Aktivitas Spionasi Republik Rakyat Tiongkok ke Amerika Serikat Terkait Proyek Militer Pesawat F-35 Joint Strike Fighter Pada Tahun 2014-2017
Keywords:
cyber espionage, F-35 Joint Strike Fighter, phishing, PRC, USAAbstract
This study aims to analyze the Chinese Spying Activities against the United States Related Military Projects F - 35 Joint Strike Fighter. In analyzing the case the author uses the concept of Action - Reaction Model and Information Warfare. This type of research is qualitative research. The results of this study indicate that Tiongkok is currently a US espionage threat, in this focus stole secret data F - 35 Joint Strike Fighter by phishing that can open access to secret aircraft data F - 35 Joint Strike Fighter jet. In its action, Chinese representatives stole the data by sending emails to Lockheed Martin staff or officials who contained malware called spyware and trojans to access data that was stored neatly and strictly as a safeguard against expensive data such as the production c ost of F - 35 fighter jets The Joint Strike Fighte.
References
Jackson, Robert dan Georg Sorensen, (2013), Elemen-elemen realisme dalam Pengantar Studi Hubungan Internasional, Oxford University Press. hal.112 Libicki, Martin.(1995). What is Information Cyberwarfare. National Defence Security, hal 26 diunduh 15 Oktober 2017.
Sterling, Bruce (1992). Hacker Crackdown Online and disorder on the electronic frontier: “Introductionâ€. http://www.gutenberg.org/files/101/101-h/101-h.htm diunduh pada 10 Oktober 2017.
The White House. 2015. Fact Sheet: President Xi Jinping’s State Visit The United Statesâ€. file:///C:/Users/acer/Documents/FACT%20SHEET_%20President%20Xi%20Jinping%E2%80%99s%20State%20Visit%20to%20the%20United%20States%20_%20whitehouse.gov.html diakses 21 Desember 2017.
The White House, 2011. “Launching the International Strategy For Cyberspaceâ€. https://obamawhitehouse.archives.gov/blog/2011/05/16/launching-us- international-strategy-cyberspace diakses 19 Desember 2017.
US Department Of State, 2011, https://2009-2017.state.gov/s/cyberissues/strategy/index.htm\
US Department Of State, 2011, “Pillars of The International Strategy For Cyberspaceâ€, https://2009- 2017.state.gov/s/cyberissues/strategy/index.htm diakses 19 Desember 2017.
Novan Iman Santosa (2017). Senior Political and News Editor at The Jakarta Post Jakarta: The Jakarta Post, Wawancara, 13 Desember.
Larry M Wortzell. (2013). “Cyber Espionage And The Theft of US Intellectual Property And Technology: Commitee on Energy and Commerce Sub Commitee on Oversight and Investigationsâ€. file:///C:/Users/acer/Documents/Wortzel-OI-Cyber-Espionage-Intellectual- Property-Theft-2013-7-9.pdf diakses pada 13 Desember 2017.
Avast. â€Trojan, Worm. Spyware definitionâ€. http://www.avast.com/c-trojan diakses pada 29 Oktober 2017.
Business Insider. (2014, 16 Juli). “FBI: A Chinese Hacker Stole Massive Amounts Of Intel On 32 US Military Projectsâ€. http://www.businessinsider.com/chinese- hackers-stole-f-35-data-2014-7/?IR=T diakses 22 Desember 2017.
BBC, (2011, 25 Januari “US Spy for Tiongkok Noshir Gowaida Jailed For 32 Yearsâ€,http://www.bbc.com/news/world-asia-pacific-12272941 diakses 17 Desember 2017.
Cambia Research.(2016, 22 April). “Surface Web, Deep Web, Dark Web – What’s The Difference?â€. https://www.cambiaresearch.com/articles/85/surface-web-deep-web-dark- web----whats-the-difference diakses 29 Oktober 2017.
CNN Indonesia. (2016, 22 Februari). “Ekspor Senjata Tiongkok Meningkat Dua Kali Lipat†https://www.cnnindonesia.com/internasional/20160222114703- 113-112511/ekspor-senjata-Tiongkok-meningkat-dua-kali-lipat/ diakses 7 Desember 2017.
Cyber Secure Asia, (2015, 2 Desember) Understanding The Difference Between Phishing And Pharming https://www.cybersecureasia.com/blog/phishing-and-pharming diakses 18 Desember 2017.
Free Beacon. (2016, 24 Maret). “Tiongkok Hacked F-22, F-35Stealth Jet Secretâ€. http://freebeacon.com/national security/Tiongkok- hacked-f22-f35-jet-secrets/ diakses 14 Desember 2017.
Kabar24. (2017, 20 Oktober). “Tiongkok Bangun Kekuatan Militer, Xi Jinping: Kekuatan Dibangun Untuk Melawanâ€. http://kabar24.bisnis.com/read/20171020/19/701409/Tiongkok-bangun- kekuatan-militer-xi-jinping-kekuatan-dibangun-untuk-melawan diakses 15 Desember 2017.
Merdeka. (2013,23 Oktober). “Kasus Estonia dan Georgia Jadi Sejarah Kelam Cyber Crime Dunia https://www.merdeka.com/teknologi/kasus- estonia-dan georgia-jadi-sejarah-kelam-cyber-crime-dunia.html diakses 16 September 2017.
New Media Institute. â€History Of the Internetâ€. http://www.newmedia.org/history- of-the-internet.html. di akses 1 November 2017.
Pakar Komunikasi. (2017,17 Mei). 15 pengertian studi kasus menurut para ahli. https://pakarkomunikasi.com/pengertian-studi-kasus-menurut-para-ahli di akses pada 29 Oktober 2017
Sindonews. (2017, 14 Oktober).†Bentuk Satuan Siber, TNI Siap Hadapi Serangan Dunia Mayaâ€. https://nasional.sindonews.com/read/1248299/14/bentuk- satuan-siber-tni siapa- hadapi- serangan-di-dunia-maya 1507966324/13diakses 10 September 2017 diakses 10 September 2017.
Sindonews. (2012, 19 Mei). “AS Tuding Tiongkok Agresor Cyber terbesar di Duniaâ€. https://international.sindonews.com/read/632058/9/as-tuding-Tiongkok- agresor-cyber- terbesar-di-dunia-1337425975 diakses 5 Desember 2017.
Service Care Solution. (Juni, 27 2016). †Surface Web vs Deep Web vs Dark Webâ€.www.servicecare.org.uk-61792715468. diakses pada 30 Oktober 2017.
Search Security. (2017, 31 Oktober). “Definition of Phishingâ€. http://searchsecurity.techtarget.com/definition/phishing diakses 18 Desember 2017.
Techopedia. “What Does Cyber Attack Meanâ€. https://www.techopedia.com/definition/24748/cyberattack diakses pada 1 November 2017.
The Global Review.(2013, 29 Januari). “Tiongkok Potensial Sebagai Superpowerâ€. http://theglobal-review.com/lama/content_detail.php?lang=id&id=10979&type=4#.WkS55 N-WbIU diakses 4 Desember 2017.
Vice News. (2014, 24 Maret). “Man Who Sold F-35 Secrets To Tiongkok Pleads Guiltyâ€. https://news.vice.com/article/man-who-sold-f-35-secrets-to- Tiongkok-pleads-guilty diakses 20 Desember 2017.
VOA Indonesia. (2015, 31 Agustus). “Pemerintah Amerika Serikat Siapkan Sanksi Atas Peretasan Oleh Chinaâ€. https://www.voaindonesia.com/a/as- siapkan-sanksi-peretasan-oleh-china-/2939473.html, diakses 20 Desember 2017.
Downloads
Published
How to Cite
Issue
Section
License
In submitting the manuscript to the Balcony (Budi Luhur Journal of Contemporary Diplomacy) , the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.
- That it is not under consideration for publication elsewhere,
- The publication has been approved by the author(s) and by responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
License and Copyright Agreement
Authors who publish with Balcony (Budi Luhur Journal of Contemporary Diplomacy) agree to the following terms:
- Authors retain copyright and grant the Balcony (Budi Luhur Journal of Contemporary Diplomacy) right of first publication with the work simultaneously licensed under Creative Commons Attribution License (CC BY 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the Balcony (Budi Luhur Journal of Contemporary Diplomacy) published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.