Claim Missing Document
Check
Articles

Found 2 Documents
Search

Counterterrorism prevention concept to support government policy in Indonesia Bimantara, Angga; Supriyadi, Asep Adang
Green Governance: Exploring Politics, Social Justice, and the Environment Vol. 1 No. 2: (August) 2024
Publisher : Institute for Advanced Science, Social, and Sustainable Future

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Background: Counter-terrorism strategies in Indonesia have evolved in response to the dynamic nature of global and domestic security threats. The Indonesian government has implemented a multifaceted approach, combining intelligence strengthening, law enforcement, deradicalization, socio-economic empowerment, and media and technology management. These efforts are critical to preventing the spread of radical ideologies and terrorist attacks. However, challenges such as human rights violations and coordination gaps remain, necessitating further examination of these strategies. Methods: This essay employs a literature review method with a qualitative descriptive approach. Data were collected from various secondary sources, including academic journals, government reports, books, and media articles. Relevant literature was sourced through keyword searches in academic databases. Thematic analysis was conducted to identify key themes related to Indonesia's counter-terrorism strategies, particularly in intelligence, law enforcement, deradicalization, and technology management. Findings: The analysis revealed that Indonesia’s counter-terrorism efforts are effective in certain areas, particularly intelligence collaboration between agencies like BIN, Polri, BNPT, and Densus 88. However, human rights concerns persist, particularly regarding the use of surveillance technologies and law enforcement practices. Deradicalization programs that integrate religious moderation and socio-economic empowerment show promise in reintegrating former terrorists into society. Additionally, big data and AI play an increasingly critical role in detecting online extremist content, though balancing privacy and security remains a challenge. Conclusion: Indonesia's counter-terrorism strategy demonstrates a comprehensive approach that addresses both immediate security concerns and long-term prevention of radicalization. While successful in many aspects, further improvements are needed to address human rights issues, enhance inter-agency coordination, and optimize the use of technology. A balanced approach that respects civil liberties while ensuring national security is essential for sustained success. Novelty/Originality of This Study: This study provides a detailed analysis of Indonesia's counter-terrorism strategies through a comprehensive literature review, highlighting the interplay between intelligence, law enforcement, social reintegration, and technology. It also emphasizes the importance of transparency and human rights in counter-terrorism efforts, which have received limited attention in previous studies.
Assessing the Threat of Indonesian ISIS Returnees: An Analysis of Ideological Mindsets and Operational Capabilities Bimantara, Angga
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 4 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i4.77

Abstract

The return of Indonesian citizens formerly associated with the Islamic State of Iraq and Syria (ISIS) as Foreign Terrorist Fighters (FTF) presents a complex challenge to national security. This research analyzes the threat posed by these returnees by focusing on their ideological radicalization and operational capacity. This study utilizes a qualitative methodology, drawing data from semi-structured interviews with returnees, counter-terrorism practitioners from BNPT, Densus 88, and BIN, and academic experts. The analysis is framed by two specific theories: Randy Borum’s "The Terrorist Mindset" to assess the stages of ideological development, and Kevin Riehle’s threat formula (Threat = Intent x Capability x Opportunity) to evaluate operational risk. The findings reveal a significant polarization in threat profiles. First, the "Combatant Profile" (including combat veterans and frustrated travelers) possesses high operational capabilities and knowledge and maintains latent ideological intent, driven by eschatological beliefs and network connections, posing a high-level, active threat. Second, the "Non-Combatant Profile" (including "civil society" members and dependents) demonstrates a near-total erosion of intent, driven by profound disillusionment with the reality of ISIS and traumatic experiences. While their ideological threat is low, they face significant socio-economic vulnerabilities. The study concludes that the threat from ISIS returnees is not monolithic and requires a bifurcated security response: prioritizing disengagement and surveillance for the high-risk combatant profile, while focusing on socio-economic integration for the low-risk, non-combatant profile to mitigate vulnerabilities.