Model C6ISR Nasional Malaysia: Ancaman hibrid, jurang institusi dan pengajaran antarabangsa (Malaysian National C6ISR model: Hybrid threats, institutional gaps and international lessons)
Abstract
Ancaman hibrid dan cabaran keselamatan multi domain terus mendedahkan kelemahan struktur dalam ekosistem keselamatan negara, khususnya dari segi penyepaduan fungsi risikan, pemantauan dan perintah antara agensi. Kajian ini meneliti jurang institusi tersebut dan membangunkan satu model konseptual C6ISR iaitu command, control, communications, computers, cyber, combat systems, intelligence, surveillance and reconnaissance yang sesuai dengan konteks operasi Malaysia. Menggunakan reka bentuk kualitatif berasaskan analisis dokumen, kajian menilai dokumen dasar utama negara, laporan keselamatan serantau serta literatur antarabangsa mengenai C4ISR, operasi multi domain, GEOINT dan governans keselamatan. Analisis tematik mengenal pasti tiga isu utama: struktur perintah yang terfragmentasi, tahap interoperabiliti yang terhad antara agensi pertahanan dan awam serta ketiadaan rangka kerja data fusion dan Common Operating Picture (COP) pada peringkat nasional. Perbandingan dengan Amerika Syarikat, Singapura, Korea Selatan dan Turkiye menunjukkan bahawa keberkesanan C6ISR bergantung pada kerangka governans yang jelas, ekosistem data bersepadu dan mekanisme sokongan keputusan masa nyata. Dapatan ini memberikan asas kepada pemahaman tentang reformasi struktur yang diperlukan Malaysia bagi meningkatkan keupayaan koordinasi dalam operasi kompleks seperti keselamatan sempadan, insiden siber dan pemantauan domain maritim. Kajian ini mencadangkan satu model C6ISR konseptual yang merangkumi komponen penyepaduan perintah, data fusion, koordinasi rentas domain dan penjajaran institusi. Model ini berfungsi sebagai kerangka awal untuk memperkukuh governans keselamatan negara dan menyokong respon multi domain yang lebih koheren.
Kata kunci: Ancaman hibrid, C6ISR, governans keselamatan, keselamatan multi domain, Malaysia
Hybrid threats and multidomain security challenges continue to expose structural vulnerabilities in Malaysia’s national security architecture, particularly in the integration of intelligence, surveillance and command functions across agencies. This study examines these institutional gaps and proposes a conceptual C6ISR, namely command, control, communications, computers, cyber, combat systems, intelligence, surveillance and reconnaissance, model suited to Malaysia’s operational context. Using a qualitative design based on document analysis, the research reviews key national policy documents, regional security reports and international literature on C4ISR, multidomain operations, GEOINT and security governance. The thematic analysis identifies three persistent issues: fragmented command structures, limited interoperability between defence and civilian agencies, and the absence of a national-level data fusion and Common Operating Picture (COP) framework. Comparative insights from the United States, Singapore, South Korea and Turkiye show that effective C6ISR systems rely on clear governance arrangements, integrated data ecosystems and real-time decision-support mechanisms. These cases provide reference points for understanding the structural reforms Malaysia requires to enhance its coordination capacity during complex operations such as border security, cyber incidents and maritime domain awareness. The study proposes a conceptual C6ISR model that outlines the essential components of command integration, data fusion, cross-domain coordination and institutional alignment. This model serves as an initial framework for strengthening Malaysia’s security governance and supporting more coherent multidomain responses. The study contributes to the literature by situating C6ISR not only as a technological capability but as a governance challenge that requires organisational integration, strategic clarity and systemwide interoperability.
Keywords: Hybrid threats, C6ISR, security governance, multidomain security, Malaysia
Keywords
Full Text:
PDFReferences
Alatas, S. M. (2016). The South China Sea and energy security: Malaysia’s reaction to emerging geopolitical reconfigurations. African and Asian Studies, 15(1), 33–52.
Alberts, D. S., & Hayes, R. E. (2006). Understanding Command and Control. CCRP Publication Series.
Buzan, B., Wæver, O., & De Wilde, J. (1998). Security: A New Framework for Analysis. Lynne Rienner.
Cantenar, Ö. F. (2023). The rise of Turkey as a drone power: Implications for executive power enhancement [Master’s thesis, University College Dublin].
Creswell, J. W., & Creswell, J. D. (2022). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches (6th ed.). SAGE Publications.
George, A. L., & Bennett, A. (2005). Case Studies and Theory Development in the Social Sciences. MIT Press.
Hoffman, F. (2007). Conflict in the 21st Century: The Rise of Hybrid Wars. Potomac Institute for Policy Studies.
Institute of Southeast Asian Studies. (2022). ISEAS regional security outlook 2022. ISEAS–Yusof Ishak Institute. https://www.iseas.edu.sg/wp-content/uploads/2022/01/ISEAS-Regional-Security-Outlook-2022.pdf
Joint Chiefs of Staff. (2018). Joint all-domain command and control (JADC2): Concept overview. U.S. Department of Defense. https://www.jcs.mil/Portals/36/Documents/Doctrine/Other_Pubs/jadc2_2018.pdf
Kementerian Pertahanan Malaysia. (2019). Kertas Putih Pertahanan: Pertahanan Negara Semesta.
Lai, Y. M., & Kuik, C. C. (2020). Structural sources of Malaysia’s South China Sea policy: Power uncertainties and small-state hedging. Australian Journal of International Affairs, 75(3), 277–304.
Majlis Keselamatan Negara. (2020). Malaysia Cyber Security Strategy 2020–2024.
Majlis Keselamatan Negara. (2021). Dasar Keselamatan Negara 2021–2025.
Mohamed, N. (2025). Artificial intelligence and machine learning in cybersecurity: A deep dive into state-of-the-art techniques and future paradigms. Knowledge and Information Systems, 67, 6969–7055.
Mohammed Zain, R., Mohd Zahari, H., & Mohd Zainol, N. A. (2023). Inter-agency information sharing coordination on humanitarian logistics support for urban disaster management in Kuala Lumpur. Frontiers in Sustainable Cities, 5, 1149454.
National Geospatial-Intelligence Agency. (2021). GEOINT essential body of knowledge.
Oh, S. J., Cho, S. K., & Seo, Y. (2024). Harnessing ICT-enabled warfare: A comprehensive review on South Korea’s military meta power. IEEE Access, 12, 46379–46400.
Rahim, S. S. I., Mohd Huda, M. I., Sa’ad, S., & Moorthy, R. (2024). Cyber security crisis/threat: Analysis of Malaysia National Security Council (NSC) involvement through the perceptions of government, private and people based on the 3P model. e-Bangi Journal of Social Sciences & Humanities, 21(2), 191–201.
Rantos, K., Spyros, A., Papanikolaou, A., Kritsas, A., Ilioudis, C., & Katos, V. (2020). Interoperability challenges in the cybersecurity information sharing ecosystem. Computers, 9(1), 18.
Raska, M. (2024). Reimagining Defense Innovation: Defense AI in Singapore. In H. Borchert, T. Schütz, & J. Verbovszky (Eds.), The Very Long Game. Contributions to Security and Defence Studies. Springer, Cham.
Romei de Socio, M., Pozzato, G. L., & Merlo, A. (2025). A scalable ontology-driven architecture for situational awareness in multi-domain operations. The Journal of Defense Modeling and Simulation Applications Methodology Technology.
Sarı, K. A., & Bozkurt, M. E. (2025). Unmanned Aerial Vehicles (UAVs), the new actors of war: historical development, current situation and future. Optimum Science Journal.
Seo, J. (2025). Strategic integration of artificial intelligence in the South Korean military: A framework for ethical, operational, and legal governance.
Tuvdendarjaa, M.-O. (2025). Artificial intelligence in contemporary peacekeeping operations.
Refbacks
- There are currently no refbacks.