Bjorka: A Cyber Crime Phenomenon Which Gets Support from the Community Using Analysis of Criminological Perspective
Abstract
Indonesia is experiencing several cybercrimes mostly in the form of online fraud and extortion, phishing and hacking. Since the Covid-19 pandemic hit, Indonesia has been faced with several hacking cases containing Indonesian people's personal data where this data was traded illegally on internet sites. One case that has received a lot of attention from the public in a longer period of time than usual is the hacking case by a hacker named Bjorka. However, the cyber crime case in the form of hacking and doxing that was carried out by Bjorka actually received support from the majority of Indonesian people rather than criticism. The criticism of the Indonesian people was actually directed at the government and this criticism was getting stronger driven by the hacktivism carried out by Bjorka. The research was compiled with the aim of knowing the background and factors that made the Bjorka cybercrime case different and popular among the public and thus gained support through a criminological perspective. The method used to compile this research is a qualitative method with literature study. This paper concludes that according to the RAT (Routine Activity Theory) Bjorka's cybercrime has succeeded in attracting the attention of the Indonesian people because Bjorka has the right motivation as an actor and target of victims, besides that government agencies are unable to maintain national cyber security with solidity. This study also has the conclusion that Bjorka received public support through his hacktivism on social media.
Keywords
Full Text:
PDFReferences
BSSN. (2022). Tentang BSSN. BSSN.go.id. Retrieved October 26, 2022, from https://bssn.go.id/tentang-bssn/
Cambridge Dictionary. (2022, October 19). DOXING | English meaning - Cambridge Dictionary. Cambridge Dictionary. Retrieved October 26, 2022, from https://dictionary.cambridge.org/dictionary/english/doxing
Choi, K.-S., Lee, C. S., & Louderback, E. R. (2020). Historical Evolutions of Cybercrime: From Computer Crime to Cybercrime. In T. J. Holt & A. M. Bossler (Eds.), The Palgrave Handbook of International Cybercrime and Cyberdeviance. Springer International Publishing.
CNN Indonesia. (2021, February 17). Database Kejaksaan RI Diretas, Hacker Sebut Jokowi dan UU ITE. CNN Indonesia. https://www.cnnindonesia.com/teknologi/20210217152812-185- 607441/database-kejaksaan-ri-diretas-hacker-sebut-jokowi-dan-uu-ite
CNN Indonesia. (2022, September 12). Jokowi Bentuk Tim Khusus Respons Serangan Bjorka. CNN Indonesia. https://www.cnnindonesia.com/nasional/20220912162500-32-846753/jokowi- bentuk-tim-khusus-respons-serangan-bjorka
Cohen, L. E., & Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review, 44(4), 588–608. https://doi.org/10.2307/2094589
Dewi, I. R. (2022, September 14). Bikin Heboh RI, Data Apa Saja yang Dibocorkan Hacker Bjorka? CNBC Indonesia.https://www.cnbcindonesia.com/tech/20220914095826-37-371939/bikin- heboh-ri-data-apa-saja-yang-dibocorkan-hacker-bjorka?page=all
Dupont, B., & Whelan, C. (2021). Enhancing relationships between criminology and cybersecurity. Journal of Criminology, 54(1), 76–92.10.1177/00048658211003925
Fedotov, Y. (2017, October 23). In Just Two Decades, Technology Has Become A Cornerstone Of Criminality. unodc. Retrieved October 26, 2022, from https://www.unodc.org/unodc/en/frontpage/2017/October/in-just-two- decades--technology-has-become-a-cornerstone-of-criminality.html
Felson, M. (1998). Opportunity Makes the Thief Practical theory for crime prevention. Police Research Series Paper, 98.
Franedya, R. (2020, May 7). 91 Juta Data Pengguna Bocor, Tokopedia Digugat Rp 100 M. CNBC Indonesia. https://www.cnbcindonesia.com/tech/20200507083340-37-156876/91-juta- data-pengguna-bocor-tokopedia-digugat-rp-100-m
Hagan, F. E., & Daigle, L. E. (2018). Introduction to Criminology: Theories, Methods, and Criminal Behavior. SAGE Publications.
Hardiansyah, Z. (2022, September 7). Apa Itu Breached Forums yang Terlibat 4 Kasus Kebocoran Data di Indonesia Sebulan Terakhir? Halaman all - Kompas.com. Kompas Tekno.https://tekno.kompas.com/read/2022/09/07/16150067/apa-itu-breached- forums-yang-terlibat-4-kasus-kebocoran-data-di-indonesia?page=all
Hardiansyah, Z. (2022, September 12). Rentetan Aksi Hacker Bjorka dalam Kasus Kebocoran Data di Indonesia Sebulan Terakhir Halaman all - Kompas.com. Kompas Tekno. Retrieved October 26, 2022, from https://tekno.kompas.com/read/2022/09/12/11000027/rentetan-aksi-hacker- bjorka-dalam-kasus-kebocoran-data-di-indonesia-sebulan
Jordan, T., & Taylor, P. (2004). Hacktivism and Cyberwars: Rebels with a Cause?Taylor & Francis.Karagiannopoulos, V. (2018). Living With Hacktivism: From Conflict to Symbiosis(V. Karagiannopoulos, Ed.). Springer International Publishing.
Newburn, T. (2017). Criminology. Routledge.
Nugraheny, D. E. (2022, September 10). Ini Dokumen yang Diklaim Milik Jokowi dan Diunggah Hacker Bjorka, Ada yang Diberi Label Rahasia. Kompas.com. https://nasional.kompas.com/read/2022/09/10/15331111/ini-dokumen-yang- diklaim-milik-jokowi-dan-diunggah-hacker-bjorka-ada-yang
Pasculli, L. (2020). The Global Causes of Cybercrime and State Responsibilities: Towards an Integrated Interdisciplinary Theory. Journal of Ethics and Legal Technologies (JELT), 2(1), 48-74.
Pospisil, B., Huber, E., Quirchmayr, G., & Seboeck, W. (2019). Modus Operandi in Cybercrime. In M. Khosrowpour (Ed.), Encyclopedia of Criminal Activities and the Deep Web, VOL 1. IGI Global.
Song, D. (2018). What Is Cybercrime? A Criminology Perspective. Journal of the MTA-DE Public Service Research Group, 3(2), 11-15. DOI 10.21868/PGnG.2018.2.2.
Thangamuthu, P., Rathee, A., Palanimuthu, S., & Balusamy, B. (2019). Cybercrime. In M. Khosrowpour (Ed.), Encyclopedia of Criminal Activities and the Deep Web, VOL 1. IGI Global.
UNODC. (2022). Cybercrime. United Nations Office on Drugs and Crime.Retrieved October 26, 2022, from https://www.unodc.org/unodc/en/cybercrime/index.html
Wawan, J. H. (2022, September 13). Soal Bjorka, Begini Tanggapan Pakar IT UGM tentang Kebocoran Data. Detikcom. https://www.detik.com/jateng/jogja/d- 6289696/soal-bjorka-begini-tanggapan-pakar-it-ugm-tentang-kebocoran- data?utm_source=copy_url&utm_campaign=detikcomsocmed&utm_medium=btn&utm_content=jateng%20Baca%20artikel%20detikjateng,%20%22Soal%20Bjorka,%20Begini%20T
DOI: https://doi.org/10.33258/birci.v6i2.7600
Article Metrics
Abstract view : 3 timesPDF - 4 times
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.