TEMPO.CO, Jakarta – Head of the Presidential Secretariat, Heru Budi Hartono, has made it clear that no presidential documents or letters have been leaked on the internet, contrary to claims made by some members of the public.

“The Secretary of State will clarify this soon. There have been no leaks of presidential letters,” Hartono said here on Saturday, in response to reports circulating on social media that President Joko’s letters and documents Widodo (Jokowi) were allegedly leaked by a hacker.

Information alleging that presidential letters and top-secret letters from the National Intelligence Agency (BIN) were leaked is a hoax, he noted, adding that spreading the hoax is a violation of the law on electronic information and transactions.

“I have to say this is a violation of the Electronic Information and Transactions Act. I believe law enforcement will take legal action and look for the suspect,” he said.

Earlier, a hacker, known as the username Bjorka, claimed to have hacked presidential data and obtained presidential letters and top secret documents from the intelligence agency.

Bjorka’s claim was later shared by a Twitter account whose tweet went viral and became a trending topic on social media until Saturday morning.

The tweet, conveying Bjorka’s claim, said presidential letters and top secret BIN documents had been leaked.

Last August, the same hacker claimed to have obtained the data of 1,304,401,300 registered SIM card users, including their population ID number, phone number, cell operator name and date. recording. Bjorka also claimed to have shared two million data samples for free.

In response to recurring reports of hacking and leaking of personal data, the Director General of Applications and IT at the Ministry of Communication and Information, Semuel Abrijani Pangerapan, pointed out that the ministry and its stakeholders have committed to remedying the alleged data breach.

He also reminded cellular carriers and electronic system operators to do quick checks for any indication of data leaks.

“Each provider should have the ability to mitigate and (implement) security (measures), maintain confidentiality, mitigate risk in the event of (data) leakage, (know) what doesn’t have to be assembled – that’s what organizers always have to do,” he said.


Click here to get the latest news from Tempo on Google News