PERKEMBANGAN TEKNOLOGI ARTIFICIAL INTELLIGENCE CINA: ANCAMAN DAN IMPLIKASINYA TERHADAP KEAMANAN NASIONAL AMERIKA SERIKAT

Nurul Minchah

Abstract


ABSTRAK
Perang dagang yang terjadi antara Amerika Serikat dengan Cina tidak hanya pada sektor ekonomi saja, namun berkembang ke berbagai sektor salah satunya adalah sektor teknologi dan industri. Obsesi Amerika Serikat dan Cina yang ingin mendominasi teknologi dunia membuat persaingan di kedua negara semakin ketat. Hal ini dibuktikan dengan beberapa inovasi di bidang teknologi industri atau penggabungan keduanya yang dikeluarkan oleh kedua negara. Seperti Cina yang berfokus pada sepuluh bidang utama untuk memainkan perang utama dalam peningkatan strategi industri termasuk next - generation IT, robotics, aerospace, farmasi dll untuk menjadikan Cina sebagai new superpower country dan dapat bersaing secara internasional. Ambisi Cina untuk menguasai dunia mendapat dukungan dari Presiden Xi Jinping yang memperkenalkan “Belt and Road Initiative” pada 2013. Tujuan dari B elt a n d R o a d I nitia tiv e adalah mempersatukan dan mengintegrasikan Cina, Rusia, Asia, Eropa, Timur Tengah, dan Afrika dengan dunia. Cina mewujudkan tujuan tersebut dengan mendirikan Silk Road Fund dan mendirikan Asian Infrastructure Investment Bank (AIIB). Selain itu perkembangan teknologi Cina yang didukung dengan prinsip “copycat” versi Cina membuat penemuan berbagai artificial intellige nce di negara ini semakin maju. Hal tersebut semakin membuat Amerika Serika merasa insecure , terlebih ketika salah satu perusahaan asal Cina yakni Huawei menemukan teknologi f a c e r e c o g nitio n yang menurut Amerika Serikat dapat menjadi suatu ancaman spionase bagi pemerintah Cina. Alasan Amerika Serikat tersebut berdasarkan paham Komunis Cina yang mewajibkan perusahaan menyerahkan perusahannya atau dapat diambil alih oleh pemerintah Cina karena menjadi milik negara. Sehingga Amerika Serikat semakin gencar untuk melarang Huawei berkembang yakni dengan membatasi distribusi berbagai produk dari Huawei, melarang Huawei melakukan transaksi jual beli bahan baku produk yang berasal dari Barat, dan berbagai kebijakan lainnya. Kemudian berimplikasi tidak hanya produk dari Huawei saja namun meluas ke berbagai produk keluaran Cina. Tujuan penulisan ini untuk menjelaskan alasan Amerika Serikat merasa tidak aman dan terancam dengan teknologi yang sedang dikembangkan oleh Cina yang diawali dengan cara mengidentifikasi peningkatan artificial intelligence milik Cina. Selain itu tulisan ini akan menjelaskan perbedaan pemahaman di kedua negara dalam menjustifikasi kasus tersebut dan faktor-faktor apa saja yang menyebabkan Amerika Serikat merasa tidak aman dengan peningkatan Cina di berbagai sektor yang ada terutama di sektor teknologi. Lebih lanjut akan dijelaskan bagaimana c y b e r s e c u rit y t h e o r y yang digunakan dapat menunjukkan berbagai ancaman keamanan akibat perkembangan teknologi yang mungkin terjadi. Suatu negara dapat melakukan berbagai upaya proteksionisme terhadap keamanan siber sehingga tidak mengancam kedaulatan negara dan mengganggu kepentingan nasional negara tersebut.

Kata K unci : Cina, Amerika Serikat, A rtificial I ntelligence, dan C yber S ecurity

 

ABSTRACT

The trade war between United States and China is not only in the economic sector, but has expanded to various sectors, such as technology and industrial sectors. The obsession of the United States and China to dominate world technology has resulted into fierce competition between the two countries. The proof is some innovations in the field of industrial technology or the merger issued by the two countries. As seen in China's effort in the main field to play a major war in improving industrial strategies including next generation IT, robotics, aerospace, pharmaceuticals etc. Those are China's focuses in attempt to turn themselves into a new superpower country and be able to compete internationally. China's ambition to dominate the world has gained the support of President Xi Jinping who introduced the "Belt and Road Initiative" in 2013. The goal of the Belt and Road Initiative is to unite and integrate China, Russia, Asia, Europe, Middle East, and Africa into one connected world. China realizes this goal by establishing the Silk Road Fund and establishing the Asian Infrastructure Investment Bank (AIIB). In addition, the "copycat" based development principles of Chinese technology has made the discovery of various artificial intelligence in the country become more advanced. This has escalated in the United States' sense of insecurity, especially when one of China's tech-based company, namely Huawei, has advanced in face recognition technology, which according to the United States is a security threat and could be a potential espionage attempt from the Chinese government. The motive behind United States' insecurity is due to China's Communist Ideology which requires every company to hand over their information to state's government or they will lose their company's permit. That's a strong reason for United States to prohibits Huawei aggressively from developing, to the point of limiting the distribution of various products from Huawei; prohibiting Huawei from purchasing raw materials from Western products; and other policies. It had affected not only to Huawei's product, but also other Chinese company products. The purpose of this paper is to explain why the United States feels insecure and threatened with technology being developed by China that begins with identifying the increase of China’s artificial intelligence. In addition, this paper will explain the differences in understanding between the two countries in justifying the case and what factors are causing the United States to feel insecure by the rise of China in various sectors, especially in the technology sector. Furthermore, it will be explained how the cyber security theory used in this paper is able to indicate various security threats due to technological developments that may occur. A country can carry out various protectionism measures against cyber security so that it does not threaten the state's sovereignty and interfere with the state's national interests.

Keywords: China, United States, Artificial Intelligence, and Cyber S ecurity 


References


Andreeva, E. (2016). The Impact of Threat Perception on National Role Conceptions: the Cases of Turkey and Rusia. Budapest, Hungary: Central European University. Anthony W. Chen, J. C. (2019). The US-China Trade War: Dominance of Trade or Technology? Applied Economic Letters Article Journal .

Anthony W. Chen, J. C. (2019). The US-CHina Trade War: Dominance of Trade or Technology? Applied Ec onomics Letters Article Journal .

Art, R. J. (2017). The United States and the Rise of CHina. International Politics: Enduring concepts and contemporarty issues, 13th edition , 393-399.

Clarke, R. A. (2010). Cyber War: The Next Threat to National Security an d What to Do About It. New York: Harper Collins.

Cohen, R. (1978). Threat Perception in International Crisis. Political Science Quarterly, 93 , 93-107.

Creswell, J. W. (2009). Research Design: Qualitative, Quantitative and Mixed Methods Approaches. Sage Publications.

Cyberspace, D. o. (2011). July Report. Diambil kembali dari http://www.defense.gov/news/d20110714cyber.pdf

Diah, S. R. (2018, Maret 24). Balas Trump, China Bakal Terapkan Tarif Impor untuk 128 Produk AS . Dipetik Oktober 26, 2019, dari Ekonomi Kompas: https://ekonomi.kompas.com/read/2018/03/24/142356226/balas-trump-china-bakal-terapkan- tarif-impor-untuk-128-produk-as

Doyle, M. W. (1983). Kant, Liberal Legacies, and Foreign Affairs. Philosophy & Public Affairs, 12 , 205-235.

Frederick, W. (2011). IT U National Cybersecurity Strategy Guide. Geneva: International Telecommunication Unit (ITU).

Fund, S. R. (2015). Silk Road Fund: Overview . Dipetik Oktober 2019, dari Silk Road Fund: http://www.silkroadfund.com.cn/ enwap/27365/27367/26761/index.html

Haenlein, A. K. (2019). Siri, Siri in my Hand, who's the Fairest in the Land? on the Interpretations, Ilustrations and Implications of Artificial Intelligence. 62 (1).

Haverland, J. B. (2012). Causal-Process Tracing. Dalam J. B. Haverland, Designing Case Studies: Explanatory Approaches in Small - N Research (hal. 79). UK: Palgrave Macmillan.

Hersh, S. (2010, November 1). The Online Threat: Should we be worried about cyber war? New Yorker .

Huberman, M. d. (1992). Analisis Data Kualitatif (diterjemahkan oleh: Tjetjep R ohedi Rosidi. Jakarta: Universitas Indonesia.

Ikenberry, J. G. (2011). The Future of the Liberal World Order: Internationalism After America. Foreign Affairs , 52-68.

Indonesia, U. P. (2012). Kajian Strategis Keamanan Cyber Nasional: Dalam Rangka Meningkatk an Ketahanan Nasional di Bidang Keamanan Cyber. Jakarta.

Indrajit, P. R. (2019, Januari 8). Kebangkitan Teknologi Informasi di China. E - Artikel Sistem Informasi .

Jervis, R. (1976). Perception and Misperception in International Politics. New Jersey: Princeton University Press.

Journal, T. W. (2011). Cyber Combat: Act of War . Dipetik Desember 2019, dari The Wall Street Journal: https://www.wsj.com/articles/SB10001424052702304563104576355623135782718

Kompas. (2019, Mei 20). Ada Apa dengan 5G, Pokok Permasalaha n AS dengan Huawei? Dipetik November 2019, dari Kompas.com: https://sains.kompas.com/read/2019/05/20/193600223/ada-apa- dengan-5g-pokok-permasalahan-as-dengan-huawei?page=all

Lee, K. F. (2018). AI Super - powers: China, Silicon Valley and the New World Order. Boston: Houghton Mifflin Harcourt.

Leeson, P. T. (2009). The Democratic Domino Theory: An Empirical Investigation. American Journal of Political Science , 533-551.

Liu, W. T. (2018). Understanding the U.S.-China Trade War. China Economic Journal, 11 , 319-340.

Maness, B. V. (2014). The Dynamics of Cyber Conflict Between Rival Antagonist. Journal of Peace Research , 347-360.

Maness, B. V. (2014). The Dynamics of Cyber Conflict Between Rival Antagonists 2001-11. Journal of Peace Research, 51 , 347-360.

Nanang, M. (2011). Metode Penelitian Kuantitatif. Jakarta: PT. Raja Grafindo.

News, C. (2019, Oktober 16). Chinese Facial Recofnition Tech Installed in Nations Vulnerable to Abuse . Dipetik Desember 2019, dari CBS News: https://www.cbsnews.com/news/china-huawei-face- recognition-cameras-serbia-other-countries-questionable-human-rights-2019-10-16/

Policy, C. I. (2018). China AI Development Report. Tsinghua University. CISTP.

Relations, C. o. (2019). Is 'Made in China 2025' a Threat to Global Trade? Dipetik November 2019, dari Council on Foreign Relations: https://www.cfr.org/backgrounder/made-china-2025-threat-global- trade

Setiawan, S. R. (2019, April 30). 10 Negara dengan Anggaran Pertahanan Tertinggi di Dunia Apa Saja? Dipetik April 14, 2020, dari Kompas.com: https://money.kompas.com/read/2019/04/30/151759726/10-negara-dengan-anggaran- pertahanan-tertinggi-di-dunia-apa-saja

Shephered, B. D. (2019, January). U.S Legislation Steps up Pressure on Huawei and ZTE, CHina Calls it Hysteria . Dipetik Oktober 2019, dari Reuters: https://www.reuters.com/article/us-usa-china- huawei-tech/u-s-legislation-steps-up-pressure-on-huawei-and-zte-china-calls-it-hysteria- idUSKCN1PA2LU

Vaswani, K. (2019). Huawei: Kisah Perjalanan Perusahaan Kontroversial yang Dituduh sebagai Mata - Mata Cina . Dipetik November 2019, dari bbc.com: https://www.bbc.com/indonesia/dunia-47477958

Yu, H. (2017). Motivation Behind China's 'One Belt, One Road Initiatives' and Establishment of the Asian Infrastructure Investment Bank. Journal of Contemporary China, 26 , 353-368.




DOI: https://doi.org/10.31315/jsdk.v12i2.3524

DOI (PDF (Bahasa Indonesia)): https://doi.org/10.31315/jsdk.v12i2.3524.g2667

Refbacks

  • There are currently no refbacks.


 


 Jurnal Studi Diplomasi dan Keamanan indexed by:

 

     

 

 

 

slot gacor slot gacor hari ini slot gacor 2025 demo slot pg slot gacor slot gacor