Indonesia’s Approach on Cyberattack Attribution through its Foreign Policy

Citra Yuda Nur Fatihah

Abstract


It is clear that cybersecurity has now become a matter of increasing concern for Indonesian citizens, the private sector and the Indonesian government. Indonesia is ranked among the top countries from which cyberattacks are launched, while at the same time is itself very vulnerable to cyberattack. Indeed, Indonesia is currently in the early stages of developing a national cybersecurity strategy. The legal framework for cybersecurity in Indonesia is still weak that there is no clear classified security law or policy, and security practices are spread across different legislation while there are no specific cybersecurity provisions in place. Indonesia also lacks of national policy and strategy when it seeks to defend itself against cyberattack, particularly those hacking activities from foreign actors or state-sponsored groups. While majority of states in the world have two different approaches on cyberattack attribution from the context of sovereignty in international law, those applied sovereignty as a rule and as a principle, Indonesia has never stated clearly its position. Therefore, based on the analysis on how Indonesia’s approach on sovereignty through its foreign policy, from the perspectives of diplomacy practices and national policies, relevant sovereignty-violation cases, and its international framework and cooperation on cybersecurity, we may conclusively view that Indonesia appears to endorse the sovereignty-as-a-rule position, where it upholds the principle of respect for state sovereignty on cyberspace.

Keywords


Cyberattack; Cybersecurity; Cyber-attribution; Cyberspace; Sovereignty; Foreign Policy



DOI: http://dx.doi.org/10.19166/glr.v2i2.5140

Full Text:

PDF

References


Agusman, Damos Dumoli and Citra Yuda Nur Fatihah. “Celebrating The 25th Anniversary of UNCLOS Legal Perspective: The Natuna Case.” Indonesian Journal of International Law (2020), Vol. 17 No. 4: 558-559. https://doi.org/10.17304/ijil.vol17.4.799.

Anjani, Noor Halimah. “Policy Brief No. 9: Cybersecurity Protection in Indonesia.” Center for Indonesian Policy Studies, March, 2021.

The ASEAN Post. “Southeast Asia Cybersecurity Emerging Concern.” Accessed 20 May, 2018. https://theaseanpost.com/article/southeast-asias-cybersecurity-emerging-concern.

Barnsby, Robert E. and Shane R. Reeves. “Give Them an Inch, They'll Take a Terabyte: How States May Interpret Tallinn Manual 2.0's International Human Rights Chapter.” 95 Texas Legal Review (2017): 1529.

Barrinha A. and Renard T. Cyber-Diplomacy: The Making of An International Society in The Digital Age Global Affairs. 2017. https://doi.org/10.1080/23340460.2017.1414924.

C., Jönsson and Langhorne R. Diplomacy: Volume III. Problems and Issues in Contemporary Diplomacy. London: Sage Publications, 2004. https://doi.org/10.4135/9781446261392.

Cabinet Secretariat of The Republic of Indonesia. “Indonesia’s Foreign Policy Priorities in 5 Years Ahead,” Accessed November 9, 2021. https://setkab.go.id/en/indonesias-foreign-policy-priorities-in-5-years-ahead/ .

Center for Indonesian Policy Studies. “Protecting People: Promoting Digital Consumer Rights.” Accessed September 27, 2021. https://www.cips-indonesia.org/digital-consumer-rights-pp27 .

Chatham House Royal Institute for International Affairs. Cyber and International Law in the 21st Century, May 23, 2018. https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century .

Cimpanu, Catalin. “Indonesian Intelligence Agency Compromised in Suspected Chinese Hack.” The Record by Recorded Future, September 10, 2021. https://therecord.media/indonesian-intelligence-agency-compromised-in-suspected-chinese-hack/.

Corn, Gary P. & Robert Taylor. Sovereignty in the Age of Cyber. 111 Am. J. Int’l L. Unbound 208 (2017). https://doi.org/10.1017/aju.2017.57.

Corn, Gary P.. Covert Deception, Strategic Fraud, and the Rule of Prohibited Intervention 6–14 (Hoover Inst. Working Group on Nat’l Sec., Tech., and L., Aegis Series Paper No. 2005, 2020). https://www.hoover.org/sites/ default/files/research/docs/corn_webready.pdf

Corn, Gary P.. Punching on the Edges of the Grey Zone: Iranian Cyber Threats and State Cyber Responses, Just Sec. (Feb. 11, 2020). https://www.justsecurity.org/68622/punching-on-the-edges-of-the-grey-zone-iranian-cyber-threats-and-state-cyber-responses/

Czech Republic. Statement by Mr. Richard Kadlčák, Special Envoy for Cyberspace, Director of Cybersecurity Department, 2nd Substantive Session of the Open-Ended Working Group on Developments in the Field of Info. & Telecomm. in the Context of Int’l Sec. of the First Comm. of the General Assembly of the United Nations Feb. 11, 2020. https://www.nukib.cz/download/publications_en/CZ%20Statement%20-%20OEWG%20%20 International %20Law%2011.02.2020.pdf.

Da Costa, Agustinus Beo and Aaron Maasho. “Indonesian Jets Force Ethiopian Cargo Plane to Land over Airspace Breach.” Reuters, January 14, 2019. https://www.reuters.com/article/us-indonesia-airlines-ethiopia/indonesian-jets-force-ethiopian-cargo-plane-to-land-over-airspace-breach-idUSKCN1P815S.

Deeks, Ashley. Defend Forward and Cyber Countermeasures 2, Hoover Inst. Working Group on Nat’l Sec., Tech., and L., Aegis Series Paper No. 2004, 2020. https://www.hoover.org/research/defend-forward-and -cyber-countermeasures.

Djafar, W., Sumigar, F., & all. Perlindungan Data Pribadi di Indonesia: Ulasan Pelembagaan Dari Perspektif Hak Asasi Manusia. Jakarta: ELSAM Press, 2016.

Eichensehr, Kristen E.. “Cyberattack Attribution as Empowerment and Constraint.” Hoover Working Group on National Security, Technology, and Law, Aegis Series Paper, No. 2101 (January 15, 2021). https://www.lawfareblog.com/cyberattack-attribution-empowerment-and-constraint.

Eichensehr, Kristen E. “The Law and Politics of Cyberattack Attribution.” 67 UCLA Law Review (2020): 522.

Finnemore, Martha & Duncan B. Hollis. “Beyond Naming and Shaming: Accusations and International Law in Cybersecurity,” European Journal of International Law, (forthcoming 2020) (manuscript at 12). https://doi.org/10.1093/ejil/chaa056.

Finnish Ministry of Foreign Affaris, Press Release. Finland Published Its Positions on Public International Law in Cyberspace (Oct. 15, 2020). https://valtioneuvosto.fi/en/-/finland-published-its-positions-on-public-international-law-in-cyberspace.

French Ministry of the Armies. International Law Applied to Operations in Cyberspace (2019). https://www.defense.gouv.fr/content/download/567648/9770527/file/international+law+applied+to+oper ations+in+cyberspace.pdf.

Greenberg, Andy. A Brief History of Russian Hackers’ Evolving False Flags, Wired, October 21, 2019. https://www.wired.com/story/russian-hackers-false-flags-iran-fancy-bear/.

H., Bull. The Anarchical Society: A Study of Order in World Politics (3rd ed). Basingstoke: Palgrave, 1977/2002. https://doi.org/10.1007/978-1-349-24028-9.

Hidayat, M. Risyal. “Indonesia Adds Patrols after Detecting Ships in South China Sea.” Al Jazeera, September 17, 2021. https://www.aljazeera.com/news/2021/9/17/indonesia-increases-sea-patrols - :~:text=“There is no bargaining when,Widodo declared following the incident.&text=Maritime and Fisheries Minister Susi,fishing illegally in Indonesian waters.

The Indonesian National Cyber and Crypto Agency. “Cyberattack Data (January – April 2020).” Accessed October 1, 2021. https://bssn.go.id/rekap- serangan-siber-januari-april-2020.

The Indonesian National Cyber and Crypto Agency. Annual Report 2020: Cybersecurity Monitoring. Jakarta: BSSN, 2020.

The Indonesian National Cyber and Crypto Agency. Indonesia National Cyber Security Strategy. Jakarta: BSSN, 2020.

The International Law Commission’s Draft Articles on Responsibility of States for Internationally Wrongful Acts, with Commentaries, UN Doc. A/56/10 (2001).

The International Telecommunication Union. Global Cybersecurity Index 2020: Measuring Commitment to Cybersecurity. Geneva: ITU Publications, 2021.

Jeff, Kosseff. Cybersecurity Law. United States: Wiley, 2019. https://platform.virdocs.com/r/s/0/doc/1488325/sp/156513543/mi/507507143?cfi=%2F4%2F2%2F6%2F4%5Bhead-2-98%5D%2C%2F1%3A0%2C%2F1%3A0.

Jurriëns, Edwin and Ross Tapsell. “Challenges and Opportunities of the Digital ‘Revolution’ in Indonesia.” In Digital Indonesia. Singapore: ISEAS Publishing, 2017. https://doi.org/10.1355/9789814786003-007.

Kearney, A.T.. Cyber Security in ASEAN: An Urgent Call to Action (2017).

Kementerian Komunikasi dan Informasi Republik Indonesia. “DPR telah Adakan Rapat Dengar Pendapat Umum terkait RUU PDP.” Accessed September 27, 2021. https://aptika.kominfo.go.id/2020/07/dpr-telah-adakan-rapat-denger-pendapat-umum-terkait-ruu-pdp/.

Kilovaty, Ido. Evaluation in the Light of the Tallinn Manual on the International Law Applicable to Cyber Warfare, Cyber Warfare and The Jus Ad Bellum Challenges (2014).

Lin, Herbert. “Attribution of Malicious Cyber Incidents 5.” Hoover Inst. Working Group on Nat’l Sec., Tech., and L., Aegis Series Paper No. 1607, 2016. https://www.hoover.org/sites/default/files/research/docs/lin _webready.pdf.

M, Wight. System of States. Leicester: Leicester University Press, 1979.

Miller, Greg et al. “Obama’s Secret Struggle to Punish Russia for Putin’s Election Assault.” Washimgton Post, June 23, 2017. https://www.washingtonpost.com/graphics/2017/world/national-security/obama-putin -election-hacking/.

The Ministry of Defense of the Republic of Indonesia. A Road Map to Cyber Defense National Strategy. Jakarta: The Ministry of Defense of the Republic of Indonesia, 2013.

The Ministry of Foreign Affairs of the Republic of Indonesia. “Indonesian FM Presents the Diplomacy Priorities 2019-2024 to the House of Representatives.” Accessed November 14, 2021. https://kemlu.go.id/portal/en/read/786/berita/indonesian-fm-presents-the-diplomacy-priorities-2019-2024-to-the-house-of-representatives.

The Ministry of Foreign Affairs of the Republic of Indonesia. “Letter of Intent Between the Government of the Republic of Indonesia and the Government of the United States of America on Promoting Strong Cyber Space Cooperation.” Accessed November 3, 2021. https://treaty.kemlu.go.id/apisearch/pdf?filename=USA-2018-0367.pdf.

The Ministry of Foreign Affairs of the Republic of Indonesia. “Memorandum of Understanding Between the Government of The Republic of Indonesia And the Government of the United Kingdom of Great Britain and Northern Ireland on Cyber Security Cooperation.” Accessed November 3, 2021. https://treaty.kemlu.go.id/apisearch/pdf?filename=GBR-2018-0068.pdf.

The Ministry of Foreign Affairs of the Republic of Indonesia. “Memorandum of Understanding Between the National Cyber and Crypto Agency of The Republic of Indonesia And the Cyberspace Administration of The People's Republic of China on Cooperation In Developing Cyber Security Capacity And Technology.” Accessed November 3, 2021. https://treaty.kemlu.go.id/apisearch/pdf?filename=CHN-2021-0228.pdf.

Mumford, David. “Indonesia is Intercepting Aircraft – Outside Their Airspace.” OPS Group, January 15, 2019. https://ops.group/blog/indonesia-is-intercepting-aircraft-outside-their-airspace/.

NCSI Project Team e-Governance Academy. “National Cyber Security Index 2020.” Accessed October 1, 20201. https://ncsi.ega.ee/country/id/.

Netherlands Ministry of Foreign Affairs. Letter from the Minister of Foreign Affairs to the President of the House of Representatives on the Int’l Legal Order in Cyberspace, Appendix at 8–9. July 5, 2019. https://www.government.nl/binaries/government/documents/parliamentary documents/2019/09/26/letter-to-the-parliament-on-the-international-legal-orderincyberspace/ International+Law+in+ the+Cyberdomain+Netherlands.pdf.

New Zealand Foreign Affairs and Trade. The Application of International Law to State Activity in Cyberspace (Dec. 1, 2020). https://www.mfat.govt.nz/en/media-and-resources/ministry-statements-and-speeches/cyber-il/.

Nikkei Asian Review. “ASEAN Remains Prime Target for Cyberattacks.” Accessed 8 February, 2018. https://asia.nikkei.com/Business/Business-trends/ASEAN-remains-prime-target-for-cyberattacks.

Nugroho, A. “Personal Data Protection in Indonesia: Legal Perspective.” International Journal of Multicultural and Multireligious Understanding 7, No. 7 (2020): 183-189. https://doi.org/10.18415/ijmmu.v7i7.1773.

Office of The Director of National Intelligence. A Guide to Cyber Attribution, September 14, 2018.

Owens, W. Et Al., Eds. Technology, Policy, Law, And Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. National Research Council, 2009.

Paul C. Ney Jr. General Counsel, Dep’t of Def. DOD General Counsel Remarks at U.S. Cybe Command Legal Conference (March 2, 2020). https://www.defense.gov/Newsroom/Speeches /Speech/Article/2099378/dod-general-counsel-remarks-at-us-cyber-command-legal-conference/.

Perutusan Tetap Republik Indonesia untuk PBB di New York. Kompilasi Statement Indonesia di Dewan Keamanan PBB 2019-2020. Kementerian Luar Negeri Republik Indonesia: Jakarta, 2001.

Potkin, Fanny. “Indonesia's Tokopedia Probes Alleged Data Leak of 91 Million Users.” Reuters, May 2, 2020. https://www.reuters.com/article/us-tokopedia-cyber/indonesias-tokopedia-probes-alleged-data-leak-of-91-million-users-idUSKBN22E0Q2.

Przemysław Roguski. The Importance of New Statements on Sovereignty in Cyberspace by Austria, the Czech Republic and United States (May 11, 2020), https://www.justsecurity.org/70108/the-importance-of-new-statements-on-sovereignty-incyber space-by-austria-the-czech-republic-and-united-states/.

Rahardjo, Budi. “7 The State of Cybersecurity in Indonesia.” In Digital Indonesia. Singapore: ISEAS Publishing, 2017. https://doi.org/10.1355/9789814786003-007.

Rid, Thomas & Ben Buchanan. Attributing Cyber Attacks. 38 J. Strat. Stud. 4, 14–23 (2015). https://doi.org/10.1080/01402390.2014.977382.

Riyadi, Gliddheo Algifariyano. “Policy Brief No. 7: Data Privacy in the Indonesian Personal Data Protection Legislation.” Center for Indonesian Policy Studies, March, 2021.

Rizal, Muhamad and Yanyan M. Yani. “Cybersecurity Policy and Its Implementation in Indonesia.” Journal of ASEAN Studies 4, No. 1 (2016). https://doi.org/10.21512/jas.v4i1.967.

S., Buck. The Global Commons: An Introduction. Washington, DC: Island Press, 1998.

Schmidt, Michael S. & Nicole Perlroth. U.S. Charges Russian Intelligence Officers in Major Cyberattacks, N.Y. Times, October 19, 2020. https://www.nytimes.com/2020/10/19/us/politics/russian-intelligence-cyberattacks.html.

Schmitt, Michael N. & Liis Vihul. Sovereignty in Cyberspace: Lex Lata Vel Non? 111 Am. J. Int’l L. Unbound 213 (2017). https://doi.org/10.1017/aju.2017.55.

Schmitt, Michael N., Ed. Tallinn Manual 2.0 On the International Law Applicable To Cyber Operations (2017). https://doi.org/10.1017/9781316822524.

Setiadi, F., Sucahyo, Y. G., & Hasibuan, Z. A. “An Overview of the Development Indonesia National Cyber Security.” International Journal of Technology & Computer Science (IJTCS) 6, (December 2012): 111.

Setiyono, Joko, Muhamad Azhar, Solechan, Nanik Trihastuti, and Arief R. Hakim. “Justification of the Ship-Sinking Policy in the Territorial Jurisdiction of Indonesia.” AACL Bioflux Volume 13, Issue 5 (2020): 2611.

The Software Alliance. “Asia-Pacific Cybersecurity Dashboard.” Accessed September 17, 2021, www.bsa.org/APACcybersecurity.

Stop Illegal Fishing. “Indonesian Government Destroys over 20 Foreign Vessels Due to Illegal Fishing.” Accessed November 1, 2021. https://stopillegalfishing.com/press-links/indonesian-government-destroys-20-foreign-vessels-due-illegal-fishing/.

Taufik, A. Fathan. “Indonesia’s Cyber Diplomacy Strategy as A Deterrence Means yo Face the Threat in the Indo-Pacific Region.” Journal of Physics: Conference Series. The International Conference on Defence Technology (Autumn Edition, 2020): 5. https://doi:10.1088/1742-6596/1721/1/012048.

Tjan, Chandra. “The Land of Unicorns: The Rise of Start-Ups in Indonesia,” The Jakarta Post, May 7, 2021. https://www.thejakartapost.com/paper/2021/05/06/the-land-of-unicorns-the-rise-of-start-ups-in-indonesia.html.

US Cyber Command. Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command (2018). https://www.cybercom.mil/Portals/56/Documents/USCYBERCOM %20Vision%20April%202018.pdf?ver=201806-14-152556-010.

US Cyber Command. The Fiscal Year 2021 Budget Request for U.S. Cyber Command and Operations in Cyberspace: Hearing Before the H. Comm. on Armed Servs., Subcomm. on Intelligence and Emerging Threats and Capabilities, 116th Cong. 44 (2020).

US Department of Defense. Summary: Department of Defense Cyber Strategy (2018), https://media.defense.gov/2018/Sep/18/2002041658/-1/1/1/CYBER_STRATEGY_SUMMARY _FINAL.PDF.

The World Bank. "Ensuring a More Inclusive Future for Indonesia through Digital Technologies." Accessed October 5, 2021. https://www.worldbank.org/en/news/press-release/2021/07/28/ensuring-a-more-inclusive-future-for-indonesia-through-digital-technologies.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Citra Yuda Nur Fatihah

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

favicon Faculty of Law | Universitas Pelita Harapan | glr@uph.edu
slot gacor slot gacor hari ini slot gacor 2025 demo slot pg slot gacor slot gacor