515,491 research outputs found
STUDI KEAMANAN NASIONAL DALAM PRESPEKTIF DIPLOMASI PERTAHANAN INDONESIA
In this journal, the authors discuss the concept of national security studies andIndonesian Defense Diplomacy. Previous studies have not used much of the theory ofIndonesian Defense Diplomacy and the concept of national security studies to analyze it.Furthermore, this study aims to clarify national security studies from the perspective ofIndonesian Defense Diplomacy in producing defense policy. Through the contentanalysis approach method, the research results show the importance of strengtheningregulation and strengthening public diplomacy and military diplomacy to strengthendefense diplomacy. As stated in the 2015 Indonesian Defense White Paper, capacitybuilding and trust-building are intended to improve human resources for the Ministryof Defense and the TNI. The 2021 Draft State Budget aimed at accelerating the nationaleconomic recovery. Trust building aims to increase the trust of Indonesian DefenseDiplomacy with regional countries, for example, Russia and South Korea, Turkey. Theywere enhancing national security through economic strength, military and diplomacycapabilities, and conducting broader cooperation in the future. The strong economic,military, and Defense Diplomacy of Indonesia are the basis for strengthening NationalSecurity. In the future, it can face AGHT in this era of globalization.Keywords: Study concept, national security, Indonesian Defense Diplomac
SECURITY AND DEFENSE IN NATIONAL RESILIENCE STUDIES TO REALIZE A NATIONAL SECURITY SYSTEM
Security comes from Latin, secures which means free from danger, fear, and threats which consist of traditional and non-traditional security approaches. Defense is defined as the main instrument of a country to create national security. National defense is defined as a dynamic condition of a country that covers all aspects of national life to deal with threats. National security encompasses the security of the state, society and individuals. There are still several definitions from several experts regarding the concepts of security and defense to date. This article analyses the forms of contemporary threats related to security and defense and explains their similarities and differences in the study of national resilience aimed at realizing a national security system and development of the national security system in other countries. This article uses a descriptive qualitative research design through literature study and interviews. This article explains that the forms of threats that occur in Indonesia include problems at the border area, SARA intolerance, inequality in bureaucratic reform, not optimal law enforcement, and transnational crime. Similarities and differences in the concepts of security and defense can be seen from the regulations, the concepts used, the institutions and the constitution. This article shows that national resilience is influenced by national defense and security. The safe condition of a country is inseparable from the security and defense factors alone but is synergized with each other factors such as economic, political, legal, social, cultural, ideological, geographic, demographic and natural resources.Keywords: defense, national security, national resilience, securit
Improving Our Vision II: Building Transparency and Cooperation
Workshop on Space Situational Awareness Data Sharing Eisenhower Center for Space and Defense Studies World Security Institute’s Center for Defense Information Secure World Foundation London, United Kingdom, October 2007
This was the second workshop to bring together a range of stakeholders to discuss global needs and capabilities for Space Situational Awareness (SSA). The first workshop was held in September 2006 in Colorado Springs, Colorado. This 2006 workshop was sponsored by the Eisenhower Center for Space and Defense Studies and the World Security Institute’s Center for Defense Information. The 2006 workshop report can be found at the following internet site: http://www.cdi.org/PDFs/SSAConference_screen. pdf
EDUCATION AND RESEARCH AS COMPONENTS OF INDONESIA DEFENSE DIPLOMACY
Defense diplomacy seeks to build partnerships through the use of defense-related programs. The Government of Indonesia develops practical cooperation among regional and extra-regional defense establishments on areas of mutual concern in education and research. Indonesia assigns Indonesia Defense University (IDU) to provide professional graduate education in defense studies with strong practical and area emphasis, conduct relevant research in defense strategy and management, national security and defense technology. Heads of Defense Universities/Colleges/Institutions Meeting (HDUCIM) serves the exchange of information concerning curriculum, defense concepts, and state defense development; it is also possible to conduct cooperation on research. In promoting regional security, defense diplomacy through education and research could play an important role in posing the stability of interstate relations by illustrating the relations between Indonesia-Cambodia and Indonesia-Philippines. Â
Securitization of Cyber Threats to the Indonesian Government:A Study of Cyber Defense Strategy
The research aims to analyze the cyber threats faced by Indonesia and the issues in them. To achieve this goal, this research explores the Indonesian government's view of cyber security as a non-traditional security threat and the Indonesian government's approach to dealing with cyber threats. It examines the extent to which securitization is carried out by various actors representing the Indonesian government. This research uses a qualitative method with an analytical descriptive form that utilizes direct and indirect sources such as interviews with several informants, literature studies, and documentation studies. This research used a non-traditional security approach, including the securitization theory related to cybersecurity. The finding of this paper suggests that The Ministry of Defense of Indonesia as a state institution did securitization that focuses on the idea of military involvement in securing cyberspace by increasing the current level of cyber technology has been accompanied by an increase in the vulnerability of cybercrime and cyber-attacks both in quality and quantity. The Ministry of Defense formed COC (Cyber Operation Center) as the frontline. It formed the cyber army to strengthen the defense and attack the cyber threat in the Ministry of Defense’s area.
Keywords — Cyber Security, Cyber Threats, Defense Strategy, Ministry of Defense, Securitizatio
Defense Institution Building: An Assessment
AbstractA key element in the Department of Defense's Strategic Guidance is building the capacity of partner nations in order to share the costs and responsibilities of global leadership. To implement this goal, the Under Secretary of Defense for Policy (USD(P)) utilizes several security cooperation programs to work with partner countries to support Defense Institution Building (DIB), i.e. build the capacity of their defense ministries. In addition, the major commands and the Services conduct activities that directly or indirectly support DIB objectives. DIB has four primary components—Wales Initiative Fund-DIB (WIF-DIB), Defense Institution Reform Initiative (DIRI), Ministry of Defense Advisors (MoDA), and Defense Institute of International Legal Studies (DILLS)—but includes all security cooperation activities that develop accountable, effective, and efficient defense institutions. The primary objective of many existing DIB activities is to help partner nations develop and manage capable security forces subject to appropriate civilian control. This paper addresses the following topics, critical to answering questions about DIB: (1) DIB-focused policy goals and program objectives; (2) Criteria for selecting and prioritizing partner nations; (3) A strategy to achieve goals and objectives; (4) Harmonizing DIB with other security cooperation activities; (5) Accountability processes and procedures; (6) Roles and responsibilities
Honor and Compromise, and Getting History Right
White House Chief of Staff John F. Kelly does not have a Ph.D. in history, although he does have two master’s degrees, in Strategic Studies (from the National Defense University) and in National Security Affairs from the Georgetown School of Foreign Service. So perhaps it was simply that he believed what he said about the Civil War this past Monday on Laura Ingraham’s new Fox News ‘Ingraham Angle’ was so innocuous that he could also believe that it wouldn’t even become a blip on anyone’s radar screen. (excerpt
When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing
Defense strategies have been well studied to combat Byzantine attacks that
aim to disrupt cooperative spectrum sensing by sending falsified versions of
spectrum sensing data to a fusion center. However, existing studies usually
assume network or attackers as passive entities, e.g., assuming the prior
knowledge of attacks is known or fixed. In practice, attackers can actively
adopt arbitrary behaviors and avoid pre-assumed patterns or assumptions used by
defense strategies. In this paper, we revisit this security vulnerability as an
adversarial machine learning problem and propose a novel learning-empowered
attack framework named Learning-Evaluation-Beating (LEB) to mislead the fusion
center. Based on the black-box nature of the fusion center in cooperative
spectrum sensing, our new perspective is to make the adversarial use of machine
learning to construct a surrogate model of the fusion center's decision model.
We propose a generic algorithm to create malicious sensing data using this
surrogate model. Our real-world experiments show that the LEB attack is
effective to beat a wide range of existing defense strategies with an up to 82%
of success ratio. Given the gap between the proposed LEB attack and existing
defenses, we introduce a non-invasive method named as influence-limiting
defense, which can coexist with existing defenses to defend against LEB attack
or other similar attacks. We show that this defense is highly effective and
reduces the overall disruption ratio of LEB attack by up to 80%
- …