• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER WARFARE, EW, CLOUD HOMELAND SECURITY UPDATE

February 5, 2016 by

03 Feb 16. China & Indonesia Engage In Joint Cyber War Simulations. The news that Indonesia and China will cooperate in cyber war exercises is big enough in itself for strategic relationships in the region. At the same time, it shows that the two countries have an advanced understanding of what cyber war will look like and it sets a new diplomatic precedent in how states must work together in preparing for the most likely impacts of cyber war.
The magazine Tempo reported that the two countries will develop a cooperation program that includes “cyber-war simulations, cyber-war responses and mitigations, cyber monitoring, cyber-crisis management, and data center restoration planning.” The intent of this program does not appear to be oriented to joint military cooperation but rather focuses on government responses to the inevitable impacts of cyber war on civil infrastructure.
The deepening collaboration in the defense relationship between Indonesia and China is a useful counter to the exaggerated sense of regional polarization over maritime security between China and other South China Sea littoral states, backed by the United States, Japan, and Australia. The relationship between Indonesia and China had been something of a roller-coaster ride between cooperation and enmity in the first half century after 1949, but it has now stabilized on all fronts. As just one example, in October 2015, the two defense ministers met and declared their intention to help maintain regional peace. Sydney University published an excellent study of the strategic relationship in November 2015.
The proposed cyber collaboration revealed this week covers four areas:
• information and communication technology strategy (cybersecurity awareness for decision-making purposes and cybersecurity in national infrastructure development);
• Capacity building in operations and technology (in digital forensics, information security, network security, cyber risk management, big data analysis, and the digital economy)
• Joint research in cybersecurity (cryptography operating systems, cyber law, cyber terrorism, and counter cyber intelligence)
• Joint operations (cyber war simulation, response and mitigation in cyber war, cyber monitoring, cyber crisis management, and resilience).
The breadth of the proposed cyber relationship goes well beyond that between China and other developing countries, but does not approach the quite close cyber relationship China has with Russia. The unique aspect of this agreement is that it implies quite clearly an advanced understanding in both countries of the civil sector impacts of future cyber war. As outlined in my recent research paper, with an eye to the future threat horizon, all countries “need to develop complex responsive systems of decision-making for medium intensity war that address multi-vector, multi-front and multi-theater attacks in cyber space, including against civilian infrastructure and civilians involved in the war effort”.
The Indonesian official revealing the proposed cyber cooperation with China to the Indonesian News Agencywas a specialist from the National Cyber Information Defense Security and Resilient Agency (DKKICN), Muchlis Ahmady. His assessment, which is both self-evident and widely shared internationally, is that most middle powers cannot provide national cyber security on their own. He observed that “the key to a successful cyberspace crisis management is coordination and sharing.”
Indonesia does not see China as its enemy in cyberspace but as a necessary partner. The two countries have set a diplomatic precedent for cyberspace cooperation outside of existing alliances or strategic partnerships by being prepared to consider joint cyber war simulations on a direct bilateral and official level. Other Asia-Pacific states could learn from this. (Source: Cyber Security Intelligence/Tempo

01 Feb 16. Egyptian Uprising – a ‘social media revolution’? The ‘Arab Spring’ pro-democracy uprisings and thei

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • PARLIAMENTARY QUESTIONS

    March 23, 2023
    Read more
  • Ajax vehicles on course for new delivery times.

    March 20, 2023
    Read more
  • EXHIBITIONS AND CONFERENCES

    March 17, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT