cover
Contact Name
Stanislaus Riyanta
Contact Email
sitjournal09@gmail.com
Phone
-
Journal Mail Official
adminjurnal@sitjournal.com
Editorial Address
Jln. Dr. Sutomo, No. 9, Pasar Baru, Jakarta Pusat
Location
Kota adm. jakarta pusat,
Dki jakarta
INDONESIA
Security Intelligence Terrorism Journal (SITJ)
ISSN : -     EISSN : 30637473     DOI : https://doi.org/10.70710/sitj
Core Subject : Social,
Security Intelligence Terrorism Journal (SITJ) is a leading journal focused on the role of intelligence and secretive agencies in international relations and counterterrorism
Articles 55 Documents
Enhancing Security through Intelligent Threat Detection and Response: The Integration of Artificial Intelligence in Cyber-Physical Systems Al Waro'i, Muhammad Nur Abdul Latif
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 1 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i1.1

Abstract

Cyber-Physical Systems (CPS) play a crucial role in critical industries such as manufacturing, transportation, energy, and healthcare by integrating the physical and digital worlds. However, the complexity and interconnectivity of CPS with the global network increase their vulnerability to cyber-attacks. This research explores the benefits of implementing artificial intelligence (AI) in the context of cyber-physical systems (CPS) to detect and respond to security threats. This study uses machine learning and deep learning techniques to analyze sensor data and system threats. The data analysis methods encompass predictive modeling and evaluating AI algorithms' performance in detecting threats. The research data is obtained from relevant literature reviews and secondary data analysis. The research findings indicate that integrating AI in CPS can enhance the success rate of threat detection, prompt response, and accuracy in threat identification. By enabling the system to learn from previous experiences, AI can reduce the number of false positives and false negatives while providing automated real-time responses to threats without human intervention. The research concludes that AI has great potential to enhance security in CPS by providing more efficient and effective solutions to address increasingly complex cyber threats. The findings of this study are expected to provide insights and recommendations that can be applied in developing CPS security systems in the future.
Terrorism as a Transnational Crime that Threatens Indonesia Marzio, Aldy
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 1 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i1.3

Abstract

This paper aims to (1) analyze Indonesia's vulnerability against terrorism; and (2) analyze efforts to counter-terrorism in Indonesia. In compiling this paper, the author collected secondary data in the form of written documentaries, namely mass media articles, journal articles and relevant books. The study results indicate that terrorism is a transnational crime with a major threat to the nation and state. In Indonesia there have been several acts of suicide bombing terrorism in the name of religious teachings. Suicide bomb terrorists consider this to be a sacred duty that is obligatory and of great benefit to their group. Indonesia's vulnerability to terrorism is determined by demographic, geographic, economic and ideological factors. Advances in information and communication technology and the increase in the number of internet users in Indonesia can also provide opportunities for cyberterrorism to occur. In carrying out counter-terrorism, the Indonesian government implements pre-emptive, preventive and repressive efforts. One of the counter-terrorism programs that raises pros and cons in Indonesian society is the involvement of the TNI. According to the author, the TNI should only be involved in counter-terrorism assistance if the National Police and BNPT experience difficulties or obstacles. A military counter-terrorism approach has the potential to violate human rights, especially against parties who are merely suspected of having been exposed to radical ideology.
An Academic Analysis of Digital Transformation: A Comprehensive Review of Literature and Business Strategies Fadhlurrahman, Muhammad Alfi
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 1 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i1.4

Abstract

The idea of digital transformation has an impact on many different facets of business. The goal of this study is to examine how digital transformation affects businesses, industries, and society as a whole, with a particular emphasis on business models, operational procedures, and customer experience. To examine the definitions, components, pillars, and important facets of digital transformation, this study uses a literature review methodology. The review's findings show that using digital technology to modernize corporate processes and improve productivity, responsiveness, and creativity is included in the concept of digital transformation. The components of digital transformation are also described in this study, including business models, digital platforms, employee experience, customer experience, and operational procedures within the organization. The customer experience, business models, and operational procedures of the organization are the three primary pillars of digital transformation. In addition, there are five essential components of digital transformation: value, data, customers, competition, and innovation. In a connected and quickly evolving business environment, digital transformation is becoming more and more significant, and firm executives need to have a long-term vision to take advantage of the potential.
False Reality: Deepfakes in Terrorist Propaganda and Recruitment Al Waro'i, Muhammad Nur Abdul Latif
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 1 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i1.5

Abstract

Deepfake technology, which leverages artificial intelligence to create hyper-realistic digital fabrications, has emerged as a significant threat across various domains, notably in terrorism. This review critically examines the exploitation of deepfakes in terrorist propaganda and recruitment, presenting a systematic analysis of the technical mechanisms behind their creation and detection, historical and contemporary propaganda methods, and their psychological impacts on audiences. The study identifies key advancements in deepfake detection technologies, such as ensemble learning and convolutional neural networks, which are crucial in distinguishing real from synthetic media. Furthermore, the review highlights the importance of public awareness and psychological resilience as vital countermeasures against deepfake manipulation. Despite technological advancements, significant challenges remain, including the development of real-time detection systems capable of operating in diverse and uncontrolled environments and a comprehensive understanding of the psychological processes affected by deepfake propaganda. The review underscores the urgent need for robust policy frameworks and international cooperation to address the ethical, legal, and security implications of deepfake technology. By integrating technical, psychological, and policy perspectives, this study provides a holistic understanding of deepfake technology's role in modern terrorism and offers insights for developing effective countermeasures. The comprehensive approach aims to contribute to the creation of robust strategies to mitigate the misuse of deepfake technology, ensuring a safer and more trustworthy digital environment.
Strategies For Addressing The Spillover Effect Of Mosaic Warfare In The South China Sea Conflict To Achieve National Security Stability Alwi, Muhamad Bashori; Suhanda, Chairi; Setiawan, Dany; Ricky, Muchamad; Hadawang, Rusdyanto
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 1 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i1.6

Abstract

The South China Sea is a strategic area rich in natural resources and a crucial international shipping and trade route, making it a focal point of territorial disputes between China, the Philippines, Vietnam, Malaysia, Brunei, and Taiwan. This conflict escalates tensions and the potential spillover effects of mosaic warfare that can impact Indonesia's national security and stability. This journal analyzes the strategic implications of the South China Sea conflict for Indonesia, exploring defensive and proactive strategies to mitigate risks and enhance national resilience. This research uses a qualitative descriptive approach based on historical analysis and content analysis, successfully identifying key areas of concern such as increased maritime security risks, the need for enhanced military capabilities, and the importance of regional and international cooperation. Proposed strategies include increased diplomatic engagement, strengthening defense capabilities, intelligence and security technology cooperation, and diversifying economic and trade routes. Indonesia must adopt a multifaceted and proactive strategy to protect its interests amidst regional instability, strengthen diplomatic relations within ASEAN and globally, enhance military and surveillance capabilities, and ensure economic resilience against potential disruptions in maritime trade routes. Public education and adherence to international law are also crucial for maintaining regional peace and security.
Spatial Analysis of Drug-Prone Areas in Jakarta to Enhance City Resilience Agustina, Saur Martha; Chotib, Chotib; Sinaga, Hariati
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i2.8

Abstract

Resilience has emerged as a central theme in urban planning, offering a strategic framework to manage city development while promoting sustainability. This is particularly important for Jakarta as it ranks among the world's significant cities highly susceptible to diverse challenges and disruptions. This includes vulnerability to drug crime cases. As one of the efforts to overcome vulnerability, it is necessary to analyze drug-prone areas in Jakarta based on urban villages. The purpose of this study is to analyze the spatial distribution of drug-prone areas in Jakarta using Geographic Information Systems (GIS) and to analyze the role of factors determining the level of drug-prone areas in Jakarta province by applying an ordinal logit regression model. The results of this research show that almost all independent variables have no significant impact on the level of drug-prone areas. The result shows that the presence of foreigners has a significant impact on the level drug prone areas. The research findings recommend tighter monitoring of the presence of foreigners.
Importance and Challenges in TPNW Ratification: Regional Analysis of Oceania, the Americas, Europe, Asia, and Africa Rajagukguk, Michael Haratua; Siagian, Ruben
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i2.9

Abstract

The research focuses on the ratification of the Treaty on the Prohibition of Nuclear Weapons (TPNW), which has become an important global issue in international security. The research aims to analyze the factors that influence countries' decisions to ratify the TPNW, as well as to explore the challenges and concerns that individual countries face regarding this issue. The benefits of the research include a deeper understanding of the political, economic, and security dynamics relating to the non-proliferation of nuclear weapons. Results show that complex political and economic interests influence the decision to ratify the TPNW. In Oceania, countries such as Australia and Fiji demonstrated concerns for strategic alliances and regional security. In contrast, smaller countries such as Kiribati and the Marshall Islands prioritized domestic issues and political considerations. In the Americas, the United States rejects TPNWs as contrary to its national security policy, while NATO commitments often bind countries in Europe. In Asia, resistance from nuclear-armed states such as China and India reflects broader geopolitical strategies, while in Africa, many states do not prioritize the issue due to domestic instability. Identified in-depth understanding of how individual states respond to TPNWs in specific contexts. Comparative analysis across regions provides a new perspective in understanding the interaction between foreign policy and non-proliferation issues. The importance of international dialog and a more holistic approach in addressing non-proliferation challenges. Countries' decisions on ratification of the TPNW are highly dependent on their localities and challenges, which include both domestic and foreign policy issues. The TPNW is not only a non-proliferation issue but also reflects the complexity of international relations and national security policies in different parts of the world.
The Role of Social Media in Supporting Information and Intelligence Gathering by Densus 88 Virgantara, Aliviqo Pandu; Nita, Surya; Rahmanto, Didik Novi
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i2.10

Abstract

Terrorism in the digital era has rapidly evolved, with terrorist groups increasingly utilizing social media platforms to spread radical ideologies, recruit new members, and plan attacks. Indonesia, having experienced various terrorism incidents, continues to face this ongoing threat. In this context, the Special Detachment 88 Anti-Terrorism Unit (Densus 88) leverages social media as a critical tool for intelligence gathering and preventing terrorist activities. This study aims to explore how Densus 88 utilizes platforms such as Facebook, Twitter, Instagram, and YouTube to identify, monitor, and analyze terrorism-related activities. Through a qualitative approach, this research investigates the perspectives and experiences of Densus 88 members involved in using social media as an intelligence tool. The findings indicate that social media provides a continuous data stream that can be used to monitor activities, track trends, and identify potential threats at an early stage. However, significant challenges remain, including the vast volume and complexity of data and difficulties in distinguishing genuinely dangerous activities from unrelated content. This study provides valuable insights into the strategic use of social media in counter-terrorism operations and suggests measures to enhance the effectiveness of intelligence gathering in the digital era.
An Analysis of Biden's Administration Stark Opposite Approaches in Humanitarian Crises Racharjo, Satrio Imam
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i2.11

Abstract

This paper examines the different approaches of the United States foreign policy towards the Russia-Ukraine and Israel-Palestine conflicts by comparing similar cases in both of the conflicts. The United States, who have been actively criticizing Russia for violating rules-based order and humanitarian values in the Russia-Ukraine conflict, have not done the same to Israel even though there is mounting pressure for similar allegations. The comparisons are analyzed through cases of the United States' aid towards Ukraine and their criticism towards Russia’s international norms violations, Continuing with their military aid to Israel while they are attacking Gaza and staying silent with Israel’s violations. We would also see how international institutions that are supposed to prevent such a crisis are unable to do much to stop the crisis, As well as Israel’s influences in the US foreign policy-making process, which resulted in persistent pro-Israel foreign policies. By analyzing the United States' actions through the concepts of Humanitarian Diplomacy, Hegemon, and Rules-Based International Order, this paper finds that the United States' national interest’s alignment with Ukraine has used humanitarian values and rules-based international order as a political instrument. On the other hand, Israel’s great influence in the United States foreign policy process has made them silent in numerous cases of international law violations committed by Israel. United States’ concern and alignment towards the Middle East and Eastern European regional hegemon has also played an important piece in their vocal criticisms of Russia’s international norms violations and their normative response towards Israel’s norms breaches.
The Logical Fallacy in Female Terrorists in Indonesia (Case Study: ISIS Period 2018-2023) Damayanti, Anugrah Nia; Riyanta, Stanislaus
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i2.12

Abstract

Terrorism represents a significant threat to both state and individual security. The effective combating of terrorism necessitates not only the implementation of repressive measures but also the fostering of societal resilience. The creation of societal resilience can be achieved by developing an intelligent society, thereby enabling it to combat the threat of radicalism and terrorism effectively. One way to foster societal resilience is to identify and address the logical fallacies of ISIS teachings. The authors selected the topic of female terrorists in Indonesia (ISIS case study 2018-2013 period) due to the increase in arrests of women related to terrorism following the Surabaya bombings in 2018. All of the women arrested are connected to ISIS. This paper employs the following theoretical frameworks: the informal logical fallacy theory (Van Vleet, Informal Logical Fallacies 2021), The Staircase to Terrorism (Mogadham, 2005), and Technic Analysis Counter Terrorism theory (Prunckun, 2010). The findings of the research indicated the presence of a logical fallacy among ISIS female terrorists. The logical fallacy observed in ISIS female terrorists in Indonesia can be attributed to the following factors: The indoctrination and education model employed by IS; the manipulation of religious teachings; the kinship system; the propagation of ideological narratives designed by IS; intense communication; the echo chamber and filter bubble; and women's psychological vulnerability all contribute to the phenomenon under study. The pattern of radicalization observed in ISIS female terrorists in Indonesia aligns with the theoretical framework of The Staircase to Terrorism (Fathali M. Moghadam). Counterterrorism measures must be implemented to address the logical fallacies observed in female terrorists. This necessitates a comprehensive approach encompassing prevention, preparation, response, and recovery.