Articles
10 Documents
Search results for
, issue
"Vol. 1 No. 2 (2024)"
:
10 Documents
clear
Spatial Analysis of Drug-Prone Areas in Jakarta to Enhance City Resilience
Agustina, Saur Martha;
Chotib, Chotib;
Sinaga, Hariati
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v1i2.8
Resilience has emerged as a central theme in urban planning, offering a strategic framework to manage city development while promoting sustainability. This is particularly important for Jakarta as it ranks among the world's significant cities highly susceptible to diverse challenges and disruptions. This includes vulnerability to drug crime cases. As one of the efforts to overcome vulnerability, it is necessary to analyze drug-prone areas in Jakarta based on urban villages. The purpose of this study is to analyze the spatial distribution of drug-prone areas in Jakarta using Geographic Information Systems (GIS) and to analyze the role of factors determining the level of drug-prone areas in Jakarta province by applying an ordinal logit regression model. The results of this research show that almost all independent variables have no significant impact on the level of drug-prone areas. The result shows that the presence of foreigners has a significant impact on the level drug prone areas. The research findings recommend tighter monitoring of the presence of foreigners.
Importance and Challenges in TPNW Ratification: Regional Analysis of Oceania, the Americas, Europe, Asia, and Africa
Rajagukguk, Michael Haratua;
Siagian, Ruben
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v1i2.9
The research focuses on the ratification of the Treaty on the Prohibition of Nuclear Weapons (TPNW), which has become an important global issue in international security. The research aims to analyze the factors that influence countries' decisions to ratify the TPNW, as well as to explore the challenges and concerns that individual countries face regarding this issue. The benefits of the research include a deeper understanding of the political, economic, and security dynamics relating to the non-proliferation of nuclear weapons. Results show that complex political and economic interests influence the decision to ratify the TPNW. In Oceania, countries such as Australia and Fiji demonstrated concerns for strategic alliances and regional security. In contrast, smaller countries such as Kiribati and the Marshall Islands prioritized domestic issues and political considerations. In the Americas, the United States rejects TPNWs as contrary to its national security policy, while NATO commitments often bind countries in Europe. In Asia, resistance from nuclear-armed states such as China and India reflects broader geopolitical strategies, while in Africa, many states do not prioritize the issue due to domestic instability. Identified in-depth understanding of how individual states respond to TPNWs in specific contexts. Comparative analysis across regions provides a new perspective in understanding the interaction between foreign policy and non-proliferation issues. The importance of international dialog and a more holistic approach in addressing non-proliferation challenges. Countries' decisions on ratification of the TPNW are highly dependent on their localities and challenges, which include both domestic and foreign policy issues. The TPNW is not only a non-proliferation issue but also reflects the complexity of international relations and national security policies in different parts of the world.
The Role of Social Media in Supporting Information and Intelligence Gathering by Densus 88
Virgantara, Aliviqo Pandu;
Nita, Surya;
Rahmanto, Didik Novi
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v1i2.10
Terrorism in the digital era has rapidly evolved, with terrorist groups increasingly utilizing social media platforms to spread radical ideologies, recruit new members, and plan attacks. Indonesia, having experienced various terrorism incidents, continues to face this ongoing threat. In this context, the Special Detachment 88 Anti-Terrorism Unit (Densus 88) leverages social media as a critical tool for intelligence gathering and preventing terrorist activities. This study aims to explore how Densus 88 utilizes platforms such as Facebook, Twitter, Instagram, and YouTube to identify, monitor, and analyze terrorism-related activities. Through a qualitative approach, this research investigates the perspectives and experiences of Densus 88 members involved in using social media as an intelligence tool. The findings indicate that social media provides a continuous data stream that can be used to monitor activities, track trends, and identify potential threats at an early stage. However, significant challenges remain, including the vast volume and complexity of data and difficulties in distinguishing genuinely dangerous activities from unrelated content. This study provides valuable insights into the strategic use of social media in counter-terrorism operations and suggests measures to enhance the effectiveness of intelligence gathering in the digital era.
An Analysis of Biden's Administration Stark Opposite Approaches in Humanitarian Crises
Racharjo, Satrio Imam
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v1i2.11
This paper examines the different approaches of the United States foreign policy towards the Russia-Ukraine and Israel-Palestine conflicts by comparing similar cases in both of the conflicts. The United States, who have been actively criticizing Russia for violating rules-based order and humanitarian values in the Russia-Ukraine conflict, have not done the same to Israel even though there is mounting pressure for similar allegations. The comparisons are analyzed through cases of the United States' aid towards Ukraine and their criticism towards Russia’s international norms violations, Continuing with their military aid to Israel while they are attacking Gaza and staying silent with Israel’s violations. We would also see how international institutions that are supposed to prevent such a crisis are unable to do much to stop the crisis, As well as Israel’s influences in the US foreign policy-making process, which resulted in persistent pro-Israel foreign policies. By analyzing the United States' actions through the concepts of Humanitarian Diplomacy, Hegemon, and Rules-Based International Order, this paper finds that the United States' national interest’s alignment with Ukraine has used humanitarian values and rules-based international order as a political instrument. On the other hand, Israel’s great influence in the United States foreign policy process has made them silent in numerous cases of international law violations committed by Israel. United States’ concern and alignment towards the Middle East and Eastern European regional hegemon has also played an important piece in their vocal criticisms of Russia’s international norms violations and their normative response towards Israel’s norms breaches.
The Logical Fallacy in Female Terrorists in Indonesia (Case Study: ISIS Period 2018-2023)
Damayanti, Anugrah Nia;
Riyanta, Stanislaus
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v1i2.12
Terrorism represents a significant threat to both state and individual security. The effective combating of terrorism necessitates not only the implementation of repressive measures but also the fostering of societal resilience. The creation of societal resilience can be achieved by developing an intelligent society, thereby enabling it to combat the threat of radicalism and terrorism effectively. One way to foster societal resilience is to identify and address the logical fallacies of ISIS teachings. The authors selected the topic of female terrorists in Indonesia (ISIS case study 2018-2013 period) due to the increase in arrests of women related to terrorism following the Surabaya bombings in 2018. All of the women arrested are connected to ISIS. This paper employs the following theoretical frameworks: the informal logical fallacy theory (Van Vleet, Informal Logical Fallacies 2021), The Staircase to Terrorism (Mogadham, 2005), and Technic Analysis Counter Terrorism theory (Prunckun, 2010). The findings of the research indicated the presence of a logical fallacy among ISIS female terrorists. The logical fallacy observed in ISIS female terrorists in Indonesia can be attributed to the following factors: The indoctrination and education model employed by IS; the manipulation of religious teachings; the kinship system; the propagation of ideological narratives designed by IS; intense communication; the echo chamber and filter bubble; and women's psychological vulnerability all contribute to the phenomenon under study. The pattern of radicalization observed in ISIS female terrorists in Indonesia aligns with the theoretical framework of The Staircase to Terrorism (Fathali M. Moghadam). Counterterrorism measures must be implemented to address the logical fallacies observed in female terrorists. This necessitates a comprehensive approach encompassing prevention, preparation, response, and recovery.
Utilization of Artificial Intelligence in Monitoring and Mitigating National Security Threats
Wiranata, Angga Junior
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v1i2.16
Implementing Artificial Intelligence (AI) in the context of national security has become a critically important topic in addressing increasingly complex modern threats. This article examines various AI applications in monitoring and mitigating national security threats, such as managing critical infrastructure, risk assessment, and adaptive responses to crises. By adopting the socio-technical systems theory approach, this approach recognizes the complexity of interactions between AI technology, human decisions, and operational environments that impact national security. Recommendations include increased investment in advanced AI infrastructure and more profound training for AI and the national security workforce. It is expected that mature AI implementation can significantly impact maintaining stability and national security in this dynamic digital era.
Counter Radicalization in Cyberspace by the Police
Akbari, Abim Aji;
Sagena, Basir;
Muhamad Syauqillah
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v1i2.17
This article examines further how the Indonesian police carry out counter-radicalization enforcement in cyberspace. This is important because radicalism triggers a person to be violent towards different views, and this does not follow the nature of the diversity of the Indonesian nation. Radicalism is the embryo of terrorism. This situation becomes more dangerous when radicalization efforts are carried out through cyberspace, which can be accessed by the entire community, including impressionable teenagers. In this regard, the Indonesian National Police, which maintains security and order and protects the community, also takes part in counter-radicalization in cyberspace to ward off negative influences that underlie intolerant and radical actions. This particular observation of the role of the police against radicalism through online media is what then differentiates it from similar research. The discussion uses a qualitative research approach and literature study method, incorporating counter-radicalisation theory through the Internet. This paper finds that counter-radicalization in cyberspace by the police is cyber patrols and content takedown, establishing a social media task force, increasing the role of moderate religious mass organizations, strengthening religious literacy, and collaborating with national and international institutions and digital platforms. In addition, law enforcement is following the ITE Law and the Terrorism Law.
The Analysis of Dangerous Face-Cream Cosmetic Product Threats and Preventive Strategies
Anggraini, Shinta
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v1i2.18
Cosmetics have now transformed into one of the daily necessities and are consumed by all demographics, both young and old, men and women. The increase in demand and need for cosmetic products was initially only for beauty purposes, but it has since evolved to include health, body care, and hygiene needs, culminating in the current trend of smooth and flawless skin, commonly known as glass skin, using a series of specific facial cream cosmetic products. The increase in public demand for facial cream cosmetic products presents an opportunity for threats to human security, where cosmetics manufacturer seek maximum profit by adding several hazardous substances, thereby posing a risk to public health. This research was conducted using qualitative research methods with data collection techniques from interviews, observations, and library research. The research results indicate a serious threat from dangerous facial cream cosmetic products with various evolving modes that 'outsmart' regulations, actions carried out by individuals who possess facilities, capital, knowledge, and access related to these matters. Therefore, it is necessary to formulate appropriate strategies to prevent strategic surprises through scenario planning that outlines several intelligence strategies to prevent and anticipate them.
Threat Analysis of Khilafatul Muslimin’s Existence as A Radical Organization in Indonesia
Ma'ruf, Al Hadid Dwi Putera
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v1i2.21
Khilafatul Muslimin (KM) is an organization established with the aim of founding a caliphate or khilafah, a system of governance based on an exclusive interpretation of Islamic leadership principles. This group promotes an ideology of the caliphate that contradicts Pancasila, Indonesia's foundational ideology, by advocating for governance rooted solely in Islamic law and singular Islamic leadership. It rejects Indonesia's principles of pluralism and democracy. The continuous efforts by KM to establish a caliphate pose a potential threat to Indonesia's sovereignty. This study aims to analyze the threats posed by KM and propose intelligence strategies to address their presence in society. A descriptive qualitative research method was employed, grounded in an inductive perspective. The analysis, based on Hank Prunckun's threat assessment framework, indicates that the threat posed by KM is at a medium level. Further threat analysis reveals that KM has the threat factors outlined by Kevin Riehle including intent, capability, and opportunity. These findings are supported by insights from perspective of the Terrorist Mindset developed by Randy Borum.
China's Cybersecurity Governance As Part Of Foreign And Security Policy
Murniasari, Mira
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v1i2.23
Cyberspace has become a new method of interaction for humans in the digital industrial era. One of the countries that play an important role in global cyberspace is China, which has the largest number of internet users, reaching 989 million. This has prompted Chinese Government to formulate a complex cybersecurity governance strategy to maintain national stability and security. Therefore, this study aims to explore China's approach to cybersecurity at domestic and foreign levels. Domestic level explores the governance in the country by examining strategic documents, policies, as well as legal and institutional frameworks, while foreign level discusses cybersecurity as part of foreign and security policy. The primary focus of this study is the series of Chinese diplomatic initiatives aimed at shaping governance norms across various international forums.