Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp.

73-88

Jurnal Pertahanan
Media Informasi tentang Kajian dan Strategi Pertahanan
yang Mengedepankan Identity, Nationalism dan Integrity
e-ISSN: 2549-9459
http://jurnal.idu.ac.id/index.php/DefenseJournal

THE CHALLENGES OF THE TECHNOLOGY 4.0 AND


INFORMATION TECHNOLOGY WITHIN TOTAL WAR STRATEGY
STRUCTURE
Ruslan Arief1, Helda Risman2, Rudy Sutanto3
Indonesia Defense University
Salemba Raya Street 14, Central Jakarta, DKI Jakarta, Indonesia 10430
ruslaarief01@gmail.com1, rismancan@gmail.com2, rudi.sutanto071@gmail.com3

Article Info Abstract

Article history: The development of information technology has a significant


Received : December 17, 2020 impact on various important aspects of life. Apart from positive
Revised : April 26, 2021 impacts, there are also negative impacts that are important to know
Accepted : April 26, 2021 and anticipate to prevent major damage and losses. On a broad
scale, namely at the national level, the development of information
technology can also affect the development of national defense as
Keywords: it is known that the nature of Indonesia's defense is total defense,
Information Technology, which is prepared to face the total war. Based on the explanation
Technology 4.0, above, the purpose of this study is to examine the impact of the
Total War Strategy, development of information technology on the implementation of
Strategic Environmental Indonesia's total war strategy. The approach used is qualitative
phenomenology with research data in the form of secondary data
collected using literature studies. The data is then analyzed using
qualitative analysis techniques. The results of the study indicate that
the development of information technology has both positive and
negative impacts. These impacts encourage the need for changes
and adjustments to the total war strategy implemented by Indonesia.
DOI: This is important to do so that Indonesia can have a stronger defense
http://dx.doi.org/10.33172/jp.v in preparation for a total war that may occur in the future.
7i1.1099
© 2021 Published by Indonesia Defense University

INTRODUCTION efficient manner than before. This is one of


The development of information the positive impacts of advanced
technology is something that cannot be information technology that encourages
avoided because it occurs along with easier implementation of various human
changes in human wants and needs. jobs. Besides, technology also facilitates
However, information technology which is social interaction between people, which
increasingly advanced and developing has makes time and distance no longer an
various impacts, which are not only positive obstacle to building a relationship (Ngafifi,
but also negative. 2014).
Information technology enables access The negative impact of the development
to information in a much more effective and of information technology is no less

73
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88

significant than the positive impact felt by crimes, namely by uploading destructive
humans. First, information technology is illegal content. The types of content
said to be the main factor causing the according to the EIT Law, among others:
breakdown of relationships between family
members because each member is busy Table 2. Types of Illegal Content in Second
with his virtual world, thus ignoring Category of Cyber Crime
closeness to family. Second, the occurrence Article Types of Illegal Content
of moral decline in the nation's generation 27 (act 1) Pornography
27 (act 2) Gambling
is also indicated due to the misuse of
27 (act 3) Slander
information technology (Yusuf, 2016).
27 (act 4) Blackmail
Third, there are various types of security 28 (act 1) Fraud
threats launched using increasingly 28 (act 2) Hate speech
advanced information technology (Arianto 29 Threats of violence to others
& Anggraini, 2019). Source: Processed by Authors, 2021
Threats that arise from the misuse of
information technology are classified into The misuse of information technology is
types of cyber threats, which underlie the increasingly dangerous so that the scale is
emergence of various types of crimes in not only at the level of ordinary cybercrime
cyberspace that are intangible or invisible. but has escalated and has the potential to
Nonetheless, the losses caused by the crime create a global scale cyberwar. Thus, it is
proved to be enormous (Arianto & not only individual interests that will be
Anggraini, 2019). To overcome potential affected due to the misuse of increasingly
crimes through misuse of information advanced information technology, but also
technology, the government has enacted a interests and security at the national level.
law regulating the use of information (Rahmawati, 2017).
technology in Law Number 19 of 2016 The echo of cyberwar has been buzzing
concerning amendments to Law Number 11 for the past decade. However, the real
of 2008 concerning Electronic Information damage caused by cybercrime which
and Transactions (EIT Law). Although became the origin of cyberwar has only
there is no specific explanation regarding been felt massively in recent years.
cybercrime, the law describes its anatomy, However, the Indonesian government has
which can be used as a basis for recognized the dangerous seeds of misuse
categorizing the types of cybercrime. of information technology for a long time.
The first category is crimes that target This is as stated by Soewardi (2013) that
internet systems, computers, and networks. Indonesia needs to immediately build a
These crimes can be in the form of illegal formidable cyber defense due to the
activities as follows (Prahassacitta, 2019): development of information technology
that has the potential to be used as a tool for
Table 1. First Category of Cyber Crime global scale crimes.
Article Types of Crime
As it is known that the Indonesian
30 Hacking
defense system is total in nature, namely by
31 Illegal interception
involving the roles of all defense
32 Defacing
33 Interference
components, starting from the human
34 Facilitating criminal acts resource component which includes the
35 Identity theft Indonesian National Armed Forces
Source: Processed by Authors, 2021 (Tentara Nasional Indonesia or TNI) to the
entire Indonesian people; regional
The second category of cybercrime is the components, as well as other resource
activity of using the internet, computers, components that can be empowered to
and networks as a means of committing defend the country's sovereignty. It can also

74
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88

be said that total defense is a combination it without directly interviewing research


of military and non-military defense. The informants (Siyoto & Sodik, 2015). The
main purpose of total defense is to support secondary data of this research is all
a war that is also total in nature (Lebo & information related to the development of
Anwar, 2020). Thus a line can be drawn information technology and Indonesia's
connecting the development of information total war strategy.
technology and Indonesia's total war. The research data were collected using
Increasingly sophisticated information literature studies, namely by tracing
technology will have an impact, either information, whether it is published in
directly or indirectly, positively or books, journals, or news reports. The data
negatively, on how Indonesia arranges its were then analyzed using qualitative
defenses to prepare itself for total war. techniques, which consist of five stages,
Based on the overall explanation above, namely reviewing the entire data, data
this study is conducted to examine the reduction, data categorization, checking the
influence of the development of validity of the data, and interpreting the data
information technology on the (Moleong, 2018).
implementation of Indonesia's total war
strategy. The analysis is carried out to find National Defense
and describe the various positive and Etymologically, the word defense comes
negative impacts of the development of from the original word ‘resilient’, which
information technology that need to be according to the Big Indonesian Dictionary,
considered in the formulation and means “remains in its state (position and so
implementation of strategies to prepare on) despite experiencing various things
Indonesia for a total war that might occur in (influenced by many factors); does not
the future. change quickly; or strong or able to endure
something”. Based on the meaning of the
METHODS original word, defense means to defense;
This study is a qualitative phenomenology defense of one thing (country or other
type. Qualitative research can be matter); a place (in the form of a fort or
understood as research that examines stronghold) that is used to defend oneself or
natural phenomena to be interpreted against attacks coming from outside.
narratively by referring to the researcher's Furthermore, from the meaning of defense,
point of view as the main research by the context of this study, the meaning of
instrument (Anggito & Setiawan, 2018). A national defense is obtained as all efforts to
phenomenological approach is a research prevent and fend off opponents, protect and
approach that offers procedural defend national interests against all kinds of
implications to be able to get the correct coercion by force and attacks from other
interpretation of the phenomena studied in parties.
the research. Through this approach, the Based on the etymological meaning
reality that is the natural background of above, it can be concluded that defense
research can be understood as it is (Farid & includes efforts, methods, capabilities, and
Adib, 2018). This type of systems and structures that allow self-
phenomenological qualitative research was protection from attacks and prevent
chosen by the author to be able to negative impacts from the result of
understand and narrate the development of aggressive actions from other parties. In the
information technology and its influence on national context, defense is not only
the total war strategy adopted by Indonesia. sufficient in the actions taken to defend the
The data used in this study is secondary country but must achieve a state of being
data, which is data that has been able to realize these actions effectively so
documented so that researchers can collect that the national interest is truly protected

75
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88

from various potential threats. achieve national goals, namely to protect


The definition of national defense the entire nation and the entire territory
according to Article 1 act 1 of Law of the of Indonesia, promote public welfare,
Republic of Indonesia Number 3 of 2002 educate the nation's life and participate
concerning State Defense (hereinafter in implementing world order based on
referred to as the Law on National Defense) independence, eternal peace, and social
is all efforts to defend the sovereignty of the justice.
state, the territorial integrity of the Unitary 3. They are providing opportunities for
State of the Republic of Indonesia, and the every citizen to exercise their rights and
safety of the entire nation from threats and obligations to defend the state as a
threats. Disturbance to the integrity of the reflection of national life which
nation and state. Furthermore, Article 2 also guarantees the rights of citizens to live in
explains that the nature of national defense an equal, just, safe, peaceful, and
is the total defense which is implemented prosperous manner.
based on awareness of the rights and 4. Build, maintain, develop and use the
obligations of citizens as well as confidence national defense force based on the
in their strength. principles of democracy, human rights,
National defense can also be interpreted public welfare, the environment, the
as the dynamic condition of a country that provisions of national law, international
has national capabilities and strength based law and international customs, and the
on the overall integration of all aspects of principle of peaceful coexistence.
the nation, which can be empowered to 5. Maintain the sovereignty of the state, the
protect all the interests of the nation from territorial integrity of the Unitary State
various threats that come from within or of the Republic of Indonesia, and the
from abroad, which are launched directly or safety of the entire nation from threats
indirectly. With the existence of national and disturbances to the integrity of the
defense, state security can be protected so nation and state.
that various important processes can be 6. Realizing and maintaining the entire
carried out optimally to achieve the nation's territory of the Unitary State of the
goals (Pranowo, 2010). Republic of Indonesia as one defense
By its meaning, the purpose of national unit.
defense is basically to protect the security Following the Law on National Defense,
of the interests of all parts of the nation. the components of national defense are
This protection can be in the form of divided into three categories, namely the
anticipatory efforts to prevent the main component, the reserve component,
realization of potential threats becoming and the supporting component.
real threats, as well as efforts in the form of 1. The main component of national defense
handling to overcome threats that already is the Indonesian National Army which
have a perceived damage impact (Pranowo, is a special unit prepared to carry out
2010). If referring to the Law on National defense tasks. According to Law
Defense, the objectives of national defense Number 34 of 2004 concerning the
can be categorized into several points as Indonesian National Armed Forces
follows: (Tentara Nasional Indonesia or TNI),
1. We are ensuring the integrity and hereinafter referred to as the TNI Law,
upholding of the Unitary State of the the TNI is a defense tool of the Unitary
Republic of Indonesia based on State of the Republic of Indonesia,
Pancasila and the 1945 Constitution. serving as executor of state defense
2. Supporting the implementation of the policy to uphold state sovereignty,
functions of the state government to maintain territorial integrity, and protect
realize one national defense unit to the safety of the nation, carry out

76
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88

military operations for war and military Following international regulations


operations other than war, and governing state sovereignty in the sea
participate actively in regional and area, namely the United Nations
international peacekeeping tasks. Convention for the Law of the Sea
2. The reserve components of national (UNCLOS), every country that has
defense are national resources that have maritime boundaries is given the right to
been prepared to be mobilized to enlarge control natural resources in the sea area
and strengthen the main components. as far as 200 miles. From the baseline of
The existence of this reserve component the sea to the furthest region. This right
is very important because it is a is not a territorial right, but rather a right
component that will be a substitute for based on interests, so that countries that
the main component if needed in certain have an EEZ basically cannot claim the
circumstances. However, the specific sea area in the EEZ as their territory, but
stipulation has not been realized by the have the right to defend the area to fulfill
state. Guidelines that explain the reserve their interests. Given the richness of
components are still in the form of the natural resources in the EEZ, the
State Defense Reserve Components Bill, sovereignty of the state to control these
which was proposed as a mandate of the natural resources needs to be maintained
State Defense Law. through safeguards carried out
3. The supporting components of national sustainably.
defense are national resources that can 2. Defense in the Territory of Jurisdiction
be used to increase the strength and Jurisdiction or territorial waters is a
capability of the main components and benchmark used to measure the territory
reserve components. The definition of that becomes the sovereignty of a
national resources, in this case, includes country. This area is measured from a
human resources, natural resources, and distance of 12 miles from the outer point
man-made resources. Natural resources of the islands at low tide towards the sea.
include all the potentials contained in the Territorial sovereignty applies from that
earth, water, and aerospace, which in point, starting from the sovereignty of
their original form can be utilized for the the airspace above it, the seabed, and the
benefit of national defense, while land below, which is absolutely the
artificial resources include natural property of the country concerned.
resources whose usability has been Violation of these boundaries is
increased for the benefit of national considered a real threat to the country's
defense. sovereignty, which must be anticipated
and overcome through the development
Total Defense System and Total War of a strong defense.
The national defense system is the first 3. Defense in the Territory of the Deepest
dimension of national defense which Islands
consists of territorial and resource aspects. Defense in the deepest islands is the core
According to the territorial aspect, the of national defense because the region is
national defense system includes a series of located at the center of government and
defenses that are developed in layers, is a place for various important activities
namely defense in the Exclusive Economic to take place that contribute to the
Zone (EEZ), defense in jurisdictions sustainability and development of a
(territorial waters), and defense in the nation. The deepest island area extends
deepest islands (Hikam, 2014). from the coastline to the entire land area
1. Defense in the Exclusive Economic owned by a country. Efforts to maintain
Zone (EEZ) security in this central region are a top

77
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88

priority that must be upheld to maintain information technology is one of the main
the sovereignty of the state. facilities that humans need to carry out
According to the resource aspect, the various important jobs. Without the
national defense system includes human existence of information technology,
resources, natural and artificial resources, humans will certainly experience many
and defense infrastructure. The three difficulties in fulfilling their needs and
resources can be categorized into two desires (Rusydi, 2017).
components, namely the main component The tangible form of the benefits of
that refers to military forces, both land, sea, information technology can be felt by
and air forces, which are specifically humans in various fields, starting from the
developed and empowered to defend the fields of education, social, economy to
country; as well as supporting components supporting efforts to strengthen national
including reserve forces, defense defense. In the field of education, there are
infrastructure, and militia obligations. All at least five fundamental changes in the
of these components form a total defense implementation of teaching and learning
system of Indonesia, which is built and activities through the application of the
improved on an ongoing basis to deal with latest information technology, among
wars that are also total in nature (Lebo & others (Rusydi, 2017):
Anwar, 2020). 1. Change from teaching model from
training to performance
RESULT AND DISCUSSION 2. Changing the place of teaching from
Development of Information Technology classrooms to classrooms without rooms
and Its Use in Various Fields 3. Change from using paper to networking
Information technology was not created in or online
prehistoric times, but the seeds of 4. Change from physical facilities to
communication have begun to be etched at network facilities
that time. As noted by historians, humans 5. Change from cycle time to real-time
began carving on cave walls as a form of Information technology provides means,
communication in 3,000 BC. Carvings such as telephones, computers, e-mail, the
made using animal horns form pictograph internet, and others, to increase the
symbols that function like letters in the effectiveness and efficiency of the
language of communication. implementation of communication and
In the next period, humans began to interaction between teachers and students.
create symbols that symbolized letters, and By optimally empowering information
the media used to write these letters. The technology, the interaction between parties
written media, which was originally in the involved in the learning process can be
form of rocks, was further refined in 500 changed from a conventional model in the
BC by China in paper form. Writing form of face-to-face to an online model,
equipment that became a form of early new where teachers and students can be in far
technology was created around 1400 by different places but can still carry out their
Gutenberg in the form of a printing press for respective roles. Besides, the need to obtain
letter plates. In the following years, various complete and easy information and
other, more sophisticated equipment were knowledge is also facilitated by information
made by engineers, ranging from technology which can become a very large
telephones, televisions, computers to the information storage medium, which can be
internet (Lubis & Safii, 2018). accessed easily and cheaply (Rosenberg,
Along with the development of 2001).
information technology, the benefits that The efficiency of the learning process
can be obtained by humans are also makes the costs for learning activities much
increasing. It can even be said that cheaper. Study materials that are stored and

78
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88

accessed online reduce the cost of printing in terms of knowledge exploration.


books or study modules. Implementation of Teachers no longer have limitations in
online learning reduces transportation costs terms of teaching materials to be
that must be incurred by teachers and delivered due to the availability of a
students, such as when doing face-to-face large database that can be accessed
learning (Zulfah, 2018). online. Likewise with students who are
It can also be stated that the use of no longer fixated on accepting the
increasingly sophisticated information material presented by the teacher only
technology can encourage the increase in but can freely explore various learning
the quality of education evenly. sources on the internet. Thus,
Specifically, an information technology information technology is not only used
product in the form of the internet that can in the formation of new learning models
remove space and time limitations in but also in a more active and exploratory
learning activities becomes a medium that learning system.
allows the subject matter to be shared with 3. Development of new learning media
students who are in different places at the Learning media has a very important role
same time. Thus, it is not only students who in achieving the success of learning
are in areas with a complete educational activities. Therefore, along with the
infrastructure who can get quality learning. increasingly intense use of information
Students who are in areas with incomplete technology in learning, there is a
educational facilities can also get quality development of learning media used,
education by utilizing the existence of namely by integrating aspects of
information technology (Husaini, 2014). information technology in the form of
There are at least four forms of learning media. The results obtained are
utilization of information technology for the in the form of new learning media that
development of the education sector, are more attractive and offer various
among others (Husaini, 2014): advantages over conventional learning
1. Improved information management media. Broadly speaking, there are three
Information technology enables massive forms of utilizing information
storage of information, as well as access technology in the development of
to information easily and cheaply. This learning media. First, information
is very beneficial for the implementation technology is used as a medium for
of learning activities that require large delivering teaching materials to students,
amounts of educational information. which is generally referred to as
Besides, information technology also computer-based training or computer-
enables information exchange to create assisted instructional.
equitable quality education. Broadly Teachers package teaching materials
speaking, it can be stated that in a program that can be accessed by
information technology allows easier students using computer devices. In
management of information and can addition to delivering teaching materials,
meet educational needs as a whole. the program can also produce
2. Online learning design information on the development of
As stated earlier, the existence of student learning activities that are used
information technology enables distance as a basis for evaluating and assessing
learning via the internet, otherwise learning outcomes. Second, information
known as online learning. Apart from technology is used as a medium for
having a learning model that is far distributing teaching materials. This
different from traditional learning, second utilization model is the same as
online learning also has enormous the first model, which aims to facilitate
flexibility for both teachers and students the transfer of teaching materials from

79
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88

teachers to students. However, the between individuals could only be done in


procedure for the two models is traditional ways, such as face to face or by
different, where the first model uses a sending letters. However, after the
program that is run on a computer, while existence of increasingly sophisticated
the second model uses the internet information technology products,
network. Teaching materials are interactions can be established more freely
uploaded to the website, then accessed and flexibly (Setiawan, 2018).
by students via a web browser. Third, Social changes due to the development
communication technology is used to of information technology can be broadly
facilitate teleconferences between classified into three. First, changes in the
related parties, namely teachers, structural dimension, namely changes that
students, and resource persons who occur in the structure of society in the form
become speakers in learning activities. of the emergence of new social roles, social
This third model emphasizes the use of class, and social institutions. Second,
information technology in an effective changes in the cultural dimension, namely
and efficient communication process, changes in cultural matters that prevail in
which not only allows the delivery of society in the form of innovation, diffusion,
teaching materials directly but also and cultural integration. Third, changes in
obtains feedback following the results of the interactional dimension, namely change
the teleconferences conducted. in the relationships that occur between
4. Teaching life skills individuals who are members of social
Along with the rapid use of information society. Interactional changes can occur in
technology in all fields, almost every job terms of frequency of interactions, social
requires the ability to operate distance formed in society, social
information technology products. intermediaries, rules and patterns of social
Therefore, mastery of information interaction, and changes in the form of
technology can be said to have become a interactions (Martono, 2012).
very important life skill. The integration The benefits of the development of
of information technology in learning information technology in the economic
activities has the potential to become a field are enormous. First, all economic
means of teaching life skills activities require a flow of information that
comprehensively and sustainably. can meet development needs to achieve
The benefits of the development of higher productivity over time. The
information technology in the social field existence of various information
are mainly in increasing the speed of technology products facilitates this need so
information distribution needed to solve that the economic process can run much
various existing social problems. The lack faster. Business actors can find out various
of clarity of information is the root of many changes in market demand quickly based on
social problems so that with the information accessed through various
advancement of information technology, information technology products so that
efforts to clarify and update information can they can formulate the right production
be carried out very easily and quickly. This strategies (Burhan, 2018).
is the basis for the ease in solving social Another benefit of the development of
problems caused by errors in receiving information technology for the economic
information (Setiawan, 2018). sector is in terms of developing the quality
Besides, information technology is also of Human Resources (HR) that can be
an important factor that determines the carried out better. The transfer of science
increase in ease and speed of social and technology becomes easier by utilizing
interaction. Before the existence of information technology products to
information technology, the interaction encourage the higher knowledge and ability

80
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88

of the community in carrying out various unintentionally by any party, with any
activities of economic value (Radhi, 2010). motive and purpose, which are based on
The distribution of information that is electronic systems or their content
getting cheaper, easier and faster has also (information) or equipment that is highly
become a big capital in the implementation dependent on technology and networks on
of infrastructure development that supports any scale, against vital and non-vital objects
economic activity. The existence of this in the military and non-military spheres,
infrastructure makes people more which threaten the sovereignty of the state,
productive and can freely carry out territorial integrity and the safety of the
economic activities to improve the quality nation.
of their lives. This is correlated with the Following those forms of cyber attack,
increasing economy in line with the smooth there are several cyber defense targets set
running of activities in the economic sector by the government, among others:
carried out by the community (Wardhana et 1. Increase understanding of the latest
al., 2020). situation related to cyber threats
The development of information 2. Formulate the most appropriate handling
technology not only brings changes on a of existing cyber threats
small scale but also on a very broad scale. 3. Raising awareness about the importance
Apart from actually causing changes in the of cyber defense as part of national
educational, social, and economic fields, defense
the government can also use information 4. Increase the active participation of all
technology that is increasingly developing elements of national defense in
to strengthen efforts to protect national defending the country from cyber threats
defense from threats originating from 5. Increasing the empowerment of all
within and outside the country (Susdarwono national resources in increasing cyber
et al., 2020). defense power
Threats to state sovereignty are currently 6. Formulate the most appropriate strategy
monitored not only based on the source but to deter, act against and restore the cyber
also the form of threats which can be in the defense sector
form of military or non-military threats. The 7. Establishment of comprehensive cyber
dominant threats during non-war times like defense implementation guidelines
today are threats that are non-military in To achieve these goals, the use of
nature, mainly in the form of cyberattacks various new information technology
by utilizing the latest information products is a necessity. Thus, the
technology products. Therefore, increasingly rapid development of
strengthening defense is also carried out by information technology encourages the
these types of threats, namely through the rapid development and strengthening of
establishment of a cyber defense agency national cyber defense to respond to cyber
supported by policies and regulations challenges and threats.
regarding cyber defense.
According to the Regulation of the Positive and Negative Impacts of
Minister of Defense of the Republic of Information Technology Development on
Indonesia Number 82 of 2014 concerning the Implementation of the Total War
Guidelines for Cyber Defense (Cyber Strategy
Defense Law), the definition of cyber As it is known, the Indonesian defense
defense is an effort to tackle cyber attacks system is known as a total defense system,
that disrupt the implementation of national which focuses on the involvement of all
defense. It also states that cyber-attacks are defense components, including human
all forms of deeds, words, thoughts, resources, territory, and various other types
whether done intentionally or of resources owned by the state. The

81
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88

concept of a total defense system is also that is directed to become the implementer
explained in Article 30 act 2 of the 1945 of cyber defense. In this case, it can be said
Constitution, namely: that the empowerment of the main and
National defense and security efforts are supporting components is more optimal
carried out through the total people's defense than before.
and security system by the Indonesian The existence of a cyber community
National Army and the Indonesian National originating from civil society, which has the
Police, as the main force, and the people, as
potential to increase the power of total
the supporting force.
defense and become the vanguard in cyber
It is also explained in the Defense Law, warfare, shows an increase in the role and
that total defense is enforced by three position of society from the supporting
components consisting of main components that are behind the ranks of the
components, reserve components, and main components in war, to being aligned
supporting components. The empowerment with the main components in the cyberwar.
of these three components to form total As it is known, in open warfare, civil
defense is basically a preparation for facing society is not directly involved but only
total war (Lebo & Anwar, 2020). The becomes a supporting component of the
essence of total war is a war that occurs in TNI (Indrawan, 2015). However, in the
all possible domains at a scale appropriate realm of total war that is military but also
to the development of the existing situation. non-military in nature, society can increase
Total war can be in the form of war in the its position and role to be not only a
military or non-military realms so that it supporter but also an important actor in
demands total defense power in these two open warfare in the cyber realm.
domains (Putra et al., 2018). Concerning the Optimization of this empowerment is
development of information technology, the based on the existence of a new threat
biggest threat that has the potential to be model which is dominated by the cyber
faced in a total war comes from cyber domain, which changes the defense
threats launched to destroy Indonesia's total paradigm from initially placing the main
defense force. component as the main defense operator to
It can be said that the increasing cyber empowering the community from the
threat is a negative impact of the supporting components to participate in
development of information technology on becoming one of the main defense forces.
Indonesia's defense. Thus, the existence of The next positive impact is the presence
cyber threats demands that a fundamental of an event which is a strong reason to
adjustment be made to the total war strategy increase the integration of information
adopted by Indonesia. The adjustment is technology into national defense. It can be
meant by integrating aspects of information said that this integration is a form of
technology in all the forces forming the strengthening national defense in the
total defense. context of facing total war because of the
Apart from having a negative impact, the development of information technology
development of information technology which is the basis for the emergence of
also has positive impacts on Indonesia's various new threats. Following the nature of
total war strategy. As mentioned by Lebo & the new threat which is dominated by the
Anwar (2020), that many parties master cyber realm, there is no better solution than
information technology, which can be used to increase the integration of information
as executors of total defense, especially in technology into Indonesia's total defense
the cyber domain. These parties can come system. This needs to be a major priority
from the community, which is the considering that the potential for cyber
supporting component of total defense, as warfare is greater than armed warfare
well as from the main defense component (Meiliyanti et al., 2019).

82
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88

The integration of information Technology (Siagian et al., 2018), but it can


technology in total defense can be done also be implemented between government
through several methods. First, by agencies and private institutions that have
increasing the portion of the material on business fields related to information
applicable information technology into the technology applications; or between
learning of the community or prospective government agencies and educational
TNI personnel at formal schools. This providers. Besides, the existence of high
method can encourage the deepening of capital requirements to finance information
public knowledge and abilities related to technology experiments can also be used as
information technology, which can be an excuse for the procurement of
empowered by the state to strengthen total cooperation between state institutions in the
defense. Second, providing information defense sector and financial institutions
technology training to TNI personnel who capable of supporting this aspect of capital.
specifically handle cyber threats. This Overall, it can be stated that the
training is directed at achieving goals in the development of information technology has
form of mastery of appropriate information had a significant impact on the total war
technology by the development of cyber strategy. The impact, which can be positive
threats that are currently being faced and or negative, is the basis for the formulation
which could potentially arise in the future. and implementation of a total war strategy
Third, build state education facilities that that has a fundamental difference from the
specifically deepen knowledge about previous one.
information technology. The public can The total war is a war that involves all
register at this facility, but on the condition components of defense by prioritizing the
that they will use their knowledge for the role and position of the main component of
benefit of the state. Fourth, collaborating defense, namely the TNI. Following the
with private institutions engaged in development of information technology,
information technology to transfer this formation has the potential to undergo
technology to defense personnel. This effort significant changes. Total defense to
aims to increase the knowledge and ability prepare for the total war, which is no longer
of information technology management of only open war with the deployment of
defense personnel, as well as to build a military power but also in the form of war
network of information technology in the cyber realm, can be carried out by
institutions that can strengthen the total empowering civil society to strengthen the
defense, particularly against cyber threats. front line of defense in this cyberwar.
The existence of cyber threats with the The development of information
potential for widespread damage makes all technology is the basis for the need to
defense components strive to strengthen the change the total war strategy to be more
total defense. These efforts are carried out flexible in determining and mobilizing
in the form of cross-sector cooperation parties who are components of defense.
based on full awareness of the potential Besides, the aspect of integrating
dangers of cyber attacks. This aspect of information technology into the defense
cross-sector cooperation is one of the component needs to be prioritized because
important capitals needed to strengthen it is the main key to the success of
total defense to face total wars that have the strengthening total defense to face total war.
potential to occur in the future. An important thing that also needs to be
Cross-sectoral cooperation is not limited considered in the formulation of a total war
to one government agency and other strategy is the nature of cyber threats, which
government agencies, for example, between tends to change from time to time and the
the Ministry of Defense and the Ministry of development of information technology.
Communication and Information These changes can occur in the source,

83
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88

aspect, form, or type of cyber threat. As The adjustment is primarily aimed at


stated in Cyber Defense Law, there are nine ensuring that national defense can ward off
sources of cyber threats, namely internal and overcome various potential threats that
and external sources; intelligence activities; arise, especially threats from the cyber
disappointment; investigation; extremist domain so that they can have high readiness
organizations; hacktivists; organized crime in the event of total war in the future.
groups; competition, enmity and conflict;
and technology. The development of CONCLUSIONS,
information technology can produce many RECOMMENDATION, AND
sources of new threats in addition to those LIMITATION
nine sources, which need to be explored in- The development of information
depth as a measure to anticipate and prepare technology has a significant impact on
for total war. various aspects of life. These impacts can be
Regarding the cyber threat aspect, it is in the form of positive or negative impacts
also stated in Cyber Defense Law that cyber according to how humans place and
threats can occur in ideological, political, empower information technology.
economic, social, cultural, national, In general, the development of
military, science and technology aspects, information technology can be used to
and other important aspects. The increase achievements in various important
development of information technology has fields, starting from the fields of education,
the potential to increase the scale of threats social, economy, and national defense. In
in these aspects so that the damage and the economic field, the development of
losses that occur can be even greater. information technology can be used to
According to Cyber Defense Law, there improve information management, design
are seven forms of cyber threats that online learning, develop new learning
generally frequently occur, namely attacks media, and teach life skills. In the social
from Advanced persistent threats (APT), field, the continued use of information
denial of service (DoS), and distributed technology encourages changes in three
denial of service (DDoS); defacement, social dimensions, namely the structural
phishing, malware, cyber intrusion, spam, dimension, the cultural dimension, and the
and misuse of communication protocols. interactional dimension.
These forms of cyber threats can change In the economic sector, developments in
their level of impact and increase in variety information technology have significantly
and number according to the increasing increased productivity, accelerated the
number of uses and new products from development of the quality of human
existing information technology. resources, and accelerated the development
Finally, concerning the types of cyber of infrastructure required for economic
threats, which consist of hardware threats, activity. The development of information
software threats, and data/information technology can also be used to strengthen
threats, along with the increasingly national defense, especially to prepare for
sophisticated information technology, more threats that come from the cyber domain.
and more products are emerging, both in the Following statutory provisions, total
form of programs/applications or use state defense is applied to prepare for total
hardware that can be used to launch a war. Thus, a fundamental change in the
cyberattack. formation of total defense due to the impact
Based on the potential changes in cyber of the development of information
threats above, it is necessary to anticipate technology will automatically lead to
efforts in the form of adjustments to the changes in the total war strategy
existing total war strategy to the implemented by Indonesia. These changes
development of information technology. are basically due to the positive and

84
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88

negative impacts of the development of untuk pengembangan ekonomi


information technology. The negative pertanian dan pengentasan
impact is in the form of increasing threats to kemiskinan. Jurnal Komunikasi
state security and sovereignty originating Pembangunan, 16(2), 233–247.
from the cyber domain. The positive Farid, M., & Adib, M. (2018).
impacts consist of increasing empowerment Fenomenologi dalam penelitian ilmu
of the community in implementing total sosial. Prenadamedia Group.
defense, having events to increase the Hikam, M. A. (2014). Menyongsong 2014-
integration of information technology into 2019 memperkuat Indonesia dalam
national defense, and increasing cross- dunia yang berubah. CV Rumah
sector cooperation to strengthen total Buku.
defense. Husaini, M. (2014). Pemanfaatan teknologi
The findings of this study can be used as informasi dalam bidang pendidikan
a consideration for the government to (e-education). Jurnal Mikrotik, 2(1).
formulate a total war strategy by Indrawan, J. (2015). Perubahan paradigma
prioritizing the development of defense pertahanan Indonesia dari pertahanan
forces, especially in the cyber domain. On teritorial menjadi pertahanan
the other hand, the findings of this research maritim: sebuah usulan. Jurnal
can also add insight to the public regarding Pertahanan, 5(2), 93–114.
the importance of using information Lebo, D., & Anwar, S. (2020).
technology wisely, which is not only Pemerdayaan komunitas siber oleh
beneficial for the fulfillment of personal pemerintah Republik Indonesia dari
interests but also the interests of the wider perspektif strategi perang semesta.
community and national interests. Jurnal Strategi Pertahanan Semesta,
This research can be used as a reference 6(1), 101–127.
for further research that wants to re- Lubis, I., & Safii, M. (2018). Smart
examine the impact of the development of economy. PT karya abadi mitra indo.
information technology on Indonesia's total Martono, N. (2012). Sosiologi perubah-an
war strategy. However, further research sosial: perspektif klasik, modern,
may use a different approach than this postmodern, dan postkolonial. Raja
research, namely a quantitative approach, to Grafindo Persada.
produce findings by empirical data that Meiliyanti, Y. T., Setiyono, J., &
describes the realities in the field. Supriyadhie, K. (2019). Kajian
hukum humaniter internasional
mengenai cyber warfare dalam
REFERENCES konflik bersenjata internasional
Anggito, A., & Setiawan, J. (2018). antara Israel dan Palestina atas Gaza.
Metodologi penelitian kualitatif. CV Diponegoro Law Journal, 8(2),
Jejak. 1581–1600.
Arianto, A. R., & Anggraini, G. (2019). Moleong, L. J. (2018). Metodologi
Membangun pertahanan dan Penelitian Kualitatif (revisi). Remaja
keamanan siber nasional Indonesia Rosda Karya.
guna menghadapi ancaman siber Ngafifi, M. (2014). Kemajuan teknologi
global melalui Indonesia security dan pola hidup manusia dalam
incident response team on internet perspektif sosial budaya. Jurnal
infrastructure (ID-SIRTII). Jurnal Pembangunan Pendidikan, 2(1), 33–
Pertahanan & Bela Negara, 9(1), 13– 47.
29. Prahassacitta, V. (2019). Konsep kejahatan
Burhan, A. B. (2018). Pemanfaatan siber dalam sistem hukum Indonesia.
teknologi informasi dan komunikasi https://business-

85
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88

law.binus.ac.id/2019/06/30/konsep- Soewardi, B. A. (2013). Perlunya


kejahatan-siber-dalam-sistem- Pembangunan Sistem Pertahanan
hukum-indonesia/ Siber (Cyber Defense) yang tangguh
Pranowo, M. B. (2010). Multidimensi bagi Indonesia. Media Informasi
ketahanan nasional. Pustaka Alpabet. Ditjen Pothan Kemhan, 31–35.
Putra, R. D., Supartono, & Deni, D. A. R. Susdarwono, E. T., Setiawan, A., & Husna,
(2018). Ancaman siber dalam Y. N. (2020). Kebijakan negara
perspektif pertahanan semesta (studi terkait perkembangan dan revitalisasi
kasus sistem pertahanan semesta). industri pertahanan Indonesia dari
Jurnal Prodi Perang Asimetris, 4(2), masa ke masa. Jurnal USM Law
99–120. Review, 3(1), 155–181.
Radhi, F. (2010). Pengembangan Wardhana, A., Kharisma, B., & Lisdiyanti,
appropriate technology sebagai upaya T. (2020). Teknologi informasi
membangun perekonomian Indonesia komunikasi dan pertumbuhan
secara mandiri. Jurnal Ekonomi ekonomi wilayah barat dan timur
Bisnis, 1(15), 1–8. Indonesia periode 2014-2018. E-
Rahmawati, I. (2017). Analisis manajemen Jurnal Ekonomi Dan Bisnis
risiko ancaman kejahatan siber dalam Universitas Udayana, 9(11), 1103–
peningkatan cyber defense. Jurnal 1116.
Pertahanan & Bela Negara, 7(2), 51– Yusuf, I. (2016). Analisis penggunaan
66. teknologi informasi (internet)
Rosenberg, M. J. (2001). E-Learning : terhadap masyarakat di Kecamatan
Strategies For Delivering Knowledge Sigi Biromaru Kabupaten Sigi.
In The Digital Age. McGraw-Hill EJurnal Katalogis, 4(9), 125–136.
Book Company. Zulfah, S. (2018). Pengaruh perkembangan
Rusydi, I. (2017). Peranan perkembangan teknologi informasi lingkungan (studi
teknologi informasi dan komunikasi kasus kelurahan Siti Rejo I Medan).
dalam kegiatan pembelajaran dan Jurnal Ilmu Administrasi UISU.
perkembangan dunia pendidikan. Anggito, A., & Setiawan, J. (2018).
Jurnal Warta, 53. Metodologi penelitian kualitatif. CV
Setiawan, D. (2018). Dampak Jejak.
Perkembangan Teknologi Informasi Arianto, A. R., & Anggraini, G. (2019).
dan Komunikasi Terhadap Budaya. Membangun pertahanan dan
Simbolika, 4(1), 62–72. keamanan siber nasional Indonesia
Siagian, L., Budiarto, A., & Simatupang. guna menghadapi ancaman siber
(2018). Peran keamanan siber dalam global melalui Indonesia security
mengatasi konten negatif guna incident response team on internet
mewujudkan ketahanan informasi infrastructure (ID-SIRTII). Jurnal
nasional. Jurnal Prodi Perang Pertahanan & Bela Negara, 9(1), 13–
Asimetris, 4(3), 1–18. 29.
Siyoto, S., & Sodik, A. (2015). Dasar Burhan, A. B. (2018). Pemanfaatan
Metodologi Penelitian. Literasi teknologi informasi dan komunikasi
Media Publishing. untuk pengembangan ekonomi
https://books.google.co.id/books?id= pertanian dan pengentasan
QPhFDwAAQBAJ&pg=PA28&dq= kemiskinan. Jurnal Komunikasi
sumber+data+penelitian+kualitatif& Pembangunan, 16(2), 233–247.
hl=en&sa=X&ved=0ahUKEwiEvfrc Farid, M., & Adib, M. (2018).
pvXbAhXGWisKHT97AesQ6AEIX Fenomenologi dalam penelitian ilmu
zAH#v=onepage&q=sumber data sosial. Prenadamedia Group.
penelitian kualitatif&f=false Hikam, M. A. (2014). Menyongsong 2014-

86
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88

2019 memperkuat Indonesia dalam kasus sistem pertahanan semesta).


dunia yang berubah. CV Rumah Jurnal Prodi Perang Asimetris, 4(2),
Buku. 99–120.
Husaini, M. (2014). Pemanfaatan teknologi Radhi, F. (2010). Pengembangan
informasi dalam bidang pendidikan appropriate technology sebagai upaya
(e-education). Jurnal Mikrotik, 2(1). membangun perekonomian Indonesia
Indrawan, J. (2015). Perubahan paradigma secara mandiri. Jurnal Ekonomi
pertahanan Indonesia dari pertahanan Bisnis, 1(15), 1–8.
teritorial menjadi pertahanan Rahmawati, I. (2017). Analisis manajemen
maritim: sebuah usulan. Jurnal risiko ancaman kejahatan siber dalam
Pertahanan, 5(2), 93–114. peningkatan cyber defense. Jurnal
Lebo, D., & Anwar, S. (2020). Pertahanan & Bela Negara, 7(2), 51–
Pemerdayaan komunitas siber oleh 66.
pemerintah Republik Indonesia dari Rosenberg, M. J. (2001). E-Learning :
perspektif strategi perang semesta. Strategies For Delivering Knowledge
Jurnal Strategi Pertahanan Semesta, In The Digital Age. McGraw-Hill
6(1), 101–127. Book Company.
Lubis, I., & Safii, M. (2018). Smart Rusydi, I. (2017). Peranan perkembangan
economy. PT karya abadi mitra indo. teknologi informasi dan komunikasi
Martono, N. (2012). Sosiologi perubah-an dalam kegiatan pembelajaran dan
sosial: perspektif klasik, modern, perkembangan dunia pendidikan.
postmodern, dan postkolonial. Raja Jurnal Warta, 53.
Grafindo Persada. Setiawan, D. (2018). Dampak
Meiliyanti, Y. T., Setiyono, J., & Perkembangan Teknologi Informasi
Supriyadhie, K. (2019). Kajian dan Komunikasi Terhadap Budaya.
hukum humaniter internasional Simbolika, 4(1), 62–72.
mengenai cyber warfare dalam Siagian, L., Budiarto, A., & Simatupang.
konflik bersenjata internasional (2018). Peran keamanan siber dalam
antara Israel dan Palestina atas Gaza. mengatasi konten negatif guna
Diponegoro Law Journal, 8(2), mewujudkan ketahanan informasi
1581–1600. nasional. Jurnal Prodi Perang
Moleong, L. J. (2018). Metodologi Asimetris, 4(3), 1–18.
Penelitian Kualitatif (revisi). Remaja Siyoto, S., & Sodik, A. (2015). Dasar
Rosda Karya. Metodologi Penelitian. Literasi
Ngafifi, M. (2014). Kemajuan teknologi Media Publishing.
dan pola hidup manusia dalam https://books.google.co.id/books?id=
perspektif sosial budaya. Jurnal QPhFDwAAQBAJ&pg=PA28&dq=
Pembangunan Pendidikan, 2(1), 33– sumber+data+penelitian+kualitatif&
47. hl=en&sa=X&ved=0ahUKEwiEvfrc
Prahassacitta, V. (2019). Konsep kejahatan pvXbAhXGWisKHT97AesQ6AEIX
siber dalam sistem hukum Indonesia. zAH#v=onepage&q=sumber data
https://business- penelitian kualitatif&f=false
law.binus.ac.id/2019/06/30/konsep- Soewardi, B. A. (2013). Perlunya
kejahatan-siber-dalam-sistem- Pembangunan Sistem Pertahanan
hukum-indonesia/ Siber (Cyber Defense) yang tangguh
Pranowo, M. B. (2010). Multidimensi bagi Indonesia. Media Informasi
ketahanan nasional. Pustaka Alpabet. Ditjen Pothan Kemhan, 31–35.
Putra, R. D., Supartono, & Deni, D. A. R. Susdarwono, E. T., Setiawan, A., & Husna,
(2018). Ancaman siber dalam Y. N. (2020). Kebijakan negara
perspektif pertahanan semesta (studi terkait perkembangan dan revitalisasi

87
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88

industri pertahanan Indonesia dari


masa ke masa. Jurnal USM Law
Review, 3(1), 155–181.
Wardhana, A., Kharisma, B., & Lisdiyanti,
T. (2020). Teknologi informasi
komunikasi dan pertumbuhan
ekonomi wilayah barat dan timur
Indonesia periode 2014-2018. E-
Jurnal Ekonomi Dan Bisnis
Universitas Udayana, 9(11), 1103–
1116.
Yusuf, I. (2016). Analisis penggunaan
teknologi informasi (internet)
terhadap masyarakat di Kecamatan
Sigi Biromaru Kabupaten Sigi.
EJurnal Katalogis, 4(9), 125–136.
Zulfah, S. (2018). Pengaruh perkembangan
teknologi informasi lingkungan (studi
kasus kelurahan Siti Rejo I Medan).
Jurnal Ilmu Administrasi UISU.

88

You might also like