Vous êtes sur la page 1sur 19

CYBER SECURITY AND CYBER DIPLOMACY,

ARE WE INDONESIANS AWARE OF THIS?


Teuku Rezasyah, Ph.D
(teuku.rezasyah@unpad.ac.id)
Department of International Relations
Faculty of Social and Political Sciences,
Universitas Padjadjaran
Paper prepared for ‘Facing the Cyber Threat Challenge in Digital Era’.
Bandung, 8 December 2018
Basic Concepts in Cyber Warfare
Lior Tabansky. Military and Strategic Affairs. Vol. 3. No. 1 2011.

Developments in computers have made possible far reaching changes


in all areas of life, and the rapid progress in computing,
communications, and software has led to a dramatic reduction in the
cost of producing, processing, and disseminating information.

The scientific-technological developments of recent decades gave rise


to “the information revolution,” which involves the processing and
dissemination of information. Information technologies continue to
develop at an accelerated pace, and a new era has arisen in the
information revolution.

The rapid growth in the fields of computing and communications and


the ongoing improvement in the performance of computerized
systems have created a new space in the world.
Syber Warfare.

Cyberspace, a space created not in nature but by human


beings, has the potential for tremendous benefits as well as
unknown risks. Since it has existed for forty years at most, an
understanding of the phenomenon is just beginning.

The interface between a new topic that enables unprecedented


capabilities, a technical field that demands professional
understanding, and mass media that compete for the
consumers.

National security has also been affected by the information


revolution and the cyberspace phenomenon. In the national
security context, the far reaching changes in information
technology that have brought about a quantum leap in the
availability and quality of intelligence, in the pace of
information transfer, and in weapons precision
THE WORLD IN 2030 AND ITS IMPLICATIONS TO INDONESIA
1. ALL PRODUCTS WILL HAVE BECOME SERVICES.

2. THERE IS A GLOBAL PRICE ON CARBON.

3. U.S DOMINANCE IS OVER. WE HAVE A HANDFUL OF GLOBAL POWERS.

4. FAREWELL HOSPITAL, HELLO HOME-SPITAL.

5. WE ARE EATING MUCH LESS MEAT.

6.TODAY’S SYRIAN REFUGEES, 2030’S CEO’S .

7.THE VALUES THAT BUILT THE WEST WILL HAVE BEEN TESTED TO BREAKING
POINT.
8. BY THE 2030’S WE WILL BE READY TO MOVE HUMANS TOWARDS THE RED
PLANET.
Global Agenda . 8 predictions for the world in 2030
Facing the future . 12 Nov 2016. Ceri Parker. Commissioning Editor, Agenda, World
Economic Forum.
5 Cybersecurity Challenges and Trends: What to Expect in 2018.
John Mason. Global Security Blog. 10 January 2018
• Cybercriminals are going to create 3.5 million
new, unfilled cybersecurity jobs by 2021.
Compare that with one million openings in 2016.
That’s an increase of 350 percent in just five
years.
• And with that increase comes some serious
cybersecurity revenue dedication. Everywhere,
businesses are investing a remarkable amount of
money into hiring security professionals,
maintaining customer privacy and avoiding
ransomware attacks.
• In 2017 alone, all of those protection efforts cost
businesses $86.4 billion.
WHAT KIND THREATS ARE WE FACING?
1. Ransomware Evolution
Ransomware is the bane of cybersecurity, IT, data professionals, and executives.
Perhaps nothing is worse than a spreading virus that latches onto customer and
business information that can only be removed if you meet the cybercriminal’s
egregious demands.
2. AI Expansion
Robots might be able to help defend against incoming cyber-attacks.
Between 2016 and 2025, businesses will spend almost $2.5 billion on artificial
intelligence to prevent cyberattacks.
3. I.T Threats
Most people are always plugged in.
The vast majority of humans in first-world countries have an iPhone in their pockets, a
computer at work, a television at home, and a tablet in their cars. The problem is that
all of that interconnectedness makes consumers highly susceptible to cyberattacks.
One study revealed that 70 percent of IT devices have serious security vulnerabilities.
WHAT KIND OF THREATS ARE WE FACING?
4. Blockchain Revolution.
2017 ended with a spectacular rise in the valuation and
popularity of cryptocurrencies like Bitcoin and
Ethereum. These cryptocurrencies are built upon blockchains,
the technical innovation at the core of the revolution, a
decentralized and secure record of transactions.
5. Serverless Apps Vulnerability.
Serverless apps can invite cyber-attacks. Customer information
is particularly at risk when users access your application off-
server — or locally — on their device.
National Security & Defense
Issued on: December 18, 2017
• I. PROTECT THE HOMELAND: President Trump’s fundamental
responsibility is to protect the American people, the
homeland, and the American way of life.
• We will strengthen control of our borders and reform our immigration
system to protect the homeland and restore our sovereignty.
• The greatest transnational threats to the homeland are:
– Jihadist terrorists, using barbaric cruelty to commit murder, repression, and
slavery, and virtual networks to exploit vulnerable populations and inspire and
direct plots.
– Transnational criminal organizations, tearing apart our communities with
drugs and violence and weakening our allies and partners by corrupting
democratic institutions.
• America will target threats at their source: we will confront threats before
they ever reach our borders or cause harm to our people.
• We will redouble our efforts to protect our critical infrastructure and
digital networks, because new technology and new adversaries create new
vulnerabilities.
• We are deploying a layered missile defense system to defend America
against missile attacks.
National Security & Defense
Issued on: December 18, 2017
II. PROMOTE AMERICAN PROSPERITY: A strong economy
protects the American people, supports our way of life, and
sustains American power.
• We will rejuvenate the American economy for the benefit of
American workers and companies, which is necessary to restore our
national power.
• America will no longer tolerate chronic trade abuses and will pursue
free, fair, and reciprocal economic relationships.
• To succeed in this 21st century geopolitical competition, America
must lead in research, technology, and innovation. We will protect
our national security innovation base from those who steal our
intellectual property and unfairly exploit the innovation of free
societies.
• America will use its energy dominance to ensure international
markets remain open, and that the benefits of diversification and
energy access promote economic and national security.
National Security & Defense
Issued on: December 18, 2017
• III. PRESERVE PEACE THROUGH STRENGTH: An America
strengthened, renewed, and rejuvenated will ensure peace
and deter hostility.
• We will rebuild America’s military strength to ensure it remains
second to none.
• America will use all of the tools of statecraft in a new era of
strategic competition—diplomatic, information, military, and
economic—to protect our interests.
• America will strengthen its capabilities across numerous domains —
including space and cyber — and revitalize capabilities that have
been neglected.
• America’s allies and partners magnify our power and protect our
shared interests. We expect them to take greater responsibility for
addressing common threats.
• We will ensure the balance of power remains in America’s favor in
key regions of the world: the Indo-Pacific, Europe, and the Middle
East.
National Security & Defense
Issued on: December 18, 2017
IV. ADVANCE AMERICAN INFLUENCE: As a force for good throughout its
history, America will use its influence to advance our interests and benefit
humanity.
• We must continue to enhance our influence overseas to protect the
American people and promote our prosperity.
• America’s diplomatic and development efforts will compete to achieve
better outcomes in all arenas—bilateral, multilateral, and in the
information realm—to protect our interests, find new economic
opportunities for Americans, and challenge our competitors.
• America will seek partnerships with like-minded states to promote free
market economies, private sector growth, political stability, and peace.
• We champion our values – including the rule of law and individual rights –
that promote strong, stable, prosperous, and sovereign states.
• Our America First foreign policy celebrates America’s influence in the
world as a positive force that can help set the conditions for peace,
prosperity, and the development of successful societies.
WHAT IS THE LIKELIHOOD OF THREAT FOR INDONESIA TODAY?
Defence White Paper, 2015. Ministry of Defence. P. 25.

FACTUAL NON FACTUAL

TERRORISM & RADICALISM THE THREAT THAT IS NOT ON A


o SEPARATISM & ARMED PRIORITY BASED ON STRATEGIC
REBELLION ANALYSIS.
o NATURAL DISASTERS o THREAT COULD BE IN THE FORM
o VIOLATION OF BORDER OF ARMED CONFLICTS/WAR
AREAS o CONVENTIONAL (CONFLICT IS
o PIRACY & NATURAL LIKELY TO HAPPEN)
RESOURCES o OTHER THREATS WILL ALSO
THEFT POTENTIALLY TO HAPPEN
o EPIDEMIC
o CYBER ATTACKS & ESPIONAGE
o TRAFFICKING AND DRUG
ABUSE
INDONESIAN CRITICAL AREAS, INFORMATION NEED BETTER
SAFEGUARDING
High-technology Medium-High- Medium-low- Low- technology
industries technology technology industries
industries industries

• Aircraft and • Electrical • Building and • Manufacturing, ;


spacecraft machinery and repairing of ships and Recycling
• Pharmaceuticals apparatus. boats • Wood, pulp, paper,
• Office, accounting • Motor vehicles, • Rubber and plastics paper products,
and computing trailers and products printing and
machinery semitrailers • Coke, refined publishing
• Radio, TV and • Chemicals excluding petroleum products • Food products,
communications pharmaceuticals and nuclear fuel beverages and
equipment • Railroad equipment • Other non-metallic tobacco
• Medical, precision and transport mineral products • Textiles, textiles
and optical equipment,. • Basic metals and products, leather
Instruments. • Machinery and fabricated metal and footwear
equipment. Products.
AREAS NEED SAFEGUARDING
FOR ECONOMIC ALL ECONOMIC INDICATORS DEALING WITH
LOCAL AND NATIONAL DEVELOPMENT,
RESILIENCE PURPOSES ESPECIALLY DATA LINKED TO INTERNATIONAL
COMPETITIVENESS AND SUSTAINABLE
DEVELOPMENT GOALS.

FOR SOCIAL RESILIENCE RACIAL AND RELIGIOUS SEGREGATION,


ESPECIALLY WHEN IT LINKS TO NATIONAL AND
PURPOSES LOCAL LEADERSHIP.

FOR ENERGY RESILIENCE ALL AVAILABLE AND FUTURE ENERGIES, BOTH


RENEWABLE AND ALTERNATIVE, AS WELL AS
PURPOSES ADVANCE ENERGIES UNDER RESEARCH.
AREAS NEED SAFEGUARDING
FOR DEFENCE-SECURITY IDEAS LEADING TO MANPOWER AVAILABILITIES
RESILIENCE PURPOSES LEADING TO DEFENCE, R&D DEVELOPMENTS, AND
PLANNED PURCHASES VV MINIMUM ESSENTIAL
FORCE. ALSO: DETAILED EXPOSURE OF ELITES
DURING THEIR CANDIDACY FOR SENIOR
POSITIONS.
FOR CULTURAL RESILIENCE THE USE OF CULTURE AS FUTURE SOFT-POWER,
PURPOSES PROCESS LEADING TO TRADE RELATED
INTELLECTUAL PROPERTY RIGHTS (TRIPS), AND
DIPLOMATIC FIGHTS INSIDE UNESCO.

FOR MARITIME RESILIENCE PLANS LEADING TO THE FIGHT AGAINS TRANS-


PURPOSES NATIONAL CRIMES AT SEA, COAST GUARD-NAVY
COOPERATION , AND THE EMPOWERMENT OF
COASTAL FISHERMAN VIA APPROPRIATE
TECHNOLOGY AND MANAGEMENT.
FOR FOOD-STOCK RESILIENCE PLANS LEADING TO MODERN FARMING,
PURPOSES COMMERCIAL AGRICULTURE, DAIRY FARMING,
AREAS NEED SAFEGUARDING
FOR INDUSTRIAL RESILIENCE INFORMATION LEADING TO CHOICE OF INDUSTRIAL
PURPOSES COUNTERPARTS, CHOICE OF CEO, RISK
MANAGEMENT, BUSINESS CONTINUITY, CHOICE OF
TECHNOLOGY, AND CHOICE OF FINANCIAL
SOURCES FOR INDUSTRIAL EXPANSION INSIDE AND
OUTSIDE THE COUNTRY.
FOR IDEOLOGICAL RESILIENCE INFORMATION LEADING TO THE POSSIBLE CLASH OF
PURPOSES IDEOLOGIES INSIDE THE COUTRY, AND ITS POSSIBLE
IMPLICATIONS COMING FROM OUTSIDE THE
COUNTRY.
DO WE NEED CYBER DIPLOMACY?
YES. As countries are more
integrated in various areas of
cooperation, Cyber Diplomacy ideas
should receive primary attention.
Regardless of the individual
countries self interests, it is about
time to better synergize their
policies.
There is always a need to prevent
misperceptions on others, both states
and non-states.
At the domestic level, need better
engagements of actors involving
diplomats, parliamentarians, I.T
stakeholders, state officials, business
actors, academia, research centres,
as well as financial and banking
institutions.
DOMESTIC REQUIREMENTS BEFORE OPERATING
STATE AND NON- GREATER SYNCHRONIZATION INTRODUCING
STATE ACTORS AWARENESS IN THE STATE’S CURRICULUM
INITIATING A NEW AMONG YOUTH LAW, USING SINCE THE
CULTURE: THE AND STUDENTS, TO BOTTOM-UP ELEMENTARY
SURVIVAL OF THE BECOME THE FIRST APPROACH. SCHOOL TO HIGH
COUNTRY IN THE FILTER PRIOR TO SCHOOL, ON THE
ERA OF CYBER UTILIZING ONLINE IMPORTANCE OF
SECURITY AND RESOURCES TO TECHNOLOGY TO
CYBER THREAT. THEIR CIRCLES. THE STATE
BUILDING
ADVANCE CYBER AS NEW SOCIALIZING CYBER INTRODUCING
TRAININGS FOR CRITERIA IN SECURITY TOUGHER
STATE AND NON PROMOTING PROTOCOLS IN MEASURES ON ALL
STATE OFFICIALS. STUDENTS AND STATE AND NON- CYBER SECURITY
YOUTHS FOR STATE OFFICES. WRONG DOINGS.
LEADERSHIP
POSITIONS.
INTERNATIONAL REQUIREMENTS
REGULAR CONSULTATION AMONG SENIOR OFFICIALS AND STATE REPRESENTATIVES
ON THE IMPORTANCE TO UNDERSTAND PROTOCOLS RELATED TO CYBER SECURITY
AND CYBER THREAT.
OPERATING A MECHANISM LEADING TO MUTUALLY ACCEPT PROTOCOLS IN AREAS OF
MUTUAL CONCERN, ESPECIALLY RELATED TO NON-SECURITY ISSUES, SUCH BANKING
AND FINANCE.
PRODUCING MUTUALLY RECOGNIZED STANDARD TERMINOLOGIES AND PROTOCOLS
AT THE REGIONAL LEVELS LEADING TO INTERNATIONAL LEVELS.
TRAINING YOUNG OPERATORS AND PRACTITIONERS AT THE REGIONAL AND
INTERNATIONAL LEVELS.

Vous aimerez peut-être aussi