China & Indonesia Engage In Joint Cyber War Simulations

The news that Indonesia and China will cooperate in cyber war exercises is big enough in itself for strategic relationships in the region. At the same time, it shows that the two countries have an advanced understanding of what cyber war will look like and it sets a new diplomatic precedent in how states must work together in preparing for the most likely impacts of cyber war.

The magazine Tempo reported that the two countries will develop a cooperation program that includes “cyber-war simulations, cyber-war responses and mitigations, cyber monitoring, cyber-crisis management, and data center restoration planning.” The intent of this program does not appear to be oriented to joint military cooperation but rather focuses on government responses to the inevitable impacts of cyber war on civil infrastructure.

The deepening collaboration in the defense relationship between Indonesia and China is a useful counter to the exaggerated sense of regional polarization over maritime security between China and other South China Sea littoral states, backed by the United States, Japan, and Australia. The relationship between Indonesia and China had been something of a roller-coaster ride between cooperation and enmity in the first half century after 1949, but it has now stabilized on all fronts. As just one example, in October 2015, the two defense ministers met and declared their intention to help maintain regional peace. Sydney University published an excellent study of the strategic relationship in November 2015.

The proposed cyber collaboration revealed this week covers four areas:

  • information and communication technology strategy (cybersecurity awareness for decision-making purposes and cybersecurity in national infrastructure development);
  • Capacity building in operations and technology (in digital forensics, information security, network security, cyber risk management, big data analysis, and the digital economy)
  • Joint research in cybersecurity (cryptography operating systems, cyber law, cyber terrorism, and counter cyber intelligence)
  • Joint operations (cyber war simulation, response and mitigation in cyber war, cyber monitoring, cyber crisis management, and resilience).

The breadth of the proposed cyber relationship goes well beyond that between China and other developing countries, but does not approach the quite close cyber relationship China has with Russia. The unique aspect of this agreement is that it implies quite clearly an advanced understanding in both countries of the civil sector impacts of future cyber war. As outlined in my recent research paper, with an eye to the future threat horizon, all countries “need to develop complex responsive systems of decision-making for medium intensity war that address multi-vector, multi-front and multi-theater attacks in cyber space, including against civilian infrastructure and civilians involved in the war effort”.

The Indonesian official revealing the proposed cyber cooperation with China to the Indonesian News Agency was a specialist from the National Cyber Information Defense Security and Resilient Agency (DKKICN), Muchlis Ahmady. His assessment, which is both self-evident and widely shared internationally, is that most middle powers cannot provide national cyber security on their own. He observed that “the key to a successful cyberspace crisis management is coordination and sharing.”

Indonesia does not see China as its enemy in cyberspace but as a necessary partner. The two countries have set a diplomatic precedent for cyberspace cooperation outside of existing alliances or strategic partnerships by being prepared to consider joint cyber war simulations on a direct bilateral and official level. Other Asia-Pacific states could learn from this.

Tempo: http://bit.ly/1ZN8xlP

« The EU Wants To Organise The New Tech Economy
The Internet of Things Needs Another 10 Years »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Tanium

Tanium

Tanium is an endpoint security and systems management company.

Minerva Labs

Minerva Labs

Minerva’s patent pending solution keeps malware in a constant sleep state before it can infiltrate your network and cause any damage.

Tubitak

Tubitak

Tubitak is the scientific and technological research council of Turkey. Areas of research include information technology and security.

Seric Systems

Seric Systems

Seric is a technology business specialising in security, infrastructure and data management.

TeachPrivacy

TeachPrivacy

TeachPrivacy provides computer-based privacy and data security training that is engaging, memorable, and understandable.

Plug and Play Tech Center

Plug and Play Tech Center

Plug and Play is the ultimate innovation platform, bringing together the best startups and the world’s largest corporations.

RIT Global Cybersecurity Institute

RIT Global Cybersecurity Institute

At RIT's Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

West Midlands Cyber Resilience Centre (WMCRC)

West Midlands Cyber Resilience Centre (WMCRC)

The East Midlands Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

OSI Security

OSI Security

OSI Security's primary services include penetration testing, security auditing, web application security testing and risk management.

Open Quantum Safe (OQS)

Open Quantum Safe (OQS)

The Open Quantum Safe (OQS) project is an open-source project that aims to support the development and prototyping of quantum-resistant cryptography.

Wabbi

Wabbi

Wabbi’s continuous security platform centralizes, automates and orchestrates security governance and vulnerability management to empower development teams to own appsec.

Protect AI

Protect AI

Protect AI is a cybersecurity company focused on AI & ML systems. Through innovative security products and thought leadership in MLSecOps, we help our customers build a safer AI powered world.

Dapple Security

Dapple Security

Dapple Security is creating cutting edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform.

SecuLore

SecuLore

An innovator in public-safety-focused cybersecurity, SecuLore is dedicated to protecting critical infrastructure from cyber attacks.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.