cover
Contact Name
Stanislaus Riyanta
Contact Email
sitjournal09@gmail.com
Phone
-
Journal Mail Official
adminjurnal@sitjournal.com
Editorial Address
Jln. Dr. Sutomo, No. 9, Pasar Baru, Jakarta Pusat
Location
Kota adm. jakarta pusat,
Dki jakarta
INDONESIA
Security Intelligence Terrorism Journal (SITJ)
ISSN : -     EISSN : 30637473     DOI : https://doi.org/10.70710/sitj
Core Subject : Social,
Security Intelligence Terrorism Journal (SITJ) is a leading journal focused on the role of intelligence and secretive agencies in international relations and counterterrorism
Articles 55 Documents
The Role of Intelligence in Countering the Threat of Used Imported Clothing Smuggling to Indonesia's Economic Security Arnolda, Ralex; Widyarsih, A. Victoria Rahajeng; Sunny, Amril Gaffar
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 3 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i3.58

Abstract

Public interest in used imported clothing is increasing due to various factors. The government has made various efforts to prevent the entry and circulation of used imported clothing through the creation of regulations, supervision and enforcement measures. However, the existence of used imported clothing remains latent in the community. This condition poses a threat to economic resilience, especially to the clothing industry, which is one of the mainstay industries of the Indonesian economy. This research will analyze the threat posed by the presence of used clothing through four stages of intelligence analysis. Then, it will categorize whether the threat of second-hand clothing is included in the threat capable of disrupting economic resilience. In addition, this research will use information obtained from interviews with informants to strengthen the results of the analysis. The data and information obtained will be triangulated to strengthen the results of the analysis. The results of this study found that the threat of used imported clothing is included in the moderate to serious threat level because it can result in shocks to industrial and economic output/production, increased unemployment, instability of exchange rates and foreign exchange reserves, and health threats. If left unchecked, this latent threat could pose social and economic risks if it reaches its culmination point. This research found that there is a need to strengthen and affirm the laws and regulations. In addition, this study found that at the operational and policy tactical level, the role of intelligence needs to be improved to prevent the presence of imported used clothing imports to a non-threatening point, such as by improving early detection measures, operational cooperation between institutions, exchanging human resource recruitment and intelligence capacity building.
Coordination Between the Indonesian Food and Drug Authority Regional Office in Palangka Raya and J&T Express Palangka Raya in Tackling the Distribution of Frequently Misused Certain Drugs in Central Kalimantan Marzio, Aldy
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 3 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i3.60

Abstract

This paper aims to explain the coordination process between the Indonesian Food and Drug Authority Regional Office in Palangka Raya (BBPOM Palangka Raya) and J&T Express Palangka Raya in tackling the distribution of Certain Drugs Frequently Misused (Obat-Obat Tertentu/OOT) in Central Kalimantan, as well as to conduct a SWOT analysis of the coordination. The findings indicate that the coordination between BBPOM Palangka Raya and J&T Express Palangka Raya was initiated through the activity titled “Strengthening Cooperation between BBPOM Palangka Raya, ASPERINDO, and Courier Service Companies,” held on September 12, 2022. Throughout 2023, BBPOM Palangka Raya and J&T Express Palangka Raya collaborated in seizing and opening packages suspected of containing OOT to obtain information regarding the types of products and the identities of the senders and recipients. Laboratory tests were also conducted to verify the OOT products' contents in these parcels. The coordination represents a form of vertical coordination, influenced by mutual awareness, effective communication, clear division of tasks, and discipline. Although the coordination has strengthened oversight, BBPOM Palangka Raya remains dependent on the Directorate of Food and Drug Intelligence of BPOM for information regarding the shipment of packages containing OOT. This coordination also presents opportunities for public outreach and training for other courier service companies and the development of a technology-based monitoring system. However, the distribution of OOT may evolve into more complex and less detectable methods. Furthermore, budget efficiency policies may challenge BBPOM Palangka Raya in effectively coordinating with J&T Express Palangka Raya.
Intelligence Failures in the Asymmetric War between Ukraine and Russia: A Literature Review of Ukraine's Drone Attacks on Russian Military Infrastructure Ito, Tarsito
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 3 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i3.63

Abstract

The asymmetric war between Ukraine and Russia since the Russian invasion in February 2022 has demonstrated a major transformation in the conduct of modern warfare. This study focuses on analyzing Russia’s intelligence failures in responding to Ukraine’s drone attacks on Russian military infrastructure. Despite its limited conventional military resources, Ukraine has successfully employed tactical strategies by utilizing low-cost yet effective drone technology, including First-Person View (FPV) and modified commercial drones. These attacks have damaged Russia’s strategic targets and exposed structural vulnerabilities in Russia’s defense and intelligence systems. This research explores how Russia’s intelligence system, which relies on hierarchical and conventional approaches, has failed to adequately prepare for new threats posed by lightweight, flexible technologies. Using a qualitative literature review method, this study identifies that shifting toward low-tech warfare and systemic disruption requires profound reforms in Russia’s intelligence structure and defense system. These findings are relevant in the military context and provide important insights for resource-constrained countries in designing more adaptive defense strategies against asymmetric threats in the 21st century.
Indonesia's Diplomatic Strategy in Countering Vanuatu's Support for the Papuan Separatist Movement in the South Pacific Setiawan, Dani Eka; Subanidja, Steph
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 3 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i3.64

Abstract

This research analyzes Vanuatu's diplomatic strategy in supporting the separatist movement in Papua and Indonesia's response through intelligence and policy approaches. Using qualitative methods, data were collected through in-depth interviews with stakeholders, analysis of official documents, and participant observation. The results show that Vanuatu utilizes international forums such as the UN and the Melanesian Spearhead Group (MSG) to promote the Papuan issue, supported by a network of pro-independence activists. Indonesia responds through active diplomacy, counter-narratives, and increased economic cooperation with Pacific countries. Intelligence analysis identifies threats to national sovereignty, while policy recommendations emphasize a multilateral approach and strengthening domestic security. These findings contribute to the literature on separatist conflict management and the role of intelligence in foreign policy.
Utilization Of Geospatial Intelligence (Geoint) In The Intelligence Cycle To Support The Role Of State Intelligence In Indonesia Djati, Wisnu Hastungkoro; Gunawan, Diah Setyorini
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 3 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i3.65

Abstract

The development of information technology has changed the paradigm of access to intelligence resources globally, including in the field of Geospatial intelligence (Geoint). Geoint integrates Imaginary intelligence (Imint) and Geospatial data (Geoinfo) in the context of strategic intelligence for comprehensive collection and analysis of geographic conditions and enemy activities. This paper highlights the utilization of Geoint in supporting the role of state intelligence in Indonesia in the intelligence cycle. The result of this paper shows the potential of Geoint to be utilized in supporting the role of intelligence organizations, especially in Indonesia, in dealing with dynamic threats that are evolving into new-style warfare. In the intelligence cycle, Geoint provides the necessary geospatial data and information and facilitates the process of planning, collecting, processing, and distributing information to support national security policy.
Funding Modes of Terrorist Groups in the Digital Age: Challenges and Solutions Based on Information Technology Sofyan, Muhammad; Prindani, Tubagus Ami
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 3 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i3.66

Abstract

The digital era has changed the landscape of terrorism financing, where information technology such as blockchain, crypto assets, and digital platforms are strategically used to disguise cash flows and evade authority surveillance. This study aims to identify and analyse the modus operandi of terrorist group funding in the digital age and formulate information technology-based solutions to address it. The approach used is qualitative, employing a literature review method, integrating Crime Script Analysis (CSA) theory to map the stages of crime and Rational Choice Theory (RCT) to understand the rational motives of perpetrators in choosing digital means. The research findings indicate that funding methods include using cryptocurrency through illegal exchanges, exploiting nominee accounts, misusing digital charitable institutions, and cross-border peer-to-peer money transfer systems. Blockchain provides high anonymity and cross-border flexibility, which are exploited to obscure transaction traces. The main challenges identified include regulatory limitations, a lack of interoperability in financial surveillance systems, and law enforcement agencies' low capacity to address high-tech crimes. As a response, this study proposes five technology-based solutions: Cyber Crime Big Data Analytics, the use of Artificial Intelligence (AI) in Open Source Intelligence (OSINT), the establishment of an integrated Command Centre, the enhancement of Data Surveillance systems, and the strengthening of national Data Centres. These solutions are believed to enhance the effectiveness of real-time prevention and detection of digital terrorism financing. This study recommends cross-sector collaboration and strategic investment in information technology development as the key to mitigating the threat of digital terrorism financing in the future.
The Use of Artificial Intelligence in the Integration for Process Intelligence Data Sources Analysis Ronitua, Justinus
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 3 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i3.67

Abstract

Integrating and analyzing intelligent data is a significant challenge in a digital age characterized by abundant data from various sources. The application of Artificial Intelligence (AI) offers a potential solution to address this complexity. This article explores AI's role in analyzing the integration of intelligence data sources, highlighting its benefits, challenges, and implications for strategic decision-making. The main problem to be addressed in this study is how AI can assist in the intelligence integration analysis process. The method used in this research is a qualitative method based on a literature review. The result of this study is that there are at least 4 (four) mechanisms of Artificial Intelligence (AI) utilization in analyzing the integration of intelligence data sources, namely machine learning mechanisms, search methods and optimization theory, knowledge-based and reasoning, and decision-making algorithms. Evaluation of AI implementation must be accompanied by attention to security challenges, ethics, and technological limitations. With the right approach, AI can be a powerful tool in supporting strategic decision-making and maintaining national security.
Geospatial Intelligence Analysis to Predict Acts of Security Disturbance by KSTP in Nduga Regency, Papua Mountainous Province Sumampouw, Giovanni Leonardo; Nurisnaeny, Poppy Setiawati
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 3 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i3.68

Abstract

The problem of security disturbance actions with the aim of separatism, which has been carried out by the Papuan Separatist Movement Organization (KSTP), has resulted in many casualties, both civilians and TNI and Polri security forces, and threatens security stability in Papua. Intelligence is central in thwarting and eliminating threats to state sovereignty through active and systematic observation of potential threats, facilitating early detection. This research aims to provide an overview of the importance of geospatial intelligence (GEOINT) analysis in predicting the actions of security disturbances by KSTP in Nduga Regency, Papua Mountainous Province. The research method employed is the GEOINT methodology, based on the Mellion model, which comprises planning, information collection, processing, analysis, and dissemination phases. The results of the research conducted, namely GEOINT, have an important role in supporting the implementation of intelligence operations in Nduga Regency, because it produces a visual picture of the movement of KSTP through the geocoding process of security disturbance action information for the period May 2022 to June 2023.
Collateral Damages of Military Operations in Nigeria Maigari, Muhammad Abdullahi
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 3 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i3.69

Abstract

The paper has chronologically documented all incidences of collateral damage caused by military operations in Nigeria. From 2009 to 2025, military personnel, alongside other armed forces, were deployed to different parts of Nigeria as part of a strategy for internal security management. In the course of discharging their duty, the Nigerian forces missed their targets and their attacks hit defenceless civilians nineteen times. This research aims to identify the causal factors for collateral damage in internal security operations by the Nigerian military in Nigeria and to examine its implications. To explore redress options for the victims or their relatives. An explanatory research design is adopted to explain the episodic collateral damage that military operations cause, especially in Northern Nigeria. The findings revealed that a total of 19 episodes of collateral damage occurred in Nigeria and all in Northern Nigeria, because that is where the military has been battling with different non-state actors who took up arms against the government and those who have been kidnapping people for ransom, killing people, and stealing their livestock. Also, operational negligence was identified as one of the major causes of collateral damage in Nigeria because all of the fighter jets possessed by the Nigerian military have high definition cameras that can view images accurately regardless of the distance to the ground; hence, the operators are supposed to distinguish between armed & unarmed people on the ground. Another factor is operational recklessness because they are supposed to differentiate between settlements/villages of terrorists and non-targeted villages before launching an attack. Therefore, it is recommended that the Federal Government, which has all the armed forces in Nigeria under its control, should ensure that they are well-trained to protect civilians when carrying out air raids to avoid collateral damage at all costs. Members of the National Assembly should enact laws that specifically punish security operatives who, out of negligence or deliberately, kill defenceless civilians or non-targets of attacks during military operations.
A Critical Review of the Impact of Inadequate Legislative Frameworks on National Security in Nigeria Tabiowo, Ezrel
Security Intelligence Terrorism Journal (SITJ) Vol. 2 No. 3 (2025)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v2i3.70

Abstract

Inadequate legislative frameworks in Nigeria have exacerbated national security vulnerabilities, allowing threats like terrorism and insurgency to proliferate unchecked. Recent enactments, including the Terrorism Prevention and Prohibition Act 2022 (Federal Republic of Nigeria, 2022) and the Cybercrimes (Prevention, Prohibition etc.) (Amendment) Act 2024 (Federal Republic of Nigeria, 2024), reveal critical gaps in addressing evolving dangers from groups such as Boko Haram, its splinter factions ISWAP and JAS, the emerging Lakurawa network in northwestern and northeastern states, and the militant Mahmuda group in north-central regions like Kwara and Niger states. These deficiencies manifest in poorly enforced provisions on counter-terrorism, cyber defenses, border control, and internal stability, leading to heightened violence, cross-border incursions, and digital vulnerabilities. By critically analyzing the interplay between legislative shortcomings and security challenges, this review highlights how outdated mechanisms fail to adapt to dynamic threats, resulting in civilian casualties, economic disruptions, and weakened state authority. Urgent reforms are essential to bolster Nigeria's legal infrastructure for enhanced security outcomes.