The Criminology of Cybercrime; A Study of Online Financial Fraud and the Challenges for Indonesian Law Enforcement

Hubbul Wathan (1), Lakshan Pradeep (2), Udara Jayasinghe (3), Thilina Samarasinghe (4)
(1) , Indonesia,
(2) Open University of Sri Lanka, Sri Lanka,
(3) University of Jaffna, Sri Lanka,
(4) University of the Visual and Performing Arts, Sri Lanka

Abstract

Indonesia faces escalating online financial fraud, particularly complex “Social Engineering/Mule Accounts” schemes, which strain law enforcement. A critical gap exists between the speed of these transnational digital crimes and the outdated operational capabilities of the Indonesian National Police (Polri). This study aimed to analyze the typology and high case attrition rates (unsolved cases) of online financial fraud and to critically evaluate the institutional and operational challenges faced by Indonesian law enforcement agencies in effectively investigating these offenses. sequential explanatory mixed-methods design was utilized, combining quantitative analysis of 2,150 reported fraud cases (2019–2024) with qualitative interviews (N=20) with police investigators, prosecutors, and banking compliance officers. Overall attrition stood at 68.4%, rising to 78.5% for mule account cases. The central finding is the Structural Lag Hypothesis: high attrition is a direct result of bureaucratic time lag, specifically “Jurisdictional Fragmentation” and “Slow Evidence Acquisition,” which grants criminals a critical 48-72 hour window to liquidate assets. The crime’s success is rooted in the police system’s procedural inertia, confirming that enforcement mechanisms are misaligned with the digital environment. The findings mandate urgent organizational reform, including the delegation of real-time data-sharing authority to local investigators to collapse this structural lag.

Full text article

Generated from XML file

References

Abdallah, E. E., Elsoud, E. A., & Abdallah, A. E. (2025). A Survey of Data Mining Techniques for Digital Forensic Analysis. The 16th International Conference on Ambient Systems, Networks and Technologies Networks (ANT)/ the 8th International Conference on Emerging Data and Industry 4.0 (EDI40), 257, 731–736. https://doi.org/10.1016/j.procs.2025.03.094

Abdul Rani, M. I., Syed Mustapha Nazri, S. N. F., & Zolkaflil, S. (2025). Dissecting the post-investigation actions on money mule cases in banking financial crime compliance. Journal of Money Laundering Control, 28(6), 747–763. https://doi.org/10.1108/JMLC-06-2025-0105

Aisyah, M., Sesunan, Y. S., & Wicaksono, A. T. S. (2025). Customers’ trust in Islamic banking post-cyberattack leads to digital service breakdowns in Indonesia. Sustainable Futures, 10, 101530. https://doi.org/10.1016/j.sftr.2025.101530

Akinbowale, O. E., Zerihun, M. F., & Mashigo, P. (2024). Application of Situational Crime Prevention Framework for Cybercrime Mitigation. International Journal of Cyber Behavior, Psychology and Learning, 14(1). https://doi.org/10.4018/IJCBPL.353436

AL-Raggad, A. K., & Al-Raggad, M. (2024). Analyzing trends: A bibliometric study of administrative law and forensic accounting in the digital age. Heliyon, 10(18), e37462. https://doi.org/10.1016/j.heliyon.2024.e37462

Al-Raggad, M., Albalawee, N., Al-Mahasneh, A., Abu Huson, Y., & Albajaly, A. (2025). Unveiling financial crimes: Advancing forensic accounting practices and ethical integrity through bibliometric insights. Safer Communities, 24(3), 244–264. https://doi.org/10.1108/SC-11-2024-0069

Arif, T., Camacho, D., & Park, J. H. (2025). Unveiling cybersecurity mysteries: A comprehensive survey on digital forensics trends, threats, and solutions in network security. Journal of Network and Computer Applications, 243, 104296. https://doi.org/10.1016/j.jnca.2025.104296

Balarabe, K. (2025). Digital borders and beyond: Establishing normative grounds for cybersecurity and sovereignty in international law. Computer Law & Security Review, 58, 106180. https://doi.org/10.1016/j.clsr.2025.106180

Casino, F. (2025). Unveiling the multifaceted concept of cognitive security: Trends, perspectives, and future challenges. Technology in Society, 83, 102956. https://doi.org/10.1016/j.techsoc.2025.102956

Chorozidis, G., Georgiou, K., Mittas, N., & Angelis, L. (2024). Knowledge and research mapping of the data and database forensics domains: A bibliometric analysis. Information and Software Technology, 171, 107472. https://doi.org/10.1016/j.infsof.2024.107472

Claessens, S., Cong, L. W., Moshirian, F., & Park, C.-Y. (2024). Opportunities and challenges associated with the development of FinTech and Central Bank Digital Currency. Journal of Financial Stability, 73, 101280. https://doi.org/10.1016/j.jfs.2024.101280

Cook, J., & Cook, J. S. (2025). The dual faces of social media: Connectivity and fraud in the digital age. SAM Advanced Management Journal, 90(1), 55–74. https://doi.org/10.1108/SAMAMJ-05-2024-0027

Dumchikov, M., Maletova, O., & Yanishevska, K. (2025). Virtual assets in cybercrime: A focus on Ukrainian realities. Journal of Financial Crime, 32(4), 919–933. https://doi.org/10.1108/JFC-02-2024-0057

Dunsin, D., Ghanem, M. C., Ouazzane, K., & Vassilev, V. (2024). A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response. Forensic Science International: Digital Investigation, 48, 301675. https://doi.org/10.1016/j.fsidi.2023.301675

Ellili, N., Nobanee, H., Haddad, A., Alodat, A. Y., & AlShalloudi, M. (2024). Emerging trends in forensic accounting research: Bridging research gaps and prioritizing new frontiers. Journal of Economic Criminology, 4, 100065. https://doi.org/10.1016/j.jeconc.2024.100065

Fathi, M., bin Saud Al-Shammar, M., & Khalifa Mohamed, G. S. (2025). Cryptocurrency and criminal liability: Investigating legal challenges in addressing financial crimes in decentralized systems. Journal of Money Laundering Control, 28(3), 504–517. https://doi.org/10.1108/JMLC-07-2024-0110

Friedl, S., & Pernul, G. (2024). IoT Forensics Readiness—Influencing factors. Forensic Science International: Digital Investigation, 49, 301768. https://doi.org/10.1016/j.fsidi.2024.301768

Han, H.-C., Huang, D.-C., & Chen, C.-L. (2025). Applications of AI and Blockchain in Origin Traceability and Forensics: A Review of ICs, Pharmaceuticals, EVs, UAVs, and Robotics. CMES - Computer Modeling in Engineering and Sciences, 145(1), 67–126. https://doi.org/10.32604/cmes.2025.070944

Hargreaves, C., Breitinger, F., Dowthwaite, L., Webb, H., & Scanlon, M. (2024). DFPulse: The 2024 digital forensic practitioner survey. Forensic Science International: Digital Investigation, 51, 301844. https://doi.org/10.1016/j.fsidi.2024.301844

Hornuf, L., Momtaz, P. P., Nam, R. J., & Yuan, Y. (2025). Cybercrime on the ethereum blockchain. Journal of Banking & Finance, 175, 107419. https://doi.org/10.1016/j.jbankfin.2025.107419

Kassem, R. (2024). Spotlight on fraud risk in hospitality a systematic literature review. International Journal of Hospitality Management, 116, 103630. https://doi.org/10.1016/j.ijhm.2023.103630

Khalid, Z., Iqbal, F., & Fung, B. C. M. (2024). Towards a unified XAI-based framework for digital forensic investigations. DFRWS APAC 2024 - Selected Papers from the 4th Annual Digital Forensics Research Conference APAC, 50, 301806. https://doi.org/10.1016/j.fsidi.2024.301806

Khan, M. K., Farwa, U. E., Zulfiqar, S., Li, S., & Haq, I. U. (2025). The plight of digitalization: Technostress and accountants’ professional identity. International Journal of Accounting Information Systems, 56, 100755. https://doi.org/10.1016/j.accinf.2025.100755

Laxman, V., Ramesh, N., Jaya Prakash, S. K., & Aluvala, R. (2024). Emerging threats in digital payment and financial crime: A bibliometric review. Journal of Digital Economy, 3, 205–222. https://doi.org/10.1016/j.jdec.2025.04.002

Lazarus, S., Button, M., Garba, K. H., Soares, A. B., & Hughes, M. (2025). Strategic business movements? The migration of online romance fraudsters from Nigeria to Ghana. Journal of Economic Criminology, 7, 100128. https://doi.org/10.1016/j.jeconc.2025.100128

Lee, J. R., Nam, Y., Lee, W.-G., Holt, T. J., & Bossler, A. M. (2025). Police capacity for cybercrime response: Assessing the impact of officers’ perceptions and agency-level factors on England and Wales constables’ capability responding to computer hacking offenses. Journal of Criminal Justice, 101, 102541. https://doi.org/10.1016/j.jcrimjus.2025.102541

Liu, S. (2025). Chapter 11—Case studies of big data applications for IoT. In M. A. Serhani, Y. Xu, & Z. Maamar (Eds.), Empowering IoT with Big Data Analytics (pp. 265–311). Academic Press. https://doi.org/10.1016/B978-0-443-21640-4.00010-7

Maher, C. A., Corsello, R. M., Engle, T. A., Kuhlman, J. D., & Nedelec, J. L. (2024). Correlates of victim services for fraud and identity theft among victim service providers. Journal of Criminal Justice, 95, 102318. https://doi.org/10.1016/j.jcrimjus.2024.102318

McNealey, R. L., Figueroa, C. I., & Maher, C. A. (2025). “Police can’t help you”: Exploring influences on perceptions of policing cybercrime. Journal of Criminal Justice, 101, 102542. https://doi.org/10.1016/j.jcrimjus.2025.102542

Mulahuwaish, A., Qolomany, B., Gyorick, K., Abdo, J. B., Aledhari, M., Qadir, J., Carley, K., & Al-Fuqaha, A. (2025). A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects. Computers in Human Behavior Reports, 18, 100668. https://doi.org/10.1016/j.chbr.2025.100668

Naqbi, S. A. A., Nobanee, H., & Ellili, N. O. D. (2025). Global trends and insights into cryptocurrency-related financial crime. Research in International Business and Finance, 75, 102756. https://doi.org/10.1016/j.ribaf.2025.102756

Otero, R. G., & Diaz, R. M. (2025). Crypto crime: Approaches from transnational crime and money laundering in Colombia. The 16th International Conference on Ambient Systems, Networks and Technologies Networks (ANT)/ the 8th International Conference on Emerging Data and Industry 4.0 (EDI40), 257, 1166–1171. https://doi.org/10.1016/j.procs.2025.03.155

Ozili, P. K. (2024). Forensic accounting research around the world. Journal of Financial Reporting and Accounting, 23(1), 128–153. https://doi.org/10.1108/JFRA-02-2023-0106

Perdana, A., & Jhee Jiow, H. (2024). Crypto-Cognitive Exploitation: Integrating Cognitive, Social, and Technological perspectives on cryptocurrency fraud. Telematics and Informatics, 95, 102191. https://doi.org/10.1016/j.tele.2024.102191

Qureshi, S. U., He, J., Tunio, S., Zhu, N., Nazir, A., Wajahat, A., Ullah, F., & Wadud, A. (2024). Systematic review of deep learning solutions for malware detection and forensic analysis in IoT. Journal of King Saud University - Computer and Information Sciences, 36(8), 102164. https://doi.org/10.1016/j.jksuci.2024.102164

Rashid, H., Liaqat, H. B., Sana, M. U., Kiren, T., Karamti, H., & Ashraf, I. (2025). Framework for detecting phishing crimes on Twitter using selective features and machine learning. Computers and Electrical Engineering, 124, 110363. https://doi.org/10.1016/j.compeleceng.2025.110363

Romero-Moreno, F. (2025). Deepfake detection in generative AI: A legal framework proposal to protect human rights. Computer Law & Security Review, 58, 106162. https://doi.org/10.1016/j.clsr.2025.106162

Sarkar, G., & Shukla, S. K. (2024). Reconceptualizing online offenses: A framework for distinguishing cybercrime, cyberattacks, and cyberterrorism in the Indian legal context. Journal of Economic Criminology, 4, 100063. https://doi.org/10.1016/j.jeconc.2024.100063

Sarker, I. H., Janicke, H., Mohsin, A., Gill, A., & Maglaras, L. (2024). Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects. ICT Express, 10(4), 935–958. https://doi.org/10.1016/j.icte.2024.05.007

Shandilya, S. K., Singh, Y., Izonin, I., & Hentosh, L. (2024). Metaverse forensics framework: A NIST based investigation framework for metaverse. Science & Justice, 64(6), 698–709. https://doi.org/10.1016/j.scijus.2024.10.005

Shih, C.-H., & Tsai, M.-L. (2024). Application of Money Flow Analysis Technology in the Investigation of Money Laundering Crimes in Taiwan. 28th International Conference on Knowledge Based and Intelligent Information and Engineering Systems (KES 2024), 246, 4524–4533. https://doi.org/10.1016/j.procs.2024.09.302

Silva, T. J., Mazur, A. H. B., OliveiraJr, E., Zorzo, A. F., & Barcellos, M. P. (2025). An ontology for promoting controlled experimentation in digital forensics. Forensic Science International: Digital Investigation, 52, 301845. https://doi.org/10.1016/j.fsidi.2024.301845

Silva, T. J., OliveiraJr, E., Pereira, M. E., & Zorzo, A. F. (2025). A review study of digital forensics in IoT: Process models, phases, architectures, and ontologies. Forensic Science International: Digital Investigation, 53, 301912. https://doi.org/10.1016/j.fsidi.2025.301912

Singh, S., & Dhumane, A. (2025). Unmasking digital deceptions: An integrative review of deepfake detection, multimedia forensics, and cybersecurity challenges. MethodsX, 15, 103632. https://doi.org/10.1016/j.mex.2025.103632

Sunil, R., Mer, P., Diwan, A., Mahadeva, R., & Sharma, A. (2025). Exploring autonomous methods for deepfake detection: A detailed survey on techniques and evaluation. Heliyon, 11(3), e42273. https://doi.org/10.1016/j.heliyon.2025.e42273

Tyagi, S., Gong, Y., & Karabiyik, U. (2025). Forensic analysis and privacy implications of LLM mobile apps: A case study of ChatGPT, Copilot, and Gemini. Forensic Science International: Digital Investigation, 54, 301974. https://doi.org/10.1016/j.fsidi.2025.301974

Watson, D. L., & Jones, A. (2024). Chapter 3—Setting up a forensic laboratory. In D. L. Watson & A. Jones (Eds.), A Blueprint for Implementing Best Practice Procedures in a Digital Forensic Laboratory (SECOND EDITION) (pp. 29–42). Academic Press. https://doi.org/10.1016/B978-0-12-819479-9.00004-6

Whittaker, J. M., Lazarus, S., & Corcoran, T. (2024). Are fraud victims nothing more than animals? Critiquing the propagation of “pig butchering” (Sha Zhu Pan, ???). Journal of Economic Criminology, 3, 100052. https://doi.org/10.1016/j.jeconc.2024.100052

Yin, K. (2025). Dissecting the Success Factors of Telecom Fraud Deterrence: International Journal of Digital Crime and Forensics, 17(1). https://doi.org/10.4018/IJDCF.391904

Zieli?ski, S. (2024). Evolving Threats, Emerging Laws: Poland’s 2023 Answer to the Smishing Challenge. Computer Law & Security Review, 54, 106013. https://doi.org/10.1016/j.clsr.2024.106013

Authors

Hubbul Wathan
hubbulwathan@polmed.ac.id (Primary Contact)
Lakshan Pradeep
Udara Jayasinghe
Thilina Samarasinghe
Wathan, H., Pradeep, L., Jayasinghe, U. ., & Samarasinghe, T. (2026). The Criminology of Cybercrime; A Study of Online Financial Fraud and the Challenges for Indonesian Law Enforcement. Cognitionis Civitatis Et Politicae, 2(3), 172–187. https://doi.org/10.70177/politicae.v2i3.2685

Article Details