cover
Contact Name
Syaiful Rohman
Contact Email
syaiful.rohman71@alumni.ui.ac.id
Phone
+6287750795292
Journal Mail Official
jts.sksg@ui.ac.id
Editorial Address
Gedung Sekolah Kajian Stratejik dan Global, Universitas Indonesia (Salemba, Jakarta) Jl. Salemba Raya No. 4 Jakarta 10430 Telp : 021 – 3900538, 021 – 3929717, 021 – 3924710, 021 – 3100059
Location
Kota depok,
Jawa barat
INDONESIA
Journal of Terrorism Studies
Published by Universitas Indonesia
ISSN : 26569965     EISSN : 27221512     DOI : https://doi.org/10.7454/jts
Core Subject :
As a form of contribution of Terrorism Studies, Strategic and Global Studies Universitas Indonesia to the development of science, Journal of Terrorism Studies (JTS) "focuses on topics relating to radicalism and terrorism both in the review of Islamic, economic and political studies in dealing with terrorist issues in Indonesia and the World. Research in the JTS journal as a form and effort in intellectual transformation, at the same time provides an opportunity for researchers who are concerned in scientific studies in the field of Radicalism and Terrorism to express ideas supported by deepening of material and data. The Editorial Team hopes that the JTS journal can be a means of contributing to the development of science and providing an overview of the problems, handling and steps that must be taken to prevent and reduce radicalism and terrorism. Hopefully the presence of JTS can be beneficial for the life of the nation and state going forward.
Arjuna Subject : -
Articles 7 Documents
Search results for , issue "Vol. 6, No. 2" : 7 Documents clear
ADDRESSING THE GAP: A NEED FOR A GENDER-BASED APPROACH IN INDONESIA’S DERADICALIZATION PROGRAM Mutiara, Raneeta
Journal of Terrorism Studies Vol. 6, No. 2
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

An effective deradicalisation program is the key to combating violent extremism and reducing potential harm to society from radical ideologies. A gender-based approach to tackling violent extremism among women has received esteemed recognition from the governments of many countries. Various international organizations and scholarly institutes have also approved the advantages of this method. This work aims to find and address the gap in the current deradicalization program in Indonesia for future development in both academic and practical areas of this subject matter. An integrative literature review is used as a method that involves synthesizing previous research and integrating empirical findings and perspectives to uncover areas where more research is needed. Through a substantial amount of literature considered in this work, Indonesia’s deradicalization program is discovered to lack a gender perspective. The ingrained patriarchy and male-centric attitude are identified as the primary reasons behind its unpopularity. Evidence from various case studies has been provided to justify the gap and the need to integrate a gender-based approach into the deradicalization program in Indonesia. Recommendations include recruiting more female deradicalization experts, providing specialized training to female prison officers to counter violent ideology, and tightening collaboration with women-based civil society organizations.
UNRAVELING THE CONFLICT-RIDDEN WEAVE: THE REGIONAL SECURITY OF THE SAHEL REGION AMIDST WAGNER GROUP’S PRESENCE Ramadhany, Ghifarie Aulia; Salahuddin Hakim, Mohammad Apridio; Manullang, Abel Josafat
Journal of Terrorism Studies Vol. 6, No. 2
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mercenaries or guns for hire have been a considerable force to reckon with in the international system. Their involvement in the conflicts of all scales have their share of contribution to the eventual outcome of the conflict. Such is the case of the Wagner Group. As a non-state actor, the Wagner Group has engendered numerous tempests across the world, one of them is the Sahel region. Their presence in the Sahel region has been a focal point of disputes within the international community. Against that backdrop, the paper seeks to shed light on how the regional security complex of the Sahel region has been severely affected by non-state actors like the Wagner group. In carrying out the research undertaking, the writers employ the qualitative research method that entails the use of secondary data alike along with the regional security complex as the guiding theoretical framework. This paper lodges how the Sahel region regional security dynamic has been subjected to changes as a result of the Wagner group’s pursuit of their own set of interests. However, it is important how the leeway for them to do so was made available by the states who reside in the region.
FALL OF MOSUL TO ISIS: JOSTLE OF NARRATIVES BETWEEN CONSPIRACY THEORY AND BETRAYAL Al Hashimi, Hamied; Alzghwabi, Moh Arak
Journal of Terrorism Studies Vol. 6, No. 2
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This article examines the rise and conflict of narratives about the fall of the Iraqi city of Mosul to the Islamic State (ISIS), which marks its tenth anniversary this year (2024). ISIS occupied parts of Iraq from 2014 to 2017, and its defeat required Iraqi mobilization and international support from the international coalition. This article attempts to trace the narratives and their conflicts about the main cause of Mosul’s fall to ISIS. The fall of Mosul was like a snowball that rolled and grew, as it spread to a large area of Northwestern Iraq. It has been shown that several factors combined to cause the fall of Mosul, not a single cause. In addition, accusations still exist between the political parties responsible for Mosul's security and administration.
TERRORIST FINANCING IN THE DIGITAL AGE: AN ANALYSIS OF CRYPTO CURRENCIES AND ONLINE CROWD FUNDING Ogele, Eziho Promise
Journal of Terrorism Studies Vol. 6, No. 2
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study examines the potential risks of emerging payment technologies and value transfer systems in facilitating terrorist activities. Through an analysis of publications, blogs, and websites associated with terrorist groups and their supporters, the research reveals a growing interest in leveraging cryptocurrencies like Bitcoin and online crowdfunding platform to support funding, planning, and implementation of terror attacks. While concrete evidence of large-scale cryptocurrency use by terrorist groups is limited, there are indications of links to several terror attacks globally. This study demonstrates the potential for cryptocurrencies to facilitate clandestine activities, utilizing a document published by ISIS that outlines instructions undetected. By analyzing this document, researchers highlighted the potential risks associated with the anonymous and decentralized nature of cryptocurrency transactions. The study adopted actor-network theory as its theoretical underpinning. The findings suggest that terrorist organizations are actively exploring new technologies to mitigate risks associated with traditional fund transfer methods, with some websites collecting donations in Bitcoin. The study recommends amongst others that the Law enforcement agencies must enhance their capabilities to track cryptocurrency transactions, which include training investigators in illicit finance investigations involving cryptocurrencies, recruiting experts in the field, and acquiring advanced IT systems despite the challenges.
IMPACTS OF TERRORISM IN EDUCATION SECTOR DUE TO INTERNAL DISPLACEMENT: CASE STUDY CABO DELGADO- MOZAMBIQUE FROM 2017 TO 2022 Joaquim, Isaque
Journal of Terrorism Studies Vol. 6, No. 2
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The study aims to analyze the impacts of internal displacement in the education sector due to terrorist conflict ongoing in the northern region of Mozambique (Cabo Delgado). The internally displaced people (IDPs) in Mozambique establish themselves within the country. They abdicate their normal life and adapt themselves to the means of subsistence, and most of the time with little support from the government which does not ensure a dignified life in basic needs: education, health, and protection. This situation has been happening in the northern province of Mozambique, where access to education is deficient, mainly in rural areas. Thus, the increasing number of internal displacements puts more pressure in the access to education services. The study is only focusing in Cabo Delgado, where since 2017 people are experiencing terrorist attacks and armed conflicts resulting on an increasing number of IDPs being hosted in different provinces. The study used the technique of data collection and the analysis model aligned with the study’s purpose. This method consisted of literature review and evaluation, combined with the analysis of secondary data from different sources. The results showed that most of the IDPs are not officially registered and hosted in an officially established center of accommodation, it was difficult to know with exactitude more about other IDPs facing different challenges. This paper will help the society to know what is really happening to the education sector in Cabo Delgado, so that policy can be put in place to mitigate the risks in this sector.
AI: A NEW LONE-WOLF TERRORISM IN THE DIGITAL ERA (PRELIMINARY ANALYSIS) Anakotta, Marthsian Yeksi, MYA
Journal of Terrorism Studies Vol. 6, No. 2
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This article addresses two fundamental inquiries: can AI engage in acts of terrorism? If so, how might such a phenomenon occur? My hypothesis posits that AI is capable of independently committing acts of terrorism, a classification derived from the study of terrorism known as lone-wolf terrorism. To address these dual issues, this article adopts a criminological approach, which is further elaborated through an examination of lone-wolf terrorism and the advancement of artificial intelligence. As is widely recognized, contemporary terrorist organizations have harnessed technological advancements in the realm of information and communication to perpetrate acts of terrorism within the digital sphere. Within the realm of terrorism studies, such activities are categorized as cyber-terrorism, while criminological investigations refer to them as cybercrime. Nonetheless, these forms of criminality are generally carried out by individuals and/or groups (users) who manipulate information and communication systems. Through these channels, content laden with radical-terrorism ideologies is disseminated via social media platforms to facilitate online radicalization and propagate terror campaigns. Ultimately, both endeavors share the objective of recruiting new members who will be assigned tasks or sympathizers who may willingly commit acts of terrorism, whether in the online or offline domains. Drawing upon routine activity theory, the presence and evolution of AI could introduce a novel actor into the sphere of cyber-terrorism, one executed by AI itself. As postulated by routine activity theory, criminal incidents transpire when three elements converge: a motivated offender, a suitable target, and a lack of capable guardianship. While AI possesses cognitive and learning abilities, albeit not yet at the level of human cognition, in the context of cyber-terrorism, the convergence of AI with the elements of a motivated offender, suitable target, and lack of capable guardianship could position it as a novel actor.
EXPLORING THE USE OF MUSIC IN DERADICALIZATION Agustanto, Pulung; Simon Runturambi, Arthur Josias; ., Puspitasari
Journal of Terrorism Studies Vol. 6, No. 2
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study seeks to explore music as an alternative method to enrich the variety of deradicalization programs in the framework of counterterrorism. The use of ethnic and local culture-based music is not only intended to prevent radicalism but also as an instrument of recovery therapy for terrorism prisoners in correctional institutions (Lapas). The offer of the programmatic agenda departs from the assumption that deradicalization so far still lacks a cultural approach. Moreover, the archipelago has a variety of music from various ethnicities, for example Javanese music, Sundanese music, Balinese music, Ambon music, and others that are rich in spiritual and even religious values. The lack of understanding of radical groups trapped in the flow of ideology and transnational movements must be returned to their local civilization. The tones, lyrics, metaphors and rhythms of Javanese music, for example, are interesting to study in a socio-psychological framework that can be utilized in deradicalization programs. Appropriate music therapy for the Terrorist Convict should be considered in the deradicalization program. In this context, Javanese traditional music is a hypothesis that should be experimented in correctional facilities for terrorists.

Page 1 of 1 | Total Record : 7