ENFORCEMENT OF LAWS AGAINST THE SALE OF PHISHING LINKS FOR THE PURPOSE OF PERSONAL DATA THEFT BASED ON THE ITE LAW
Universitas Bhayangkara Surabaya
Universitas Bhayangkara Surabaya
DOI:
https://doi.org/10.56943/jcj.v3i4.802The rapid growth of cybercrime poses significant threats to personal data security, with phishing emerging as one of the most common methods. Phishing involves tricking individuals into revealing confidential information, and a concerning development is the creation and sale of phishing links to facilitate personal data theft. This situation raises legal questions regarding the sufficiency of current regulations to address such acts. This study aims to examine the legal framework governing the buying and selling of phishing links and to assess law enforcement efforts in handling these activities. The research applies a normative juridical method, combining statutory and conceptual approaches, and relies on the analysis of legislation and relevant legal literature. The study finds that phishing link sellers may be prosecuted under Article 34 paragraph (1) letter a in conjunction with Article 50, as well as Article 35 in conjunction with Article 51 paragraph (1) of the ITE Law. Phishing link buyers can be charged under Article 28 paragraph (1) in conjunction with Article 45A paragraph (1) of the ITE Law and Article 65 paragraph (1) in conjunction with Article 67 paragraph (1) of the Personal Data Protection Law. Nonetheless, these provisions remain insufficient, as they do not explicitly regulate the sale of phishing links and leave room for multiple interpretations. Law enforcement involves preventive actions through public and institutional collaboration and repressive measures through the imposition of criminal penalties.
Keywords: Buying and Selling Law Enforcement Personal Data Phising
Ahammad, SK Hasane, Sunil D. Kale, Gopal D. Upadhye, Sandeep Dwarkanath Pande, E Venkatesh Babu, Amol V. Dhumane, and Mr. Dilip Kumar Jang Bahadur. “Phishing URL Detection Using Machine Learning Methods.” Advances in Engineering Software 173 (November 2022): 103288. https://linkinghub.elsevier.com/retrieve/pii/S0965997822001892.
Alkhalil, Zainab, Chaminda Hewage, Liqaa Nawaf, and Imtiaz Khan. “Phishing Attacks: A Recent Comprehensive Study and a New Anatomy.” Frontiers in Computer Science 3 (March 2021): 563060.
Aminudin, Muhammad. “Lagi! Rekening Nasabah Bank Dibobol Rp 549 Juta Gegara Buka Link .PDF.” Detik Jatim.
Arliman, Laurensius. “MEWUJUDKAN PENEGAKAN HUKUM YANG BAIK UNTUK MEWUJUDKAN INDONESIA SEBAGAI NEGARA HUKUM.” Doctrinal 2, no. 2 (June 2020): 509–532.
Atmasasmita, Prof. Dr. Romli. Hukum Kejahatan Bisnis: Teori & Praktik Di Era Globalisasi. 1st ed. Jakarta: KENCANA, 2014.
Chin, Tommy, Kaiqi Xiong, and Chengbin Hu. “Phishlimiter: A Phishing Detection and Mitigation Approach Using Software-Defined Networking.” IEEE Access 6 (2018): 42516–42531. https://ieeexplore.ieee.org/document/8387883/.
D’Este, Pablo, Surya Mahdi, Andy D. Neely, and Francesco Rentocchini. “Inventors and Entrepreneurs in Academia: What Types of Skills and Experience Matter?” SSRN Electronic Journal (2011). http://www.ssrn.com/abstract=1951845.
Evandio, Akbar. “Serangan Phising Meningkat, Ini Cara Antisipasinya.” BISNIS TEKNO.
Fanasafa, Irfan. “Waspada Kejahatan Phising Mengintai Anda.” Website DJKN.
Fuad, Fokky, Istiqomah Istiqomah, and Suparji Achmad. “DIALEKTIKA PERLINDUNGAN HUKUM BAGI GURU DALAM MENDISIPLINKAN SISWA DI SEKOLAH.” Indonesian Journal of Law and Policy Studies 1, no. 1 (May 2020): 55–64.
Ghazi-Tehrani, Adam Kavon, and Henry N. Pontell. “Phishing Evolves: Analyzing the Enduring Cybercrime.” Victims & Offenders 16, no. 3 (April 3, 2021): 316–342. https://www.tandfonline.com/doi/full/10.1080/15564886.2020.1829224.
Hadjon, Philipus M. Pengantar Hukum Administrasi Indonesia. 10th ed. Yogyakarta: Gadjah Mada University Press, 2008.
Hamzah;, Andi. Asas-Asas Hukum Pidana / Andi Hamzah. Jakarta: Rineka Cipta, 2008.
Hasan, Fayyad-Kazan, Kassem-Moussa Sondos, Hejase Hussin J, and Hejase Ale J. “Forensic Analysis of Private Browsing Mechanisms: Tracing Internet Activities.” Journal of Forensic Science and Research 5, no. 1 (March 8, 2021): 012–019. https://www.forensicscijournal.com/articles/jfsr-aid1022.php.
Hassan, Md Arif, Zarina Shukur, and Mohammad Kamrul Hasan. “An Efficient Secure Electronic Payment System for E-Commerce.” Computers 9, no. 3 (August 27, 2020): 66. https://www.mdpi.com/2073-431X/9/3/66.
Ibrahim, Dr. Johnny. Teori & Metodologi Penelitian Hukum Normatif. Bayu Media, 2013.
Khan, Shereen, Tajneen Saleh, Magiswary Dorasamy, Nasreen Khan, Olivia Tan Swee Leng, and Rossanne Gale Vergara. “A Systematic Literature Review on Cybercrime Legislation.” F1000Research 11 (August 23, 2022): 971. https://f1000research.com/articles/11-971/v1.
Kuzmin, Yury A. “IDENTITY THEFT (CRIMINOLOGICAL ASPECT).” Oeconomia et Jus, no. 3 (September 28, 2020): 48–57. http://oecomia-et-jus.ru/en/en-singlenum/.
Leiva, Llysselie Gay Querol. “Impact of Information and Communication Technologies on Everyday Life.” Management (Montevideo) 3 (February 8, 2025): 130. https://managment.ageditor.uy/index.php/managment/article/view/130.
Lokapala, Yazid Haikal, Fuad Januar Nurfauzi, and Yeni Widowaty. “Aspek Yuridis Kejahatan Phishing Dalam Ketentuan Hukum Di Indonesia.” Indonesian Journal of Criminal Law and Criminology (IJCLC) 5, no. 1 (June 11, 2024). https://journal.umy.ac.id/index.php/ijclc/article/view/19853.
Makari, Edmon. “Informasi Hukum Untuk Sistem Ketahanan Nasional Terhadap Penyelenggaraan Sistem Dan Komunikasi Elektronik Global.” Jurnal Ketahanan Nasional (2014): 77.
Makuch, Anna. “Raising Public and Private User Awareness of the Threats and Risks Related to Cyberspace Security.” Cybersecurity and Law 8, no. 2 (December 6, 2022): 44–55. http://www.cybersecurityandlaw.com/Raising-public-and-private-user-awareness-of-the-threats-and-risks-related-to-cyberspace,157123,0,2.html.
Marzuki, Prof. Dr. Peter Mahmud. Pengantar Ilmu Hukum. Revisi. Jakarta: KENCANA, 2017.
Nduka, Rapuluchukwu Ernest, and Vinesh Basdeo. “The Need for Harmonised and Specialised Global Legislation to Address the Growing Spectre of Cybercrime.” Southern African Public Law 36, no. 2 (January 28, 2022). https://unisapressjournals.co.za/index.php/SAPL/article/view/8112.
Ngafifi, Muhamad. “KEMAJUAN TEKNOLOGI DAN POLA HIDUP MANUSIA DALAM PERSPEKTIF SOSIAL BUDAYA.” Jurnal Pembangunan Pendidikan: Fondasi dan Aplikasi 2, no. 1 (June 2014).
Rahardjo, Satjipto. Ilmu Hukum. 8th ed. Bandung: PT Citra Aditya Bakti, 2014.
———. Penegakan Hukum: Suatu Tinjauan Sosiologis. Yogyakarta: Genta Publishing, 2009.
Ratna, Yulvita, and Gunawan Djajaputra. “LEGAL LIABILITY OF PROPERTY DEVELOPERS REGARDING THE FULFILLMENT OF OBLIGATIONS TO CONSUMERS IN SALE AND PURCHASE TRANSACTIONS USING THE BINDING SALE AND PURCHASE AGREEMENT.” Awang Long Law Review 6, no. 2 (May 31, 2024): 453–459. https://ijsshr.in/v5i8/66.php.
Ryazanova, Ekaterina. “Responsibility for the Dissemination of Personal Data as a Way to Counteract Offenses in the Field of Information and Communication Technologies.” Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2022, no. 3 (October 3, 2022): 118–123. http://vestnikspbmvd.ru/en/nauka/article/48998/view.
Shidarta. Hukum Penalaran Dan Penalaran Hukum. 1st ed. Genta Publishing, 2013.
Sukirno, Edy Lisdiyono, and Sri Mulyani. “Implications of Legal Positivism on Cybercrime Law Enforcement in Indonesia in the Case of the Hacking of the Mojokerto City Government Website.” International Journal of Criminology and Sociology 10 (April 26, 2021): 891–896. https://lifescienceglobal.com/pms/index.php/ijcs/article/view/7427.
Williams, Emma J, and Adam N Joinson. “Developing a Measure of Information Seeking about Phishing.” Journal of Cybersecurity 6, no. 1 (January 1, 2020). https://academic.oup.com/cybersecurity/article/doi/10.1093/cybsec/tyaa001/5748294.
Zam, Efvy. Phishing : Teknik Mudah Penyadapan Password Dan Pencegahannya. Jakarta: Mediakita, 2014.
“Teori-Teori Perlindungan Hukum Menurut Para Ahli.” Hukum Online.