AI, Geopolitics, and Cyber Threats: Challenges to Indonesia’s Digital Sovereignty in the Era of Global Technology Competition

AI, Geopolitics, and Cyber Threats: Challenges to Indonesia’s Digital Sovereignty in the Era of Global Technology Competition

At the International Postgraduate Student Conference (IPGSC) organized by the Graduate Program in International Relations, Universitas Indonesia, on October 23-24, 2025, Raden Wijaya Kusumawardhana—Expert Staff to the Minister of Communication and Digital Affairs for Social, Economic, and Cultural Affairs—representing the Minister of Communication and Digital Affairs, delivered a keynote address on the dynamics of artificial intelligence (AI), geopolitics, and cyber threats in the digital era.

Raden Wijaya emphasized that the world is now entering a phase where data and algorithms have become strategic commodities, and digital technology functions as the infrastructure of global power. AI not only impacts economic and social innovation but also plays a role in shaping and competing for global power.

AI and the Shift in Global Technology Power

In his address, Raden Wijaya highlighted how the emergence of DeepSeek from China has disrupted the dominance of Western AI companies. With an investment of only 6.5 million USD, this technology caused the global AI market valuation to drop from approximately 1 billion USD to 969 million USD, demonstrating how rapidly and competitively the global technology ecosystem is evolving.

He also underscored that conflicts such as Iran-Israel and the Russia-Ukraine war have shown a surge in AI use in defense operations, intelligence analysis, and autonomous weaponry. Factors such as AI’s dual-use nature, its connection to the microchip industry, the ability of states possessing superior AI to shape international standards, and the risks of technological dependency have become key reasons why AI is now a highly determinative geopolitical issue.

Emphasis on Cyber Threats: Threat Characteristics and Dual-Use Nuances

Raden Wijaya emphasized that cyber threats in the digital era possess increasingly complex characteristics, are borderless, and have a dual-use nature. Technology initially developed for civilian purposes can now be repurposed for offensive operations by both state and non-state actors.

First, cyber threats are dual-use in nature. Digital infrastructure, software, AI algorithms, and cloud computing technology designed to enhance civilian sector efficiency can easily be exploited for network penetration, sabotage, or intelligence operations. States utilize these capabilities in strategic competition, while non-state actors such as cybercriminals, hacktivist groups, and armed organizations can leverage them for data manipulation, hacking, or attacks on public services.

Second, the character of cyber threats is asymmetric. States with high capabilities can launch precision attacks on other countries’ critical infrastructure. However, at the same time, small groups with limited resources can even cause significant damage through malware, botnets, or zero-day vulnerability exploitation. This makes cyberspace an open operational field for both large and small actors.

Third, cyber threats are characterized by ambiguity and attribution difficulties. Attacks are often conducted through proxies—whether criminal groups, technology consultants, or independent actors—making it difficult to definitively identify the attacking state. AI technology exacerbates this complexity by accelerating attack automation, producing manipulative content at scale, and helping to discover system vulnerabilities with high precision.

Fourth, cyber threats are very often linked to information operations. Generative AI can produce disinformation and digital propaganda used by both states and non-state actors to influence public opinion, disrupt domestic stability, or delegitimize public institutions.

Through these points, he emphasized that cyber threats are not merely technical issues but strategic threats that challenge digital sovereignty, national security, and political stability. Indonesia must strengthen national cyber resilience, build deterrence mechanisms, and develop a digital talent ecosystem to ensure control over technology that is increasingly integrated into daily life.

Indonesia and Digital Sovereignty in the Era of AI Competition

Raden Wijaya affirmed that Indonesia needs to develop a digital strategy focused not only on innovation but also on security. Investment in digital talent development, AI research, microprocessor infrastructure, and protection of critical infrastructure forms the foundation for Indonesia’s digital sovereignty amid global competition.

In closing his keynote address at IPGSC, he emphasized that the future will not only be determined by who possesses the most advanced technology, but by who is capable of securing, managing, and defending that technology as part of national interests.

Borderless Cyberspace and Its Implications for International Security: Indonesia’s Perspective

Borderless Cyberspace and Its Implications for International Security: Indonesia’s Perspective

In his keynote address at the International Postgraduate Student Conference (IPGSC), an international conference for postgraduate students in International Relations held at Universitas Indonesia on October 23-24, 2025, Dr. Sulistyo, Deputy for Cyber Security and Government and Human Development Codes at the National Cyber and Crypto Agency (BSSN), emphasized that cyberspace represents a unique strategic domain characterized by its borderless nature—transcending geographical boundaries, lacking singular jurisdiction, and operating without a single governing authority. This condition fundamentally distinguishes cyberspace from physical domains such as land, sea, and air.

According to Sulistyo, this borderless character makes cyberspace not merely a digital infrastructure, but an arena with significant consequences for international stability and security.“Cyberspace penetrates national borders and blurs traditional concepts of sovereignty. Threats can emerge from anywhere, be perpetrated by anyone, and impact anyone,” he stated.

Borderless Cyberspace and Challenges to State Sovereignty

Within the framework of international security, the transboundary nature of cyberspace presents serious challenges. Cyberattacks on critical infrastructure, misinformation, and data manipulation can cross national borders within seconds. This complicates attribution, law enforcement, and collective responses. The absence of geographical boundaries creates new challenges for states: how to defend sovereignty in a domain that lacks physical territory? How to enforce rules in a domain where the primary actors are not always states? This borderless character also creates opportunities for non-state actors—ranging from criminal hackers to state-sponsored groups—to execute cross-border operations without physically breaching territorial boundaries.

Sulistyo also emphasized that borderless cyberspace has transformed how states perceive security threats. Cyber conflicts can occur without declarations of war, military mobilization, or violations of conventional territorial boundaries—yet remain capable of crippling economies, influencing domestic politics, and disrupting regional stability. In the context of great power rivalry, cyberspace has become a new arena for strategic competition. Control over digital technology, AI, quantum computing, and next-generation telecommunications has now become an instrument of state power, deepening the geopolitical dimension of the cyber domain.

Indonesia’s Response: Diplomacy, Multilateral Cooperation, and Strengthening Cyber Resilience

Facing the challenges of borderless cyberspace, Indonesia is strengthening its cyber diplomacy based on the principles of its independent and active foreign policy. Indonesia strives to ensure that global cyberspace governance remains inclusive and is not co-opted by geopolitical competition that disadvantages developing countries. Through forums such as ASEAN, the UN, and various other international cooperation regimes, Indonesia promotes: the establishment of norms for state behavior in cyberspace, confidence-building measures, enhanced cooperation in handling cross-border incidents, and strengthening regional capacity to address cyber threats.

Sulistyo emphasized that in a boundaryless domain like cyberspace, national resilience heavily depends on a state’s ability to build adaptive, responsive, and sustainable systems. He identified three strategic agendas. First, strengthening national cyber security capacity, including modernizing cyber defense architecture. Second, intensive international collaboration, as no country can secure cyberspace independently. And third, developing competent cyber human resources capable of operating in the global digital ecosystem.

“Cyber security is international security. In a space that knows no borders, the security of one country is deeply connected to the security of others,” he concluded.

Accessibility