3.5 Analysis and Discussion
3.5.1 Chronology of Case Study Decision
Number 592/Pid.sus/2019/Pn/Jkt.Brt
The chronology of this case began on Wednesday,
May 22 2019, where the West Jakarta District Court
had the authority to examine and try this case with the
defendant, Mr Daniel Iskandar, along with other
colleagues. who sell customer data using the financial
information reporting system (SLIK) of the financial
services authority (OJK) which contains the NIK
KTP, complete address of the customer, address of
work place, registered with any bank, number of
credit card limits, current or not credit card payments,
the data was sold for IDR 100,000 (One Hundred
Thousand Rupiah) per data. After obtaining the
customer data, the perpetrators launched a crime
starting with the victim named Mr. Ilham Bintang.
The perpetrator tried to contact Mr. Ilham
Bintang's telephone number but could not be
contacted because Mr. Ilham Bintang was in
Australia. Next, another suspect made a Subscriber
Identity Module for mobile or a new SIM card to get
a duplicate of Mr. Ilham Bintang's telephone number
by using a fake KTP in the name of Mr. Ilham.
Bintang at the Indosat outlet in the shopping center in
the Bintaro area. The fake ID card was made by one
of the female perpetrators with the initials TR in
Jakarta for IDR 1,250,000 (One million two hundred
and fifty thousand rupiah), then the ID card was made
At the request of perpetrator TR and perpetrator W,
the fake data and images (in separate files) sent by
perpetrator D alias E were handed over again to be
made to the perpetrator with the initials JW in the area
of Jl. Ciputat Raya No. 4, Pondok Pinang, Jakarta -
South with costs Rp. 300,000,- (Three hundred
thousand rupiah).
The syndicate of perpetrators then shared the task
of handing over Mr. Ilham Bintang's duplicate
number to other perpetrators to then break into the
account by hacking his personal e- mail account then
entering the Yahoo application to find out Mr. Ilham
Bintang's personal e-mail because it required a
password to open it. When asked to reset (To open
Mr. Ilham Bintang's e- mail, an OTP (One Time
Password) was sent to the new telephone number. So,
that was used as data to change the password (Br
Ilham Bintang's personal e-mail).
Then after the e-mail was opened, the bank data
was opened, so (Mr. Ilham Bintang's) account was
completely drained, because of this there was an
unknown transaction used on Mr. Ilham Bintang's
BNI Bank credit card by the perpetrator by making
purchases at LAZADA in the form of Vouchers. gold
amounting to Rp. 8,500,000,- (eight million five
hundred thousand rupiah) for 10 transactions totaling
Rp. 85,000,000,- (eighty five million rupiah) after
successfully spending the gold Voucher then
Redeeming the Voucher to the Pluang account
becomes After the Gold became Gold, the Gold was
bought for Rp. 85,000,000,- (Eighty-five million
rupiah) which was then resold by one of the
perpetrators with the initials E on the Pluang
application for Rp. 83,000,000,- (Eighty-three
million rupiah) within 2 (two) days the Pluang
application transferred Rp. 83,000,000,- (Eighty-
three million rupiah), to the Bank Sumsel Babel
account in the name of the perpetrator with the initials
AT in the amount of Rp. 37,000,000,- (Thirty seven
million rupiah) and to the BCA account of the
perpetrator with the initials NM amounting to Rp.
46,000,000,- (Forty-six million rupiah), while on Mr.
Ilham Bintang's M-Banking Commonwealth Bank
ID, a savings balance of approximately Rp.
255,124,666 was seen. ,- (Two hundred fifty-five
million one hundred twenty-four thousand six
hundred and sixty-six rupiah) at that time the balance
of the money savings had been used by the
perpetrator, stealing money through Commonwealth
Bank accounts and BNI Bank credit cards totaling
IDR 385,000 ,000 (three hundred and eighty-five
million rupiah), the perpetrator carried out this
operation by transferring transfers to other perpetrator
syndicates using various banks.
So according to Mr. Ilham Bintang, the losses in
the 2 (two) Commonwealth Bank accounts and the
BNI 46 Bank Credit Card were: Savings account
amounting to Rp. 61,405,491,- (Sixty one million
four hundred five thousand four hundred and ninety
one rupiah), Australian Dollar savings account
amounting to AUD.25,263 (Twenty five thousand
two hundred and sixty three Australian dollars) and
BNI Bank Credit Card 46 amounting to
Rp.85,000,000,- (Eighty five million rupiah).
The five defendants who underwent trial with split
cases included Desar (20), Teti Rosmiawati (46),
Wasno (52), Amran Yunianto (53), and Pegik (28).
Based on the evidence and facts obtained during the
trial, the defendant has been legally and convincingly
proven to have committed a crime, namely taking
customer funds by breaking into customer
accounts/hacking customer data, attempting to break
into credit cards, hacking or hacking telephones. , as
well as falsifying identity/KTP so that the panel of
judges imposed criminal sanctions in accordance with
Article 35 in conjunction with Article 51 paragraph
(1) in conjunction with Article 30 in conjunction with
Juridical Review of Taking Customer Funds Without Rights Through Electronic Transactions: Study Decision Number
592/Pid.sus/2019/Pn/Jkt.Brt
507