Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Security Intelligence Terrorism Journal (SITJ)

The Deradicalization Paradox: When Former Terrorists Become Perpetrators of Economic Crimes Sofyan, Muhammad; Priyanto, Sapto
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 2 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i2.52

Abstract

This study investigates the paradoxical emergence of "zero terrorist attacks" in Indonesia from 2023 to mid-2024, alongside the growing involvement of former terrorism convicts (ex-napiter) in illicit economic activities. While Indonesia’s counter-terrorism strategy has been hailed as successful in preventing violent extremism, reports indicate that numerous ex-napiter are actively engaged in illegal enterprises such as subsidized fuel smuggling, unauthorized mining, and unlicensed vehicle leasing. Utilizing a qualitative descriptive approach and drawing upon Abraham Maslow’s hierarchy of needs theory, this research explores the motivations driving these individuals from ideological militancy to economic criminality. Data were collected through document analysis and field interviews conducted in April 2025 across multiple regions. The findings reveal that unmet economic and psychosocial needs, particularly related to esteem and security, have led many former convicts to seek recognition and income through informal and illegal means. These developments raise critical concerns about the effectiveness of reintegration programs that prioritize ideological transformation over sustainable economic support. The article concludes by recommending an integrated reintegration model grounded in the fulfillment of human needs, community engagement, and localized governance reform. This framework aims to reduce recidivism, prevent radical resurgence, and ensure a lasting peace beyond the absence of physical violence.
Funding Modes of Terrorist Groups in the Digital Age: Challenges and Solutions Based on Information Technology Sofyan, Muhammad; Prindani, Tubagus Ami
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 3 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i3.66

Abstract

The digital era has changed the landscape of terrorism financing, where information technology such as blockchain, crypto assets, and digital platforms are strategically used to disguise cash flows and evade authority surveillance. This study aims to identify and analyse the modus operandi of terrorist group funding in the digital age and formulate information technology-based solutions to address it. The approach used is qualitative, employing a literature review method, integrating Crime Script Analysis (CSA) theory to map the stages of crime and Rational Choice Theory (RCT) to understand the rational motives of perpetrators in choosing digital means. The research findings indicate that funding methods include using cryptocurrency through illegal exchanges, exploiting nominee accounts, misusing digital charitable institutions, and cross-border peer-to-peer money transfer systems. Blockchain provides high anonymity and cross-border flexibility, which are exploited to obscure transaction traces. The main challenges identified include regulatory limitations, a lack of interoperability in financial surveillance systems, and law enforcement agencies' low capacity to address high-tech crimes. As a response, this study proposes five technology-based solutions: Cyber Crime Big Data Analytics, the use of Artificial Intelligence (AI) in Open Source Intelligence (OSINT), the establishment of an integrated Command Centre, the enhancement of Data Surveillance systems, and the strengthening of national Data Centres. These solutions are believed to enhance the effectiveness of real-time prevention and detection of digital terrorism financing. This study recommends cross-sector collaboration and strategic investment in information technology development as the key to mitigating the threat of digital terrorism financing in the future.