Bjorka: A Cyber Crime Phenomenon Which Gets Support from the Community Using Analysis of Criminological Perspective

Hegar Gagah Anantaka, Eva Achjani Zulfa, Surya Nita

Abstract


Indonesia is experiencing several cybercrimes mostly in the form of online fraud and extortion, phishing and hacking. Since the Covid-19 pandemic hit, Indonesia has been faced with several hacking cases containing Indonesian people's personal data where this data was traded illegally on internet sites. One case that has received a lot of attention from the public in a longer period of time than usual is the hacking case by a hacker named Bjorka. However, the cyber crime case in the form of hacking and doxing that was carried out by Bjorka actually received support from the majority of Indonesian people rather than criticism. The criticism of the Indonesian people was actually directed at the government and this criticism was getting stronger driven by the hacktivism carried out by Bjorka. The research was compiled with the aim of knowing the background and factors that made the Bjorka cybercrime case different and popular among the public and thus gained support through a criminological perspective. The method used to compile this research is a qualitative method with literature study. This paper concludes that according to the RAT (Routine Activity Theory) Bjorka's cybercrime has succeeded in attracting the attention of the Indonesian people because Bjorka has the right motivation as an actor and target of victims, besides that government agencies are unable to maintain national cyber security with solidity. This study also has the conclusion that Bjorka received public support through his hacktivism on social media.


Keywords


Cybercrime; hacktivism; Indonesia; routine activity theory

Full Text:

PDF

References


BSSN. (2022). Tentang BSSN. BSSN.go.id. Retrieved October 26, 2022, from https://bssn.go.id/tentang-bssn/

Cambridge Dictionary. (2022, October 19). DOXING | English meaning - Cambridge Dictionary. Cambridge Dictionary. Retrieved October 26, 2022, from https://dictionary.cambridge.org/dictionary/english/doxing

Choi, K.-S., Lee, C. S., & Louderback, E. R. (2020). Historical Evolutions of Cybercrime: From Computer Crime to Cybercrime. In T. J. Holt & A. M. Bossler (Eds.), The Palgrave Handbook of International Cybercrime and Cyberdeviance. Springer International Publishing.

CNN Indonesia. (2021, February 17). Database Kejaksaan RI Diretas, Hacker Sebut Jokowi dan UU ITE. CNN Indonesia. https://www.cnnindonesia.com/teknologi/20210217152812-185- 607441/database-kejaksaan-ri-diretas-hacker-sebut-jokowi-dan-uu-ite

CNN Indonesia. (2022, September 12). Jokowi Bentuk Tim Khusus Respons Serangan Bjorka. CNN Indonesia. https://www.cnnindonesia.com/nasional/20220912162500-32-846753/jokowi- bentuk-tim-khusus-respons-serangan-bjorka

Cohen, L. E., & Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review, 44(4), 588–608. https://doi.org/10.2307/2094589

Dewi, I. R. (2022, September 14). Bikin Heboh RI, Data Apa Saja yang Dibocorkan Hacker Bjorka? CNBC Indonesia.https://www.cnbcindonesia.com/tech/20220914095826-37-371939/bikin- heboh-ri-data-apa-saja-yang-dibocorkan-hacker-bjorka?page=all

Dupont, B., & Whelan, C. (2021). Enhancing relationships between criminology and cybersecurity. Journal of Criminology, 54(1), 76–92.10.1177/00048658211003925

Fedotov, Y. (2017, October 23). In Just Two Decades, Technology Has Become A Cornerstone Of Criminality. unodc. Retrieved October 26, 2022, from https://www.unodc.org/unodc/en/frontpage/2017/October/in-just-two- decades--technology-has-become-a-cornerstone-of-criminality.html

Felson, M. (1998). Opportunity Makes the Thief Practical theory for crime prevention. Police Research Series Paper, 98.

Franedya, R. (2020, May 7). 91 Juta Data Pengguna Bocor, Tokopedia Digugat Rp 100 M. CNBC Indonesia. https://www.cnbcindonesia.com/tech/20200507083340-37-156876/91-juta- data-pengguna-bocor-tokopedia-digugat-rp-100-m

Hagan, F. E., & Daigle, L. E. (2018). Introduction to Criminology: Theories, Methods, and Criminal Behavior. SAGE Publications.

Hardiansyah, Z. (2022, September 7). Apa Itu Breached Forums yang Terlibat 4 Kasus Kebocoran Data di Indonesia Sebulan Terakhir? Halaman all - Kompas.com. Kompas Tekno.https://tekno.kompas.com/read/2022/09/07/16150067/apa-itu-breached- forums-yang-terlibat-4-kasus-kebocoran-data-di-indonesia?page=all

Hardiansyah, Z. (2022, September 12). Rentetan Aksi Hacker Bjorka dalam Kasus Kebocoran Data di Indonesia Sebulan Terakhir Halaman all - Kompas.com. Kompas Tekno. Retrieved October 26, 2022, from https://tekno.kompas.com/read/2022/09/12/11000027/rentetan-aksi-hacker- bjorka-dalam-kasus-kebocoran-data-di-indonesia-sebulan

Jordan, T., & Taylor, P. (2004). Hacktivism and Cyberwars: Rebels with a Cause?Taylor & Francis.Karagiannopoulos, V. (2018). Living With Hacktivism: From Conflict to Symbiosis(V. Karagiannopoulos, Ed.). Springer International Publishing.

Newburn, T. (2017). Criminology. Routledge.

Nugraheny, D. E. (2022, September 10). Ini Dokumen yang Diklaim Milik Jokowi dan Diunggah Hacker Bjorka, Ada yang Diberi Label Rahasia. Kompas.com. https://nasional.kompas.com/read/2022/09/10/15331111/ini-dokumen-yang- diklaim-milik-jokowi-dan-diunggah-hacker-bjorka-ada-yang

Pasculli, L. (2020). The Global Causes of Cybercrime and State Responsibilities: Towards an Integrated Interdisciplinary Theory. Journal of Ethics and Legal Technologies (JELT), 2(1), 48-74.

Pospisil, B., Huber, E., Quirchmayr, G., & Seboeck, W. (2019). Modus Operandi in Cybercrime. In M. Khosrowpour (Ed.), Encyclopedia of Criminal Activities and the Deep Web, VOL 1. IGI Global.

Song, D. (2018). What Is Cybercrime? A Criminology Perspective. Journal of the MTA-DE Public Service Research Group, 3(2), 11-15. DOI 10.21868/PGnG.2018.2.2.

Thangamuthu, P., Rathee, A., Palanimuthu, S., & Balusamy, B. (2019). Cybercrime. In M. Khosrowpour (Ed.), Encyclopedia of Criminal Activities and the Deep Web, VOL 1. IGI Global.

UNODC. (2022). Cybercrime. United Nations Office on Drugs and Crime.Retrieved October 26, 2022, from https://www.unodc.org/unodc/en/cybercrime/index.html

Wawan, J. H. (2022, September 13). Soal Bjorka, Begini Tanggapan Pakar IT UGM tentang Kebocoran Data. Detikcom. https://www.detik.com/jateng/jogja/d- 6289696/soal-bjorka-begini-tanggapan-pakar-it-ugm-tentang-kebocoran- data?utm_source=copy_url&utm_campaign=detikcomsocmed&utm_medium=btn&utm_content=jateng%20Baca%20artikel%20detikjateng,%20%22Soal%20Bjorka,%20Begini%20T




DOI: https://doi.org/10.33258/birci.v6i2.7600

Article Metrics

Abstract view : 3 times
PDF - 4 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.