Kekuatan Digital Forensik dalam Mengungkap Tindak Pidana Cyber Crime

Studi Kasus : Hacker Ilegal Akses Pembayaran Kereta Commuter Indonesia (KCI))

Authors

  • Ira Irmansyah Universitas Pancasila

DOI:

https://doi.org/10.56910/jispendiora.v3i3.2949

Keywords:

Evidence, Cyber, Digital, Forensics, Security

Abstract

This research discusses the strategic role of digital forensics in uncovering cyber crime with a case study of the hacking of the Multi Trip Card (KMT) payment system owned by the Indonesian Commuter Train (KCI). This case involves perpetrators who use illegal software to manipulate digital balances on KMT cards, so that they only pay a small amount but get a large balance. This phenomenon causes financial losses as well as threats to public trust in electronic payment systems. The research method used is qualitative descriptive with a case study approach. The analysis was carried out on various digital traces, ranging from server logs, transaction records, to metadata that becomes electronic evidence. Digital forensics plays a role in the process of identifying, collecting, securing and analyzing data to ensure the validity of evidence. The findings suggest that electronic evidence can have legal force if obtained through lawful procedures, for example by using chains of custody and standardized forensic analysis methods. In addition, this study highlights the weakness of digital security systems that are a loophole for cybercriminals. Digital forensics is not only important in the investigation stage, but also as a means of security evaluation to anticipate similar crimes. Law enforcement against cases like this requires collaboration between law enforcement officials, forensic experts, digital service providers, and regulators. The application of the latest security technologies, such as data encryption, anomaly detection systems, and periodic audits, is considered to be able to minimize the potential for manipulation. The implication of this research is the need to increase awareness, strengthen regulations, and technological innovation in dealing with the development of cyber crime. Digital forensics is proving to be a vital instrument that not only supports investigations, but also maintains the integrity of digital systems.

References

Arief, B. N. (2005). Pembaharuan hukum pidana dalam perspektif kajian perbandingan (Cet. 1). Bandung: Citra Aditya Bakti.

Arifah, D. A. (2011). Kasus cybercrime di Indonesia. Jurnal Bisnis dan Ekonomi, 18(2), 185-195. file:///C:/Users/User/Downloads/fvm939e.pdf

Djanggih, H. (2013, November 15). Kebijakan hukum pidana dalam penanggulangan cybercrime di bidang kesusilaan. Jurnal Media Hukum, 1(2). https://osf.io/c9m25

Ekundayo, F. (2024, November 30). Big data and machine learning in digital forensics: Predictive technology for proactive crime prevention. World Journal of Advanced Research and Reviews, 24(2), 2692-2709. https://wjarr.com/node/16513

Hermawan, R. (2013). Kesiapan aparatur pemerintah dalam menghadapi. Jurnal Teknik Informatika, 6(1), 43-50.

https://doi.org/10.14569/IJACSA.2022.0130939

https://doi.org/10.30574/wjarr.2024.24.2.3659

https://doi.org/10.33172/jpbh.v7i2.193

https://doi.org/10.36106/ijsr/9633529

https://doi.org/10.4018/979-8-3693-6517-5.ch011

https://doi.org/10.5120/ijca2017914729

https://doi.org/10.54938/ijemdcsai.2022.01.1.37

https://doi.org/10.62311/nesx/97422614

K, Y., & Venumadhava, G. S. (2022, February 1). Cyber forensic tools and its application in the investigation of digital crimes: Preventive measures with case studies. International Journal of Scientific Research, 71-73. https://www.worldwidejournals.com/international-journal-of-scientific-research-(IJSR)/fileview/cyber-forensic-tools-and-its-application-in-the-investigation-of-digital-crimes-preventive-measures-with-case-studies_February_2022_6126714570_9633529.pdf

Krishna Pasupuleti, M. (2024). Digital forensics uncovering cyber evidence. In Digital forensic science (pp. 41-49). National Education Services. https://www.nationaleducationservices.org/digital-forensics-uncovering-cyber-evidence/pid-2226747091

Legacy, S. (2024, September). Cyber forensics and cyber crime investigation: Utilizing AI for faster and more accurate results.

Magdalena, M., & Setiyadi, M. R. (2007). Cyberlaw, tidak perlu takut (Ed. 1). Yogyakarta: Andi.

Makarim, E. (2003). Kompilasi hukum telematika (Ed. 1). Jakarta: University Press.

Mansur, D. M. A., & Gultom, E. (2005). Cyber law: Aspek hukum teknologi informasi (Ed. 1). Bandung: Refika Aditama.

Mariyanna, S. K. (2017). Post graduate diploma cyber law & cyber forensics machine learning for cyber forensics and judicial admissibility project assignment submitted by Shiva Kumar Mariyanna ID No. CLCF/667/17 year of study.

Muis, M. (2019). Penanggulangan cyber crime. Universitas Muhamadiyah Sumatera Utara.

Mumpuni, A. (2024). Pemuda Depok berhasil bobol saldo KAI Rp12 juta, begini modusnya. Tirto.id2. https://tirto.id/pemuda-depok-berhasil-bobol-saldo-kai-rp12-juta-begini-modusnya-gWFx#google_vignette

Nurcahyo, A. T. (2024). Polisi ungkap cara pelaku bobol sistem top up saldo KMT KAI Commuter, raup Rp12 juta selama 3 hari. Prfmnews.id. https://prfmnews.pikiran-rakyat.com/nasional/pr-137805231/polisi-ungkap-cara-pelaku-bobol-sistem-top-up-saldo-kmt-kai-commuter-raup-rp12-juta-selama-3-hari?page=all

Rahmawati, I. (2017). The analysis of cyber crime threat risk management to increase cyber defense. Jurnal Pertahanan & Bela Negara, 7(2), 51-66.

Ramli, A. M. (2006). Cyber law and HAKI dalam sistem hukum Indonesia (Ed. 1). Bandung: Abacus.

Riadi, I., Fadlil, A., & Sari, T. (2017, July 17). Image forensic for detecting splicing image with distance function. International Journal of Computer Applications, 169(5), 6-10. http://www.ijcaonline.org/archives/volume169/number5/riadi-2017-ijca-914729.pdf

Rukmini, M. (2006). Aspek hukum pidana dan kriminologi: Sebuah bunga rampai (Cet. 1). Bandung: Refika Aditama.

Sahetapy. (2005). Pisau analisis kriminologi (E. L. Sahetapy, Ed., Ed. 1). Bandung: Citra Aditya Bakti.

Saputro, B. N. J. A. (2014). Kepastian hukum bukti digital cybercrime dalam komputer forensik. Universitas Jember.

Singh, A., Singh, S. K., Vege, H. K., & Singh, N. (2022). A framework for crime detection and diminution in digital forensics (CD3F). International Journal of Advanced Computer Science and Applications, 13(9). http://thesai.org/Publications/ViewPaper?Volume=13&Issue=9&Code=IJACSA&SerialNo=39

Sitompul, A. (2004). Hukum internet (Cet. 2). Bandung: Citra Aditya Bakti.

Subair, S., Yosif, D., Ahmed, A., & Thron, C. (2022, May 30). Cyber crime forensics. International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence, 1(1), 41-49. http://ojs.ijemd.com/index.php/ComputerScienceAI/article/view/37

Suhariyanto, B. (2013). Tindak pidana teknologi informasi (cybercrime): Urgensi pengaturan dan celah hukumnya (Ed. 1). Jakarta: Rajawali Pers.

Suparni, N. (2009). Cyberspace: Problematika dan antisipasi pengaturannya (Ed. 1). Jakarta: Sinar Grafika.

Wahid, A., & Labib, M. (2005). Kejahatan mayantara: Cyber crime (Ed. 1). Jakarta: Refika Aditama.

Widodo. (2009). Sistem pemidanaan dalam cyber crime: Alternatif ancaman pidana kerja sosial dan pidana pengawasan bagi pelaku cyber crime (Ed. 1). Yogyakarta: Laksbang Mediatama.

Yogi, M. K., & Mundru, Y. (2024). Illuminating evidence. In Redefining security with cyber AI (pp. 195-229). https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-6517-5.ch011

Yustia, M. A. (2010). Pembuktian dalam hukum pidana Indonesia terhadap cyber crime. Jurnal Pranata Hukum, 5(2), 77-90.

Downloads

Published

2025-07-30

How to Cite

Ira Irmansyah. (2025). Kekuatan Digital Forensik dalam Mengungkap Tindak Pidana Cyber Crime : Studi Kasus : Hacker Ilegal Akses Pembayaran Kereta Commuter Indonesia (KCI)). JISPENDIORA Jurnal Ilmu Sosial Pendidikan Dan Humaniora, 3(3), 119–132. https://doi.org/10.56910/jispendiora.v3i3.2949

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.