China & Indonesia Engage In Joint Cyber War Simulations

The news that Indonesia and China will cooperate in cyber war exercises is big enough in itself for strategic relationships in the region. At the same time, it shows that the two countries have an advanced understanding of what cyber war will look like and it sets a new diplomatic precedent in how states must work together in preparing for the most likely impacts of cyber war.

The magazine Tempo reported that the two countries will develop a cooperation program that includes “cyber-war simulations, cyber-war responses and mitigations, cyber monitoring, cyber-crisis management, and data center restoration planning.” The intent of this program does not appear to be oriented to joint military cooperation but rather focuses on government responses to the inevitable impacts of cyber war on civil infrastructure.

The deepening collaboration in the defense relationship between Indonesia and China is a useful counter to the exaggerated sense of regional polarization over maritime security between China and other South China Sea littoral states, backed by the United States, Japan, and Australia. The relationship between Indonesia and China had been something of a roller-coaster ride between cooperation and enmity in the first half century after 1949, but it has now stabilized on all fronts. As just one example, in October 2015, the two defense ministers met and declared their intention to help maintain regional peace. Sydney University published an excellent study of the strategic relationship in November 2015.

The proposed cyber collaboration revealed this week covers four areas:

  • information and communication technology strategy (cybersecurity awareness for decision-making purposes and cybersecurity in national infrastructure development);
  • Capacity building in operations and technology (in digital forensics, information security, network security, cyber risk management, big data analysis, and the digital economy)
  • Joint research in cybersecurity (cryptography operating systems, cyber law, cyber terrorism, and counter cyber intelligence)
  • Joint operations (cyber war simulation, response and mitigation in cyber war, cyber monitoring, cyber crisis management, and resilience).

The breadth of the proposed cyber relationship goes well beyond that between China and other developing countries, but does not approach the quite close cyber relationship China has with Russia. The unique aspect of this agreement is that it implies quite clearly an advanced understanding in both countries of the civil sector impacts of future cyber war. As outlined in my recent research paper, with an eye to the future threat horizon, all countries “need to develop complex responsive systems of decision-making for medium intensity war that address multi-vector, multi-front and multi-theater attacks in cyber space, including against civilian infrastructure and civilians involved in the war effort”.

The Indonesian official revealing the proposed cyber cooperation with China to the Indonesian News Agency was a specialist from the National Cyber Information Defense Security and Resilient Agency (DKKICN), Muchlis Ahmady. His assessment, which is both self-evident and widely shared internationally, is that most middle powers cannot provide national cyber security on their own. He observed that “the key to a successful cyberspace crisis management is coordination and sharing.”

Indonesia does not see China as its enemy in cyberspace but as a necessary partner. The two countries have set a diplomatic precedent for cyberspace cooperation outside of existing alliances or strategic partnerships by being prepared to consider joint cyber war simulations on a direct bilateral and official level. Other Asia-Pacific states could learn from this.

Tempo: http://bit.ly/1ZN8xlP

« The EU Wants To Organise The New Tech Economy
The Internet of Things Needs Another 10 Years »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CEPS

CEPS

CEPS is a leading think tank and forum for debate on EU affairs, ranking among the top think tanks in Europe. Topic areas include Innovation, Digital economy and Cyber-security.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

Arctic Wolf Networks

Arctic Wolf Networks

Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity.

Conference Index

Conference Index

Conference Index provides an indexed listing of upcoming meetings, seminars, congresses, workshops, summits and symposiums across a wide range of subjects including Cybersecurity.

Tier One Technology Partners

Tier One Technology Partners

Tier One Technology Partners is an IT managed services provider that focuses on cybersecurity, cloud services, IT consulting, and infrastructure.

Keysight Technologies

Keysight Technologies

Keysight is dedicated to providing tomorrow’s test technologies today, enabling our customers to connect and secure the world with their innovations.

PA Consulting

PA Consulting

PA Consulting Group is a consultancy that specialises in strategy, technology and innovation. Our cyber security experts work with you to spot digital and technology security risks and reduce them.

Acora

Acora

Acora provide a range of best-in-class managed services, Microsoft-centric business software, and cloud solutions designed to help mid-market organisations succeed in the digital economy.

Single Point of Contact

Single Point of Contact

Single Point of Contact is a Managed IT Services provider that helps businesses to achieve a seamless and secure IT environment.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.

Star Lab

Star Lab

Star Lab specializes in the development and productization of embedded security technologies.

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre is the jurisdiction's Cyber Emergency Response Team (CERT) and national technical authority for cyber security.

Sansec Technology

Sansec Technology

Sansec Technology is dedicated to the research and development of cryptographic products and solutions for cyber security.

True Corporation

True Corporation

True Corporation is Thailand’s leading Telecom-Tech company, empowering people and businesses with connected solutions that advance society sustainably.