Professional Documents
Culture Documents
Jurnal Pertahanan: The Challenges of The Technology 4.0 and Information Technology Within Total War Strategy Structure
Jurnal Pertahanan: The Challenges of The Technology 4.0 and Information Technology Within Total War Strategy Structure
73-88
Jurnal Pertahanan
Media Informasi tentang Kajian dan Strategi Pertahanan
yang Mengedepankan Identity, Nationalism dan Integrity
e-ISSN: 2549-9459
http://jurnal.idu.ac.id/index.php/DefenseJournal
73
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88
significant than the positive impact felt by crimes, namely by uploading destructive
humans. First, information technology is illegal content. The types of content
said to be the main factor causing the according to the EIT Law, among others:
breakdown of relationships between family
members because each member is busy Table 2. Types of Illegal Content in Second
with his virtual world, thus ignoring Category of Cyber Crime
closeness to family. Second, the occurrence Article Types of Illegal Content
of moral decline in the nation's generation 27 (act 1) Pornography
27 (act 2) Gambling
is also indicated due to the misuse of
27 (act 3) Slander
information technology (Yusuf, 2016).
27 (act 4) Blackmail
Third, there are various types of security 28 (act 1) Fraud
threats launched using increasingly 28 (act 2) Hate speech
advanced information technology (Arianto 29 Threats of violence to others
& Anggraini, 2019). Source: Processed by Authors, 2021
Threats that arise from the misuse of
information technology are classified into The misuse of information technology is
types of cyber threats, which underlie the increasingly dangerous so that the scale is
emergence of various types of crimes in not only at the level of ordinary cybercrime
cyberspace that are intangible or invisible. but has escalated and has the potential to
Nonetheless, the losses caused by the crime create a global scale cyberwar. Thus, it is
proved to be enormous (Arianto & not only individual interests that will be
Anggraini, 2019). To overcome potential affected due to the misuse of increasingly
crimes through misuse of information advanced information technology, but also
technology, the government has enacted a interests and security at the national level.
law regulating the use of information (Rahmawati, 2017).
technology in Law Number 19 of 2016 The echo of cyberwar has been buzzing
concerning amendments to Law Number 11 for the past decade. However, the real
of 2008 concerning Electronic Information damage caused by cybercrime which
and Transactions (EIT Law). Although became the origin of cyberwar has only
there is no specific explanation regarding been felt massively in recent years.
cybercrime, the law describes its anatomy, However, the Indonesian government has
which can be used as a basis for recognized the dangerous seeds of misuse
categorizing the types of cybercrime. of information technology for a long time.
The first category is crimes that target This is as stated by Soewardi (2013) that
internet systems, computers, and networks. Indonesia needs to immediately build a
These crimes can be in the form of illegal formidable cyber defense due to the
activities as follows (Prahassacitta, 2019): development of information technology
that has the potential to be used as a tool for
Table 1. First Category of Cyber Crime global scale crimes.
Article Types of Crime
As it is known that the Indonesian
30 Hacking
defense system is total in nature, namely by
31 Illegal interception
involving the roles of all defense
32 Defacing
33 Interference
components, starting from the human
34 Facilitating criminal acts resource component which includes the
35 Identity theft Indonesian National Armed Forces
Source: Processed by Authors, 2021 (Tentara Nasional Indonesia or TNI) to the
entire Indonesian people; regional
The second category of cybercrime is the components, as well as other resource
activity of using the internet, computers, components that can be empowered to
and networks as a means of committing defend the country's sovereignty. It can also
74
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88
75
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88
76
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88
77
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88
priority that must be upheld to maintain information technology is one of the main
the sovereignty of the state. facilities that humans need to carry out
According to the resource aspect, the various important jobs. Without the
national defense system includes human existence of information technology,
resources, natural and artificial resources, humans will certainly experience many
and defense infrastructure. The three difficulties in fulfilling their needs and
resources can be categorized into two desires (Rusydi, 2017).
components, namely the main component The tangible form of the benefits of
that refers to military forces, both land, sea, information technology can be felt by
and air forces, which are specifically humans in various fields, starting from the
developed and empowered to defend the fields of education, social, economy to
country; as well as supporting components supporting efforts to strengthen national
including reserve forces, defense defense. In the field of education, there are
infrastructure, and militia obligations. All at least five fundamental changes in the
of these components form a total defense implementation of teaching and learning
system of Indonesia, which is built and activities through the application of the
improved on an ongoing basis to deal with latest information technology, among
wars that are also total in nature (Lebo & others (Rusydi, 2017):
Anwar, 2020). 1. Change from teaching model from
training to performance
RESULT AND DISCUSSION 2. Changing the place of teaching from
Development of Information Technology classrooms to classrooms without rooms
and Its Use in Various Fields 3. Change from using paper to networking
Information technology was not created in or online
prehistoric times, but the seeds of 4. Change from physical facilities to
communication have begun to be etched at network facilities
that time. As noted by historians, humans 5. Change from cycle time to real-time
began carving on cave walls as a form of Information technology provides means,
communication in 3,000 BC. Carvings such as telephones, computers, e-mail, the
made using animal horns form pictograph internet, and others, to increase the
symbols that function like letters in the effectiveness and efficiency of the
language of communication. implementation of communication and
In the next period, humans began to interaction between teachers and students.
create symbols that symbolized letters, and By optimally empowering information
the media used to write these letters. The technology, the interaction between parties
written media, which was originally in the involved in the learning process can be
form of rocks, was further refined in 500 changed from a conventional model in the
BC by China in paper form. Writing form of face-to-face to an online model,
equipment that became a form of early new where teachers and students can be in far
technology was created around 1400 by different places but can still carry out their
Gutenberg in the form of a printing press for respective roles. Besides, the need to obtain
letter plates. In the following years, various complete and easy information and
other, more sophisticated equipment were knowledge is also facilitated by information
made by engineers, ranging from technology which can become a very large
telephones, televisions, computers to the information storage medium, which can be
internet (Lubis & Safii, 2018). accessed easily and cheaply (Rosenberg,
Along with the development of 2001).
information technology, the benefits that The efficiency of the learning process
can be obtained by humans are also makes the costs for learning activities much
increasing. It can even be said that cheaper. Study materials that are stored and
78
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88
79
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88
80
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88
of the community in carrying out various unintentionally by any party, with any
activities of economic value (Radhi, 2010). motive and purpose, which are based on
The distribution of information that is electronic systems or their content
getting cheaper, easier and faster has also (information) or equipment that is highly
become a big capital in the implementation dependent on technology and networks on
of infrastructure development that supports any scale, against vital and non-vital objects
economic activity. The existence of this in the military and non-military spheres,
infrastructure makes people more which threaten the sovereignty of the state,
productive and can freely carry out territorial integrity and the safety of the
economic activities to improve the quality nation.
of their lives. This is correlated with the Following those forms of cyber attack,
increasing economy in line with the smooth there are several cyber defense targets set
running of activities in the economic sector by the government, among others:
carried out by the community (Wardhana et 1. Increase understanding of the latest
al., 2020). situation related to cyber threats
The development of information 2. Formulate the most appropriate handling
technology not only brings changes on a of existing cyber threats
small scale but also on a very broad scale. 3. Raising awareness about the importance
Apart from actually causing changes in the of cyber defense as part of national
educational, social, and economic fields, defense
the government can also use information 4. Increase the active participation of all
technology that is increasingly developing elements of national defense in
to strengthen efforts to protect national defending the country from cyber threats
defense from threats originating from 5. Increasing the empowerment of all
within and outside the country (Susdarwono national resources in increasing cyber
et al., 2020). defense power
Threats to state sovereignty are currently 6. Formulate the most appropriate strategy
monitored not only based on the source but to deter, act against and restore the cyber
also the form of threats which can be in the defense sector
form of military or non-military threats. The 7. Establishment of comprehensive cyber
dominant threats during non-war times like defense implementation guidelines
today are threats that are non-military in To achieve these goals, the use of
nature, mainly in the form of cyberattacks various new information technology
by utilizing the latest information products is a necessity. Thus, the
technology products. Therefore, increasingly rapid development of
strengthening defense is also carried out by information technology encourages the
these types of threats, namely through the rapid development and strengthening of
establishment of a cyber defense agency national cyber defense to respond to cyber
supported by policies and regulations challenges and threats.
regarding cyber defense.
According to the Regulation of the Positive and Negative Impacts of
Minister of Defense of the Republic of Information Technology Development on
Indonesia Number 82 of 2014 concerning the Implementation of the Total War
Guidelines for Cyber Defense (Cyber Strategy
Defense Law), the definition of cyber As it is known, the Indonesian defense
defense is an effort to tackle cyber attacks system is known as a total defense system,
that disrupt the implementation of national which focuses on the involvement of all
defense. It also states that cyber-attacks are defense components, including human
all forms of deeds, words, thoughts, resources, territory, and various other types
whether done intentionally or of resources owned by the state. The
81
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88
concept of a total defense system is also that is directed to become the implementer
explained in Article 30 act 2 of the 1945 of cyber defense. In this case, it can be said
Constitution, namely: that the empowerment of the main and
National defense and security efforts are supporting components is more optimal
carried out through the total people's defense than before.
and security system by the Indonesian The existence of a cyber community
National Army and the Indonesian National originating from civil society, which has the
Police, as the main force, and the people, as
potential to increase the power of total
the supporting force.
defense and become the vanguard in cyber
It is also explained in the Defense Law, warfare, shows an increase in the role and
that total defense is enforced by three position of society from the supporting
components consisting of main components that are behind the ranks of the
components, reserve components, and main components in war, to being aligned
supporting components. The empowerment with the main components in the cyberwar.
of these three components to form total As it is known, in open warfare, civil
defense is basically a preparation for facing society is not directly involved but only
total war (Lebo & Anwar, 2020). The becomes a supporting component of the
essence of total war is a war that occurs in TNI (Indrawan, 2015). However, in the
all possible domains at a scale appropriate realm of total war that is military but also
to the development of the existing situation. non-military in nature, society can increase
Total war can be in the form of war in the its position and role to be not only a
military or non-military realms so that it supporter but also an important actor in
demands total defense power in these two open warfare in the cyber realm.
domains (Putra et al., 2018). Concerning the Optimization of this empowerment is
development of information technology, the based on the existence of a new threat
biggest threat that has the potential to be model which is dominated by the cyber
faced in a total war comes from cyber domain, which changes the defense
threats launched to destroy Indonesia's total paradigm from initially placing the main
defense force. component as the main defense operator to
It can be said that the increasing cyber empowering the community from the
threat is a negative impact of the supporting components to participate in
development of information technology on becoming one of the main defense forces.
Indonesia's defense. Thus, the existence of The next positive impact is the presence
cyber threats demands that a fundamental of an event which is a strong reason to
adjustment be made to the total war strategy increase the integration of information
adopted by Indonesia. The adjustment is technology into national defense. It can be
meant by integrating aspects of information said that this integration is a form of
technology in all the forces forming the strengthening national defense in the
total defense. context of facing total war because of the
Apart from having a negative impact, the development of information technology
development of information technology which is the basis for the emergence of
also has positive impacts on Indonesia's various new threats. Following the nature of
total war strategy. As mentioned by Lebo & the new threat which is dominated by the
Anwar (2020), that many parties master cyber realm, there is no better solution than
information technology, which can be used to increase the integration of information
as executors of total defense, especially in technology into Indonesia's total defense
the cyber domain. These parties can come system. This needs to be a major priority
from the community, which is the considering that the potential for cyber
supporting component of total defense, as warfare is greater than armed warfare
well as from the main defense component (Meiliyanti et al., 2019).
82
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88
83
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88
84
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88
85
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88
86
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88
87
Arief, Risman, Prakoso/Jurnal Pertahanan Vol. 7 No. 1 (2021) pp. 73-88
88