•  
  •  
 

Jurnal Kajian Stratejik Ketahanan Nasional

Abstract

This research is a case study of cyber espionage conducted against the member of Democratic National Committee (DNC) towards the 2016 US presidential election, caused Hillary Clinton's email leaked and published by WikiLeaks. It indicates the intelligence activities have entered into cyberspace and can disrupt the national ressilience, so it is necessary to do counterintelligence as an effort to maintain the cyber security. This research uses qualitative approach, data collected from interviews and literature study. The purposes of this research are (1) to determine the threat level of cyber espionage conducted against DNC, (2) counterintelligence methods against the threat, (3) and Indonesian Government Strategy against cyber threat. This research use counterintelligence theory, threat analysis theory, and SWOT analysis. The results of this research are (1) the threats analysis of cyber espionage indicating the threat agent has high level threat, it could harms the national interest and affect the national ressilience, (2) cyber counterintelligence are conducted by two ways i.e., defensive counterintelligence to block and detect enemy's access activity, and offensive counterintelligence to collect informations, manipulate, control, and thwart enemy’s action, (3) Indonesian Government Strategies against cyber threat are strengthening legal measure, technical measure, organizational measure, capacity building, and cooperation. Keywords : counterintelligence; cyber espionage; democratic national committee; email; hillary clinton.

References

Daftar Pustaka

Buku :

Johnson, William R. 1994. Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer. Bethesda, Md.: Stone Trail Press.

Zuehlke, Arthur A. 1980. What is Counterintelligence? In: Intelligence Requirements for the 1980s: Counterintelligence. Godson, Roy S; ed. Washing-ton D.C.: National Strategy Information Center.

Olson, James M. 2001. A Never-Ending Necessity. The Ten Commandments of counterintelligence. Washington D.C.: Studies in Intelligence.

Widjajanto, A. Lay, C. Keliat, M. (2006). Velox et Exatus. Universitas Indonesia.

Prunckun, H. (2012). Counterintelligence Theory and Practice. USA : Rowman & Littlefield.

Prunckun, H. (2015). Scientific Methods of Inquiry for Intelligence Analysis, Rowman & Littlefield.

Online document:

Asosiasi Penyelenggara Jasa Internet Indonesia. (2016). Infografis Penetrasi & Perilaku Pengguna Internet Indonesia. Survey 2016.

CyberEgde Group. 2016 Cyberthreat Defense Report.

Departement of Homeland Security and Federal Bureau of Investigation. (2016). Joint Analysis Report : GRIZZLY STEPPE – Russian Malicious Cyber Activity. Reference Number: JAR-16-20296A.

Intelligence Community Assesment (CIA, FBI, NSA). (2017). Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution. National Intelligence Council. USA.

Internet Security Threat Report, Volume 22. (2017). Symantec.

ISO/IEC 27032:2012. Information technology – Security techniques – Guidelines for cybersecurity

Jurnal Online :

Beer, P. D. von Solms Basie, S. (2013). The Case for cyber counterintelligence. Adaptive Science and Technology (ICAST). Pretoria.

Hurley, M. M. Conceptualizing Cyber Intelligence, Surveillance, and Reconnaisance. Air & Space Journal. USAF. 2012.

Jabbour, K. Cyber Vision and Cyber Force Development, Strategic Studies Quarterly 4, no. 1 (Spring 2010): 65, http://www.au.af.mil/au/ssq/2010/spring/spring10.pdf.

Klimburg, A. (2012). National Cyber Security Framework Manual. NATO Cooperative Cyber Defence Centre of Excellence.

Rubenstein, D. (2014). Nation State Cyber Espionage and its Impacts.

Vardangalos, G. (2016). Cyber Intelligence and Cyber Counterintelligence (CCI) : General Definitions and Principles. Center for International Strategic Analyses (KEDISA).

Legislasi:

Penjelasan Undang-Undang No.17 Tahun 2011 tentang Intelijen Negara

Website:

https://nasional.sindonews.com/read/1154663/14/panglima-tni-beberkan-potensi-ancaman-yang-mengintai-indonesia-1478861976. Tanggal tayang 11 November 2016. Tanggal akses 3 April 2017.

http://tekno.kompas.com/read/2016/12/13/10220067/peretas.rusia.di.balik.kemenangan.trump. Tanggal tayang 13 Desember 2016. Tanggal akses 15 Desember 2017.

https://www.nytimes.com/interactive/2016/07/27/us/politics/trail-of-dnc-emails-russia-hacking.html. Tanggal tayang 6 Januari 2017. Tanggal akses 12 Desember 2017.

http://www.chicagotribune.com/news/nationworld/ct-russian-hack-grizzly-steppe-20161230-story.html. Tanggal tayang 30 Desember 2016. Tangggal akses 12 Desember 2017.

http://www.wired.co.uk/article/how-russian-hackers-work. Tanggal tayang 11 Januari 2017. Tanggal akses 12 Desember 2017.

https://www.kaspersky.com/resource-center/definitions/spear-phishing. Tanggal akses 20 Desember 2017.

https://wikileaks.org/clinton-emails/?q=iraq%7Cbaghdad%7Cbasra%7Cmosoul. Tanggal akses 1 Maret 2017.

http://internasional.kompas.com/read/2016/10/08/13321811/wikileaks.bocorkan.ribuan.e-mail.ketua.kampanye.hillary.clinton. Tanggal tayang 8 Oktober 2016. Tanggal akses 22 Desember 2017.

http://internasional.republika.co.id/berita/internasional/global/17/08/24/internasional/abc-australia-network/17/10/16/oxwbns366-hillary-tuding-wikileaks-dan-rusia-bantu-kemenangan-trump. Tanggal tayang 16 Oktober 2017. Tanggal akses 22 Desember 2017.

https://www.nytimes.com/2016/12/13/us/politics/russia-hack-election-dnc.html. Tanggal tayang 13 Desember 2016. Tanggal akses 12 Desember 2017.

https://www.cnnindonesia.com/internasional/20161230035205-134-183018/sanksi-untuk-rusia-pemerintah-as-usir-35-diplomat/. Tanggal tayang 30 Desember 2016. Tanggal akses 22 Desember 2017.

https://international.sindonews.com/read/1225065/41/balas-sanksi-moskow-pangkas-staf-diplomatik-as-di-rusia-1501262019. Tanggal tayang 29 Juli 2017. Tanggal akses 22 Desember 2017.

Bahasa Abstract

Penelitian ini adalah studi kasus mengenai peristiwa spionase siber kepada anggota Democratic National Committee (DNC) menjelang pilpres AS tahun 2016, yang mengakibatkan kebocoran email Hillary Clinton yang dirilis oleh WikiLeaks. Hal tersebut menunjukkan bahwa aktivitas intelijen telah berkembang ke ranah siber dan dapat menganggu ketahanan nasional, sehingga perlu dilakukan upaya kontra intelijen untuk menjaga keamanan siber. Penelitian ini menggunakan pendekatan kualitatif dengan pengumpulan data melalui wawancara dan studi literatur. Penelitian ini bertujuan untuk mengetahui (1) level ancaman dari aktivitas spionase siber kepada DNC, (2) metode kontra intelijen terhadap ancaman tersebut, dan (3) strategi Indonesia untuk menghadapi ancaman siber. Teori yang digunakan adalah Teori Kontra Intelijen dan Teori Ancaman, serta analisis SWOT. Hasil dari penelitian ini adalah (1) analisis ancaman spionase siber menunjukkan bahwa pelaku merupakan sebuah ancaman dengan level tinggi sehingga membahayakan kepentingan negara dan dapat mempengaruhi ketahanan nasional, (2) kontra intelijen siber dilakukan melalui dua metode yaitu, kontra intelijen defensif yang bertujuan untuk memblokir dan mendeteksi terhadap aktivitas akses lawan dan kontra intelijen ofensif bertujuan untuk mengumpulkan informasi, memanipulasi, mengontrol, dan menggagalkan aksi lawan, (3) strategi Indonesia untuk menghadapi ancaman siber adalah dengan melakukan penguatan baik pada segi regulasi, teknik, organisasi, kemampuan, dan kerjasama

Share

COinS