cover
Contact Name
Stanislaus Riyanta
Contact Email
sitjournal09@gmail.com
Phone
-
Journal Mail Official
adminjurnal@sitjournal.com
Editorial Address
Jln. Dr. Sutomo, No. 9, Pasar Baru, Jakarta Pusat
Location
Kota adm. jakarta pusat,
Dki jakarta
INDONESIA
Security Intelligence Terrorism Journal (SITJ)
ISSN : -     EISSN : 30637473     DOI : https://doi.org/10.70710/sitj
Core Subject : Social,
Security Intelligence Terrorism Journal (SITJ) is a leading journal focused on the role of intelligence and secretive agencies in international relations and counterterrorism
Articles 55 Documents
Utilization of Artificial Intelligence in Monitoring and Mitigating National Security Threats Wiranata, Angga Junior
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i2.16

Abstract

Implementing Artificial Intelligence (AI) in the context of national security has become a critically important topic in addressing increasingly complex modern threats. This article examines various AI applications in monitoring and mitigating national security threats, such as managing critical infrastructure, risk assessment, and adaptive responses to crises. By adopting the socio-technical systems theory approach, this approach recognizes the complexity of interactions between AI technology, human decisions, and operational environments that impact national security. Recommendations include increased investment in advanced AI infrastructure and more profound training for AI and the national security workforce. It is expected that mature AI implementation can significantly impact maintaining stability and national security in this dynamic digital era.
Counter Radicalization in Cyberspace by the Police Akbari, Abim Aji; Sagena, Basir; Muhamad Syauqillah
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i2.17

Abstract

This article examines further how the Indonesian police carry out counter-radicalization enforcement in cyberspace. This is important because radicalism triggers a person to be violent towards different views, and this does not follow the nature of the diversity of the Indonesian nation. Radicalism is the embryo of terrorism. This situation becomes more dangerous when radicalization efforts are carried out through cyberspace, which can be accessed by the entire community, including impressionable teenagers. In this regard, the Indonesian National Police, which maintains security and order and protects the community, also takes part in counter-radicalization in cyberspace to ward off negative influences that underlie intolerant and radical actions. This particular observation of the role of the police against radicalism through online media is what then differentiates it from similar research. The discussion uses a qualitative research approach and literature study method, incorporating counter-radicalisation theory through the Internet. This paper finds that counter-radicalization in cyberspace by the police is cyber patrols and content takedown, establishing a social media task force, increasing the role of moderate religious mass organizations, strengthening religious literacy, and collaborating with national and international institutions and digital platforms. In addition, law enforcement is following the ITE Law and the Terrorism Law.
The Analysis of Dangerous Face-Cream Cosmetic Product Threats and Preventive Strategies Anggraini, Shinta
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i2.18

Abstract

Cosmetics have now transformed into one of the daily necessities and are consumed by all demographics, both young and old, men and women. The increase in demand and need for cosmetic products was initially only for beauty purposes, but it has since evolved to include health, body care, and hygiene needs, culminating in the current trend of smooth and flawless skin, commonly known as glass skin, using a series of specific facial cream cosmetic products. The increase in public demand for facial cream cosmetic products presents an opportunity for threats to human security, where cosmetics manufacturer seek maximum profit by adding several hazardous substances, thereby posing a risk to public health. This research was conducted using qualitative research methods with data collection techniques from interviews, observations, and library research. The research results indicate a serious threat from dangerous facial cream cosmetic products with various evolving modes that 'outsmart' regulations, actions carried out by individuals who possess facilities, capital, knowledge, and access related to these matters. Therefore, it is necessary to formulate appropriate strategies to prevent strategic surprises through scenario planning that outlines several intelligence strategies to prevent and anticipate them.
Threat Analysis of Khilafatul Muslimin’s Existence as A Radical Organization in Indonesia Ma'ruf, Al Hadid Dwi Putera
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i2.21

Abstract

Khilafatul Muslimin (KM) is an organization established with the aim of founding a caliphate or khilafah, a system of governance based on an exclusive interpretation of Islamic leadership principles. This group promotes an ideology of the caliphate that contradicts Pancasila, Indonesia's foundational ideology, by advocating for governance rooted solely in Islamic law and singular Islamic leadership. It rejects Indonesia's principles of pluralism and democracy. The continuous efforts by KM to establish a caliphate pose a potential threat to Indonesia's sovereignty. This study aims to analyze the threats posed by KM and propose intelligence strategies to address their presence in society. A descriptive qualitative research method was employed, grounded in an inductive perspective. The analysis, based on Hank Prunckun's threat assessment framework, indicates that the threat posed by KM is at a medium level. Further threat analysis reveals that KM has the threat factors outlined by Kevin Riehle including intent, capability, and opportunity. These findings are supported by insights from perspective of the Terrorist Mindset developed by Randy Borum.
China's Cybersecurity Governance As Part Of Foreign And Security Policy Murniasari, Mira
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 2 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i2.23

Abstract

Cyberspace has become a new method of interaction for humans in the digital industrial era. One of the countries that play an important role in global cyberspace is China, which has the largest number of internet users, reaching 989 million. This has prompted Chinese Government to formulate a complex cybersecurity governance strategy to maintain national stability and security. Therefore, this study aims to explore China's approach to cybersecurity at domestic and foreign levels. Domestic level explores the governance in the country by examining strategic documents, policies, as well as legal and institutional frameworks, while foreign level discusses cybersecurity as part of foreign and security policy. The primary focus of this study is the series of Chinese diplomatic initiatives aimed at shaping governance norms across various international forums.
The Potential Threat Of Iran's Nuclear Conflict To Nuclear Proliferation In Southeast Asia Djakaria, As'ad Syamsul Arif
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 1 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i1.24

Abstract

This study examines the potential impact of Iran's nuclear program on the perceptions of security in Southeast Asia, highlighting how Iran's resilience under international pressure could influence ASEAN nations. Using the diffusion of norms theory, the paper identifies Iran's actions as a precedent that may inspire similar pursuits in the region, threatening regional stability. It further explores Indonesia's strategic role in addressing this challenge through diplomatic initiatives, proactive leadership in ASEAN frameworks, and the development of peaceful nuclear technology. Strengthened collaboration with international bodies such as the IAEA and robust regional policies are essential to ensure nuclear development remains focused on peaceful purposes. Indonesia’s leadership in advocating non-proliferation, fostering regional cooperation, and mediating conflicts is critical to maintaining Southeast Asia as a nuclear-weapon-free zone. The findings underline the need for comprehensive strategies to mitigate proliferation risks while enhancing regional security and stability.
Early Intelligence Detection of LGBT in the Selection of Indonesian National Police (POLRI) Recruits Trapsilo, Firso
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 1 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i1.25

Abstract

This study focuses on early detection of the threat of LGBT inclusion in the Indonesian National Police, primarily by selecting police recruits. This research uses a qualitative method with a descriptive design. The results of the study show that there is evidence of LGBT threats to the Police, both at the recruitment selection stage as well as among active members of the Police. Early detection and prevention efforts against this threat need to focus on strengthening the criteria and stages of the selection of police recruits. Especially at the Mental and Personality Investigation (in Bahasa Indonesia: Penelusuan Mental Kepribadian or Mental and Personality Investigation) stage. This research then suggests a procedure for checking social media as one of the stages in the selection of police officers and the need for more detailed indicators as guidelines for assessing LGBT threats at the selection stage of police officers.
Kufal Symbiosis: Collaboration of Artificial Intelligence and Terrorist Organizations Guna, Wahyu Jati Arya
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 1 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i1.28

Abstract

This paper delves into the phenomenon of "kufal symbiosis,” which refers to the collaboration between artificial intelligence (AI) and terrorist organizations. It highlights AI’s potential to enhance the efficiency of terrorist operations. While AI can be used to recruit new members and plan more sophisticated attacks, security agencies face challenges in adapting this technology to counter terrorism effectively. This paper discussed the crucial need to strike a balance between individual privacy and national security, as well as the difficulties of managing large-scale data with limited resources. Additionally, the use of technology such as deepfakes and botnets by terrorist organizations might lead to confusion and intensify the impact of their attacks. The discussion also addresses cyberattacks on smart cities, exposing the vulnerabilities in infrastructure to cyber threats. In conclusion, while AI enhances the efficiency of terrorist operations, it also equips security agencies to prevent such threats despite the ongoing struggle to balance privacy and security.
Green Arms Race: Indonesia's Critical Minerals and its Sprint for Renewable Energy Sovereignty Pasaribu, Naek Tua; Tama, Airlangga Aji; Azzari, Muhamad Kevin; Gautama, Ivan
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 1 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i1.30

Abstract

The increasing global demand for renewable energy has pushed countries around the world to compete in acquiring critical minerals and developing green technology. This article aims to examine the policies, regulations, and incentives implemented by the Indonesian government to leverage its vast reserves of critical minerals such as nickel, tin, and rare earth elements. It also aims to compare Indonesia's approach with the strategies employed by major players like China and the United States. The analysis highlights Indonesia's strengths, including its mineral wealth and supportive policies, as well as challenges such as technological readiness and regulatory hurdles. The research aims to provide insights into how Indonesia can enhance its renewable energy capabilities and achieve energy sovereignty while navigating the complex geopolitical landscape by using SWOT and intelligence analysis. The results indicate that the Indonesian government must improve its efforts to maximize its own potential, including by maintaining the availability of mineral resources, establishing robust regulations, and providing incentives for developers in the renewable energy sector. Additionally, it is crucial to promptly address the issues that hinder Indonesia's progress in achieving renewable energy sovereignty, such as updating mineral reserve data, adapting technology and improving human resources, and enhancing oversight to prevent illegal smuggling of mineral resources for renewable energy.
Cyber Warfare And Its Place In Modern Geopolitics And War Aryasatya, Idden; Daryanto, Eko
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 1 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i1.31

Abstract

There are now major cybersecurity concerns as a result of how fast technology has changed geopolitics. Attacks against a nation's communication, infrastructure, and economy through cyber espionage, sabotage, disinformation, and DDoS attacks undermine national stability. The high level of digital integration in industrialized nations makes them easy targets, while the lack of resources and digital knowledge makes underdeveloped nations vulnerable. There has to be international collaboration on cybersecurity rules and ethics because of this chasm. While cutting-edge innovation like AI strengthens defenses, it also introduces new dangers and raises new ethical questions. This study delves into the consequences of cyberwarfare. It highlights the importance of strong cybersecurity measures, online education, and global cooperation to safeguard nations and their inhabitants against ever-changing cyber dangers.