cover
Contact Name
Syaiful Rohman
Contact Email
syaiful.rohman71@alumni.ui.ac.id
Phone
+6287750795292
Journal Mail Official
jts.sksg@ui.ac.id
Editorial Address
Gedung Sekolah Kajian Stratejik dan Global, Universitas Indonesia (Salemba, Jakarta) Jl. Salemba Raya No. 4 Jakarta 10430 Telp : 021 – 3900538, 021 – 3929717, 021 – 3924710, 021 – 3100059
Location
Kota depok,
Jawa barat
INDONESIA
Journal of Terrorism Studies
Published by Universitas Indonesia
ISSN : 26569965     EISSN : 27221512     DOI : https://doi.org/10.7454/jts
Core Subject :
As a form of contribution of Terrorism Studies, Strategic and Global Studies Universitas Indonesia to the development of science, Journal of Terrorism Studies (JTS) "focuses on topics relating to radicalism and terrorism both in the review of Islamic, economic and political studies in dealing with terrorist issues in Indonesia and the World. Research in the JTS journal as a form and effort in intellectual transformation, at the same time provides an opportunity for researchers who are concerned in scientific studies in the field of Radicalism and Terrorism to express ideas supported by deepening of material and data. The Editorial Team hopes that the JTS journal can be a means of contributing to the development of science and providing an overview of the problems, handling and steps that must be taken to prevent and reduce radicalism and terrorism. Hopefully the presence of JTS can be beneficial for the life of the nation and state going forward.
Arjuna Subject : -
Articles 91 Documents
TERRORIST FINANCING IN THE DIGITAL AGE: AN ANALYSIS OF CRYPTO CURRENCIES AND ONLINE CROWD FUNDING Ogele, Eziho Promise
Journal of Terrorism Studies Vol. 6, No. 2
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study examines the potential risks of emerging payment technologies and value transfer systems in facilitating terrorist activities. Through an analysis of publications, blogs, and websites associated with terrorist groups and their supporters, the research reveals a growing interest in leveraging cryptocurrencies like Bitcoin and online crowdfunding platform to support funding, planning, and implementation of terror attacks. While concrete evidence of large-scale cryptocurrency use by terrorist groups is limited, there are indications of links to several terror attacks globally. This study demonstrates the potential for cryptocurrencies to facilitate clandestine activities, utilizing a document published by ISIS that outlines instructions undetected. By analyzing this document, researchers highlighted the potential risks associated with the anonymous and decentralized nature of cryptocurrency transactions. The study adopted actor-network theory as its theoretical underpinning. The findings suggest that terrorist organizations are actively exploring new technologies to mitigate risks associated with traditional fund transfer methods, with some websites collecting donations in Bitcoin. The study recommends amongst others that the Law enforcement agencies must enhance their capabilities to track cryptocurrency transactions, which include training investigators in illicit finance investigations involving cryptocurrencies, recruiting experts in the field, and acquiring advanced IT systems despite the challenges.
IMPACTS OF TERRORISM IN EDUCATION SECTOR DUE TO INTERNAL DISPLACEMENT: CASE STUDY CABO DELGADO- MOZAMBIQUE FROM 2017 TO 2022 Joaquim, Isaque
Journal of Terrorism Studies Vol. 6, No. 2
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The study aims to analyze the impacts of internal displacement in the education sector due to terrorist conflict ongoing in the northern region of Mozambique (Cabo Delgado). The internally displaced people (IDPs) in Mozambique establish themselves within the country. They abdicate their normal life and adapt themselves to the means of subsistence, and most of the time with little support from the government which does not ensure a dignified life in basic needs: education, health, and protection. This situation has been happening in the northern province of Mozambique, where access to education is deficient, mainly in rural areas. Thus, the increasing number of internal displacements puts more pressure in the access to education services. The study is only focusing in Cabo Delgado, where since 2017 people are experiencing terrorist attacks and armed conflicts resulting on an increasing number of IDPs being hosted in different provinces. The study used the technique of data collection and the analysis model aligned with the study’s purpose. This method consisted of literature review and evaluation, combined with the analysis of secondary data from different sources. The results showed that most of the IDPs are not officially registered and hosted in an officially established center of accommodation, it was difficult to know with exactitude more about other IDPs facing different challenges. This paper will help the society to know what is really happening to the education sector in Cabo Delgado, so that policy can be put in place to mitigate the risks in this sector.
AI: A NEW LONE-WOLF TERRORISM IN THE DIGITAL ERA (PRELIMINARY ANALYSIS) Anakotta, Marthsian Yeksi, MYA
Journal of Terrorism Studies Vol. 6, No. 2
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This article addresses two fundamental inquiries: can AI engage in acts of terrorism? If so, how might such a phenomenon occur? My hypothesis posits that AI is capable of independently committing acts of terrorism, a classification derived from the study of terrorism known as lone-wolf terrorism. To address these dual issues, this article adopts a criminological approach, which is further elaborated through an examination of lone-wolf terrorism and the advancement of artificial intelligence. As is widely recognized, contemporary terrorist organizations have harnessed technological advancements in the realm of information and communication to perpetrate acts of terrorism within the digital sphere. Within the realm of terrorism studies, such activities are categorized as cyber-terrorism, while criminological investigations refer to them as cybercrime. Nonetheless, these forms of criminality are generally carried out by individuals and/or groups (users) who manipulate information and communication systems. Through these channels, content laden with radical-terrorism ideologies is disseminated via social media platforms to facilitate online radicalization and propagate terror campaigns. Ultimately, both endeavors share the objective of recruiting new members who will be assigned tasks or sympathizers who may willingly commit acts of terrorism, whether in the online or offline domains. Drawing upon routine activity theory, the presence and evolution of AI could introduce a novel actor into the sphere of cyber-terrorism, one executed by AI itself. As postulated by routine activity theory, criminal incidents transpire when three elements converge: a motivated offender, a suitable target, and a lack of capable guardianship. While AI possesses cognitive and learning abilities, albeit not yet at the level of human cognition, in the context of cyber-terrorism, the convergence of AI with the elements of a motivated offender, suitable target, and lack of capable guardianship could position it as a novel actor.
EXPLORING THE USE OF MUSIC IN DERADICALIZATION Agustanto, Pulung; Simon Runturambi, Arthur Josias; ., Puspitasari
Journal of Terrorism Studies Vol. 6, No. 2
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study seeks to explore music as an alternative method to enrich the variety of deradicalization programs in the framework of counterterrorism. The use of ethnic and local culture-based music is not only intended to prevent radicalism but also as an instrument of recovery therapy for terrorism prisoners in correctional institutions (Lapas). The offer of the programmatic agenda departs from the assumption that deradicalization so far still lacks a cultural approach. Moreover, the archipelago has a variety of music from various ethnicities, for example Javanese music, Sundanese music, Balinese music, Ambon music, and others that are rich in spiritual and even religious values. The lack of understanding of radical groups trapped in the flow of ideology and transnational movements must be returned to their local civilization. The tones, lyrics, metaphors and rhythms of Javanese music, for example, are interesting to study in a socio-psychological framework that can be utilized in deradicalization programs. Appropriate music therapy for the Terrorist Convict should be considered in the deradicalization program. In this context, Javanese traditional music is a hypothesis that should be experimented in correctional facilities for terrorists.
EXPLORING THE DARK HORIZON : ARTIFICIAL INTELLIGENCE (AI) AS CYBERTERRORISM TOOLS Krisnayanto, Krisnayanto; Suryadi, Suryadi
Journal of Terrorism Studies Vol. 7, No. 1
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This Journal utilizes a thorough literature review approach to explore the evolving relationship between artificial intelligence (AI) and its potential use as a tool for terrorism. With the rapid advancement of AI technologies, there is a growing concern about their possible misuse by terrorist groups. This study extensively examines existing research, policy documents, and expert opinions and investigates the complex connections between AI and terrorism. The literature review delves into historical examples, current case studies, and emerging trends to clarify the various ways in which AI could be employed for harmful purposes by terrorist organizations. By analyzing recruitment strategies, communication methods, propaganda dissemination, and attack planning, the study offers a detailed understanding of the potential risks associated with the intersection of AI and terrorism. Ethical and legal considerations are thoroughly examined, addressing issues of accountability and the necessity for regulatory frameworks to guide the ethical use of AI technologies in the context of terrorism. In response to the identified risks
STATE SPONSORED TERRORISM AS A TOOL FOR PROXY WAR Lee, Brice Tseen Fu; Sims, Juan Pablo; Kornphetcharat, Kotchaphop
Journal of Terrorism Studies Vol. 7, No. 1
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper explores the role of state-sponsored terrorism as a tool in proxy wars, examining its effectiveness in achieving short-term geopolitical objectives and its long-term consequences. By analyzing historical and contemporary case studies, such as Iran’s support for Hezbollah and Pakistan’s backing of militant groups in Kashmir, the paper demonstrates how states use financial, military, and intelligence resources to empower non-state actors. The analysis applies realist, constructivist, and asymmetrical warfare theories to understand the motivations behind state sponsorship and the risks involved, including blowback and international sanctions. The paper concludes by assessing the future of state-sponsored terrorism in light of evolving global security dynamics and counter-terrorism measures.
EMERGING TECHNOLOGIES IN BOKO HARAM'S OPERATIONS AND COUNTER-TERRORISM EFFORTS IN CENTRAL AFRICA Minko, Abraham Ename
Journal of Terrorism Studies Vol. 7, No. 1
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The interplay between terrorism and technology in Central Africa has intensified, particularly with Boko Haram’s rise. This research explores how emerging technologies enhance Boko Haram's operations and the corresponding counter-terrorism efforts. It examines Boko Haram’s use of social media for recruitment, encrypted messaging for secure communication, and advanced weaponry like drones and improvised explosive devices (IEDs). These technologies have expanded Boko Haram’s reach and operational efficiency, challenging security forces. The study also evaluates technological countermeasures implemented by Central African governments and international bodies, including surveillance, cyber intelligence, and data analytics. It assesses the effectiveness of these measures, noting successes and obstacles such as limited resources and rapidly evolving threats. Using a qualitative method, the research explores cybersecurity dynamics, including Boko Haram’s cyber-attacks on critical infrastructure and its use of the internet for radicalization. The study identifies gaps in current cybersecurity defenses and provides strategic recommendations for improvement. These include adopting advanced surveillance and data analysis tools, enhancing regional cooperation for intelligence sharing, and increasing investment in cybersecurity. The aim is to develop a more effective counter-terrorism strategy informed by technological advancements.
IMPACT OF CRIME ON INTERSTATE TRANSPORT OPERATIONS IN NORTHCENTRAL NIGERIA Ohida, Muhammed Etudaiye
Journal of Terrorism Studies Vol. 7, No. 1
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The study investigated the impact of crime on interstate road transport operations in north-central Nigeria. The study relies on descriptive statistics to describe the features of the populations. 200 questionnaires were purposefully administered to the four major interstate motor parks in the capital of some north-central states (i.e., Minna, Lokoja, Benue, and Lafia) using random sampling techniques. The gathered data was analysed using percentages and charts, while the T-test statistics were used to test the study hypothesis. The result shows that there is a statistically significant influence of crimes on interstate transport operations in north-central Nigeria. The study concluded that improving the safety of the road transport network will motivate transport operators to operate more efficiently on the routes.
ASSESSING BIOTERRORISM PREPAREDNESS IN INDONESIA: CHALLENGES AND STRATEGIC FRAMEWORKS FOR NATIONAL SECURITY Toni, Toni; Haliansyah, Haliansyah
Journal of Terrorism Studies Vol. 7, No. 1
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Bioterrorism represents a growing global threat, necessitating robust preparedness frameworks to safeguard national security. This study aims to assess Indonesia's bioterrorism preparedness by identifying key challenges and proposing strategic frameworks for improvement. Using Structural Equation Modeling (SEM), this quantitative research examines the relationship between Government Capacity (independent variable), Crisis Management Effectiveness (intervening variable), and National Security Preparedness (dependent variable). A structured survey was distributed to key stakeholders, including public health officials, security experts, and policymakers, yielding 100 valid responses. Data analysis through SEM revealed that Government Capacity significantly influences Crisis Management Effectiveness, which in turn positively impacts National Security Preparedness. Moreover, Crisis Management Effectiveness partially mediates the relationship between Government Capacity and National Security Preparedness, highlighting its critical role as an intervening factor. The findings underscore the importance of enhancing government capacity through investments in biosecurity infrastructure, interagency coordination, and public health training. Strengthening crisis management mechanisms can amplify national security preparedness against bioterrorism threats. The study concludes with recommendations for targeted policy interventions and collaborative frameworks to bolster Indonesia's resilience to bioterrorism.
THE EVOLUTION OF INDIA’S ‘COUNTER-TERRORISM (CT)’ POLICY IN THE 21ST CENTURY Ashok, Mule Rohit
Journal of Terrorism Studies Vol. 7, No. 1
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The changing nature of modern terrorism has proved a major threat to the global security architecture. The 9/11 terrorist attack on the United States of America, the world's ‘Police State’, is apparent. Consequently, the international community launched collective fights at different levels to deal with it. However, the nation-state at the individual level also designed a ‘Counter-Terror (CT)’ policy mechanism within the scope of the foreign policy paradigm to safeguard national security. India, since its independence, has consistently faced security challenges from terrorism from its neighbours, and has followed the same suit. The major CT policy was grounded in the post-2001 period, when an attack on the Parliament happened. ‘Zero Tolerance with Terrorism’ is the principal ideology on which India’s entire CT policy framework is built. Of course, it led to the ‘securitisation’ of foreign policy by prioritising national security above all other interests. This research paper has a major objective to analyse the evolution of CT narratives within India’s foreign policy, for which primary and secondary literature have been utilised. Recommendations of the research include that to wipe out ambiguity, the Indian government must publish a white paper concerning a coherent ‘National Terrorism Policy’.

Page 9 of 10 | Total Record : 91