Analisis Penggunaan Media Siber terhadap Keamanan Nasional: Suatu Studi di Malaysia
DOI:
https://doi.org/10.33172/jspd.v3i3.134Abstract
Abstrak -- Pengguna internet adalah tinggi di negara-negara di dunia. Persentase pengunaan internet yang tinggi akan menyebabkan rakyat mendapatkan informasi yang tidak dapat dipastikan benar atau tidak. Arab spring adalah contoh di negara-negara Timur Tengah di mana penggunaan media sosial dapat menjatuhkan pemerintah yang ada. Pihak-pihak yang ada agenda tertentu sering mengguna media siber untuk melancarkan serangan siber. Media siber dapat dijadikan alat untuk melakukan serangan kepada pemerintah dalam bentuk perang urat saraf. Media siber bersifat terbuka dan pengunaannya yang meluas sukar bagi pemerintah memantau dan mengawalnya. Selain sebagai media untuk melakukan perang urat saraf, media siber juga dapat menyebabkan terjadinya salah faham di antara pihak-pihak yang bertikai. Ini karena penafsiran secara terbuka dan mampu membawa kepada pertikaian jika tidak ditangani dengan baik. Sikap pengguna media siber yang tidak ada kesadaran terhadap keselamatan dengan mudah mengunggah informasi-informasi rahasia seperti surat-surat dinas, aset pertahanan dan lain-lain ke internet telah membuka rahasia negara kepada umum. Di samping itu, serangan siber atas sistem pemerintahan dan ekonomi juga boleh meruntuhkan negara, seperti apa yang berlaku di Estonia dan Georgia. Serangan sistem pemerintahan oleh Rusia telah merusakkan ekonomi dan politik negara tersebut. Penggunaan media siber yang tidak dikawal mampu memusnahkan keamanan, kesejahteraan dan ekonomi negara. Sekiranya ini berlaku, negara akan kehilangan investor dan ekonomi negara akan merosot. Kemerosotan ekonomi akan memusnahkan asas negara dan negara akan menjadi huru hara. Dengan hampir semua lingkungan kehidupan bersandarkan kepada teknologi informasi, kerawanan keamanan siber akan memberi bencana yang besar kepada negara. Baik dari segi ekonomi, politik, keamanan, dan lain-lain. Maka sangatlah penting untuk diketahui bagaimana peran penggunaan media siber dalam rangka keamanan negara.
Kata Kunci: Siber, Media Sosial, Keamanan Nasional, Perang Informasi, Spionase.
Abstract -- Internet is becoming necessity for the nation and the user percentage is increasing year by year. High percentage of internet user will cause many people to get unreliable information. Arab spring is an example in Middle Eastern countries where the use of social media can topple existing governments. Parties on a hidden agenda often use cyber media to launch cyber-attacks to their victims. Cyber media can be used as a tool to attack the government in the form of psychological warfare. Cyberspace is open to everyone to use and its difficult for the government to monitor and control it. Cyber media can also lead to misunderstandings among conflicting parties if the issue not handled properly. The cyber-media user's non-awareness towards security by uploading confidential information such as official letters, defense assets and so on has opened nation’s secrets to the public. In addition, cyber attacks on government’s administration and economy may also undermine the country, as in the cases of Russia cyber attack to Estonia and Georgia. The use cyber media without proper law and regulations can destroy the nation's security, welfare and economy. If this happen, the country would lose investors and the country's economy would be affected. The economic downturn will destroy the stability of the nation and the country will become fail state. With almost every part of our life relying on information technology, cyber security vulnerability will bring great disaster to the country in terms of economy, politics, security etc. Therefore, it is important to know how the cyber media role in the framework of nation’s security.
Keyword: Cyber, Social Media, National Security, Cyber War, Espionage
References
Daftar Pustaka
Buku
Creswell, J. W. (2014). Research design: Pendekatan kualitatif, kuantitatif, dan mixed. Yogyakarta: Pustaka Pelajar.
Castell. (1996). The Rise of Network Society. West Sussex: Wiley-Blackwell.
Depdikbud. (1994). Kamus Besar Bahasa Indonesia. Jakarta : Balai Pustaka.
Indrawan, Rully & R. Poppy Yaniawati. 2014. Metode penelitian, Kuantitatif, Kualitatif, dan campuran untuk manajemen, pembangunan, dan pendidikan. Bandung : Refika Aditama.
Miriam B. (2009). Dasar-dasar Ilmu Politik. Jakarta : PT.Gramedia Pustaka.
Sekolah Staf dan Komando TNI AD. (2010). Kajian Triwulan IV. Bandung.
Sekolah Staf dan Komando TNI AD. (2016). Pedoman Penyusunan Karya Tulis Militer Ilmiah. Bandung.
Sugiyono. (2014). Memahami penelitian kualitatif. 2014. Bandung : Alfabeta.
United States Joint Command (2006). Informations Operations.
United States Joint Command (2003). Phycological Operations.
Jurnal
Amos Granit (March 2010). Cyberspace as a Military Domain – In What Sense? Institute for Intelligence Studies at IDF Military Intelligence.
Ball, Desmond, and Gary Waters. “Cyber Defence and Warfare.” Security Challenges 9, no. 2 (2013): 91-98.
Ball, Desmond. “China’s Cyber Warfare Capabilities.” Security Challenges 7, no. 2 (Winter 2011): 81-103.
Baylon, Caroline, Roger Brunt, and David Livingstone. “Cyber Security at Civil Nuclear Facilities: Understanding the Risk.” Chatham House. 2015.
Beidleman, Scott W. “Defining and Deterring Cyber War.” Master’s thesis, U.S. Army War College, June 2009.
Bejtlich, Richard. "Outside Perspectives on the Department of Defense Cyber Strategy." The Brookings Institution. September 29, 2015.
Bendiek, Annegret and Tobias Metzger. “Deterrence theory in the cyber-century: Lessons from a state-of-the-art literature review.” Lecture Notes in Informatics (LNI), Gesellschaft fur Informatik, Bonn, 2015.
Benitz, Jorge, and Jason Healey. “Cyber Offense is King.” The Atlantic Council. July 30, 2012.
Borum, Randy, and Ronald Sanders. “Cyber Intelligence: Preparing Today: for Tomorrow’s Threats.” Intelligence and National Security Alliance, 2015.
Collins, Alan (2003). Security and Southeast Asia: domestic,regional and global issues ,Singapore: ISEAS
Cilluffo, Frank J., and Joseph R. Clark. “Preparing for Netwars: Repurposing Cyber Command.” The Journal of International Security Affairs (2012):111-118.
Cilluffo, Frank J., Sharon L. Cardash, and George C. Salmolraghl. "A Blueprint for Cyber Deterrence: Building Stability through Strength." Military and Strategic Affairs 4, no. 3 (December 2012): 3-23.
Clarke, Richard A. “Securing Cyberspace through International Norms: Recommendations for Policymakers and the Private Sector.” Good Harbor Security Risk Management, LLC. 2012.
Clayton, Blake and Adam Segal. “Addressing Cyber Threats to Oil and Gas Suppliers.” Council on Foreign Relations. 2013.
Colby, Elbridge. (June 24, 2013). “Cyberwar and the Nuclear Option.” The National Interest.
Collins, Alan, (2003). Security and Southeast Asia: domestic,regional and global issues ,Singapore: ISEAS.
Cornish, Paul, David Livingstone, Dave Clemente, and Claire Yorke. “On Cyber Warfare.” Chatham House. 2010.
Cornish, Paul, David Livingstone, Dave Clemente, and Claire Yorke. “Cyber Security and the UK’s Critical National Infrastructure.” Chatham House. 2011.
Cornish, Paul, Rex Hughes, and David Livingstone. “Cyberspace and the National Security of the United Kingdom.” Chatham House. 2009.
Craig, Anthony and Brandon Valeriano. “Conceptualising Cyber Arms Races.” Presented at the 8th International Conference on Cyber Conflict, Tallinn, Estonia, 2016.
CSIS Commission on Cybersecurity for the 44th President. "A Human Capital in Crisis: Technical Proficiency Matters." Center for Strategic and International Studies. November 2010.
CSIS Commission on Cybersecurity for the 44th President. “Securing Cyberspace for the 44th Presidency.” Center for Strategic and International Studies. December 2008.
Eidman, Christopher R. Monterey (2014). Unconventional cyber warfare: cyber opportunities in unconventional warfare, California: Naval Postgraduate School.
Fauziah (2017). Kebergantungan Media Sosial Terhadap Isu Arab Spring Dalam Kalangan Khalayak di Malaysia, Jurnal Komunikasi Malaysian Journal of Communication Jilid 33(1)2017: 423-437, Universiti kebangsaan Malaysia.
Federal Ministry of the Interior. (February 2011) “The New Cyber Security Strategy for Germany,”Berlin.
Lynn, WJ. (February 15, 2011) “Remarks on Cyber at the RSA Conference” ,as delivered by, III, San Francisco, California.
Noor, Elina. (2011) “The Problem with Cyber Terrorism.” In SEARCCT’s Selection of Articles Vol. 2, 51-64.
Sebastian M. Convertino II, Lou Anne DeMattei, Tammy M. Knierim, (July 2007)). Flyingand Fighting in Cyberspace. Alabama: Air University Press.
The United States Army’s Cyberspace Operations Concept Capability Plan 2016-2028 (22 February 2010).
Weedon, Jen. (2015). “Beyond ‘Cyber War’” Russia’s Use of Strategic Cyber Espionage and Information Operations in Ukraine.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 67-78. Tallinn: NATO CCD COE Publication.
Wirtz, James J. (2015) “Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 29-38. Tallinn: NATO CCD COE Publication.
Joint Publication 3 – 13 : Joint Operations, Feb 2006
Web
Bernama. (2017). “Ubah kempen cara lama. Pada 31 Januari 2017.” http://www.utusan.com.my/berita/politik/ubah-kempen-cara-lama-ahmad-zahid-1.434300/bn-nasional-1.434305
El-Nawawy. Kamis. (2012) “Cyberactivists Paving the Way for the Arab Spring: Voices from Egypt, Tunisia and Libya.” Pada 1 May 2017. http://www.cyberorient.net/article.do?articleId=7994
Indonesia dalam Situasi Perang Generasi Keempat (2016). http://www.beritasatu.com/nasional/351486-indonesia-dalam-situasi-perang-generasi-keempat.html
Jagatreview (2015). “Waspada! Tren Terbaru Serangan Spionase Cyber – EquationDrug” http://www.jagatreview.com/2015/03/pr-waspada-tren-terbaru-serangan-spionase-cyber-equationdrug/ diakses pada 25 Agusuts 2017.
Mudzakir Maruf (2016). Indonesia Ketar-ketir Lawan Cyberterrorism. https://semarak.news/2016/11/22/10781-indonesia-lawan-cyberterrorism.html
Leo Taddeo (2017). “Nation-state cyber attacks come out of the shadows” http://tech.newstatesman.com/guest-opinion/nation-state-cyber-attacks-come-shadows diakses pada 1 Juni 2017.
Marsda TNI (Pur) Prayitno Ramelan (2013). "Opini Pray Tentang Penyadapan NSA dan ASD di Harian Sindo." https://tni-au.mil.id/pustaka/opini-pray-tentang-penyadapan-nsa-dan-asd-di-harian-sindo pada 10 Agustus 2017.
Mohammad. (2014) Keamanan Nasional. Pada 30 May 2017 https://polmas.wordpress.com/2014/10/10/keamanan-nasional/.
Perang Generasi Ke 4 (Fourth Generation Warfare). Pada 14 Juni 2017. http://strategitaktik.blogspot.com/2013/08/perang-generasi-ke-4-fourth-generation.html.
Perang Generasi Ke 4 (Fourth Generation Warfare). Pada 14 Juni 2017. http://strategitaktik.blogspot.com/2013/08/perang-generasi-ke-4-fourth-generation.html.
Republika.co.id (2016) http://trendtek.republika.co.id/berita /trendtek/ internet/17/05/23/oqd8kn313-negara-dengan-pertahanan-siber-yang-lemah-bakal-merugi pada 27 Agustus 2017
Ryan, Y. (2011). Anonymous and the Arab uprisings The cyber activists discuss their work and the broader global push for freedom of speech and freedom from oppression. Pada 5 Mei 2017 http://www.aljazeera.com/news/middleeast/2011/05/201151917634659824.html
Robert Farley (2016). Just How Wide-Reaching Are China's Economic Espionage Efforts? http://thediplomat.com/2016/12/just-how-wide-reaching-are-chinas-economic-espionage-efforts/ diakses pada 25 Agustus 2017.
Tiirmaa (2011). Cyber Security Threats and responses: at Global, Nation-State. http://www.ceri-scienes-po.org pada 4 Juni 2017.