REFORMATION OF LAW ENFORCEMENT OF CYBER CRIME IN INDONESIA

Technological progress and the presence of globalization in third world countries including Indonesia has a variety of consequences, this includes the negative impact of increasing cyber crime in Indonesia. Increasing cyber crime in the community with a variety of increasingly sophisticated modus operandi, in reality is not balanced by the existence of a comprehensive legal umbrella and also the absence of adequate facilities and pre-facilities is a separate issue in the enforcement of cyber crime cases in a dynamic society. Enforcement weaknesses are the lack of human resources of investigators who understand cyber crime, and the lack of means and pre-law enforcement facilities in cyber crime. so it is necessary to increase the HR of the relevant law enforcers as well as the improvement of facilities and pre-facilities related to law enforcement in cyber crime. enforcement weaknesses are the lack of human resources of investigators who understand cyber crime, and the lack of means and pre-law enforcement facilities in cyber crime. so it is necessary to increase the HR of the relevant law enforcers as well as the improvement of facilities and prefacilities related to law enforcement in cyber crime.


A. INTRODUCTION
Cybercrime is one of the dark sides of technological advances that have a very broad negative impact on all fields of modern life today. With the advancement of technology, it is easy for some people to enter the scope of crime simply by relying on their ability to drive the technological system. The problem of cyber crime in its development is inseparable from the problem of computer network security or internet-based information security in the current era of globalization, this can be observed even more clearly by viewing the problem of information as a commodity.
Information as a commodity has consequences in the form of the need for reliability in services related to technology-based information. To achieve the level of reliability of course the information itself must always be updated so that the information presented is not out of date. The dilemma arises when the growth of technology-based information together with the growth of new crimes, cyber crime is a crime that arises along with the rapid development of information technology.
Relating to cybercrime in Indonesia, until this time the majority of cybercrime has not been regulated in a clear legal norms in the legislation, because it was in prosecuting cybercrime applied the provisions of the Criminal Code and the provisions of the Act beyond the Criminal Code. The provisions in the Criminal Code that can be used to prosecute cybercrime by way of interpretation, extensive is the provision on the crime of counterfeiting (as stipulated in Article 263 to Article 276), the crime of theft (under Article 362 up to 367), the crime of fraud (as under Article 378 up to 395), and the crime of destruction of goods (as stipulated in Article 407 through Article 412). 1 Integration in existing regulations means making savings and preventing over criminalization As a preventive measure for all matters relating to criminal offenses in the field of computers, especially cyber, as far as possible is returned to the existing legislation, namely the Criminal Code (the Criminal Law Book) and regulations outside the Criminal Code.
Integration in existing regulations means making savings and preventing over criminalization As a preventive measure for all matters relating to criminal offenses in the field of computers, especially cyber, as far as possible is returned to the existing legislation, namely the Criminal Code (the Criminal Code) and regulations outside the Criminal Code. Integration in existing regulations means making savings and preventing over criminalization 2 , without changing Crimes committed by entering / breaking into a computer network system illegally, without permission or without the knowledge of the owner of the computer network system that he entered Usually the perpetrators (hackers) do it with the intention of sabotage or theft of important and confidential information. However, there are also those who do it only because they feel challenged to try their expertise to penetrate a system that has a high level of protection. This crime is increasingly widespread with the development of Internet / intranet technology. We certainly have not forgotten that when the East Timor problem was warmly discussed at the international level, several Indonesian government-owned websites were damaged by hackers (Kompas, 11/08/1999). Some time ago, hackers have also successfully penetrated into the data base containing the data of the users of America Online (AOL), a United States company engaged in ecommerce that has a high level of confidentiality (Indonesian Observer, 6/26/2000). The site of the Federal Bureau of Investigation (FBI) is also not spared from hacker attacks, which results in the inability of this site for some time;

b. Illegal Contents
It is a crime to enter data or information on the Internet about something that is not true, unethical, and can be considered unlawful or disturbing public order. For example, the loading of a hoax or slander that will destroy the dignity or dignity of others, matters relating to pornography or the loading of information which is state secrets, agitation and propaganda to fight legitimate government and so on;

c. Forgery Data
It is a crime to falsify data on important documents stored as scripless documents over the Internet. This crime is usually directed at e-commerce documents by making it appear as if there was a "typo" which will ultimately benefit the offender because the victim will enter personal data and credit card numbers that can be misused;

d. Cyber Espionage
It is a crime that utilizes the internet network to conduct spy activities against other parties, by entering the computer network system of the target party. This crime is usually directed against business rivals whose important which, when combined with media that can be read by a computer, will be able to make the computer work to perform special functions or to achieve specific results, including preparation in designing instructions -the construction. 6 Copyright for computer programs is valid for 50 years. The price of computer / software programs which are very expensive for Indonesian citizens is a promising opportunity for business people to duplicate and sell pirated software at very cheap prices. For example, an anti-virus program for $ 50 can be purchased for Rp. 20,000.00. Sales at very cheap prices compared to the original software generate huge profits for the perpetrators because the capital spent is not more than Rp. 5,000.00 per piece. The rise of software piracy in Indonesia that seems "understandable" is certainly very detrimental to copyright owners.

3) Law Number 36 of 1999
concerning Telecommunications According to Article 1 number (1)

Law Enforcement Reform in Cyber Crime
In its development in order to be able to realize fair cyber crime law enforcement, it is necessary to do several things, namely: a. Special laws need to be made to regulate cyber crime, with special cyber crime laws governed, issues of technological progress will not be able to hamper the course of the law, as for the law-making process according to David Eastonthat the drafting of a legal rule is inseparable from the personal influence that has the authority to create the legal regulations both individuals and groups, in addition to the person, the environment in the form of a social, economic, political, cultural, security and geographic environment as well as the effects of the judicial, legislative, and executives and community leaders and so on are also factors that influence the input of a legal regulation drafting. These factors interact with each other so that changing inputs into outputs in the process of drafting legal regulations. 10 b. In handling cybercrime cases, investigators who are experienced (not beginner investigators) are needed, their education is directed at mastering technical investigations and investigating administration as well as the basics of knowledge in the computer and hacker profiles, this has been alluded to above which states that, John Sulivan with the theory of Well MES said that the requirements to obtain good law enforcement must rest on three things, namely: 11 lawmakers must know and be motivated that being a matter of law enforcement is a challenge as well as a difficult task. In this aspect, law enforcers must have a motivation that aims not only at the interests of law enforcers, but more than that also protects victims of cyber crime.

2) Well Education
Well Education, meaning that an enforcer and law maker should meet certain educational standards. So that in addition to formal education other education is also needed related to knowledge of law, for example legal seminars and short courses. In this aspect, every law enforcement officer related to cybercrime issues must be able to be educated in depth and fair with the knowledge of law that continues to develop along with the times and technology. 12

3) Well Salary
Well Salary, This means that salaries of law enforcers and