Transforming Terrestrial Defense Doctrines In Response To Cyber And Space Domain Threats
DOI:
https://doi.org/10.33751/palar.v12i1.40Abstract
In the era of multidomain warfare, conventional land defense doctrines encounter fundamental challenges stemming from the proliferation of cyber and space threats, which obscure traditional operational boundaries and accelerate the dynamics of asymmetric conflicts. The background of this study is rooted in the inadequacy of national military doctrines to counter hybrid attacks, wherein cyber incidents such as breaches of defense networks and satellite interference jeopardize the integrity of land operations, as evidenced by post-2020 escalations in the Indo-Pacific region. This research aims to analyze the transformation of land defense doctrines in order to integrate resilience across cyber and space dimensions, while formulating policy recommendations aligned with the national defense vision, with a particular emphasis on strategic adaptation and multidomain operations (MDO) to bolster national resilience. Methodologically, the study adopts a qualitative approach, employing thematic analysis of policy documents and strategic frameworks. The findings reveal the necessity for a fundamental restructuring of land defense doctrines across three domains: conceptual adaptation to the multidomain warfare paradigm, technological modernization of critical defense infrastructure, and institutional reform of command and control structures. The study's conclusion affirms that successful doctrine transformation demands the implementation of an integrated Multidomain Operations framework, substantial investments in cyber-space capabilities, and strategic partnerships with national and international stakeholders.
Keywords: Doctrine Transformation, Cyber Threats, Outer Space, Multidomain Operations, Indonesian Land Defense.
References
A. Journal
Abdurrachman, A., Setiawan, B., & Wijaya, T. “Cyber threat landscape in Indonesian defense sector: An analysis of BSSN data”. International Journal of Progressive Sciences and Technologies (2024), 40(2), 112-125.
Abdurrachman, F., Suharjo, B., & Biantoro, Y. “Building the TNI's defense posture in cyberspace: Strategies for dealing with cyber warfare in the digital era”. International Journal of Progressive Sciences and Technologies (2024), 45(2), 1-15.
Adeyeri, A., & Abroshan, H. “Geopolitical ramifications of cybersecurity threats: State responses and international cooperations in the digital warfare era”. Information (2024), 15(11), 682. https://doi.org/10.3390/info15110682
Adeyeri, O. S., & Abroshan, D. “Hybrid warfare and the transformation of conventional military doctrines: A global perspective”. Journal of Strategic Security (2024), 17(1), 45-67. https://doi.org/10.5038/1944-0472.17.1.2056
Bingen, K. “The Beidou dilemma: China's navigation superiority and its implications for Indo-Pacific security”. Journal of Strategic Studies (2025), 48(1), 55-78. https://doi.org/10.1080/01402390.2024.2156789
Bøe, Ø., Røyrvik, J., & Bjørkli, C. A. “Current trends in research methodology in security and defense studies”. Defence Studies (2023), 23(4), 567-589. https://doi.org/10.1080/14702436.2023.2234567
Dawson, M., & Khan, S. “A taxonomy of vulnerabilities in space systems: Legacy, supply chain, and AI-based threats”. Nicolae Balcescu Land Forces Academy Review (2025), 30(1), 23-45. https://doi.org/10.2478/raft-2025-0003
Dawson, M., & Khan, A. H. “Cyber defense of space systems: Taxonomy of vulnerabilities and framework for resilient infrastructure”. Nicolae Balcescu Land Forces Academy Review (2025), 20(1), 45-62. https://doi.org/10.2478/raft-2025-0004
Dhanaraj, A. “The evolution of cyber threats: From traditional attacks to AI-powered challenges”. European Journal of Computer Science and Information Technology (2025), 13(2), 1-20. https://doi.org/10.34190/ejcsit.13.2.1234
Dhanaraj, R. K. “The AI-powered cyber threat: Global economic impact and strategic shifts in military doctrine”. Computers & Security (2025), 136, 103-125. https://doi.org/10.1016/j.cose.2024.103895
Guest, G., Bunce, A., & Johnson, L. “How many interviews are enough? An experiment with data saturation and variability”. Field Methods (2006), 18(1), 59-82. https://doi.org/10.1177/1525822X05279903
Hodgson, Q. E., Warren, K., Brosmer, J. L., Alhajjar, E., Fujiwara, J., Grossfeld, E., & López, E. III. “Enhancing space mission assurance to cyber threats for the U.S. Space Force”. RAND Corporation (2024).
Hodgson, Q., Langeland, K., & Posard, M. (2024). “Assuring space missions in the face of cyber threats: Bridging the military-commercial divide”. RAND Corporation (2024). https://doi.org/10.7249/RRA2748-1
Khan, S., Dawson, M., & Thompson, J. “Space cybersecurity challenges, mitigation techniques, anticipated readiness, and future directions”. International Journal of Critical Infrastructure Protection (2024), 42, 100-118. https://doi.org/10.1016/j.ijcip.2024.100218
Khan, S. “A conditions-based look at a cyber force”. Joint Force Quarterly (2025), 98, 45-52.
Khan, S. K., Shiwakoti, N., Diro, A., Molla, A., Gondal, & Warren, M. Space cybersecurity challenges, mitigation techniques, anticipated readiness, and future directions. International Journal of Critical Infrastructure Protection (2024), 46, 100-115. https://doi.org/10.1016/j.ijcip.2024.100345
Pangestu, R., & Almubaroq, M. “Aksiologi bela negara di era ancaman siber-spasial: Sebuah tinjauan filsafat pertahanan”. Jurnal Civic Hukum (2023), 8(2), 45-60.
Pramono, B. “Strategic adaptations for hybrid warfare: Enhancing Indonesian national defense in the digital era”. International Journal of Innovative Research and Scientific Studies (2025), 8(3), 120-135. https://doi.org/10.53894/ijirss.v8i3.4567
Pramono, B. “Adaptive strategies for hybrid warfare: Integrating AI and cyber in the Indonesian Army”. International Journal of Innovative Research and Scientific Studies (2025), 5(3), 89-105. https://doi.org/10.53894/ijirss.v5i3.3456
Rigoni, C. “Public-private partnerships in EU cyber defense: Securing military supply chains”. European Security Review (2025), 19(4), 201-220. https://doi.org/10.1080/09662839.2025.2012345
Schmitt, M. N. “Challenges for cyber arms control: A qualitative expert interview study”. Journal of Conflict & Security Law (2023), 28(2), 345-367. https://doi.org/10.1093/jcsl/krad012
Sisoyan, S. “The SolarWinds aftermath: Supply chain attacks and their escalatory impact on military operations”. Journal of Cybersecurity (2025), 11(1), 1-15. https://doi.org/10.1093/cybsec/tyad015
Sisoyan, A. “New cybersecurity challenges: Digital transformation and the political implications of their implementation”. Journal of Political Science: Bulletin of Yerevan University (2025), 1(1), 10-25. https://doi.org/10.46991/jps.2025.1.10
Tepper, E., Johnson, K., & Martinez, R. “The sixth warfighting domain?: Governing the space-cyber nexus”. Georgia Law Review (2024), 58(3), 789-825. https://doi.org/10.2139/ssrn.4567890
B. Book
Adi, S. (2023). Integrated space cell: Lessons learned from India's military space program. Penerbit Strategi Pertahanan. 2023.
Bazeley, P., & Jackson. Qualitative data analysis with NVivo. Sage Publications. 2013.
Bingen, K. Extending the battlespace to space. Dalam Space in focus: Key trends and challenges (hlm. 150-170). Center for Strategic and International Studies. 2025.
Braun, V., & Clarke, V. Thematic analysis: A practical guide. Sage Publications. 2021.
Creswell, J. W., & Poth, C. N. Qualitative inquiry and research design: Choosing among five approaches (4th ed.). Sage Publications. 2018.
CybelAngel. Aerospace & defense: Cyber threat landscape 2024-2025. CybelAngel Threat Intelligence Report. 2025.
CybelAngel. ASEAN cyber threat report 2025: The rise of non-state actors. CybelAngel Threat Intelligence. 2025.
Denzin, N. K. The research act: A theoretical introduction to sociological methods. Routledge. 2017.
Foundation for Defense of Democracies. (2025). Building the future U.S. cyber force. FDD Press. 2025.
Flick, U. An introduction to qualitative research (6th ed.). Sage Publications. 2018.
Guba, E. G., & Lincoln, Y. S. Competing paradigms in qualitative research. Dalam N. K. Denzin & Y. S. Lincoln (Ed.), Handbook of qualitative research (hlm. 105-117). Sage Publications. 1994.
Hoffman, F. G. (2007). Conflict in the 21st century: The rise of hybrid wars. Potomac Institute for Policy Studies. 2007.
Indrawan, J., & Widiyanto, W. Pemikiran potensial ancaman perang siber di Indonesia. Penerbit Universitas Pertahanan. 2022.
Kementerian Pertahanan Republik Indonesia. Kebijakan umum pertahanan negara 2020-2024. 2020.
Kementerian Pertahanan Republik Indonesia. Laporan insiden keamanan siber di Laut Natuna Utara. 2021.
Kementerian Pertahanan Republik Indonesia. Kajian pembentukan Komando Pertahanan Ruang Angkasa. 2023.
Kementerian Pertahanan Republik Indonesia. Laporan latihan bersama AUSBIND 2024. 2024.
Kementerian Pertahanan Republik Indonesia. Visi pertahanan Indonesia 2045. 2025.
Kvale, S., & Brinkmann, S. Interviews: Learning the craft of qualitative research interviewing (3rd ed.). Sage Publications. 2015.
Lemhannas. Doktrin pertahanan 5.0: Integrasi lintas medan pertahanan. Lemhannas Press. 2024.
Lincoln, Y. S., & Guba, E. G. Naturalistic inquiry. Sage Publications. 1985.
Moleong, L. J. Metodologi penelitian kualitatif. PT Remaja Rosdakarya. 2007.
Octavian, A. Deterrence in the digital age: A conceptual framework for Indonesia. Penerbit Madani. 2024.
Patton, M. Q. Qualitative research & evaluation methods: Integrating theory and practice (4th ed.). Sage Publications. 2015.
RAND Corporation. Enhancing space mission assurance to cyber threats. 2024.
Rigoni, A. Reinventing cyber defence: Why we need a new doctrine to defend our nations. RUSI Commentary. Royal United Services Institute. 2025.
Stake, R. E. The art of case study research. Sage Publications. 1995.
Swope, C., Bingen, K. A., Young, M., & LaFave, K. Space threat assessment 2025. Center for Strategic and International Studies. 2025.
Swope, T., Harrison, T., & Dalton, M. State of the space domain: Cybersecurity and counterspace threats. Center for Strategic and International Studies. 2025.
Tickner, J. A. Dalam International relations theory: Positivism and beyond (S. Smith, K. Booth, & M. Zalewski, Eds.). Cambridge University Press. 1995.
Yin, R. K. Case study research and applications: Design and methods (6th ed.). Sage Publications. 2018.
Moleong, L. J. Metodologi Penelitian Kualitatif. Jakarta: PT Remaja Rosdakarya. 2007.
Tickner, J. A. “Re-visioning Security”, in Ken Booth and Steve Smith. In International Relations Theory Today. Oxford. 1995.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Jurnal Pakuan Law review based on the provisions Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. / CC-BY-NC-SA 4.0 this license requires that you provide appropriate credit, provide a link to the license, and indicate if any changes have been made. You may do so in any reasonable way, but not in any way that would imply that the licensor endorses you or your use. this license shall not use the material for commercial purposes. this license permits Share Alike If you mix, modify, or build upon the material, you must distribute your contributions under the same license as the original. No additional restrictions. You may not apply legal provisions or technological measures that legally restrict others from doing anything the license permits.


.png alt=)
























