Claim Missing Document
Check
Articles

Analysis of Railway Track Type Selection on the Lahat-Lubuklinggau Line Nopriyanto, Windi; Asuti, Septiana Widi; Dewi, Puspita; Priyanto, Sapto
Jurnal Indonesia Sosial Teknologi Vol. 5 No. 10 (2024): Jurnal Indonesia Sosial Teknologi
Publisher : Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59141/jist.v5i10.6678

Abstract

Currently, the railway line from Lahat to Lubuklinggau uses the R.42 rail type with a crossing power capacity of 2,106 > 5,106 tons/year. An increase in road class is needed to increase crossing capacity. This research aims to determine the feasibility and impact of upgrading the rail type from R.42 to R.54 to improve the operational efficiency and safety of the Lahat-Lubuklinggau railway line. In this study, the author uses the railway loading method using the beam on the elastic foundation (BoEF) concept to calculate rail permit voltage to ensure that the capacity of the railroad can accommodate the load of railway traffic. The study results in show that with the upgrade of the railroad class to class III with the R.54 rail type, this line can transport a load of 5,924,001.60 tons/year, an increase from 1,838,390.40 tons/year. In addition, the track with the R.54 rail type also meets the requirements for trains with the largest load, considering that the allowable voltage (1,097.18 kg/cm²) is smaller than the previous rail allowable voltage (1,738.14 kg/cm²). It is estimated that the R.54 rail type has a life resistance of 16-17 years against crossing power without the Babaranjang train and for 9-10 years against crossing power with the Babaranjang train for the coming year.
Analisis Ring of Security pada Stasiun MRT X Permana, Aulya; Priyanto, Sapto
UNES Law Review Vol. 7 No. 1 (2024)
Publisher : Universitas Ekasakti

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31933/unesrev.v7i1.2209

Abstract

The security of public transportation infrastructure is a crucial aspect in maintaining the stability and continuity of urban society. Mass Rapid Transit (MRT) stations are potential targets for terrorism and other crimes. This study aims to analyze the security of X MRT Station based on the Ring of Security concept. This article, titled "Analysis of the Ring of Security at X MRT Station in Jakarta," uses a descriptive qualitative research method with data collection techniques including field observations and literature studies. The Ring of Security concept is used as an analytical framework to identify weaknesses and strengths in the station's security system. The results show that the station has several strengths, such as robust building design and extensive use of CCTV. However, there are also weaknesses, such as a lack of supervision in certain areas like restrooms and parking lots. Risk analysis and improvement recommendations are proposed to enhance the security of X MRT Station in Jakarta and protect the public from potential terrorism and other crimes. This research contributes to the understanding of public transportation security systems and the importance of implementing a holistic security concept in protecting critical urban infrastructure.
Analisis Implementasi Three Rings of Security Sebagai Upaya Pencegahan Aksi Terorisme dalam Sistem Pengamanan Bandara X Azzahra, Syafira; Priyanto, Sapto
UNES Law Review Vol. 7 No. 1 (2024)
Publisher : Universitas Ekasakti

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31933/unesrev.v7i1.2212

Abstract

Peristiwa 9/11 yang merupakan titik awal dari salah satu serangkaian serangan teroris yang mematikan di Amerika Serikat, di mana serangan pembajakan pesawat udara yang menyerang gedung World Trade Center (WTC) di New York oleh Al Qaeda pada tahun 2001. Adanya fenomena tersebut menyoroti bahwa kedaulatan udara berperan sangat penting dalam memastikan keamanan dari ancaman serangan terorisme yang melibatkan transportasi udara, karena dapat berakibat fatal jika terjadi kelalaian dalam menjaga wilayah udara kedaulatan negara. Bandara X merupakan salah satu bandara di Indonesia yang memiliki nilai strategis, karena didalamnya terdapat objek-objek vital. Jenis penelitian ini adalah kualitatif deskriptif dan data diperoleh dengan menggunakan teknik pengumpulan data studi kepustakaan dan observasi. Analisa yang dilakukan menggunakan kerangka konsep three rings of security yang terdiri dari tiga indikator, yaitu the outer ring, the middle ring, dan the inner ring. Hasil analisis dari penelitian ini menjelaskan bagaimana implementasi three rings of security yang sudah diberlakukan dalam menjaga keamanan bandara X untuk mencegah terjadinya aksi terorisme.
Strategic intelligence in preventing radicalism and terrorism: A study in Cilacap Costazolanitova, Briyan; Rofii, Muhammad Syaroni; Priyanto, Sapto
Interdisciplinary Social Studies Vol. 3 No. 1 (2023): October-December 2023 (Regular Issue)
Publisher : International Journal Labs

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55324/iss.v3i1.566

Abstract

This research discusses how the Cilacap Polresta's strategic intelligence in dealing with conditions where there is a Nusakambangan Prison where terrorism convicts are detained. there are prisoners of terrorism convicts and families and organizations affiliated with terrorism in the jurisdiction of the Cilacap Polresta. Based on the background, there are 2 main problems that underlie this title namely 1) What is the pattern of the spread of radicalism in Cilacap? 2) What is the Cilacap Police intelligence strategy in preventing radicalism? The theory that underlies the research is the theory of strategic intelligence and national resilience. Strategic intelligence in law enforcement agencies, is carried out as planning without considering and studying the crime problems faced by the agency and without adequate operational input, while national resilience is a dynamic aspect of a nation that includes all aspects of national life to remain victorious in the midst of regularity and change that always exists. The research method design used to analyze this research is descriptive qualitative, the data collection techniques used are interviews and literature studies. Then where the data collected is then analyzed with theories related to strategic intelligence and national resilience. The results of this study are expected to be one source of information about the pattern of the spread of radicalism, as well as understanding the mechanism of intelligence strategy in preventing radicalism in society.
PROGRAM DERADIKALISASI DI INDONESIA: PROSES REINTEGRASI MASYARAKAT Benhard Pattiwaellapia, Alfredo; Priyanto, Sapto; Syauqillah, Muhamad
NUSANTARA : Jurnal Ilmu Pengetahuan Sosial Vol 10, No 4 (2023): NUSANTARA : JURNAL ILMU PENGETAHUAN SOSIAL
Publisher : Universitas Muhammadiyah Tapanuli Selatan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31604/jips.v10i4.2023.2074-2083

Abstract

Studi ini berpendapat bahwa ancaman radikalisasi di Indonesia semakin meluas. Oleh karena itu Pemerintah harus melaksanakan program deradikalisasi dengan tahapan reintegrasi untuk mencegah penyebaran radikalisme semakin meluas di Indonesia. Penelitian ini dilakukan menggunakan metode kualitatif dengan pendekatan kepustakaan yang berfokus pada teori radikalisasi, deradikalisasi dan reintegrasi. Penelitian ini menemukan hasil bahwa: pemerintah Indonesia telah menjalankan program deradikalisasi melalui BNPT untuk mencegah penyebaran radikalisasi, Adapun strategi yang dilakukan Pemerintah dengan menjalankan program deradikalisasi dengan tahapan reintegrasi. Namun dalam menjalankan program ini masih menemukan beberapa permasalahan. Sehingga dapat disimpulkan bahwa program deradikalisasi yang di jalankan Pemerintah saat ini belum secara menyeluruh mengatasi akar permasalahan, adapun model deradikalisasi yang diterapkan mencakup reintegrasi seperti upaya dalam counter terorisme, pencegahan radikalisme, perbandingan pemahaman agama, menghindari provokasi kebencian dan permusuhan atas nama agama, mencegah indoktrinasi masyarakat, serta partisipasi masyarakat dalam menolak terorisme.
IMPLEMENTASI KONSEP KEAMANAN NASIONAL DALAM UPAYA MENGHADAPI ANCAMAN SIBER DI INDONESIA Febi Cahya Manafe, Christo; Priyanto, Sapto; Subandi, Imam
NUSANTARA : Jurnal Ilmu Pengetahuan Sosial Vol 10, No 4 (2023): NUSANTARA : JURNAL ILMU PENGETAHUAN SOSIAL
Publisher : Universitas Muhammadiyah Tapanuli Selatan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31604/jips.v10i4.2023.2063-2073

Abstract

Studi ini berargumen jika keamanan nasional adalah salah satu aspek terpenting dalam menjaga kemanan negara. Tidak hanya keamanan secara militer, Pemerintah juga perlu memperhatikan keamanan dari ruang siber. Oleh karena itu Pemerintah harus mengimplementasikan konsep keamanan nasional baik untuk ruang lingkup militer ataupun ruang siber. Penelitian ini dilakukan menggunakan metode kualitatif dengan pendekatan kepustakaan yang berfokus pada teori keamanan nasional dan ancaman siber. Penelitian ini menemukan hasil bahwa: Pemerintah Indonesia saat ini sudah berusaha untuk menjaga keamanan nasional baik dari sisi militer ataupun siber. Namun dalam implementasinya, saat ini belum ada regulasi khusus yang mengatur mengenai keamanan nasional. Sehingga dapat disimpulkan bahwa Pemerintah saat ini sudah menjalankan beberapa strategi untuk menjaga keamanan nasional baik dari bidang militer ataupun bidang siber, akan tetapi perlu adanya regulasi khusus terkait keamanan nasional untuk semakin memperkuat strategi yang disiapkan.
Interception at a Crossroads: Juridical and Strategic Perspectives on Wiretapping in Indonesia’s Counter-Terrorism Framework in the Digital Era Artya, Ade; Priyanto, Sapto; Subandi, Imam
Journal of Law, Politic and Humanities Vol. 6 No. 1 (2025): (JLPH) Journal of Law, Politic and Humanities
Publisher : Dinasti Research

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.38035/jlph.v6i1.2537

Abstract

This research investigates the critical crossroads in Indonesia's counter-terrorism strategy, where success in suppressing terrorist attacks coincides with the expansion of a dual surveillance apparatus in the digital era. Employing a qualitative approach with juridical normative analysis and the Actor-Network Theory (ANT) framework, this study examines the strategic and legal dimensions of wiretapping. Findings indicate that the formal legal framework, particularly Law No. 5 of 2018, provides a basis for effective proactive interception but contains ambiguities that grant broad discretionary power. Crucially, the research uncovers a parallel, unregulated surveillance regime involving invasive spyware procurement and extra legal agreements that bypass judicial oversight, thereby threatening civil liberties. The study concludes that this duality creates a security paradox, where tactical success masks systemic risks to the rule of law. Comprehensive legislative reform is imperative to establish a singular, proportional, transparent, and accountable framework.
Interception at a Crossroads: Juridical and Strategic Perspectives on Wiretapping in Indonesia’s Counter-Terrorism Framework in the Digital Era Artya, Ade; Priyanto, Sapto; Subandi, Imam
Journal of Law, Politic and Humanities Vol. 6 No. 1 (2025): (JLPH) Journal of Law, Politic and Humanities
Publisher : Dinasti Research

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.38035/jlph.v6i1.2537

Abstract

This research investigates the critical crossroads in Indonesia's counter-terrorism strategy, where success in suppressing terrorist attacks coincides with the expansion of a dual surveillance apparatus in the digital era. Employing a qualitative approach with juridical normative analysis and the Actor-Network Theory (ANT) framework, this study examines the strategic and legal dimensions of wiretapping. Findings indicate that the formal legal framework, particularly Law No. 5 of 2018, provides a basis for effective proactive interception but contains ambiguities that grant broad discretionary power. Crucially, the research uncovers a parallel, unregulated surveillance regime involving invasive spyware procurement and extra legal agreements that bypass judicial oversight, thereby threatening civil liberties. The study concludes that this duality creates a security paradox, where tactical success masks systemic risks to the rule of law. Comprehensive legislative reform is imperative to establish a singular, proportional, transparent, and accountable framework.