Strategic Blindness in Outer Space: Asymmetric Threat Analysis of Starlink on Indonesia's Cyber Sovereignty and Intelligence Mitigation Strategies

Authors

  • Ahmad Ridwansyah Sekolah Tinggi Intelijen Negara
  • Pratama Dahlian Persadha Sekolah Tinggi Intelijen Negara
  • Edy Supriadi Sekolah Tinggi Intelijen Negara

DOI:

https://doi.org/10.70710/sitj.v3i1.82

Keywords:

Asymmetric Threat, Cyber Sovereignty, Intelligence Strategy, Starlink, National Security

Abstract

The advent of Low Earth Orbit (LEO) satellite constellations, epitomized by SpaceX's Starlink, has fundamentally disrupted the global telecommunications architecture. While offering critical connectivity solutions for archipelagic nations like Indonesia, this technology simultaneously introduces profound asymmetric threats to national security. This study aims to analyze the anatomy of these threats, evaluate their multidimensional impacts, and formulate a comprehensive intelligence strategy to mitigate the hegemony of Starlink's technology. Adopting a post-positivist paradigm, this research utilizes a qualitative descriptive method integrated with the Intelligence Analysis Cycle. The findings indicate that the threat level of Starlink is 'Critical' based on Hank Prunckun's threat matrix (T = I x C), driven predominantly by uncontrolled technical capabilities rather than malicious intent. Starlink is identified as bypassing national gateways, creating "strategic blindness" for intelligence apparatuses, and acting as a force multiplier for separatist groups via anti-jamming communication capabilities. Economically, its dominance threatens to de-industrialize local telecommunications infrastructure through predatory pricing. The study recommends a mitigation strategy based on Arthur F. Lykke Jr.’s model, advocating for "Market Power Diplomacy," the establishment of independent Space Situational Awareness (SSA), and the implementation of a hardware ban as an ultimum remedium.

Downloads

Download data is not yet available.

References

Betz, D. (2015). Cyberpower and National Security. Edinburgh University Press.

Boley, A., Wright, E., Lawler, S., Hickson, P., & Balam, D. (2021). Plaskett 1.8 m Observations of Starlink Satellites. The Astronomical Journal, 163. https://doi.org/10.3847/1538-3881/ac5599

Cavelty, M. D. (2009). Cyber-security and resilience: a framework for the analysis of critical information infrastructure protection. International Journal of Critical Infrastructure Protection, 2(3), 146-153.

Chaudhry, A., & Yanikomeroglu, H. (2021). Laser Intersatellite Links in a Starlink Constellation: A Classification and Analysis. IEEE Vehicular Technology Magazine, 16, 48–56. https://doi.org/10.1109/MVT.2021.3063706

Creswell, J. W., & Creswell, J. D. (2018). Research design: Qualitative, quantitative, and mixed methods approaches (5th ed.). SAGE Publications.

_______, & Poth, C. N. (2016). Qualitative inquiry & research design (4th ed.). SAGE Publications.

CSIS (Center for Strategic & International Studies). (2020). Defending the Digital Frontier: Critical Infrastructure and National Security in the Information Age. CSIS.

Duan, T., & Dinavahi, V. (2021). Starlink Space Network-Enhanced Cyber–Physical Power System. IEEE Transactions on Smart Grid, 12, 3673–3675. https://doi.org/10.1109/TSG.2021.3068046

Gunawan, B., & Ratmono, B. M. (2022). Kuasa Siber: Sebuah Refleksi Kritis. PT. Rayyana Komunikasindo.

Halferty, G., Reddy, V., Campbell, T., Battle, A., & Furfaro, R. (2022). Photometric characterization and trajectory accuracy of Starlink satellites: implications for ground-based astronomical surveys. Monthly Notices of the Royal Astronomical Society. https://doi.org/10.1093/mnras/stac2080

Harianja, A., Rio, A., & Setiawan, M. (2022). IMPLIKASI PERANG SIBER ANTARA ISRAEL, AMERIKA SERIKAT DAN IRAN MELALUI OLIMPIC GAME OPERATION TERHADAP FASILITAS PROGRAM NUKLIR IRAN PADA PERIODE PEMERINTAHAN MAHMOUD AHMADINEJAD: PERANG SIBER STUXNET 2010. Jurnal Hubungan Internasional Moestopo. https://journal1.moestopo.ac.id/index.php/mjir/article/download/1895/1094

Harrison, T., & Johnson, K. (2023). Space Threat Assessment 2023. Center for Strategic & International Studies (CSIS). 180

Intelligence and National Security Alliance (INSA). (2021). Insider Threats and Commercial Espionage: Economic and National Security Impacts. INSA.

Iskandar, M. (2025). Serangan Siber: Jenis, Dampak, dan Cara Mengatasinya. In Phintraco. https://phintraco.com/serangan-siber/

Karas, J., & Molla, A. M. (2023). Starlink and the Geopolitics of Space: How Low Earth Orbit Satellite Constellations are Changing the Global Order. Chatham House.

Kelly, T. (2012). International Internet Bandwith: Supply and Demand. ITU Workshop.

Kemp, S. (2024). Digital 2024: Global Overview Report. DataReportal in partnership with We Are Social and Meltwater. https://datareportal.com/reports/digital-2024-global-overview-report

Kent, S. (1949). Strategic Intelligence for American World Policy. In Princeton University Press.

Khoirunnisa. (2024). Cyber Warfare Strategies in the Russia-Ukraine Conflict 2021-2022. Journal of Information Systems and Technology Management. https://www.researchgate.net/publication/384774336_Cyber_Warfare_Strategies_in_the_Russia-Ukraine_Conflict_2021-2022

Kraiwanit, T., Limna, P., & Siripipatthanakul, S. 2023. NVivo for Social Sciences and Management Studies: A Systematic Review. Advance Knowledge for Executives, 2(3).

Leiner, B. (1997). Brief History of The Internet. Internet Society.

Levchenko, I., Xu, S., Wu, Y.-L., & Bazaka, K. (2020). Hopes and concerns for astronomy of satellite constellations. Nature Astronomy, 1–3. https://doi.org/10.1038/s41550-020-1141-0

Lykke, A. F. (1997). Defining military strategy. Military Review, 77(1), 183–186.

Michel, F., Trevisan, M., Giordano, D., & Bonaventure, O. (2022). A first look at starlink performance. Proceedings of the 22nd ACM Internet Measurement Conference. https://doi.org/10.1145/3517745.3561416

Milevski, L. (2011). Stuxnet and Strategy. Joint Force Quarterly, 63, 64–69. https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-63/jfq-63_64-69_Milevski.pdf?ver=Jy0SW9E8UBbatlrmrw-egQ%3D%3D

Molla, A. M. (2024). Geopolitics of Starlink: The race for low-Earth orbit satellite dominance. Space Policy, 67, 101633.

Pohle, J., & Thiel, T. (2020). Digital sovereignty. Internet Policy Review, 9(4).

Prunckun, H. (2019). METHODS OF INQUIRY FOR INTELLIGENCE ANALYSIS (3rd ed.). The Rowman & Littlefield Publishing Group, Inc. 181

Rahimi, & Jones. (2025). Cyber warfare dalam Konflik Modern: Analisis Serangan Stuxnet pada Fasilitas Nuklir Iran. DIALOGIKA, 1(3), 49–50. https://ejournal.appisi.or.id/index.php/Dialogika/article/download/372/323

Stuxnet: Titik Balik dalam Konflik Modern. (2025). DIALOGIKA. https://ejournal.appisi.or.id/index.php/Dialogika/article/download/372/323/1883

Sugiyono. (2013). Metode Penelitian Kuantitatif Kualitatif dan R&D (19th ed.). Alfabeta.

Sukarno, I. (2014). Ilmu Intelijen. Prenadamedia Group.

Sugirman, S. (2009). Manajemen Intelijen: Teori dan Aplikasi. Jakarta: PT RajaGrafindo Persada.

Utama, A. (2024, October 8). Wawancara eksklusif Egianus Kogoya – Perselisihan internal OPM, tuduhan terima suap, dan ancaman 'akan terus bikin pusing Indonesia’. Https://Www.Bbc.Com/Indonesia/Articles/Cly3z71x4vdo.

Vlaj, S. (2017). The Role of Non-State Actors in Cyber Security Governance. Lex Localis - Journal of Local Self-Government, 15(4), 729-747.

Waruwu, B. (2023). Metode penelitian sosial: Teori dan praktik. Deepublish.

Wikipedia contributors. (2025, June 1). Bell Labs. Https://En.Wikipedia.Org/w/Index.Php?Title=Bell_Labs&oldid=1293333710.

Williams P. (2008). Security Studies: An Introduction. Routledge.

Yin, R. K. (2016). Family and Consumer Sciences Research Journal. Qualitative Research from Start to Finish, 44(3).

Yusuf, A. M. (2014). Metode penelitian: Kuantitatif, kualitatif & penelitian gabungan. Prenada Media Group.

Downloads

Published

2026-03-14

How to Cite

Ridwansyah, A., Persadha, P. D., & Supriadi, E. (2026). Strategic Blindness in Outer Space: Asymmetric Threat Analysis of Starlink on Indonesia’s Cyber Sovereignty and Intelligence Mitigation Strategies. Security Intelligence Terrorism Journal (SITJ), 3(1), 16–21. https://doi.org/10.70710/sitj.v3i1.82

Issue

Section

Articles

Similar Articles

1 2 3 4 5 6 7 > >> 

You may also start an advanced similarity search for this article.