Claim Missing Document
Check
Articles

Found 2 Documents
Search

Kontra Intelijen Aksi Spionase Siber Terhadap Anggota Democratic National Committee Menjelang Pemilihan Presiden AS Tahun 2016 Setiyadi, Basuki Erwin; Keliat, Makmur
Jurnal Kajian Stratejik Ketahanan Nasional Vol. 3, No. 1
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research is a case study of cyber espionage conducted against the member of Democratic National Committee (DNC) towards the 2016 US presidential election, caused Hillary Clinton's email leaked and published by WikiLeaks. It indicates the intelligence activities have entered into cyberspace and can disrupt the national ressilience, so it is necessary to do counterintelligence as an effort to maintain the cyber security. This research uses qualitative approach, data collected from interviews and literature study. The purposes of this research are (1) to determine the threat level of cyber espionage conducted against DNC, (2) counterintelligence methods against the threat, (3) and Indonesian Government Strategy against cyber threat. This research use counterintelligence theory, threat analysis theory, and SWOT analysis. The results of this research are (1) the threats analysis of cyber espionage indicating the threat agent has high level threat, it could harms the national interest and affect the national ressilience, (2) cyber counterintelligence are conducted by two ways i.e., defensive counterintelligence to block and detect enemy's access activity, and offensive counterintelligence to collect informations, manipulate, control, and thwart enemy’s action, (3) Indonesian Government Strategies against cyber threat are strengthening legal measure, technical measure, organizational measure, capacity building, and cooperation. Keywords : counterintelligence; cyber espionage; democratic national committee; email; hillary clinton.
The Role of National Computer Security Incident Response Team (Nat-CSIRT) in Threat Intelligence Sharing Through National Cyber Threat Intelligence System and Cyber Incident Database Center Yusuf, Andi; Setiyadi, Basuki Erwin; Amanda, Claudia Dwi; Fikri, Muhamad Al
Journal Research of Social Science, Economics, and Management Vol. 4 No. 10 (2025): Journal Research of Social Science, Economics, and Management
Publisher : Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59141/jrssem.v4i10.843

Abstract

In 2021 and 2022, the stakeholder response rate to notifications sent by BSSN was only 9% of the total notifications delivered. In establishing the Nat-CSIRT, BSSN needs to implement breakthroughs to increase the number of responses and follow-ups to these notifications, thereby enhancing situational awareness and strengthening the national cybersecurity posture. Therefore, the role of Nat-CSIRT is crucial in optimizing threat intelligence sharing at the national level. The implementation of threat intelligence sharing has been mandated by various national and organizational policies, which underscores the urgency of executing the established policy directions. This paper focuses on strategies for the role of Nat-CSIRT in the implementation of national-level threat intelligence sharing by delving into the root causes of the suboptimal sharing using a problem tree analysis. Furthermore, the paper determines the strategic optimization of Nat-CSIRT’s role through a SWOT analysis, resulting in a strategy that leverages strengths to seize opportunities (S-O Strategy). This strategy is carried out through a three-phase action plan—short-term, medium-term, and long-term—targeting the development of human resources, governance, and technology. In addition, the paper presents a model for a national-level threat intelligence sharing scheme for the National Cyber Threat Intelligence System and National Cyber Incident Database Center, enabling stakeholders to automatically implement standardized information exchange in a secure, swift, and accurate manner, while applying the Traffic Light Protocol. This approach is expected to lead to more effective cyber threat response and mitigation.