IMPLIKASI PERANG SIBER ANTARA ISRAEL, AMERIKA SERIKAT DAN IRAN MELALUI OLIMPIC GAME OPERATION TERHADAP FASILITAS PROGRAM NUKLIR IRAN PADA PERIODE PEMERINTAHAN MAHMOUD AHMADINEJAD: PERANG SIBER STUXNET 2010

Ayunita Harianja, Adi Rio Arianto, M. Chairil Akbar Setia

Abstract


Iran's nuclear program is the most collaborative in the Middle East region. International criticism regarding the development of the program did not make Ahmadinejad to stop the nuclear program in Iran. The United States decided to take action regarding Iran's nuclear program by cooperating with Israel to carry out attacks on nuclear facilities Israel is located in the Natan region. This attack is known as the Olympic Game Operation with the code "olympics, by creating a dangerous malware virus called Stuxnet, designed with the aim of taking over control over remote industrial systems. This attack is expected to be capable of nuclear facilities in the Natanz region as a whole, but in reality, this attack was only able to have a short-term impact on the damage caused. This study aims to find out how the impact of cyber war involving Israel, the United States, and Iran on Iranian power in the Middle East region. The author uses 3 frameworks of thought in this research, namely International Security, Cyber War, and Cyber Attacks. In this study, the author uses 2 data sources, namely primary data and secondary data. Iran's nuclear facilities are able to have both short and long-term impacts in several fields and are able to influence the position of Iran's power in the Middle East region.

Keywords : Nuclear, Stuxnet Virus, International Security, Cyber War, Cyber Crime, Olympic Game Operation

 


Full Text:

PDF

References


BUKU

Agus Triartono, S. I. (2019). Keamanan dan Sekuritisasi dalam Hubungan Internasional. Jawa Barat: Melvana Publishing.

Baezner, M., & Robin, P. (2017). Stuxnet. Zürich: Security Studies (CSS), ETH Zürich.

Creswell, J. (1998). Research Design : Qualitative and Quantitative Approaches. Thousand Oaks : Sage Production.

Dr.Maskun S.H, L., Achmad S.H M, H., Dr.Naswar S.H, M., Hassidiq, H., Shafira, A., & Lubis, S. N. (2020). Korelasi Kejahatan Siber & Kejahatan Agresi Dalam Perkembangan Hukum Internasional. Makassar, Sulawesi Selatan, Indonesia: Nas Media Pustaka.

Hadi, A. (2005). Matinya Dunia Cyberspace. Sewon bantul, Yogyakarta, Indonesia: LKiS Yogyakarta.

Moore, R. (2011). Cybercrime : Investigating High-Technology Computer Crime. United State of America: Anderson Publishing.

Pace, P. (2006). National Military Strategy for Cyberspace Operation (NMS-CO). Washington DC: Departmen Of Defense Washington.

Paul K. Kerr, J. R. (2010). The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability. Congressional Research Service .

Rohozinski, J. P. (2013). Stuxnet and the Future of Cyber War. London: Routledge.

Sugiyono. (2013). Metode Penelitian Kuantitatif,Kualitatif,dan R&D. Bandung: Penerbit Alfabeta.

Supriyadi. (85). Community of Practitioners : Solusi Alternatif Berbagi Pengetahuan antar Pustakawan. Lentera Pustaka, 2016.

Syani Zuraida, Y. (n.d.). Stuxnet Amerika Serikat dalam Kerangka Neo-Realisme. 83.

Tampubolon, K. E. (2019). Perbedaan Cyber Attack,Cyber Crime dan Cyber Warfare. Jurist-Diction Journal, 546-547.

Tarock, A. (2014). Iran's Nuclear Programme and The West. London: Routledge.

W.Creswell, J. (2008). Qualitative Inquiry & Research Design : Choosing Among Five Approaches. United States of America: Sage Publication L.td.

Winterfeld, J. A. (2011). Cyber Warfare : techniques,tatics and tools for security practitioners. United State of America: Elsevier.

Yaphe, J. S. (2010). Nuclear Politics in Iran. Washington, D.C.: National Defense University Press.

JURNAL

Akbar, Z. E. (2015). Kepentingan Rusia dibalik dukungannya terhadap Program Nuklir Iran. Jurnal Ilmu Hubungan Internasional, 5-9.

Banerjea, U. (2015). Revolutionary Intelligence: The Expanding Intelligence Role of the Iranian Revolutionary Guard Corps. Journal of Strategic Security, 97-99.

Basri, T. H. (2014). Sejarah dan Pengembangan Senjata Nuklir. Jurnal Seuneubok Lada, 2, 98-100.

Eberle, C. J. (2013). Just Cause and Cyber War. Journal of Military Ethics, 8.

Frances Ryan, M. C. (2009). Interviewing in Qualitative Research : The one-to-one interview. International Journal of Teraphy and Rehabilitation, 310.

Hadi, S. (2016). Pemeriksaan Keabsahan Data Peneltiian Kualitatif pada Skripsi. Jurnal Ilmu Pendidikan, 75.

Hadžikadunić, E. (2014). Understanding Iranian Foreign Policy-The Case of Iranian Nuclear Program. Journal of Transdiciplinary Studies, 7-9.

Hidayat, A. (2012). Kepentingan Siber Ofensif Iran Terhadap Arab Saudi Dalam Kasus Virus ShamoonTahun 2012. Global Political Studies Journal, 106-108.

Hidayat, A. (2020). Kepentingan Siber Ofensif Iran Terhadap Arab Saudi Dalam Kasus Virus ShamoonTahun 2012. Global Political Studies Journal, 118-119.

Irawan, D. (2021). Dinamika Keamanan Kawasan Timur Tengah dalam Persaingan Kekuatan Iran dan Amerika Serikat. Dauliyah, 238-239.

Kamiński, M. A. (2020). Operation Olympic Games : Cyber Sabotage as a tool of American Intelligence aimed at counteracting the development of Iran's Nuclear Programme. Security Defense Quartelly, 65-66.

Kiki Mikail, A. F. (2019). Program Pengembangan Nuklir Iran dan Pengaruhnya terhadap Masyarakat Iran (1957-2006 M). Jurnal Studi Sosial dan Politik.

McCombie, S. C. (2012). Stuxnet: the emergence of a new cyber weapon and its implications. Journal of Policing,Intelligence nd Counter Terrorism, 80-89.

Melysa, A. (2016). Analisis Penggunaan Offensive Cyber Operations Menghadapi Ancaman Nuklir Iran. Journal of International Relations, 214.

Mikail, K. (2019). Program Pengembangan Nuklir Iran dan Pengaruhnya terhadap Masyarakat Iran. Jurnal Studi Sosial dan Politik, 7-10.

Mir, K. A. (2014). Iran Nuclear Programme: Revisiting the Nuclear Debate. Journal of Power, Politics & Governance, 224-226.

Mohamed Chawki, A. D. (2015). Cybercrime,Digital Forensics and Jurisdiction. 3.

Mulyadi, M. (2011). Peneltian Kuantitatif dan Kualitatif serta Pemikiran Dasar Menggabungkannya. Jurnal Studi Komunikasi dan Media, 1-2.

Mundzir, C. (2020). Dimensi Islam dan Politik : Telaah Historis atas Revolusi Iran 1979. Jurnal al-Hikmah, 36-40.

Nahak, S. (2017). Hukum Tindak Pidana Mayantara (Cyber Crime) dalam perspektif akademi. Jurnal Prasada, 3-6.

Nugroho, A. (2012). Dukungan Cina Terhadap Program Nuklir Iran (2006-2009). Jurnal Transnasional, 4, 2-6.

Putri, G. E. (2016). Pandangan Politik Mahmoud Ahmadinejad Studi Kasus : Hubungan Iran-Amerika Serikat (2005-2009). Dauliyah Journal of Islamic and International Studies, 160-162.

Rahman, A. B. (2017). Editorial : Keamanan Internasional. Journal of International Studies, 1-3.

Rahmawati, I. (2017, Agustus). Analisis Manajemen Risiko Ancaman Kejahatan Siber (cyber crime) dalam peningkatan Cyber Defense. Jurnal Pertahanan dan Bela Negara, 7, 56-57.

Raodia. (2019). Pengaruh Perkembangan Teknologi Terhadap Terjadinya Kejahatan Mayantara (Cybercrime). Jurisprudentie, 232-233.

Raouf, H. (2019). Iranian quest for Regional Hegemony : Motivations,Strategies and Contrains. Journal Emerald, 243-248.

Rashid.dkk, Y. (2019). Case Study Method: A Step-by-Step Guide. International Journal of Qualitative Methods, 5.

Rijali, A. (2018). Analisis Data Kualitatif. Jurnal Alhadharah, 94.

Riyadi. (2016). Kajian Ancaman Cyber Security Terutama apda Fasilitas Nuklir Untuk Meningkatkan Keamanan dan Ketahanan Nasional. Pusat Pengkajian Sistem dan Teknologi Pengawasan Instalasi dan Bahan Nuklir, 1.

Rosaliza, M. (2015). Wawancara,sebuah interaksi komunikasi dalam penelitian kualitatif. Jurnal Ilmu Budaya, 71-72.

S.Bachri, B. (2010). Meyakinkan Validitas Data Melalui Triangulasi Pada Peneltiian Kualitatif. Jurnal Teknologi Pendidikan, 55-56.

Saldanha, P. (2017). Keefektifan Konvensi NPT dalam Menangani negara Pengguna Senjata Nuklir. Journal Islamic World and Politics, 132-136.

Saragih, H. M. (2017). Perubahan Arah Kebijakan Luar Negeri Iran Terhadap Amerika Serikat Dalam Progam Nuklir Iran pada masa pemerintahan Hassan Rouhani. Jurnal Interdependence, 17-19.

Sembiring, Z. (2020). Stuxnet Threat Analysis in SCADA (Supervisory Control And Data Aquisition) and PLC (Programmable Logic Controller) Systems. Journal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE), 98.

Shakarian, P. (2011). Stuxnet: Cyberwar Revolution in Military Affairs. Small Wars Journal, 4-5.

Shakarian, P. (2011). Stuxnet: Cyberwar Revolution in Military Affairs. Small Wars Journal, 2-7.

Sinaga, O. (2009). Kepemilikan Nuklir dan keamanan Nasional iran : Suatu Studi Kasus. Sosiohumaniora, 28.

Stevens, C. (2019). Assembling Cybersecurity : The Politics and materiality of technical malware reports and the Case of Stuxnet. Contemporary Security Policy, 2-4.

Subagyo, A. (2015). Sinergi Dalam Menghadapi Ancaman Cyber Warfare Synergy in Facing of Cyber Warfare Threat. Jurnal Pertahanan, 96-99.

Sundari, R. (2020). Strategi Amerika Serikat Dalam Menekan Pengembangan Nuklir Iran. Frequency of International Relations, 317-322.

Sya’roniRofii. (2010). Membayangkan DuniaTanpa Senjata Nuklir: NPTdan Post-agreement Negotiation. Jurnal Multiversa, 3-10.

Sya’roniRofii, M. (2015). Babak Baru Nuklir Iran:Memahami Manuver Irandan Dinamika Politik Kawasan Timur Tengah. Jouranal of Integrative International Relations, 29-31.

ARTIKEL

Fauzi, M. Z. (2018). Strategi Pemerintahan Ahmadinejad dalam Penolakan Penghentian Program Nuklir iran Yang Berdampak Terhadap Semakin Memburuknya Hubungan Iran dengan Amerika Serikat tahun 2005-2009. 3-15.

Ganji, B. (2006). Politics of confrontation: the foreign policy of the USA and revolutionary Iran.

Hikmatul Akbar, P. K. (2012). Perkembangan Nuklir Iran dan Diplomasi kepada IAEA. 19.

Kubbig, P. D. (2006, August 3). Iran and the Nuclear Non-Ploriferation Treaty.

Kushner, D. (2019). The Real Story of Stuxnet. 2.

Langner, R. (2011). Stuxnet: Dissecting a Cyberwarfare Weapon. THE IEEE COMPUTER AND RELIABILITY SOCIETIES.

SUMBER ONLINE

Affairs, O. O. (2020, March 16). United Nations. Retrieved from United Nation: https://www.un.org/disarmament/wmd/nuclear/npt/

BBC. (2021, April 14). BBC News. Retrieved 2 31, 2021, from bbc.com: https://www.bbc.com/indonesia/dunia-56713445

BBC. (2021, April 12). BBC NEWS. Retrieved 1 5, 2022, from BBC.com: https://www.bbc.com/indonesia/dunia-56713445

CNN. (2018, June 7). cnnindonesia.com. Retrieved 1 5, 2022, from CNN Indonesia: https://www.cnnindonesia.com/internasional/20180607153103-120-304333/iran-buka-fasilitas-nuklir-baru-di-natanz

PBS. (2021, April 13). PBS Frontline. Retrieved from pbs.org: https://www.pbs.org/wgbh/pages/frontline/shows/tehran/axis/map.html

Primer, T. I. (2020, March 17). United States Institute of Peace. Retrieved from The Iran Primer: https://iranprimer.usip.org/blog/2020/jan/22/iran-and-npt#:~:text=1968,develop%20or%20acquire%20nuclear%20weapons

Syafnidawaty. (2020, october 29). Universitas Raharja. Retrieved from raharja.ac.id: https://raharja.ac.id/2020/10/29/penelitian-kualitatif/

Syafnidawaty. (2020, November 8). Universitas Raharja. Retrieved from raharja.ac.id: https://raharja.ac.id/2020/11/08/data-primer/

Syafnidawaty. (2020, November 8). Universitas Raharja. Retrieved from raharjaa.ac.id: https://raharja.ac.id/2020/11/08/data-sekunder/

Wey, A. L. (2021, July 25). nationalinterest.org. Retrieved 1 4, 2022, from The National Interest: https://nationalinterest.org/blog/buzz/these-olympic-games-launched-new-era-cyber-sabotage-190082

Worldmeter. (n.d.). Retrieved 1 14, 2022, from worldmeters.info: https://www.worldometers.info/oil/iran-oil/

Zetter, K. (2015, 10 02). Wired. Retrieved 12 31, 2021, from Wired.com: https://www.wired.com/2015/02/nsa-acknowledges-feared-iran-learns-us-cyberattacks/


Refbacks

  • There are currently no refbacks.