We are a team from the Indonesian National Police dedicated to ensuring the security of netizens in cyberspace. Our mission involves monitoring, preventing, and investigating all forms of cybercrime. Additionally, we actively engage in public education, enlightening netizens about the implementation of the Information and Electronic Transactions (ITE) Law. Our goal is to empower individuals to avoid falling victim to cybercrime. Through this platform, let's collaborate in the fight against cybercrime to realize Indonesia's digital sovereignty.
A type of malware that targets hardware to extract valuable information from its targets, then encrypts and locks the files. The perpetrator asked for a ransom to open or access the data.
This form of cybercrime steals personal data via email, telephone or fake messages claiming to be from certain agencies. Criminals look for sensitive information like passwords, credit cards, email addresses, and OTPs for actions like theft, identity misuse, and extortion.
Cybercrime involves hacking a victim's website or email and changing its appearance. Signs of hacking can be recognized by sudden changes in the appearance of the site, such as strange pages, unclear advertisements, or even unnoticed data theft.
Impersonating authorities (e.g. banks or governments) in cybercrime. Apart from stealing data like phishing, spoofing can also spread malware to the victim's device or website. Types of spoofing include identity spoofing, IP spoofing, DNS spoofing, and website spoofing.
Cracking is an attempt to forcefully hack a computer system for illegal purposes, such as data theft and distribution of malware. Types of cracking include password cracking, software cracking, and network cracking. Avoid attacks with unique passwords, VPNs, HTTPS sites, and be careful about clicking on online links or advertisements.
The crime of wiretapping via the internet network to illegally steal sensitive data. This allows an attacker to view all data traffic, protected or not, for potential further attacks.
Data falsification is falsifying important documents over the internet, usually related to e-commerce, to obtain the victim's personal and credit card data through "typing errors". In scriptless document form, this document is stored by the institution with a database website.
OTP (One Time Password) is a temporary code for verification in smartphone applications. Its increasingly popular existence also increases the risk of cybercrime, including OTP theft attempts. OTP fraud is used for a variety of malicious acts, including tampering with accounts and carrying out illegal financial transactions.
Cyber Terrorism is a cyber crime that harms the country and threatens the safety of citizens and government. This includes attacks on computers, networks, and information systems for the purposes of intimidation, government pressure, or political gain.
Child Predators are cybercrimes that target minors and expose them to inappropriate content and treatment. These actions often occur via social media platforms such as Facebook, Instagram, Twitter, and also in online games such as Roblox.
An online scam involves deceptive activities on the internet aimed at defrauding individuals for financial gain or obtaining sensitive personal information. Perpetrators often use tactics like sending APK file to android phones, phishing emails and fake websites, posing as trustworthy entities to trick users into divulging confidential details.
Child pornography is the creation, distribution, or possession of explicit materials involving minors engaged in sexual activities. It is a criminal offense and a serious violation of child rights, with legal systems globally working to combat its production and circulation.
Employ a password manager to generate and store strong, unique passwords for each of your online accounts. This not only enhances security but also simplifies the management of multiple credentials.
Implement 2FA whenever possible to add an extra layer of security. This typically involves receiving a code on your phone or email to verify your identity when logging in. Google Authenticator is a free application that adequately fulfills additional security requirements.
Keep yourself updated on common cyber threats and scams. Awareness of phishing techniques and other tactics used by cybercriminals can help you recognize and avoid potential dangers.
Use reputable antivirus and anti-malware software on your devices. Regularly update these programs to ensure they are equipped to detect and protect against the latest cyber threats.
Avoid sharing sensitive information, such as financial details or personal identifiers, on unsecured websites or with unknown contacts. Be skeptical of unsolicited messages or emails requesting such information.
Back up important files and data regularly. In the event of a cyber attack or ransomware, having backups ensures you can restore your information without succumbing to extortion or loss.
Our Vision
Our Mission
Conduct extensive cyber campaigns and educational programs to empower citizens with the knowledge and tools needed to protect themselves from cybercrimes. This includes promoting safe online practices, recognizing phishing attempts, and understanding the importance of reporting suspicious activities.
Employ advanced cybersecurity measures and proactive monitoring to detect and prevent cybercrimes, ensuring the early identification of potential threats to Indonesian citizens' digital safety.
Foster collaboration with national and international law enforcement agencies, as well as public and private sectors, to enhance the effectiveness of cybercrime investigations. This includes information sharing, joint operations, and the development of strategies to combat evolving cyber threats.