cover
Contact Name
Stanislaus Riyanta
Contact Email
sitjournal09@gmail.com
Phone
-
Journal Mail Official
adminjurnal@sitjournal.com
Editorial Address
Jln. Dr. Sutomo, No. 9, Pasar Baru, Jakarta Pusat
Location
Kota adm. jakarta pusat,
Dki jakarta
INDONESIA
Security Intelligence Terrorism Journal (SITJ)
ISSN : -     EISSN : 30637473     DOI : https://doi.org/10.70710/sitj
Core Subject : Social,
Security Intelligence Terrorism Journal (SITJ) is a leading journal focused on the role of intelligence and secretive agencies in international relations and counterterrorism
Articles 9 Documents
Search results for , issue "Vol. 2 No. 4 (2025)" : 9 Documents clear
No Tempest in a Teacup: Fentanyl Trafficking as a Threat to United States’ Security and Its Geopolitical Implications Manullang, Abel Josafat; Sudrajat, Jasson Aditya; Natawibawa, Ibrahim Izzan
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 4 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i4.71

Abstract

Drug trafficking is one of globalization's rotten fruits that the United States (US) has struggled against as it has witnessed 4 waves of opioid epidemic. Chief among the trafficked drugs is fentanyl that caused more than 100.000 in the last two years. Its crossboundary nature, how they originate from outside the US, makes it intricate to solve as it would require a holistic approach. Against that backdrop, this study seeks to provide a security understanding of the issue and its geopolitical repercussions for the US. The writers employ the qualitative research method that entails the use of both primary and secondary data procured from the internet. The article begins with an elaboration of how fentanyl trafficking poses a threat to the security of the US. Here, fentanyl trafficking falls under the non-traditional threat with a far-reaching security implication, especially in the national and human sense. Following that, the geopolitical repercussions of this transnational threat is discussed. Among them is how the issue has riled up the US relations with Mexico and China. Finally, an overview of the existing means to deal with the problem is provided along with some suggestions as to the path ahead.
Stressors Among Counterterrorism Professionals in Indonesia Sukabdi, Zora Arfina; Purnama, Chandra Yudistira; Ruliana, Winda; Muzayanah, Umi
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 4 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i4.72

Abstract

Counterterrorism professionals in Indonesia face significant pressures due to the demanding nature of their work. This study was aimed at investigating stressors among Indonesian counterterrorism personnel. A mixed-methods research design was employed in the study. The results demonstrate that counterterrorism professionals, including national intelligence operatives, encounter stress chiefly from role expectations, workload, and insufficient social support. Different demographic groups view certain stressors as the most challenging. Furthermore, statistical evidence indicates that employment in security and national defence, or broader intelligence sectors significantly affects personnel's occupational stress levels. The study may help in developing resilience capacity-building strategies.
Integrating Modern Technologies and Intelligence Systems for Infectious Disease Preparedness: A Strategic Review Pasma, Satriani Aga
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 4 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i4.73

Abstract

Infectious disease outbreaks remain a persistent threat to global health, social stability, and national security. In recent years, the intersection of modern technology and public health has introduced transformative tools to enhance outbreak anticipation, surveillance, and response. This review aims to explore how technological innovations particularly artificial intelligence (AI), the Internet of Things (IoT), and digital health platforms can be strategically leveraged to strengthen national preparedness against emerging infectious diseases, with an emphasis on the intelligence sector’s role. Utilizing a systematic literature review approach, the study draws insights from scholarly articles, policy documents, and case studies published over the past ten years. Findings show that integrating technology into surveillance and early warning systems significantly improves detection and mitigation capabilities. However, challenges persist in data privacy, interoperability, and resource disparities, especially in developing countries. This paper highlights the importance of multisectoral collaboration, investment in digital infrastructure, and policy innovation to ensure that technological advancement translates into effective public health outcomes.
The Role of Intelligence in Countering Radicalism Threats within the Ranks of the Indonesian National Army (TNI AD) Jadmiko, Adi; Supriyadi, Supriyadi; Prasetyono, Budi
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 4 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i4.74

Abstract

Pancasila plays a role in maintaining national stability which can be achieved if the Indonesian people feel safe and peaceful and the integrity and sovereignty of the Indonesian state are protected from internal and external threats. Radicalism and terrorism are internal threats. Exposure to radicalism can cause a person to commit acts of terrorism. According to the data, it is known that the perpetrators of acts of radicalism and terrorism consist of the unemployed, unskilled workers, independent entrepreneurs, employees/employees, professionals, civil servants, public officials and the military. This research will examine how the role of intelligence in dealing with the threat of radicalism among Indonesian Army soldiers. The research method used is a qualitative approach. The results of the study show that the threat of radicalism among TNI AD soldiers is a real threat and there are 5 (five) TNI AD soldiers who are exposed to radicalism and are involved in criminal acts of terrorism. The exposure of TNI AD soldiers to radicalism is caused by internal and external factors, such as ideology and the economy. The role of intelligence to prevent this can be in the form of monitoring, close surveillance and profiling strategies for Indonesian Army soldiers. Apart from that, it was also carried out in the form of emphasis in the form of issuing a telegram from the TNI Commander regarding the prevention of radicalism and cooperation in preventing and overcoming radicalism with the BNPT and related agencies through the SKB 11 Ministers. The detection of TNI AD soldiers who were exposed to these radical views was through identifying symptoms of radicalism in TNI AD Soldiers by searching for evidence in the form of profiling them. Besides that, the internal situation of the institution was restored. After carrying out the detection, security is carried out in a preventive form by screening all TNI soldiers as well as security in a repressive form by efforts to develop mentality, deradicalization, and socialization of planting Pancasila ideological values.
Analysing ULMWP’s Online Propaganda Strategy Through Hank Prunckun’s ICV Framework Simamora, Nober Naung; Riyanta, Stanislaus; Masithoh, Nidia
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 4 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i4.75

Abstract

This study explores how the United Liberation Movement for West Papua (ULMWP) uses digital communication to promote Papua independence narratives and gain attention in international forums. Drawing on Prunckun’s Threat Analysis Theory (2015), this research examines ULMWP’s online propaganda strategies by assessing its intent, capability, and the vulnerabilities it targets. Using an explanatory qualitative method, data were collected from interviews with practitioners and secondary sources published between 2019 and 2023. The findings show that ULMWP consistently works to build global support while undermining Indonesia’s legitimacy through emotionally charged narratives focused on injustice and human rights. These efforts are implemented through coordinated digital activism and proactive engagement with international media, while uses a diplomatic mechanism. According to Ring’s Threat Level Classification (2009), ULMWP’s efforts fall between serious and critical categories given their impact on public perception and foreign policy challenges. The study suggests that stronger intelligence strategies are needed to maintain national cohesion in the digital era.
Empowered by Extremes: Indonesian Women In Jemaah Islamiyah (JI) & Jemaah Ansharut Daulat (JAD) Permana, Aulya Nanda
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 4 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i4.76

Abstract

This study examines the evolving roles of Indonesian women within terrorist networks, focusing on Jemaah Islamiyah (JI) and Jemaah Ansharut Daulah (JAD). Using Moghaddam's Staircase to Terrorism model and Riyanta's shortcut to terrorism model, this study analyzes how women's radicalization progresses through both gradual psychological and ideological processes and accelerated digital exposure. Data were drawn from secondary sources, including academic articles and case studies of Indonesian female extremists. Findings indicate that women's participation has expanded from supportive domestic roles to operational involvement as recruiters, propagandists, financiers, and suicide bombers. Their radicalization is often facilitated by family and marital networks, religious study groups (pengajian), and online propaganda, reflecting both traditional pathways and modern digital acceleration. The study argues that women's involvement in terrorism represents a paradoxical form of empowerment, breaking gender norms while simultaneously reinforcing ideological subjugation. This phenomenon highlights the shifting gender dynamics within extremist movements and emphasizes the importance of gender-sensitive approaches in Indonesia's counter-radicalization and rehabilitation strategies.
Assessing the Threat of Indonesian ISIS Returnees: An Analysis of Ideological Mindsets and Operational Capabilities Bimantara, Angga
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 4 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i4.77

Abstract

The return of Indonesian citizens formerly associated with the Islamic State of Iraq and Syria (ISIS) as Foreign Terrorist Fighters (FTF) presents a complex challenge to national security. This research analyzes the threat posed by these returnees by focusing on their ideological radicalization and operational capacity. This study utilizes a qualitative methodology, drawing data from semi-structured interviews with returnees, counter-terrorism practitioners from BNPT, Densus 88, and BIN, and academic experts. The analysis is framed by two specific theories: Randy Borum’s "The Terrorist Mindset" to assess the stages of ideological development, and Kevin Riehle’s threat formula (Threat = Intent x Capability x Opportunity) to evaluate operational risk. The findings reveal a significant polarization in threat profiles. First, the "Combatant Profile" (including combat veterans and frustrated travelers) possesses high operational capabilities and knowledge and maintains latent ideological intent, driven by eschatological beliefs and network connections, posing a high-level, active threat. Second, the "Non-Combatant Profile" (including "civil society" members and dependents) demonstrates a near-total erosion of intent, driven by profound disillusionment with the reality of ISIS and traumatic experiences. While their ideological threat is low, they face significant socio-economic vulnerabilities. The study concludes that the threat from ISIS returnees is not monolithic and requires a bifurcated security response: prioritizing disengagement and surveillance for the high-risk combatant profile, while focusing on socio-economic integration for the low-risk, non-combatant profile to mitigate vulnerabilities.
New Approaches and Concepts in Intelligence Studies: Actor-Network Theory in the Transformation of Security Intelligence Mulya, Ade
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 4 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i4.78

Abstract

This article examines the fundamental transformations in the study and practice of security intelligence driven by technological convergence, the emergence of non-traditional threats, and the shifting ontology of human-technology interaction. Using the theoretical framework of Actor-Network Theory (ANT) developed by Bruno Latour, this study reanalyzes the intelligence cycle, focusing on recognizing the agency of non-human actors. This approach explicitly rejects the traditional, linear model of the intelligence cycle, which is increasingly inadequate to capture the dynamics of contemporary intelligence. Key findings demonstrate that modern intelligence practice operates as a constantly shifting, heterogeneous network, in which human actors (e.g., analysts, field officers) and non-human actors equally have agency (actancy) and "translate" the roles and functions of each other (translation). This transformation, although increasing operational efficiency, however, raises critical governance challenges. This is especially related to the phenomenon of algorithmic black-boxing, which threatens transparency, accountability, and democratic legitimacy in the use of security intelligence. This study concludes that recognizing the agency of non-human actors is crucial for designing adaptive distributed accountability frameworks that address the complexities of contemporary intelligence.
Transforming Intelligence Operations in Indonesia: Challenges and Opportunities in the Digital Age Al Waro'i, Muhammad Nur Abdul Latif
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 4 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i4.79

Abstract

The digital revolution has transformed global intelligence paradigms, making advanced technology essential for modernizing national security systems. This paper discusses the integration of digital technologies, such as Artificial Intelligence (AI), Machine Learning (ML), big data analytics, and cybersecurity, into Indonesia's intelligence operations. Traditionally, Indonesia's intelligence relied on Human Intelligence (HUMINT) and Signal Intelligence (SIGINT), but the rise of digital threats such as cyberattacks, terrorism, and social media-driven radicalization now demands the adoption of advanced technologies to improve detection and response effectiveness. This study uses a qualitative methodology and conducts an extensive literature review of academic articles, policy reports, and case studies to explore the application of digital technologies in Indonesia’s intelligence context. Key findings reveal that, although AI, big data, and other digital tools present significant potential, their integration is hindered by inadequate infrastructure, data privacy and security concerns, and cultural resistance within the intelligence community. The study recommends improving digital infrastructure, strengthening cybersecurity policies, and fostering public-private partnerships and international collaborations to support Indonesia’s intelligence modernization efforts. This research emphasizes the need for continued investment in technology and inter-agency cooperation to enhance Indonesia’s intelligence capabilities, ensuring that the country is prepared to tackle 21st-century security challenges.

Page 1 of 1 | Total Record : 9