Replication is one of the oldest tactics in warfare, utilizing humanity’s reliance on identity for trust and cooperation.
Israel’s Mossad intelligence operation in mid-September against Hezbollah fighters was one of the most ingenious uses of replication tactics in modern history.
By embedding plastic explosives in specially designed pagers and marketing them through unaware suppliers, the Mossad dealt a devastating blow. This operation confirms a fundamental truth: the most powerful weapon in war is not drones or advanced drones or artificial intelligence, but an ancient strategy of mimicry.
Replication has historically played a central role in warfare. When Russia invaded Ukraine in 2022, its troops disguised themselves as Ukrainian units to avoid detection.
In addition to combat, mimicry or replication helps espionage, theft and sabotage activities. A Bulgarian spy arrested in Britain was found carrying passports from nine different countries, highlighting the use of fake identities in the world of espionage.
Indonesia, as a rapidly growing country, is particularly vulnerable to impersonation-based attacks. Increasing digitization creates new opportunities for fraudsters to exploit loopholes in the country’s cybersecurity infrastructure.
The financial sector has seen a surge in cases of identity theft, where criminals use stolen credentials to drain bank accounts or secure fake loans.
To combat the growing threat of replication/impersonation, Indonesia must adopt a multifaceted approach that includes regulatory, technological, and educational measures. Here are policy recommendations that can help reduce this risk.
First, strengthen the Cybersecurity Framework. Governments must set stringent cybersecurity standards for financial institutions and other critical sectors. These include mandatory multi-factor authentication, periodic security audits, and the implementation of AI-based monitoring systems to detect anomalous behavior in real-time.
Second, develop a national deepfake detection tool. Indonesia could invest in AI research to create tools capable of identifying deepfakes and other forms of digital impersonation. Working with international partners and technology companies will accelerate the development of this technology.
Third, increase public awareness. Public education campaigns are essential to inform citizens about the risks of imitation. Training programs for employees in high-risk sectors, such as finance and healthcare, should emphasize the recognition and response to social engineering attacks.
Fourth, form a special task force. Special units within the state cyber and Cipher Agency (BSSN) can focus on crimes related to replication. The task force will coordinate with law enforcement, private companies, and international agencies to deal with evolving threats.
Fifth, legal reform by updating existing laws to deal with replication in the digital age is essential. The government should criminalize the use of deepfake technology for fraudulent purposes and impose severe penalties for perpetrators.
Sixth, encourage identity verification innovation. Encouraging the use of biometric authentication and blockchain technology can improve the identity verification process, reducing the risk of replication.