Strategic Blindness in Outer Space: Asymmetric Threat Analysis of Starlink on Indonesia's Cyber Sovereignty and Intelligence Mitigation Strategies
DOI:
https://doi.org/10.70710/sitj.v3i1.82Keywords:
Asymmetric Threat, Cyber Sovereignty, Intelligence Strategy, Starlink, National SecurityAbstract
The advent of Low Earth Orbit (LEO) satellite constellations, epitomized by SpaceX's Starlink, has fundamentally disrupted the global telecommunications architecture. While offering critical connectivity solutions for archipelagic nations like Indonesia, this technology simultaneously introduces profound asymmetric threats to national security. This study aims to analyze the anatomy of these threats, evaluate their multidimensional impacts, and formulate a comprehensive intelligence strategy to mitigate the hegemony of Starlink's technology. Adopting a post-positivist paradigm, this research utilizes a qualitative descriptive method integrated with the Intelligence Analysis Cycle. The findings indicate that the threat level of Starlink is 'Critical' based on Hank Prunckun's threat matrix (T = I x C), driven predominantly by uncontrolled technical capabilities rather than malicious intent. Starlink is identified as bypassing national gateways, creating "strategic blindness" for intelligence apparatuses, and acting as a force multiplier for separatist groups via anti-jamming communication capabilities. Economically, its dominance threatens to de-industrialize local telecommunications infrastructure through predatory pricing. The study recommends a mitigation strategy based on Arthur F. Lykke Jr.’s model, advocating for "Market Power Diplomacy," the establishment of independent Space Situational Awareness (SSA), and the implementation of a hardware ban as an ultimum remedium.
Downloads
References
Betz, D. (2015). Cyberpower and National Security. Edinburgh University Press.
Boley, A., Wright, E., Lawler, S., Hickson, P., & Balam, D. (2021). Plaskett 1.8 m Observations of Starlink Satellites. The Astronomical Journal, 163. https://doi.org/10.3847/1538-3881/ac5599
Cavelty, M. D. (2009). Cyber-security and resilience: a framework for the analysis of critical information infrastructure protection. International Journal of Critical Infrastructure Protection, 2(3), 146-153.
Chaudhry, A., & Yanikomeroglu, H. (2021). Laser Intersatellite Links in a Starlink Constellation: A Classification and Analysis. IEEE Vehicular Technology Magazine, 16, 48–56. https://doi.org/10.1109/MVT.2021.3063706
Creswell, J. W., & Creswell, J. D. (2018). Research design: Qualitative, quantitative, and mixed methods approaches (5th ed.). SAGE Publications.
_______, & Poth, C. N. (2016). Qualitative inquiry & research design (4th ed.). SAGE Publications.
CSIS (Center for Strategic & International Studies). (2020). Defending the Digital Frontier: Critical Infrastructure and National Security in the Information Age. CSIS.
Duan, T., & Dinavahi, V. (2021). Starlink Space Network-Enhanced Cyber–Physical Power System. IEEE Transactions on Smart Grid, 12, 3673–3675. https://doi.org/10.1109/TSG.2021.3068046
Gunawan, B., & Ratmono, B. M. (2022). Kuasa Siber: Sebuah Refleksi Kritis. PT. Rayyana Komunikasindo.
Halferty, G., Reddy, V., Campbell, T., Battle, A., & Furfaro, R. (2022). Photometric characterization and trajectory accuracy of Starlink satellites: implications for ground-based astronomical surveys. Monthly Notices of the Royal Astronomical Society. https://doi.org/10.1093/mnras/stac2080
Harianja, A., Rio, A., & Setiawan, M. (2022). IMPLIKASI PERANG SIBER ANTARA ISRAEL, AMERIKA SERIKAT DAN IRAN MELALUI OLIMPIC GAME OPERATION TERHADAP FASILITAS PROGRAM NUKLIR IRAN PADA PERIODE PEMERINTAHAN MAHMOUD AHMADINEJAD: PERANG SIBER STUXNET 2010. Jurnal Hubungan Internasional Moestopo. https://journal1.moestopo.ac.id/index.php/mjir/article/download/1895/1094
Harrison, T., & Johnson, K. (2023). Space Threat Assessment 2023. Center for Strategic & International Studies (CSIS). 180
Intelligence and National Security Alliance (INSA). (2021). Insider Threats and Commercial Espionage: Economic and National Security Impacts. INSA.
Iskandar, M. (2025). Serangan Siber: Jenis, Dampak, dan Cara Mengatasinya. In Phintraco. https://phintraco.com/serangan-siber/
Karas, J., & Molla, A. M. (2023). Starlink and the Geopolitics of Space: How Low Earth Orbit Satellite Constellations are Changing the Global Order. Chatham House.
Kelly, T. (2012). International Internet Bandwith: Supply and Demand. ITU Workshop.
Kemp, S. (2024). Digital 2024: Global Overview Report. DataReportal in partnership with We Are Social and Meltwater. https://datareportal.com/reports/digital-2024-global-overview-report
Kent, S. (1949). Strategic Intelligence for American World Policy. In Princeton University Press.
Khoirunnisa. (2024). Cyber Warfare Strategies in the Russia-Ukraine Conflict 2021-2022. Journal of Information Systems and Technology Management. https://www.researchgate.net/publication/384774336_Cyber_Warfare_Strategies_in_the_Russia-Ukraine_Conflict_2021-2022
Kraiwanit, T., Limna, P., & Siripipatthanakul, S. 2023. NVivo for Social Sciences and Management Studies: A Systematic Review. Advance Knowledge for Executives, 2(3).
Leiner, B. (1997). Brief History of The Internet. Internet Society.
Levchenko, I., Xu, S., Wu, Y.-L., & Bazaka, K. (2020). Hopes and concerns for astronomy of satellite constellations. Nature Astronomy, 1–3. https://doi.org/10.1038/s41550-020-1141-0
Lykke, A. F. (1997). Defining military strategy. Military Review, 77(1), 183–186.
Michel, F., Trevisan, M., Giordano, D., & Bonaventure, O. (2022). A first look at starlink performance. Proceedings of the 22nd ACM Internet Measurement Conference. https://doi.org/10.1145/3517745.3561416
Milevski, L. (2011). Stuxnet and Strategy. Joint Force Quarterly, 63, 64–69. https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-63/jfq-63_64-69_Milevski.pdf?ver=Jy0SW9E8UBbatlrmrw-egQ%3D%3D
Molla, A. M. (2024). Geopolitics of Starlink: The race for low-Earth orbit satellite dominance. Space Policy, 67, 101633.
Pohle, J., & Thiel, T. (2020). Digital sovereignty. Internet Policy Review, 9(4).
Prunckun, H. (2019). METHODS OF INQUIRY FOR INTELLIGENCE ANALYSIS (3rd ed.). The Rowman & Littlefield Publishing Group, Inc. 181
Rahimi, & Jones. (2025). Cyber warfare dalam Konflik Modern: Analisis Serangan Stuxnet pada Fasilitas Nuklir Iran. DIALOGIKA, 1(3), 49–50. https://ejournal.appisi.or.id/index.php/Dialogika/article/download/372/323
Stuxnet: Titik Balik dalam Konflik Modern. (2025). DIALOGIKA. https://ejournal.appisi.or.id/index.php/Dialogika/article/download/372/323/1883
Sugiyono. (2013). Metode Penelitian Kuantitatif Kualitatif dan R&D (19th ed.). Alfabeta.
Sukarno, I. (2014). Ilmu Intelijen. Prenadamedia Group.
Sugirman, S. (2009). Manajemen Intelijen: Teori dan Aplikasi. Jakarta: PT RajaGrafindo Persada.
Utama, A. (2024, October 8). Wawancara eksklusif Egianus Kogoya – Perselisihan internal OPM, tuduhan terima suap, dan ancaman 'akan terus bikin pusing Indonesia’. Https://Www.Bbc.Com/Indonesia/Articles/Cly3z71x4vdo.
Vlaj, S. (2017). The Role of Non-State Actors in Cyber Security Governance. Lex Localis - Journal of Local Self-Government, 15(4), 729-747.
Waruwu, B. (2023). Metode penelitian sosial: Teori dan praktik. Deepublish.
Wikipedia contributors. (2025, June 1). Bell Labs. Https://En.Wikipedia.Org/w/Index.Php?Title=Bell_Labs&oldid=1293333710.
Williams P. (2008). Security Studies: An Introduction. Routledge.
Yin, R. K. (2016). Family and Consumer Sciences Research Journal. Qualitative Research from Start to Finish, 44(3).
Yusuf, A. M. (2014). Metode penelitian: Kuantitatif, kualitatif & penelitian gabungan. Prenada Media Group.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Security Intelligence Terrorism Journal (SITJ)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.






