China & Indonesia Engage In Joint Cyber War Simulations

The news that Indonesia and China will cooperate in cyber war exercises is big enough in itself for strategic relationships in the region. At the same time, it shows that the two countries have an advanced understanding of what cyber war will look like and it sets a new diplomatic precedent in how states must work together in preparing for the most likely impacts of cyber war.

The magazine Tempo reported that the two countries will develop a cooperation program that includes “cyber-war simulations, cyber-war responses and mitigations, cyber monitoring, cyber-crisis management, and data center restoration planning.” The intent of this program does not appear to be oriented to joint military cooperation but rather focuses on government responses to the inevitable impacts of cyber war on civil infrastructure.

The deepening collaboration in the defense relationship between Indonesia and China is a useful counter to the exaggerated sense of regional polarization over maritime security between China and other South China Sea littoral states, backed by the United States, Japan, and Australia. The relationship between Indonesia and China had been something of a roller-coaster ride between cooperation and enmity in the first half century after 1949, but it has now stabilized on all fronts. As just one example, in October 2015, the two defense ministers met and declared their intention to help maintain regional peace. Sydney University published an excellent study of the strategic relationship in November 2015.

The proposed cyber collaboration revealed this week covers four areas:

  • information and communication technology strategy (cybersecurity awareness for decision-making purposes and cybersecurity in national infrastructure development);
  • Capacity building in operations and technology (in digital forensics, information security, network security, cyber risk management, big data analysis, and the digital economy)
  • Joint research in cybersecurity (cryptography operating systems, cyber law, cyber terrorism, and counter cyber intelligence)
  • Joint operations (cyber war simulation, response and mitigation in cyber war, cyber monitoring, cyber crisis management, and resilience).

The breadth of the proposed cyber relationship goes well beyond that between China and other developing countries, but does not approach the quite close cyber relationship China has with Russia. The unique aspect of this agreement is that it implies quite clearly an advanced understanding in both countries of the civil sector impacts of future cyber war. As outlined in my recent research paper, with an eye to the future threat horizon, all countries “need to develop complex responsive systems of decision-making for medium intensity war that address multi-vector, multi-front and multi-theater attacks in cyber space, including against civilian infrastructure and civilians involved in the war effort”.

The Indonesian official revealing the proposed cyber cooperation with China to the Indonesian News Agency was a specialist from the National Cyber Information Defense Security and Resilient Agency (DKKICN), Muchlis Ahmady. His assessment, which is both self-evident and widely shared internationally, is that most middle powers cannot provide national cyber security on their own. He observed that “the key to a successful cyberspace crisis management is coordination and sharing.”

Indonesia does not see China as its enemy in cyberspace but as a necessary partner. The two countries have set a diplomatic precedent for cyberspace cooperation outside of existing alliances or strategic partnerships by being prepared to consider joint cyber war simulations on a direct bilateral and official level. Other Asia-Pacific states could learn from this.

Tempo: http://bit.ly/1ZN8xlP

« The EU Wants To Organise The New Tech Economy
The Internet of Things Needs Another 10 Years »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Oxygen Forensics

Oxygen Forensics

Oxygen Forensics offer the most advanced forensic data examination tools for mobile devices and cloud services.

TWNCERT

TWNCERT

TWNCERT is the National Computer Emergency Response Team of Taiwan.

Holm Security

Holm Security

Holm Security are taking vulnerability assessment into the next generation as a cloud service.

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

IoT Security Institute (IoTSI)

IoT Security Institute (IoTSI)

IoT Security Institute is an academic and industry body dedicated to providing frameworks and supporting educational services to assist in managing security within an Internet of Things eco-system.

QI ANXIN Technology Group

QI ANXIN Technology Group

QI ANXIN specializes in serving the cybersecurity market by offering next generation enterprise-class cybersecurity products and services to government and businesses.

CyVolve

CyVolve

Cyvolve is the next great leap forward in data security, ensuring constant encryption and pervasive control over all your data.

Onfido

Onfido

Onfido is building the new identity standard for the internet. We digitally prove people’s real identities using a photo ID and facial biometrics.

Womble Bond Dickinson

Womble Bond Dickinson

Womble Bond Dickinson is a transatlantic law firm, providing high-quality legal experience and outstanding personal service from key locations across the United Kingdom and United States.

Centre for Cyber Security Research & Innovation

Centre for Cyber Security Research & Innovation

The Centre for Cyber Security Research & Innovation is Nepal's First Academic Research Institute to focus on understanding the overall Information Security of Nepalese Organizations.

BluSapphire

BluSapphire

BluSapphire is an industry-first, purpose-built, cloud-native, Hybrid XDR platform powered by AI and big data analytics.

Orbis Cyber Security

Orbis Cyber Security

Orbis is one of the leading cybersecurity company in USA. Our cybersecurity specialist defends your data, combat threat, and modernize your compliance.

Opkalla

Opkalla

We started Opkalla because we believe IT professionals deserve better. We help our clients navigate the confusion in the marketplace and choose the solution that is right for your business.

RedLattice

RedLattice

RedLattice are at the cutting edge of tool development and AI-assisted vulnerability research in cybersecurity.