Abstract

The development of globalization has changed the pattern of war from conventional military power with trained soldiers and sophisticated weaponry to non-military state power through cultural, economic, political, and technological aspects. Warfare now dominantly utilizes technological sophistication or cyber warfare, posing a threat to national security, sovereignty, and resilience in the virtual world. This article uses a qualitative approach that refers to the meaning, concept, definition, characteristics, metaphor, symbol, and description of a qualitative study, conducted through examining various social arrangements and groups or individuals in a social setting. The data collection technique used here is only a literature review or a descriptive review of previous research sources and other secondary data. In terms of Cyber Espionage issues, updating the law can be a step towards providing a legal basis for law enforcement against Cyber Espionage perpetrators as a legal breakthrough to ensnare the perpetrators. Cyber intelligence's role as a "new" form in the governance of national intelligence can become clearer and avoid potential issues. Attention to these issues should be accompanied by solutions in preparing competent human resources, infrastructure, funds, and technology to make cyber intelligence an asset for national and state security.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.