Articles
13 Documents
Search results for
, issue
"Vol. 2 No. 1 (2025)"
:
13 Documents
clear
The Potential Threat Of Iran's Nuclear Conflict To Nuclear Proliferation In Southeast Asia
Djakaria, As'ad Syamsul Arif
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 1 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v2i1.24
This study examines the potential impact of Iran's nuclear program on the perceptions of security in Southeast Asia, highlighting how Iran's resilience under international pressure could influence ASEAN nations. Using the diffusion of norms theory, the paper identifies Iran's actions as a precedent that may inspire similar pursuits in the region, threatening regional stability. It further explores Indonesia's strategic role in addressing this challenge through diplomatic initiatives, proactive leadership in ASEAN frameworks, and the development of peaceful nuclear technology. Strengthened collaboration with international bodies such as the IAEA and robust regional policies are essential to ensure nuclear development remains focused on peaceful purposes. Indonesia’s leadership in advocating non-proliferation, fostering regional cooperation, and mediating conflicts is critical to maintaining Southeast Asia as a nuclear-weapon-free zone. The findings underline the need for comprehensive strategies to mitigate proliferation risks while enhancing regional security and stability.
Early Intelligence Detection of LGBT in the Selection of Indonesian National Police (POLRI) Recruits
Trapsilo, Firso
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 1 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v2i1.25
This study focuses on early detection of the threat of LGBT inclusion in the Indonesian National Police, primarily by selecting police recruits. This research uses a qualitative method with a descriptive design. The results of the study show that there is evidence of LGBT threats to the Police, both at the recruitment selection stage as well as among active members of the Police. Early detection and prevention efforts against this threat need to focus on strengthening the criteria and stages of the selection of police recruits. Especially at the Mental and Personality Investigation (in Bahasa Indonesia: Penelusuan Mental Kepribadian or Mental and Personality Investigation) stage. This research then suggests a procedure for checking social media as one of the stages in the selection of police officers and the need for more detailed indicators as guidelines for assessing LGBT threats at the selection stage of police officers.
Kufal Symbiosis: Collaboration of Artificial Intelligence and Terrorist Organizations
Guna, Wahyu Jati Arya
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 1 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v2i1.28
This paper delves into the phenomenon of "kufal symbiosis,” which refers to the collaboration between artificial intelligence (AI) and terrorist organizations. It highlights AI’s potential to enhance the efficiency of terrorist operations. While AI can be used to recruit new members and plan more sophisticated attacks, security agencies face challenges in adapting this technology to counter terrorism effectively. This paper discussed the crucial need to strike a balance between individual privacy and national security, as well as the difficulties of managing large-scale data with limited resources. Additionally, the use of technology such as deepfakes and botnets by terrorist organizations might lead to confusion and intensify the impact of their attacks. The discussion also addresses cyberattacks on smart cities, exposing the vulnerabilities in infrastructure to cyber threats. In conclusion, while AI enhances the efficiency of terrorist operations, it also equips security agencies to prevent such threats despite the ongoing struggle to balance privacy and security.
Green Arms Race: Indonesia's Critical Minerals and its Sprint for Renewable Energy Sovereignty
Pasaribu, Naek Tua;
Tama, Airlangga Aji;
Azzari, Muhamad Kevin;
Gautama, Ivan
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 1 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v2i1.30
The increasing global demand for renewable energy has pushed countries around the world to compete in acquiring critical minerals and developing green technology. This article aims to examine the policies, regulations, and incentives implemented by the Indonesian government to leverage its vast reserves of critical minerals such as nickel, tin, and rare earth elements. It also aims to compare Indonesia's approach with the strategies employed by major players like China and the United States. The analysis highlights Indonesia's strengths, including its mineral wealth and supportive policies, as well as challenges such as technological readiness and regulatory hurdles. The research aims to provide insights into how Indonesia can enhance its renewable energy capabilities and achieve energy sovereignty while navigating the complex geopolitical landscape by using SWOT and intelligence analysis. The results indicate that the Indonesian government must improve its efforts to maximize its own potential, including by maintaining the availability of mineral resources, establishing robust regulations, and providing incentives for developers in the renewable energy sector. Additionally, it is crucial to promptly address the issues that hinder Indonesia's progress in achieving renewable energy sovereignty, such as updating mineral reserve data, adapting technology and improving human resources, and enhancing oversight to prevent illegal smuggling of mineral resources for renewable energy.
Cyber Warfare And Its Place In Modern Geopolitics And War
Aryasatya, Idden;
Daryanto, Eko
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 1 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v2i1.31
There are now major cybersecurity concerns as a result of how fast technology has changed geopolitics. Attacks against a nation's communication, infrastructure, and economy through cyber espionage, sabotage, disinformation, and DDoS attacks undermine national stability. The high level of digital integration in industrialized nations makes them easy targets, while the lack of resources and digital knowledge makes underdeveloped nations vulnerable. There has to be international collaboration on cybersecurity rules and ethics because of this chasm. While cutting-edge innovation like AI strengthens defenses, it also introduces new dangers and raises new ethical questions. This study delves into the consequences of cyberwarfare. It highlights the importance of strong cybersecurity measures, online education, and global cooperation to safeguard nations and their inhabitants against ever-changing cyber dangers.
The Threat of Forming a Post-Truth Scenario Through Political Propaganda by Social Media Users in the 2024 General Election
Kurniawan, Adib Rifqy
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 1 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v2i1.32
At the beginning of 2023, We Are Social recorded that internet users in Indonesia reached 212.9 million people, or the equivalent of 77 percent of the total population. This figure has more than doubled compared to the initial year that regulations on the use of social media as a means of campaigning were implemented, namely in 2014, which was 88.1 million people. Currently active social media users in Indonesia have reached 167 million users. The more social media users there are in Indonesia, the faster the potential for information dissemination, including the spread of hoaxes and content with hate speech nuances, which is also increasingly widespread. This condition has triggered an increase in the concentration of post-truth in Indonesia ahead of the 2024 General Election. This research will identify patterns of post-truth formation in Indonesia, as well as analyze the threat of the existence of post-truth in the midst of holding the General Election. This qualitative research will use netnographic methods by focusing on Hoax content and nuances of Hate Speech on Social Media, especially Twitter. Apart from that, interviews will also be conducted with experts, academics, and practitioners.
Scenario Planning in Anticipating the Death of Leaders of The Islamic State of Iraq and Syria (ISIS) Leader to Mitigate Terrorist Attacks in Indonesia (Case Study: The Death of Abu Bakr Al-Baghdadi)
Manik, Sri Helena Patricia;
Riyanta, Stanislaus
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 1 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v2i1.33
The death of a leader in the Islamic State of Iraq and Syria (ISIS) organization is often followed by calls for revenge, typically initiated with the renewal of bai’at (pledge of allegiance) against those deemed responsible. ISIS tends to incorporate retaliation as part of its response to various global situations perceived as threats to Muslims. This study aims to elaborate on scenario planning in addressing the aftermath of an ISIS leader's death, to mitigate terrorist attacks in Indonesia. The research employs a descriptive qualitative method using scenario planning analysis based on the framework of Scenario Planning by Brands, Christian, Torsten Wulf, and Philip Meissner. These findings must be implemented in a coordinated and sustainable manner to ensure the effectiveness of anticipating and addressing threats from ISIS networks in Indonesia.
The Integration of Strategic Intelligence and Cyber Resilience in Combating Organized Narcotics Crime in Indonesia (A Case Study of Hydra Indonesia)
Aziz, Wawan Kurniawan;
Daryanto, Eko
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 1 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v2i1.34
Organized Narcotics Crime in Indonesia is evolving through the utilization of technologies such as the dark web, encrypted communications, and cryptocurrency transactions. The Hydra Indonesia case, uncovered in Bali in 2024, illustrates how international narcotics syndicates leverage cyber technology to evade law enforcement detection and expand their operations. This article examines the integration of strategic intelligence and cyber resilience as effective measures to address these threats. The findings of this discussion highlight that the synergy between strategic intelligence and cyber resilience plays a critical role in early detection, criminal network mapping, and enhanced coordination among law enforcement agencies. This integration optimizes technological resources for more effective prevention and enforcement efforts against organized narcotics crime. Policy recommendations include strengthening cyberinfrastructure, enhancing intelligence capacity, and fostering international collaboration to reinforce the national response to narcotics crime threats in an increasingly complex and global digital era.
Threat Analysis of Social Media Use on the Tendency of College Student Radicalism
Abshari, Hana
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 1 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v2i1.35
Various complex aspects influence a person's formation of radical ideology. Several factors, such as a low sense of tolerance and national identity, are thought to encourage the entry of radicalism. In addition, the use of social media also increases the potential for radicalism because it is used as a new jihad medium by radical terror groups. On the other hand, college students, as part of the youth often exposed to social media, become potential targets. This study employs a mixed-method approach to explore the relationship between tolerance, national identity, and social media usage with radicalism and to identify emerging threats. Data was collected through questionnaires distributed to 150 Science students at the University of Indonesia and interviews with informants, including academics, policymakers, and practitioners. The results of hypothesis testing showed a low negative effect on tolerance and national identity. In contrast, using social media positively and moderately affects student radicalism. Social media’s freedom to share information and facilitate interaction makes it highly effective for spreading radical propaganda. This is coupled with the ability of radical terror groups to create narratives based on negative issues against the government. Other opportunities arise from students' insufficient deterrence power and loopholes in violating the law. A comprehensive prevention strategy is required to minimize potential threats through commitment and synergy from all elements of society.
Threats of Data Leakage in Military Security Systems In the Regional Military Command III/Siliwangi
Indriyana, Diana;
Prasetyono, Budi;
Mado, Aloysus
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 1 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.70710/sitj.v2i1.37
This research investigates the threat of data leakage to the military security system in the Kodam III/Siliwangi region. While advancements in information technology have positively impacted society, they also bring the threat of cybercrime. The Indonesian government has responded by enacting the Personal Data Protection Law and strengthening inter-agency collaboration to prevent and address cybercrimes. The threat of data leakage in the Kodam III/Siliwangi region falls under non-physical and unconventional military threats, posing risks to national security and social stability.