The Criminology of Cybercrime; A Study of Online Financial Fraud and the Challenges for Indonesian Law Enforcement
Abstract
Indonesia faces escalating online financial fraud, particularly complex “Social Engineering/Mule Accounts” schemes, which strain law enforcement. A critical gap exists between the speed of these transnational digital crimes and the outdated operational capabilities of the Indonesian National Police (Polri). This study aimed to analyze the typology and high case attrition rates (unsolved cases) of online financial fraud and to critically evaluate the institutional and operational challenges faced by Indonesian law enforcement agencies in effectively investigating these offenses. sequential explanatory mixed-methods design was utilized, combining quantitative analysis of 2,150 reported fraud cases (2019–2024) with qualitative interviews (N=20) with police investigators, prosecutors, and banking compliance officers. Overall attrition stood at 68.4%, rising to 78.5% for mule account cases. The central finding is the Structural Lag Hypothesis: high attrition is a direct result of bureaucratic time lag, specifically “Jurisdictional Fragmentation” and “Slow Evidence Acquisition,” which grants criminals a critical 48-72 hour window to liquidate assets. The crime’s success is rooted in the police system’s procedural inertia, confirming that enforcement mechanisms are misaligned with the digital environment. The findings mandate urgent organizational reform, including the delegation of real-time data-sharing authority to local investigators to collapse this structural lag.
Full text article
References
Abdallah, E. E., Elsoud, E. A., & Abdallah, A. E. (2025). A Survey of Data Mining Techniques for Digital Forensic Analysis. The 16th International Conference on Ambient Systems, Networks and Technologies Networks (ANT)/ the 8th International Conference on Emerging Data and Industry 4.0 (EDI40), 257, 731–736. https://doi.org/10.1016/j.procs.2025.03.094
Abdul Rani, M. I., Syed Mustapha Nazri, S. N. F., & Zolkaflil, S. (2025). Dissecting the post-investigation actions on money mule cases in banking financial crime compliance. Journal of Money Laundering Control, 28(6), 747–763. https://doi.org/10.1108/JMLC-06-2025-0105
Aisyah, M., Sesunan, Y. S., & Wicaksono, A. T. S. (2025). Customers’ trust in Islamic banking post-cyberattack leads to digital service breakdowns in Indonesia. Sustainable Futures, 10, 101530. https://doi.org/10.1016/j.sftr.2025.101530
Akinbowale, O. E., Zerihun, M. F., & Mashigo, P. (2024). Application of Situational Crime Prevention Framework for Cybercrime Mitigation. International Journal of Cyber Behavior, Psychology and Learning, 14(1). https://doi.org/10.4018/IJCBPL.353436
AL-Raggad, A. K., & Al-Raggad, M. (2024). Analyzing trends: A bibliometric study of administrative law and forensic accounting in the digital age. Heliyon, 10(18), e37462. https://doi.org/10.1016/j.heliyon.2024.e37462
Al-Raggad, M., Albalawee, N., Al-Mahasneh, A., Abu Huson, Y., & Albajaly, A. (2025). Unveiling financial crimes: Advancing forensic accounting practices and ethical integrity through bibliometric insights. Safer Communities, 24(3), 244–264. https://doi.org/10.1108/SC-11-2024-0069
Arif, T., Camacho, D., & Park, J. H. (2025). Unveiling cybersecurity mysteries: A comprehensive survey on digital forensics trends, threats, and solutions in network security. Journal of Network and Computer Applications, 243, 104296. https://doi.org/10.1016/j.jnca.2025.104296
Balarabe, K. (2025). Digital borders and beyond: Establishing normative grounds for cybersecurity and sovereignty in international law. Computer Law & Security Review, 58, 106180. https://doi.org/10.1016/j.clsr.2025.106180
Casino, F. (2025). Unveiling the multifaceted concept of cognitive security: Trends, perspectives, and future challenges. Technology in Society, 83, 102956. https://doi.org/10.1016/j.techsoc.2025.102956
Chorozidis, G., Georgiou, K., Mittas, N., & Angelis, L. (2024). Knowledge and research mapping of the data and database forensics domains: A bibliometric analysis. Information and Software Technology, 171, 107472. https://doi.org/10.1016/j.infsof.2024.107472
Claessens, S., Cong, L. W., Moshirian, F., & Park, C.-Y. (2024). Opportunities and challenges associated with the development of FinTech and Central Bank Digital Currency. Journal of Financial Stability, 73, 101280. https://doi.org/10.1016/j.jfs.2024.101280
Cook, J., & Cook, J. S. (2025). The dual faces of social media: Connectivity and fraud in the digital age. SAM Advanced Management Journal, 90(1), 55–74. https://doi.org/10.1108/SAMAMJ-05-2024-0027
Dumchikov, M., Maletova, O., & Yanishevska, K. (2025). Virtual assets in cybercrime: A focus on Ukrainian realities. Journal of Financial Crime, 32(4), 919–933. https://doi.org/10.1108/JFC-02-2024-0057
Dunsin, D., Ghanem, M. C., Ouazzane, K., & Vassilev, V. (2024). A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response. Forensic Science International: Digital Investigation, 48, 301675. https://doi.org/10.1016/j.fsidi.2023.301675
Ellili, N., Nobanee, H., Haddad, A., Alodat, A. Y., & AlShalloudi, M. (2024). Emerging trends in forensic accounting research: Bridging research gaps and prioritizing new frontiers. Journal of Economic Criminology, 4, 100065. https://doi.org/10.1016/j.jeconc.2024.100065
Fathi, M., bin Saud Al-Shammar, M., & Khalifa Mohamed, G. S. (2025). Cryptocurrency and criminal liability: Investigating legal challenges in addressing financial crimes in decentralized systems. Journal of Money Laundering Control, 28(3), 504–517. https://doi.org/10.1108/JMLC-07-2024-0110
Friedl, S., & Pernul, G. (2024). IoT Forensics Readiness—Influencing factors. Forensic Science International: Digital Investigation, 49, 301768. https://doi.org/10.1016/j.fsidi.2024.301768
Han, H.-C., Huang, D.-C., & Chen, C.-L. (2025). Applications of AI and Blockchain in Origin Traceability and Forensics: A Review of ICs, Pharmaceuticals, EVs, UAVs, and Robotics. CMES - Computer Modeling in Engineering and Sciences, 145(1), 67–126. https://doi.org/10.32604/cmes.2025.070944
Hargreaves, C., Breitinger, F., Dowthwaite, L., Webb, H., & Scanlon, M. (2024). DFPulse: The 2024 digital forensic practitioner survey. Forensic Science International: Digital Investigation, 51, 301844. https://doi.org/10.1016/j.fsidi.2024.301844
Hornuf, L., Momtaz, P. P., Nam, R. J., & Yuan, Y. (2025). Cybercrime on the ethereum blockchain. Journal of Banking & Finance, 175, 107419. https://doi.org/10.1016/j.jbankfin.2025.107419
Kassem, R. (2024). Spotlight on fraud risk in hospitality a systematic literature review. International Journal of Hospitality Management, 116, 103630. https://doi.org/10.1016/j.ijhm.2023.103630
Khalid, Z., Iqbal, F., & Fung, B. C. M. (2024). Towards a unified XAI-based framework for digital forensic investigations. DFRWS APAC 2024 - Selected Papers from the 4th Annual Digital Forensics Research Conference APAC, 50, 301806. https://doi.org/10.1016/j.fsidi.2024.301806
Khan, M. K., Farwa, U. E., Zulfiqar, S., Li, S., & Haq, I. U. (2025). The plight of digitalization: Technostress and accountants’ professional identity. International Journal of Accounting Information Systems, 56, 100755. https://doi.org/10.1016/j.accinf.2025.100755
Laxman, V., Ramesh, N., Jaya Prakash, S. K., & Aluvala, R. (2024). Emerging threats in digital payment and financial crime: A bibliometric review. Journal of Digital Economy, 3, 205–222. https://doi.org/10.1016/j.jdec.2025.04.002
Lazarus, S., Button, M., Garba, K. H., Soares, A. B., & Hughes, M. (2025). Strategic business movements? The migration of online romance fraudsters from Nigeria to Ghana. Journal of Economic Criminology, 7, 100128. https://doi.org/10.1016/j.jeconc.2025.100128
Lee, J. R., Nam, Y., Lee, W.-G., Holt, T. J., & Bossler, A. M. (2025). Police capacity for cybercrime response: Assessing the impact of officers’ perceptions and agency-level factors on England and Wales constables’ capability responding to computer hacking offenses. Journal of Criminal Justice, 101, 102541. https://doi.org/10.1016/j.jcrimjus.2025.102541
Liu, S. (2025). Chapter 11—Case studies of big data applications for IoT. In M. A. Serhani, Y. Xu, & Z. Maamar (Eds.), Empowering IoT with Big Data Analytics (pp. 265–311). Academic Press. https://doi.org/10.1016/B978-0-443-21640-4.00010-7
Maher, C. A., Corsello, R. M., Engle, T. A., Kuhlman, J. D., & Nedelec, J. L. (2024). Correlates of victim services for fraud and identity theft among victim service providers. Journal of Criminal Justice, 95, 102318. https://doi.org/10.1016/j.jcrimjus.2024.102318
McNealey, R. L., Figueroa, C. I., & Maher, C. A. (2025). “Police can’t help you”: Exploring influences on perceptions of policing cybercrime. Journal of Criminal Justice, 101, 102542. https://doi.org/10.1016/j.jcrimjus.2025.102542
Mulahuwaish, A., Qolomany, B., Gyorick, K., Abdo, J. B., Aledhari, M., Qadir, J., Carley, K., & Al-Fuqaha, A. (2025). A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects. Computers in Human Behavior Reports, 18, 100668. https://doi.org/10.1016/j.chbr.2025.100668
Naqbi, S. A. A., Nobanee, H., & Ellili, N. O. D. (2025). Global trends and insights into cryptocurrency-related financial crime. Research in International Business and Finance, 75, 102756. https://doi.org/10.1016/j.ribaf.2025.102756
Otero, R. G., & Diaz, R. M. (2025). Crypto crime: Approaches from transnational crime and money laundering in Colombia. The 16th International Conference on Ambient Systems, Networks and Technologies Networks (ANT)/ the 8th International Conference on Emerging Data and Industry 4.0 (EDI40), 257, 1166–1171. https://doi.org/10.1016/j.procs.2025.03.155
Ozili, P. K. (2024). Forensic accounting research around the world. Journal of Financial Reporting and Accounting, 23(1), 128–153. https://doi.org/10.1108/JFRA-02-2023-0106
Perdana, A., & Jhee Jiow, H. (2024). Crypto-Cognitive Exploitation: Integrating Cognitive, Social, and Technological perspectives on cryptocurrency fraud. Telematics and Informatics, 95, 102191. https://doi.org/10.1016/j.tele.2024.102191
Qureshi, S. U., He, J., Tunio, S., Zhu, N., Nazir, A., Wajahat, A., Ullah, F., & Wadud, A. (2024). Systematic review of deep learning solutions for malware detection and forensic analysis in IoT. Journal of King Saud University - Computer and Information Sciences, 36(8), 102164. https://doi.org/10.1016/j.jksuci.2024.102164
Rashid, H., Liaqat, H. B., Sana, M. U., Kiren, T., Karamti, H., & Ashraf, I. (2025). Framework for detecting phishing crimes on Twitter using selective features and machine learning. Computers and Electrical Engineering, 124, 110363. https://doi.org/10.1016/j.compeleceng.2025.110363
Romero-Moreno, F. (2025). Deepfake detection in generative AI: A legal framework proposal to protect human rights. Computer Law & Security Review, 58, 106162. https://doi.org/10.1016/j.clsr.2025.106162
Sarkar, G., & Shukla, S. K. (2024). Reconceptualizing online offenses: A framework for distinguishing cybercrime, cyberattacks, and cyberterrorism in the Indian legal context. Journal of Economic Criminology, 4, 100063. https://doi.org/10.1016/j.jeconc.2024.100063
Sarker, I. H., Janicke, H., Mohsin, A., Gill, A., & Maglaras, L. (2024). Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects. ICT Express, 10(4), 935–958. https://doi.org/10.1016/j.icte.2024.05.007
Shandilya, S. K., Singh, Y., Izonin, I., & Hentosh, L. (2024). Metaverse forensics framework: A NIST based investigation framework for metaverse. Science & Justice, 64(6), 698–709. https://doi.org/10.1016/j.scijus.2024.10.005
Shih, C.-H., & Tsai, M.-L. (2024). Application of Money Flow Analysis Technology in the Investigation of Money Laundering Crimes in Taiwan. 28th International Conference on Knowledge Based and Intelligent Information and Engineering Systems (KES 2024), 246, 4524–4533. https://doi.org/10.1016/j.procs.2024.09.302
Silva, T. J., Mazur, A. H. B., OliveiraJr, E., Zorzo, A. F., & Barcellos, M. P. (2025). An ontology for promoting controlled experimentation in digital forensics. Forensic Science International: Digital Investigation, 52, 301845. https://doi.org/10.1016/j.fsidi.2024.301845
Silva, T. J., OliveiraJr, E., Pereira, M. E., & Zorzo, A. F. (2025). A review study of digital forensics in IoT: Process models, phases, architectures, and ontologies. Forensic Science International: Digital Investigation, 53, 301912. https://doi.org/10.1016/j.fsidi.2025.301912
Singh, S., & Dhumane, A. (2025). Unmasking digital deceptions: An integrative review of deepfake detection, multimedia forensics, and cybersecurity challenges. MethodsX, 15, 103632. https://doi.org/10.1016/j.mex.2025.103632
Sunil, R., Mer, P., Diwan, A., Mahadeva, R., & Sharma, A. (2025). Exploring autonomous methods for deepfake detection: A detailed survey on techniques and evaluation. Heliyon, 11(3), e42273. https://doi.org/10.1016/j.heliyon.2025.e42273
Tyagi, S., Gong, Y., & Karabiyik, U. (2025). Forensic analysis and privacy implications of LLM mobile apps: A case study of ChatGPT, Copilot, and Gemini. Forensic Science International: Digital Investigation, 54, 301974. https://doi.org/10.1016/j.fsidi.2025.301974
Watson, D. L., & Jones, A. (2024). Chapter 3—Setting up a forensic laboratory. In D. L. Watson & A. Jones (Eds.), A Blueprint for Implementing Best Practice Procedures in a Digital Forensic Laboratory (SECOND EDITION) (pp. 29–42). Academic Press. https://doi.org/10.1016/B978-0-12-819479-9.00004-6
Whittaker, J. M., Lazarus, S., & Corcoran, T. (2024). Are fraud victims nothing more than animals? Critiquing the propagation of “pig butchering” (Sha Zhu Pan, ???). Journal of Economic Criminology, 3, 100052. https://doi.org/10.1016/j.jeconc.2024.100052
Yin, K. (2025). Dissecting the Success Factors of Telecom Fraud Deterrence: International Journal of Digital Crime and Forensics, 17(1). https://doi.org/10.4018/IJDCF.391904
Zieli?ski, S. (2024). Evolving Threats, Emerging Laws: Poland’s 2023 Answer to the Smishing Challenge. Computer Law & Security Review, 54, 106013. https://doi.org/10.1016/j.clsr.2024.106013
Authors
Copyright (c) 2026 Hubbul Wathan, Lakshan Pradeep, Udara Jayasinghe, Thilina Samarasinghe

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.