Presentasi sedang didownload. Silahkan tunggu

Presentasi sedang didownload. Silahkan tunggu

Teknologi Pertahanan Onno W. Purbo Computer Network Research Group Institut Teknologi Bandung

Presentasi serupa


Presentasi berjudul: "Teknologi Pertahanan Onno W. Purbo Computer Network Research Group Institut Teknologi Bandung"— Transcript presentasi:

1

2 Teknologi Pertahanan Onno W. Purbo Computer Network Research Group Institut Teknologi Bandung onno@itb.ac.id

3 Outline zPengakuan penulis :-) … zPola / Fokus Penelitian bidang Ketahanan & Keamanan. zKekuatan Teknologi Informasi. zPenutup...

4 Pengakuan Penulis...

5 Modal penulis.. zSaya bukan ahli bidang ketahanan & keamanan. zSaya hanya staff di ITB. zBidang saya adalah teknologi informasi khususnya Internet. zModal utama penyiapan materi adalah Internet.

6 Sumber Informasi zHttp://www.arpa.mil/ yAdvanced Research Program Agency zhttp://www.dtic.dla.mil/ yDefence Technical Information Center zhttp://www.defenselink.mil/ yU.S. Pentagon zdll. Silahkan lihat di paper saya …...

7 Pola Pengembangan Teknologi zVisi yang jelas yJoint Vision 2010 yU.S. menitik beratkan pada SDM. zPenjabaran strategi penelitian yJoint Warfighting Science & Technology Plan

8 Beberapa pepatah.. z"z"... attaining one hundred victories in one hundred battles is not the pinnacle of excellence. Subjugating the enemy's army without fighting is the true pinnacle of excellence." Sun Tzu, The Art of War

9 Beberapa pepatah... z“Communications without intelligence is noise;intelligence without communications is irrelevant." Gen. Alfred. M. Grey, USMC

10 Joint Vision 2010 zDominant Maneuver zPrecision Engagement zFull Dimensional Protection zFocused Logistics

11 Joint Vision 2010 zFoundation: yhigh quality people yinnovative leadership zTraditional Concepts: ymaneuver, strike, protection, & logistics zLeveraged with: ytechnological advances & information superiority

12 Dasar Joint Vision 2010 zPeople zLeader Development zTraining & Readiness zFirst-rate Equipment

13 Konsep Operasi zDominant maneuver zPrecision engagement zFull dimension protection zFocused logistic

14 Strategic Investment Priorities zAffordability zDual Use zAccelerated Transition zA Strong Technology Base

15 R&D Plan zIn future conflicts, information technologies will play a critical role in achieving the dominance we seek. That presents several challenges. We must develop the communications, sensors and computing systems to capture, synthesize and distribute near-real time information to all levels of operations. We need to build military applications that extend the capability of our operators and support organizations. And, we must discover and develop whole new concepts through basic research and cultivation of the nation’s best scientific and engineering talent. William J. Perry - Secretary of Defense

16 Information Technology.. zThe possibility of delivering almost any information known about a situation almost anywhere at near real-time has sparked discussion of a revolution in military affairs. zBecause the potential is present, it is the job of the DoD S&T Program to demonstrate the elements of a future global information architecture that would enable revolutionary change, as well as to prototype new applications that challenge today's doctrine and offer new advanced concepts and tactics.

17 Warfighter Objectives zInformation Superiority zPrecision Force zCombat Identification zJoint Theater Missile Defense zMilitary Operations in Urban Terrain zJoint Readiness zJoint Countermine

18 Warfighter Objectives zElectronic Warfare zInformation Warfare zChemical/Biological Agent Detection zReal-Time Logistics Control zCounterproliferation

19 Indonesia ….? zInformation Superiority zPrecision Force zCombat Identification zMilitary Operations in Urban Terrain zJoint Readiness zJoint Countermine zInformation Warfare zReal-Time Logistics Control

20 Information Warfare

21 Jenis Information Warfare Penunjang Pertempuran Fisik  Command-and-control (C2W)  Intelligence-based warfare (IBW)  Electronic warfare (EW) Perjuangan Sipil  psychological warfare (PSYW)  hacker warfare  economic information warfare (EIW)  cyberwarfare.

22 Information Warfare: Pertempuran Fisk  Command-and-control (C2W)  Intelligence-based warfare (IBW)  Electronic warfare (EW)

23 Command & Control zAntihead zAntineck

24 Intelligence-Based Warfare zOffensive IBW zDefensive IBW

25 Electronic Warfare zAntiradar zAnticommunications zCryptography

26 Pola Teknologi Informasi

27 Command & Control zJoint Power Projection / Real-Time Support / Rapid Force Projection Command and Control. zRapid Battlefield Visualization zBattlefield Awareness & Data Dissemination zJoint Task Force

28 Rapid Battlefield Awareness

29 Komunikasi zRobust Tactical / Mobile Networking zIntegrated Collection Management zInformation Security

30 Microwave 2Mbps

31 Peralatan Sensor zHigh-Altitude Endurance Unmanned Aerial Vehicle zTactical Unmanned Aerial Vehicle zCounter-Camouflage Concealment and Deception

32 Teknologi Pendukung zSatellite C3I / Navigation Signals Propagation Technology zNavigation Warfare

33 Faktor Kunci Implementasi  Skill & Knowledge (Ketrampilan & Pengetahuan).  Leadership (Kepemimpinan).  Continuous Training (Latihan yang berkelanjutan).  Advance Equipment (Peralatan yang canggih).

34 Perjuangan Sipil & Ekonomi

35 Jenis Information Warfare zPsychological warfare (PSYW) zHacker warfare zEconomic Information Warfare (EIW) zCyberwarfare

36 Psychological Warfare zCounter-will melalui media massa / internet zCounterforces ketakutan / kematian zCounter-commander menyulitkan komandan lapangan zKulturkampf McDonnald / KFC / diskotik / pil ekstasi

37 Hacker Warfare zAttacks on computer networks melalui security hole zIntent of an attack pelumpuhan sistem informasi, random data error, pencurian informasi, pencurian servis / jasa (misalnya SLJJ tanpa bayar) zAlat yang digunakan virus, logic bom, trojan horse & sniffer

38 Economic Information Warfare zInformation blockade zInformation imperialism yknowlede intensive menjajah labour intensive.

39 Cyberwarfare zInformation terrorism ybayangkan jika KTP kita di salahgunakan. zSemantic attacks ybayangkan jika komputer PLN di tipu. zSimula-warfare ysimulasi pertempuran di Internet. zGibson-warfare ymasuk ke dalam komputer.

40 Strategi Pertempuran di Era Informasi zStrategi Dasar: SDM! zPemberdayaan Bangsa Indonesia. zStrategi Militer Berbasis Informasi.

41 Sumber Daya Manusia Produsen Informasi

42 Kendala Utama zBahasa Inggris zTingkat Pendidikan zBirokrasi dalam melepas informasi

43 Strategi Praktis zMembaca & membiasakan diri menjadi kunci. zBeri akses para perwira / peneliti ke Internet utk membaca / membuka wawasan. zBeri kemungkinan utk berinteraksi dg. Dunia luar. zBuka kemungkinan utk kerjasama dg dunia pendidikan.

44 Integrasi IntraNet ke Internet

45 Contoh Demokratisasi

46 Summary zVisi zStrategi zTaktis Information Warfare zKunci Keberhasilan: SDM

47


Download ppt "Teknologi Pertahanan Onno W. Purbo Computer Network Research Group Institut Teknologi Bandung"

Presentasi serupa


Iklan oleh Google