Claim Missing Document
Check
Articles

Found 7 Documents
Search

Upaya Penyidik dalam Mendapatkan Alat Bukti dari Yurisdiksi Asing Melalui Kerja Sama Antar Negara Haryudiawan, Arif; Basir, Basir; Aminanto, Muhamad Erza
Syntax Literate Jurnal Ilmiah Indonesia
Publisher : CV. Ridwan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4530.367 KB) | DOI: 10.36418/syntax-literate.v6i8.3884

Abstract

Perkembangan dunia saat ini semakin global dan teknologi yang sangat cepat dan canggih mengakibatkan terjadinya berbagai perubahan sosial di masyarakat. Penelitian ini bertujuan untuk menganalisis praktik penyidikan tindak pidana siber khususnya skimming yang dilakukan oleh seorang warga negara asing (WNA) di wilayah Jakarta maupun kendala-kendala yang dihadapi oleh penyidik Direktorat Reserse Kriminal Umum (Ditreskrimum) pada Kepolisian Daerah Metropolitan Jakarta Raya (Polda Metro Jaya). Metode penelitian yang digunakan adalah kualitatif. Penyidikan yang dilakukan oleh Ditreskrimum Polda Metro Jaya pada saat ini belum memberikan hasil yang maksimal dalam pemberantasan kejahatan skimming yang dilakukan oleh WNA di Jakarta. Penyidik dalam melakukan pemenuhan alat bukti dapat melakukan kerja sama dengan aparat penegak hukum di negara asing, baik secara formal maupun informal.
THE READINESS OF THE SEMARANG CITY POLICE IN FACING SECURITY CHALLENGES ARISING FROM SOCIAL DYNAMICS AHEAD OF THE 2024 ELECTIONS Mahadika, Ivan Pradipta; Chrysnanda, Chrysnanda; Aminanto, Muhamad Erza
POLICY, LAW, NOTARY AND REGULATORY ISSUES Vol. 3 No. 1 (2024): JANUARY
Publisher : Transpublika Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55047/polri.v3i1.1000

Abstract

Indonesia's diverse culture and society, with its many islands, ethnic groups, and languages, present unique challenges for elections. Exploiting social differences in political competition can create tensions and conflicts. Sensitive issues like ethnicity, religion, race, and social groups, along with the spread of false information through social media, increase the risks. Past conflicts in Central Java and Semarang after elections highlight the danger of misunderstandings between groups. The Semarang Police must prepare for the 2024 elections by training personnel, collaborating with relevant organizations, using technology, raising community awareness, managing false information, and planning secure campaign events. The readiness of the Semarang Police is crucial in maintaining stability and preventing conflicts during the upcoming elections. This study aims to elucidate how the Semarang Police Station is prepared to face security challenges arising from social dynamics leading up to the 2024 elections. This research employs a qualitative method, drawing on national security theory, community policing theory, and the concept of readiness as theoretical frameworks. The 2024 elections in Indonesia raise concerns about security due to social dynamics. The Semarang Police Station plays a vital role in preparing for these challenges. This involves monitoring social dynamics, training personnel, collaborating with stakeholders, and enhancing conflict and security management. Despite the challenges of managing a diverse society, Indonesia's values of tolerance, inter-religious harmony, and gotong royong are sources of national strength.
Legal Comparison of Counter-Terrorism Regulations in Indonesia and Malaysia Yasman, Viora Andari; Aminanto, Muhamad Erza; Lutan, Ahwil
Budapest International Research and Critics Institute-Journal (BIRCI-Journal) Vol 5, No 4 (2022): Budapest International Research and Critics Institute November
Publisher : Budapest International Research and Critics University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33258/birci.v5i4.7370

Abstract

This study aims to explain the legal comparison of counterterrorism regulations in Indonesia and Malaysia. This is qualitative descriptive research which uses descriptive analysis. This research employs case approach and statute approach. The data was collected from primary legal materials as well as secondary legal materials. The findings reveal that anti-terrorism countermeasures have been governed in Indonesia by the anti-terrorism act, which focuses on countermeasures after a terrorist attack and prevention which gives Densus 88 the authority to investigate individuals suspected of being part of a terrorist group. Meanwhile, Malaysia has issued the ISA or Internal Security Act since 1960 as a form of defense against terrorist groups. The ISA is a regulation dealing specifically with terrorism cases, in which there are amendments in the form of authority granted to national security forces to arrest and detain individuals who are considered dangerous to national security without justice for 2 years. This policy ultimately created friction among the people because it was considered a weapon that could silence people's aspirations. With the many polemics and cons that side by side with the ISA, this is what ultimately made Malaysia revoke the ISA. As such, it can be concluded that terrorism cases are not cases that can be ignored because they involve life safety and national stability. The legal foundations for this issue must take into account a number of factors, including the principle of humanity or human rights. Regulations made specifically to handle this case will be one of the important points in the sovereignty and stability of a country, this is because terrorism cases involve many aspects in that country.
Digital Literacy as an Action Plan to Prevent Online Fraud Using the Triangle Scheme in the Jurisdiction of Makassar Police Headquarters Triananda, Rinal Krishna; S., Basir; Aminanto, Muhamad Erza
POLICY, LAW, NOTARY AND REGULATORY ISSUES Vol. 4 No. 3 (2025): JULY
Publisher : Transpublika Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55047/polri.v4i3.1801

Abstract

This research aims to evaluate the effectiveness of preventive strategies implemented by the Makassar Police Headquarters (Polrestabes) in handling triangle scheme online fraud, a form of cybercrime that is increasingly prevalent alongside the rise in online transaction activities among the public. A qualitative approach with case study methodology is used to examine in depth the digital literacy strategies initiated by Makassar Police Headquarters, including collaboration between internal functional units and synergy with external stakeholders. Research findings indicate that although institutional frameworks and legal regulations are available, the implementation of digital literacy programs still faces constraints including budget limitations, gaps in digital technology mastery, and suboptimal reach of educational programs to peripheral areas. SWOT analysis and application of social system theory, community policing, and digital literacy implementation models indicate the need for strengthening human resource capacity, diversifying socialization methods, and establishing cross-sector collaborative forums to strengthen the community's digital security ecosystem. This research recommends the formulation of strategic policies that integrate digital literacy with law enforcement based on the Information and Electronic Transaction Law, Criminal Code, as well as personal data protection and consumer protection regulations. With a comprehensive and sustainable approach, prevention of triangle scheme online fraud can be optimized as part of the national cyber security strategy.
Handling of Online Fraud Cyber Crimes During the Covid-19 Pandemic in the National Police of the Republic of Indonesia Al kindy*, Muhammad Ghazy; Nita, Surya; Aminanto, Muhamad Erza
Riwayat: Educational Journal of History and Humanities Vol 7, No 3 (2024): July, Educational and Social Issue
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24815/jr.v7i3.39698

Abstract

Electronic transactions offer various conveniences and benefits while also giving rise to legal problems, one of which is the crime of fraud. To minimize the occurrence of this, a more in-depth study is needed regarding legal regulations, forms and modes, as well as efforts to prevent and overcome them. The existence of the Covid-19 virus has had a negative impact on the reduction of workers in Indonesia and the rise of online fraud, especially using more and more electronic media. This was also influenced by the economic situation of Indonesian society when Covid-19 was on the rise. Cybercrime is a form of crime that arises from the use of internet technology. The rapid development in the use of internet services invites crime. With the increasing number of requests for internet access, crimes against the use of information technology are increasing along with the development of the technology itself. More and more parties will be harmed by the actions of cybercriminals if there is no law that regulates it.
From Compliance to Fatigue? Assessing the Effectiveness of ETLE in Indonesia’s Traffic Law Enforcement Shahab, Muhammad Ali; Handayani, Riska Sri; Aminanto, Muhamad Erza
POLICY, LAW, NOTARY AND REGULATORY ISSUES Vol. 4 No. 4 (2025): OCTOBER
Publisher : Transpublika Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55047/polri.v4i4.1820

Abstract

This study evaluates the effectiveness of Electronic Traffic Law Enforcement (ETLE) in Indonesia from 2019 to 2024, focusing on its role in increasing compliance within the framework of Deterrence Theory. Drawing on violation data from 12 urban jurisdictions (including Jakarta, Surabaya, and Denpasar) where ETLE has been implemented, the findings indicate that the system enhances the certainty of punishment, particularly in detecting administrative violations such as helmet infractions and missing documentation. However, its long-term effectiveness remains inconsistent, as fluctuations in violations suggest behavioral adaptation and deterrence fatigue. While ETLE initially led to a surge in detected violations, compliance declined in later years due to uneven enforcement between urban and rural areas, as well as limitations in addressing behavioral infractions such as reckless and distracted driving. These findings primarily reflect urban contexts, highlighting a need for broader geographic inclusion in future evaluations to ensure national applicability. The study suggests that certainty alone is insufficient for sustained deterrence without complementary measures such as effective penalty enforcement, geographic expansion, and public awareness campaigns. To maximize its impact, ETLE must be integrated with traditional law enforcement methods and adaptive policy strategies to ensure lasting compliance. Future research should assess ETLE’s direct influence on accident rates and long-term driver behavior, with particular attention to expanding the geographic scope to improve national representativeness and policy relevance.
Revisiting Cyber Threats in Government Sectors: A Systematic Review of Attacks, Challenges, and Policy-Level Defenses Nuraeni, Aisyah; Nugraha, Yudhistira; Aminanto, Muhamad Erza
International Journal of Advances in Data and Information Systems Vol. 6 No. 2 (2025): August 2025 - International Journal of Advances in Data and Information Systems
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59395/ijadis.v6i2.1404

Abstract

This paper presents a systematic literature review (SLR) based on the PRISMA framework, synthesizing 128 peer-reviewed studies published between 2020 and 2024, drawn from major scholarly databases. The review investigates cyber threats specifically targeting government institutions and identifies phishing, ransomware, malware, and denial-of-service (DoS) attacks as the most prevalent attack vectors affecting government sector environments. In addition to these threats, the study highlights persistent institutional limitations, such as outdated infrastructure, fragmented inter-agency coordination, limited technical capacity, and regulatory gaps, which hinder effective cybersecurity governance and response. To address these challenges, the review compiles both proactive and reactive mitigation strategies, emphasizing the need for SOC design principles such as scalability, interoperability, inter-agency coordination, and resilience in cyber operations. The paper synthesizes its findings into a taxonomy of threat profiles and contextual constraints, offering a foundational reference for building government-specific SOC models. It also outlines future research directions related to operational validation, capability maturity modeling, and institutional alignment in public-sector cybersecurity architectures.