China & Indonesia Engage In Joint Cyber War Simulations

The news that Indonesia and China will cooperate in cyber war exercises is big enough in itself for strategic relationships in the region. At the same time, it shows that the two countries have an advanced understanding of what cyber war will look like and it sets a new diplomatic precedent in how states must work together in preparing for the most likely impacts of cyber war.

The magazine Tempo reported that the two countries will develop a cooperation program that includes “cyber-war simulations, cyber-war responses and mitigations, cyber monitoring, cyber-crisis management, and data center restoration planning.” The intent of this program does not appear to be oriented to joint military cooperation but rather focuses on government responses to the inevitable impacts of cyber war on civil infrastructure.

The deepening collaboration in the defense relationship between Indonesia and China is a useful counter to the exaggerated sense of regional polarization over maritime security between China and other South China Sea littoral states, backed by the United States, Japan, and Australia. The relationship between Indonesia and China had been something of a roller-coaster ride between cooperation and enmity in the first half century after 1949, but it has now stabilized on all fronts. As just one example, in October 2015, the two defense ministers met and declared their intention to help maintain regional peace. Sydney University published an excellent study of the strategic relationship in November 2015.

The proposed cyber collaboration revealed this week covers four areas:

  • information and communication technology strategy (cybersecurity awareness for decision-making purposes and cybersecurity in national infrastructure development);
  • Capacity building in operations and technology (in digital forensics, information security, network security, cyber risk management, big data analysis, and the digital economy)
  • Joint research in cybersecurity (cryptography operating systems, cyber law, cyber terrorism, and counter cyber intelligence)
  • Joint operations (cyber war simulation, response and mitigation in cyber war, cyber monitoring, cyber crisis management, and resilience).

The breadth of the proposed cyber relationship goes well beyond that between China and other developing countries, but does not approach the quite close cyber relationship China has with Russia. The unique aspect of this agreement is that it implies quite clearly an advanced understanding in both countries of the civil sector impacts of future cyber war. As outlined in my recent research paper, with an eye to the future threat horizon, all countries “need to develop complex responsive systems of decision-making for medium intensity war that address multi-vector, multi-front and multi-theater attacks in cyber space, including against civilian infrastructure and civilians involved in the war effort”.

The Indonesian official revealing the proposed cyber cooperation with China to the Indonesian News Agency was a specialist from the National Cyber Information Defense Security and Resilient Agency (DKKICN), Muchlis Ahmady. His assessment, which is both self-evident and widely shared internationally, is that most middle powers cannot provide national cyber security on their own. He observed that “the key to a successful cyberspace crisis management is coordination and sharing.”

Indonesia does not see China as its enemy in cyberspace but as a necessary partner. The two countries have set a diplomatic precedent for cyberspace cooperation outside of existing alliances or strategic partnerships by being prepared to consider joint cyber war simulations on a direct bilateral and official level. Other Asia-Pacific states could learn from this.

Tempo: http://bit.ly/1ZN8xlP

« The EU Wants To Organise The New Tech Economy
The Internet of Things Needs Another 10 Years »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

techUK

techUK

techUK represents companies operating in the tech sector in the UK. Focus areas cover all aspects of ICT including cyber security.

Sensible Vision

Sensible Vision

SensibleVision helps organizations transparently protect data and prevent costly security breaches by constantly verifying the identities of people who use computers or mobile devices.

UM Labs

UM Labs

UM Labs is a developer of security products for Voice over IP (VoIP), protecting SIP trunk connections, safeguarding mobile phone communications and enabling BYOD.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

Tecnalia Research & Innovation

Tecnalia Research & Innovation

Tecnalia is the largest center of applied research and technological development in Spain, a benchmark in Europe and a member of the Basque Research and Technology Alliance.

Project Moore

Project Moore

Project Moore is an Amsterdam law firm specialising in IT-law and privacy.

Griffiss Institute (GI)

Griffiss Institute (GI)

GI's primary role is to advocate and facilitate the co-operation of private industry, academia, and the Air Force Research Laboratory in developing solutions to critical cyber security problems.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

Alertot

Alertot

Hackers attack minutes after a new vulnerability is published. Alertot helps to decrease exposure time in organizations by notifying new issues when they are disclosed.

Adit Ventures

Adit Ventures

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

BlackhawkNest

BlackhawkNest

Blackhawk is the only cyber security solution on the market that combines network monitoring and incident response into a cohesive appliance.

IPKeys Technologies

IPKeys Technologies

IPKeys delivers innovative cybersecurity and technology solutions focused on helping the federal government reduce risk and protect the US from cyberattacks.

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.