Evaluation of the VVIP Security System in Cases of
Terrorism in Indonesia
Christo Manafe, Sapto Priyanto, Imam Subandi
Prodi Kajian
Terorisme, SKSG Universitas Indonesia, Indonesia
[email protected], [email protected], [email protected]
Keywords |
|
ABSTRACT |
||
Evaluation,
System, Security, VVIP/VIP |
|
Acts of terrorism targeting Very
Very Important Person (VVIP) have occurred several times in Indonesia. This
shows that VVIP is one of the targets of terrorist attacks. So that the
evaluation of the VVIP security system is mandatory, so that VVIP� do not become victims of terrorist attacks
again. The human factor, namely the mistakes of VVIP security officers,
became the dominant factor in the success of terrorist attacks on VVIP. Strict
sanctions against security officers who violate applicable rules need to be
implemented so that other security officers do not repeat them. The
implementation of a strict VVIP security system SOP is a must so that no more
terrorist attacks against VVIP occur. In routine activity theory, a capable
guard system can prevent a person from becoming a target for crime
(terrorism). |
||
|
|
|
||
|
|
|||
INTRODUCTION
Assaults on government officials or prominent
figures in a nation are not a novel problem. Attacks that result in mortality
are the most catastrophic. There are numerous causes for these attacks,
including conflicts of interest between individuals or organizations. Such
incidents undermine a nation's reputation for protecting its territory and all
of its citizens. The
occurrence of events in multiple nations that target chiefs of state or other
government officials signifies the commencement of targeted terrorist attacks.
No longer is the emphasis on massive assaults that negatively impact the
general public.
Incident Attack on VVIP
Official in Indonesia
Given the numerous attacks
on leaders and government officials overseas, it is conceivable that similar
incidents could transpire in Indonesia. An instance of this was the terrorist
assault on Matori Abdul Djalil, who was then a deputy chair of the People's
Consultative Assembly (MPR) (Agus, 2018). His last role was as Minister of Defense for the Republic of Indonesia
from 2001 to 2004, under the Mutual Assistance Cabinet, and he passed away in
2007 due to illness. The attack on M. Abdul Djalil took place in the Tanjung
Mas Raya residential complex in South Jakarta. Around 08:30 WIB, Matori Abdul
Djalil was surveying the progress of an extension to his house. Concurrently,
two men approached carrying pamphlets and offering household goods. As one of the
attackers and Matori Abdul Djalil conversed, one of the supposed salesmen
unexpectedly brandished a sharp object and attacked Matori Abdul Djalil. The
attackers fled the scene on a motorbike, one was killed by an angry mob, and
the other was apprehended by police after four days on the run.
M. Abdul Djalil was
quickly rushed to the hospital, and due to immediate medical assistance, he
survived. The assault's perpetrators were Sarmo (who was killed by the mob) and
Tanzul Arifin, also known as Sabar or Pipin. The attack's orchestrators were
Zulfikar and Hasnullah, the Qur'anic tutors of Tanzul's family. The motive
behind the assassination attempt on Matori Abdul Jalil was the assailants'
perception that he had strayed from Islamic teachings, which made him seem like
a figure who was unwilling to support Muslims and appeared as a leader of the
Indonesian Communist Party (PKI) who had converted to Islam. During
a peak period of terrorism in Indonesia, marked by numerous bombings and
instances of Indonesian citizens affiliating with the Islamic State of Iraq and
Syria (ISIS) and later wishing to return to Indonesia, assaults on government
officials became a recurring event. This included the stabbing incident
involving Wiranto, who was, at that moment, the Coordinating Minister for
Political, Legal, and Security Affairs.
Wiranto, a military veteran who last held the
four-star rank of General as the Commander of the Indonesian National Armed
Forces (TNI), served as the Coordinating Minister from 2016 to 2019 before
becoming a member of the Presidential Advisory Council in 2019. His stabbing
took place while attending the inauguration event at Mathla'ul Anwar
University, a component of the Joint Lecture Building project (Devina,
2019). The
event was a meticulously planned part of a series of activities by the
committee, involving local TNI and Police security forces. When the
Coordinating Minister's motorcade reached the Pandeglang city square, a lapse
in attention from local security forces and personal security detail occurred
as the minister prepared to exit his vehicle. Suddenly, a man wielding a sharp
object launched an attack from his side.
The Coordinating Minister was assaulted by a
married couple in the Menes village yard, a thriving economic center in that area,
which is located in the Pandeglang district of Banten. The incident took place
as the Minister was preparing to greet some members of the welcoming party
following the conclusion of an event and the inauguration of a learning
facility at Mathla'ul Anwar University. The perpetrators, identified as SA and
his wife FA, attacked the Minister with a sharp weapon, resulting in injuries.
Promptly, the Minister was evacuated to RSPAD in Jakarta, where they received
immediate and intensive medical treatment at the hospital. Highly important
figures such as VVIPs can be subjected to an array of dangers including
abductions, planned killings, or assaults from anonymous individuals or
terrorist factions. To counteract these threats, VVIP individuals often have
bodyguard accompaniments and are under stringent observation.
Additionally, all security arrangements must be
attentively and accurately established to shield the VVIPs from any potential
risks. Failures in VVIP protection can arise from a lack of coordination amongst
all parties participating in security, like police forces, military,
intelligence personnel, and other security organizations. A deficient number of
security staff can reduce the effectiveness of VVIP protection, as these duties
are multifaceted and call for specialized skills. Modern security technology
plays a crucial role in bolstering VVIP security. Insufficient security
technology can amplify the challenge of ensuring VVIP safety and leave room for
criminal activity. Terrorist onslaughts and other illegal acts are usually
schemed surreptitiously, so lacking or inadequate intelligence can render VVIP
protection ineffectual.
Poorly executed training and readiness can lead to
security lapses, particularly in emergency scenarios, which can lead to failures
or even imperil the life of the VVIP themselves.Repeated attacks on state heads
and top-tier government officials in Indonesia have been an ongoing incident,
stretching back to the post-independence phase of the Republic of Indonesia
from its first president till today. These assaults are committed by radical
factions or those possessing ideologies that clash with the government's
ideology, Pancasila. As a result, the government has laid down a legal
framework through Indonesian legislation to provide a legal base for officers
performing duties as personal bodyguards for state heads or government
officials. This is done so that field officers can adhere to the established
security protocols and make decisions to act without hesitation.
Head of State
High-ranking officials at both the national and
regional level, such as heads of state and regional leaders, serve as potent
symbols of a country's and region's authority and sovereignty. If an event
occurs - such as an attack - which could inflict harm, potentially causing
injury or death to these officials, the implications are far-reaching for the
nation or region. This would have a significant ripple effect on all aspects of
life, predominantly destabilizing the security of the region. Consequently, it
could trigger a security crisis. The influence on national stability can be
significant. Observers also believe that the presence and protection of VVIPs
can create a sense of safety and order among citizens. This can promote social
and economic stability (Agetha
et al. 2022). VVIPs
often become the primary targets of terrorist acts. Careful protection can
prevent terrorist actions and ensure the smooth execution of public events such
as public meetings, work visits, and speeches. The presence of high-level
guests in a country can provide opportunities to enhance diplomatic relations
between the two countries. This can boost business and policy cooperation. A
country capable of providing support and protection for VVIPs can build a
positive image in the international community. This can help increase the trust
and legitimacy of the country in various components, which of course has a
correlation with security issues and international relations in the world.
Heads of state or officials given VVIP status,
this classification can be given to individuals or groups in accordance with
applicable regulations, have the right to be protected, escorted, and it is the
duty of the related security apparatus to provide their security. Every country
has agencies or organizations to closely guard, for example, in America, the
head of state and his family are protected by the Secret Service in zone ring 1
and other security assistance from the local security forces, while in
Indonesia, the escort and protection for the president and his family are
carried out by the presidential security forces or known as Paspampres.
Meanwhile, for ministers and other high-ranking officials, it is carried out by
the assistance unit from the TNI and Polri, who already have special capabilities
in the field of protection and escorting VVIP and VIP guests. The types of
security activities that must be carried out by the Presidential Security
Forces and supported by other units or related agencies for the smooth running
of security duties. It can be concluded that the most important series of
security activities is personal security carried out in a continuous and
attached manner for the safety of VVIP officials.
While for the duration, it is based on the end of
the VVIP official's term of office and the end of the activities carried out by
the official. In addition, the President and Vice President are symbols of the
state, this certainly needs to receive special attention. Apart from that, the
need for the President and Vice President as a VVIP classification, because it
is a symbol of the people through a general election to determine a head of
state in order to lead the Indonesian nation in accordance with the practice of
Pancasila and the 1945 Constitution. After the term of the President and Vice
President is over, they also need to be secured by the state. Considering
several factors, one of which is to respect and honor the performance they have
given during their tenure to the State. Besides, they are individuals who issue
policies and confidential information related to the state directly, which must
be protected from threats from external or internal parties. The President,
Vice President, Former State Head Officials, families, and Heads of Government
or heads of government are symbols of a sovereign state that must receive
special treatment and attention, with classification as Very Very Important
Person (VVIP). The
implementation of Security Operations to the President, Vice President, Former
State Head Officials, families, and Heads of Government or heads of government
(hereinafter referred to as VVIP Opspam) is based on an organized security
operation pattern that pays attention to goals, objectives, principles,
principles and other provisions. expected to create maximum synergy and can
produce an optimal level of VVIP security.
VVIP Security to Its Protected Objects
The methods and mechanisms of ensuring the
security of VVIPs vary among countries and security agencies, and they
continuously evolve in response to advancements in technology and the
escalating threats posed by potential attackers. However, the fundamental
principles remain constant: the safety and well-being of VVIPs must always be
prioritized. Any minor obstacles or problems that result in injury or harm to
VVIPs are considered failures, even if security measures were implemented to
the fullest extent. In the implementation of special operations for the
security of Presidents, Vice Presidents, and other individuals classified as
VVIPs, the focus should always be on preventive actions rather than repressive
measures. This means that the security agency or team responsible for VVIP
protection should follow a four-stage approach: planning, preparation,
implementation, and termination. Each stage requires careful coordination and
consideration of potential threats, challenges, disruptions, and obstacles that
may arise at any given time. By adhering to this approach, security teams can
proactively address security concerns and mitigate risks to ensure the safety
and comfort of VVIPs. It is essential to stay vigilant and adapt security
strategies to counter evolving threats, maintaining a high level of
professionalism and expertise in VVIP security operations.VVIP security is an
important part of a preparation stage for an event or visit involving important
figures and categorized as VVIP. Or as people who have high influence and
interest, VVIPs must certainly get maximum protection and security to ensure
their safety and security during the process of series of activities or the process
of serving an important position in a country or government. VVIP security
involves a number of procedures and policies designed to ensure their safety
and security.
Route management for VVIPs involves coordination
with numerous agencies and security entities in the region. Familiarity with
the local area's typology that will be used as a VVIP route aids in executing
this task efficiently and effectively. The foremost priority in route
management is to manage congestion-prone areas. Security officials are expected
to redirect public traffic to alternate routes or implement a system of road
openings and closures, thereby minimizing disruptions to local community
activities and ensuring the safe and smooth passage of the VVIP convoy. The
second priority is to manage bends, junctions, and crossroads that could
potentially pose threats and hindrances to the VVIP convoy. The third concern
involves bridges and flyovers that carry a high potential for threats, such as
bridge bombs or disruptive banners that might impede the VVIP convoy.
The final focus is on routes perceived as
vulnerable to terror attacks or possible accidents for the VVIP convoy, such as
steep inclines, declines, or areas with rugged roads. When it comes to route management, the personnel in
charge should already be positioned and ready to carry out the tasks defined by
the leaders or commanders responsible for the VVIP convoy route, well ahead of
the convoy's passage. This allows for preparatory steps such as inspecting the
area, evaluating route and weather conditions, and identifying situations that
could compromise the security of the VVIP convoy. If any disruptions arise that
local security elements cannot manage or resolve, the leader or commander
responsible for the route can report to their superiors or the leader/commander
overseeing the VVIP security operation. This enables contingency planning, such
as switching to an alternate route, to ensure the smoothness, comfort, and
safety of the VVIP's journey.
Route Management necessitates meticulous
preparation stages that include coordination meetings with all related security
elements to gain insight and make decisions regarding route utilization. The
routes chosen must satisfy the necessary standards in line with established
regulations or security procedures. Not only should the selection of routes be
carefully prepared, but it also requires preparation of regular, alternative,
and emergency routes. This planning ensures that if the main route becomes
obstructed or impassable for the VVIP convoy, backup routes are readily
available. Both outbound and return routes for the VVIP convoy should be
covered under this process. Such stringent route management on the ground is
crucial and must be intensely monitored since the route employed for the convoy
is among the factors posing significant potential vulnerabilities and threats. The five security functions are mandatory elements
to be executed by the security units assigned to and selected for the task.
Specifically in Indonesia, the Presidential Security Force (Paspampres) is the
agency responsible for safeguarding the head of state, their family, and those
of equivalent status, including VVIP guests. Paspampres's primary function
involves conducting a security operation that includes direct physical
protection. It remains closely associated with the protected entity at all
times, catering to personnel categorized as VVIP, and managing state protocol
duties.
VVIP Security Challenges Against Terrorism
VVIP security is a special security operation that
has a very high risk level and a significant impact on the country. Therefore,
the security team must face various challenges and obstacles. To overcome these
obstacles, the security team must accurately and carefully plan, supported by
various analysis components, information, and other supporting factors. They
must have a clear and structured security plan, and carry out training and
simulations to improve abilities and readiness. Also, it's crucial to work with
local security agencies and communities to minimize risk and strengthen
security for VVIPs.
METHODS
The methods and mechanisms
of ensuring the security of VVIPs vary among countries and security agencies,
and they continuously evolve in response to advancements in technology and the
escalating threats posed by potential attackers. However, the fundamental
principles remain constant: the safety and well-being of VVIPs must always be
prioritized. Any minor obstacles or problems that result in injury or harm to
VVIPs are considered failures, even if security measures were implemented to
the fullest extent.
RESULTS AND DISCUSSION
Intelligence Theory
The Theory of
Intelligence is a crucial concept that finds its application and necessity in
various sectors, including security. The importance of this theory lies in the
ability of specific agencies, especially those that handle information, to
receive reliable data. As such, government intelligence agencies, ranging from
security apparatus to relevant bodies, are required to carry out intelligence
activities with utmost professionalism and discretion, always keeping the
national interest in mind. The accurate information gathered by field
intelligence agents gives officials of the intelligence agency a predictive
edge about potential disturbances, threats, challenges, and obstacles. This
underscores the indispensable role of the Intelligence Agency in maintaining
national security (John M. Echols and Hassan Shadlily, 1996).
The three
classifications of intelligence agencies in conducting intelligence activities
are:
a. Organization
Intelligence
activities worldwide are characterized by secrecy and confidentiality. These
operations are conducted covertly and remain undisclosed to the public. All
intelligence activities are under the strict control and supervision of a
country's designated intelligence agency. The findings and outcomes of these
activities are exclusively shared with the leadership of the respective agency
and are not disseminated to other government entities. The intelligence agency
is officially recognized by the government and operates within a well-defined
organizational structure. It is supported by legal frameworks, allocated
budgets, and staffed with members possessing specialized skills relevant to the
intelligence field.
b. Activity
An
Intelligence Agency, along with its intelligence agents, conducts
pre-determined activities aimed at safeguarding the national interest and
addressing various threats and disruptions that may arise within a country's
territory or from external sources, such as aggressor nations. These activities
are crucial for gathering intelligence, analyzing potential risks, and
formulating strategies to mitigate and counteract these threats. The primary
objective is to protect and promote the security, stability, and well-being of
the country and its citizens by proactively addressing internal and external
challenges.
c. Analysis
The
Intelligence Agency's responsibility extends beyond merely collecting and
acquiring data. It also plays a pivotal role in interpreting and presenting the
acquired information to the nation's leadership. The reliability of the
information supplied by the agency is paramount, as it equips leaders with the
knowledge required to make strategically sound decisions that are in sync with
the nation's key components and interests. The data interpreted by the agency forms
the basis for framing national policies and holds significant consequences for
the wider public.
The outcomes of data
analysis and interpretation are consolidated into what's known as intelligence
products, which are strictly confidential and classified. Access to these
products is strictly controlled and granted only upon the approval of top-tier
leaders or agencies in a hierarchical manner, thus ensuring the prioritization
of national interests. The head of the agency bears the burden of maintaining the
secrecy of these products, protecting them from any unauthorized exposure that
could potentially harm public interests. One of the areas that heavily relies
on these intelligence products for ensuring effective protection and security
measures is VVIP security.
Strategy
Theory
The Strategy Theory, as
proposed by Arthur F. Lykke in 1981, is a security approach that implements a
hierarchy of protective measures to shield a target or zone from threats. When
applied to VVIP security in the context of terrorist threats, this theory
proposes three essential elements. Firstly, the 'means' element suggests that
for a strategic theory to be effective, there must be an objective guiding the
selection and usage of tools or methods. This encompasses resources,
capabilities, and any other tools required to effectuate the strategy.
Secondly, the 'ways' or 'methods' element relates to the course of actions,
tactics, or procedures undertaken to accomplish these objectives. It involves a
carefully planned roadmap to guide the implementation of the selected means
towards achieving the intended ends. Lastly, the 'ends' refer to the goals or
outcomes that the strategy aims to achieve. In the context of VVIP security,
this could include ensuring the safety and well-being of the protected
individuals, preventing terrorist attacks, or maintaining the stability of a
region. Thus, Lykke's Strategy Theory provides a systematic framework to design
and implement effective security measures in various contexts, including VVIP protection
against potential terrorist threats. Strategic phenomena such as the rise of democracy,
human rights enforcement, and terrorism have significantly complicated the
threat landscape and reshaped security concepts.
Threats are no longer
confined to the military domain but also encompass non-military dangers. A more
modern understanding of security highlights the need to safeguard non-state
actors. This shift in focus arose from a decline in threats to state
sovereignty through military aggression and an increase in threats to human
security in other areas, including infectious diseases, natural disasters,
environmental degradation, and more. As defined by Christopher S. (2015), "national security," particularly in the
context of the United States, involves "protecting the United States from
major threats to its territorial, political, or economic well-being."The
national security concept pertains to the protection of a country as an entity,
rather than as a totality. In a traditional approach, security is viewed simply
as the defense of a state against threats from other states' military powers,
defended through the state's own military capabilities. This perspective ties
all political phenomena and international relations to the state, highlighting
the state's central role in ensuring national security. VVIP and VIP Security in Facing Threats from the
Intelligence Perspective
In the context of VVIP
and VIP security, it is important to understand the threats that arise from an
intelligence perspective. Throughout the history of the Republic of Indonesia,
there have been instances of attacks targeting heads of state and high-ranking
government officials. These attacks have been carried out by various groups,
driven by dissatisfaction with the government's actions or due to ideological
differences with the Pancasila ideology. To address these security challenges,
legislation has been established to provide a legal framework for the personnel
responsible for protecting heads of state and government officials.
CONCLUSION
In light of the aforementioned conditions, risk
mitigation can be carried out through the following ways: (1) Use
of Intelligence Data: The use of intelligence data is crucial in securing
VVIPs. Intelligence data is utilized to gather information on potential threats
to VVIPs, including monitoring and analyzing terrorist groups, criminal
syndicates, or individuals planning to carry out attacks or crimes against
VVIPs. This data provides insights into the background and relationships of
individuals seeking to meet with VVIPs. Intelligence data is used to monitor
the activities and movements of VVIPs. It is also employed to conduct risk
analysis and security evaluations for VVIPs. By analyzing information about
political situations, regional security, and potential threats, preventive
actions and security measures can be designed and implemented more effectively.
Intelligence data is also used to identify cyber threats against VVIPs. (2) National
Intelligence Agency and intelligence implementers in the region must always
provide up-to-date information by following the intelligence rotation
mechanism, starting from studying activities, collecting information, data
processing or analysis, and presenting the data to the leadership. This is done
to ensure that the leadership and their staff make informed decisions and
develop security strategies to address all possible threats that may impact
VVIPs. (3) Security Perimeter: In VVIP
security operations, a security perimeter refers to the approach that involves
establishing a strictly secured zone or area around the VVIP. The security
perimeter aims to protect and monitor the physical environment surrounding the
VVIP object. It often involves several components, including the installation
of fences, barricades, and signage to restrict access around the activity area where the VVIP
is present. This is done to control entry and exit in the area, reducing
threats and disruptions during the event. Security personnel can be deployed
around the perimeter to conduct regular surveillance and patrols. They are
responsible for monitoring who enters and exits the area and responding to any
emergent situations or threats. Additionally, technology such as CCTV can be
used for continuous monitoring of the perimeter area. Electronic security
systems may also include motion sensors, sound sensors, and other detection
systems to identify suspicious activities. (4) Regulating Access to the VVIP Area: Access to the
VVIP area should be controlled using access cards, facial recognition, or other
identification technologies. Only individuals with special authorization should
be allowed to enter the security perimeter. Strict security checks should be
conducted on vehicles and individuals entering the perimeter area. This may
involve checking belongings, verifying identities, and performing other
security screenings to ensure no threats enter. An effective security perimeter
provides an additional layer of protection against potential threats or attacks
on VVIPs. It enables the security team to quickly and efficiently detect,
prevent, or respond to dangerous situations, ensuring the security and
integrity of the VVIP and their surroundings.
REFERENCES
Agetha,
N. B., Putro, R. W., & Saptono, E. (2022). Manajemen Peningkatan Kemampuan
Personel Pasukan Pengamanan Presiden Dalam Menjaga Keamanan Presiden Dan Wakil
Presiden Republik Indonesia Guna Mendukung Pertahanan Negara. Manajemen
Pertahanan: Jurnal Pemikiran Dan Penelitian Manajemen Pertahanan, Vol 8(1).
Adi P (2019) Belajar Memahami Teori Ancaman dari Prof.
Purnomo Yusgiantoro, ITB https://www.itb.ac.id/news/read/57328/home/belajar-
memahami-teri-ancaman-dari-prof-purnomo-yusgiantoro.
Agni Vidya Perdana. (2018). Kampanye Presiden
Zimbabwe Diteror Ledakan Bom, 41 Orang Terluka dalam. KOMPAS. Diakses dari
https://internasional.kompas.com/read/2018/06/24/18555791/kampanye-presiden-zimbabwe-diteror-ledakan-bom-41-orang-terluka?page=all
tanggal 5� Maret 2022.
Arikunto, Suharsimi. (2016) Prosedur Penelitian
Suatu Pendekatan Praktek.
Ansell dan Gash, 2007:54 dalam Ansell dan Gash.
(2007). Collaborative Governance in Theory and Practice, Journal of Public
Administration Reesearch and Theory. Published by Oxford University Press.
Agib Tanjung (2014) Repotnya Paspampres kawal
Presiden Jokowi, https://www.merdeka.com/peristiwa/repotnya-paspampres-kawal-presiden-jokowi.html.
Armaidy Armawi (2013) Kajian Pengutan Komunikasi
Intelijen Daerah, Fakultas Filsafat Universitas Gadjah Mada, Yogyakarta.
Arthur, F & Lykke Jr. (2010). Military
Strategy: Theory and Application
Aliminsyah & Pandji, (2004), Kamus Istilah
Manajemen, Bandung: CV. Yrama Widya
Agus Mulyawan. (2000). Matori Dibacok dalam Media
Indonesia. Diakses dari:
https://mediaindonesia.com/humaniora/147879/2000-matori-dibacok tanggal 5 Maret
2022.
Benyamin Boy (2020) dalam Penggunaan Kekuatan
Komando Operasi Khusus Tentara Nasional Indonesia dalam mengatasi terorisme di
Indonesia, Program Studi Peperangan Asimetris Fakultas Strategi Pertahanan
Universitas Pertahanan.
BBC News (2017) Perempuan calon pengebom Istana Presiden
dihukum tujuh setengah tahun https://www.bbc.com/indonesia/indonesia-40861991.
Budihardjo, M. (2014) Panduan Praktis Menyusun
SOP. Jakarta: Raih Asa Sukses.
Barry Buzan (1991) People, States and Fears, An
Agenda for International Security Studies in Post Cold War. Boulder: Lynne
Rienner Publishers.
Creswell, J.W.(2013). Research Design (Pendekatan
Qualitative, Quantitative, and Mixed Methods ), Edisi Revisi. Yogyakarta :
Pustaka Pelajar.
Desi Triana Aswan. (2020). Peristiwa 10 September,
Menteri Luar Negeri Swedia Anna Lidh Dibunuh di Pusat Perbelanjaan dalam
Tribunnews, Diakses dari:
https://makassar.tribunnews.com/2020/09/10/peristiwa-10-september-menteri-luar-negeri-swedia-anna-lidh-dibunuh-di-pusat-perbelanjaan
tanggal 5 Maret 2022.
Devina Halim (2022). Menko Polhukam Wiranto
Ditusuk Orang Tak Dikenal dalam KOMPAS, Diakses dari
https://nasional.kompas.com/read/2019/10/10/13141341/menko-polhukam-wiranto-ditusuk-orang-tak-dikenal
tanggal 5 Maret 2022.
Deputra, A. A., & Tarigan, B. Y. A. (2021). Implementation
of Selective Policy in Granting State Enterprises License Calling Visa in
Anticipating Immigration Violations at Immigration Examinations. Journal of Law
and Border Protection, 3(2), 23-33.
Daoed Joesoef. (2014). Studi Strategi: Logika
Ketahanan Nasional dan Pembangunan Nasional. Jakarta: Gramedia Kompas.
Detiknews (2007) SBY Marah Disuguhi Bendera RMS
dan Tarian Cakalele,
https://news.detik.com/berita/d-799130/sby-marah--disuguhi-bendera- rms
dan-tarian-cakalele.
Departemen Luar Negeri AS (1998) Terorisme:
Tinjaun Psiko-Politis, Peran Media, Kemiskinan, dan Keamanan Nasional. Jakarta:
Yayasan Pustaka Obor Indonesia.
Erfani Muhamad (2016) dalam karyanya Sinkronisasi
SOP Pengamanan VVIP dengan Kebijakan Objek, Program Studi Strategi Pertahanan
Darat Fakultas Strategi Pertahanan Universitas Pertahanan.
Fortunata Okto Fermula (2018) dalam Peran Pasukan
Pengamanan Presiden pada Operasi Pengamanan VVIP di daerah, Program Studi
Strategi Pertahanan Darat Fakultas Strategi Pertahanan Universitas Pertahanan.
Fatlolon. (2016). Masalah Terorisme Global.
Yogyakarta: Kanisius.
Guntur, G. (2019). A conceptual framework for
qualitative research: A literature studies. Capture: Jurnal Seni Media Rekam,
10(2), 91-106.
Glori K. Wadrianto. (2016) Dubes Rusia Andrei Karlov
Ditembak Mati di Ankara, Moskwa Bersuara dalam KOMPAS, Diakses dari:
https://internasional.kompas.com/read/2016/12/20/07124271/dubes.rusia.andrei.karlov.ditembak.mati.di.ankara.moskwa.bersuara
tanggal 3 Maret 2022.
Gumilar, Nugraha (2015). Ilmu Pertahanan Dan
Pendidikan Bela Negara Dalam Pembangunan Wilayah Perbatasan. Jurnal WIRA
Kementrian Pertahanan. Volume 54 /No. 38/Mei-Juni 2015.
Hanri WK (2018) dalam Pengaruh pendidikan
pengembangan spesialisasi dan stres kerja terhadap kemampuan personel Satuan
Detasemen Polisi Milter III/1 Bogor dalam pengamanan Presiden dan Keluarga di
Istana Kepresidenan Bogor, Program Studi Strategi Pertahanan Darat Fakultas
Strategi Pertahanan Universitas Pertahanan.
Himmelman, Arthur Turovh (2002). Collaboration for
Change: Definitions, Decision � Making Models, Roles, and Collaboration Process
Guide, White Paper.
Iwan Supriyatna (2017) Upaya Terobos Istana, dari
Minta Jokowi Menikahkan hingga�������������� mengaku
ISIS https://megapolitan.kompas.com/read/2017/12/20/10453831/3-upaya- terobos-istana-dari-minta-jokowi-menikahkan-hingga-mengaku-
isis.
James. J.F Forrest (2007) Countering Terrorism and
Insurgency in The 21st Century, Prager Security International. London, 2007.
Juwono Sudarsono (2004) Globalisasi Ekonomi Dan
Demokrasi Indonesia, Artikel Dalam Majalah Prisma, Jakarta.
Jablonsky.D. (2002) Why Is Strategy Difficult
Carlisle Barracks, PA Strategic Studies Institute, U.S. Army War College.
Sri Yunanto (2017) dalam Ancaman dan Strategi
Penanggulangan Terorisme di Dunia dan Indonesia, Penerbit Institute For Peace
and Security Studies (IPSS).
Soewidia Henaldi (2016) Jangan Sembarangan
Terbangkan Drone di Kota Bogor, Melintas Diatas Lokasi Ini Bakal Ditembak
https://bogor.tribunnews.com/2016/04/25/jangansembarangan-terbang-drone-di-kota-bogor-melintas-diatas-lokasi-ini-bakal-ditembak.
Sugiyono (2014) Metode Penelitian Pendidikan
Pendekatan Kuantitatif, Kualitatif, dan R&D. Bandung: Alfabeta.
Supriyatno, M. (2014). Tentang Ilmu Pertahanan.
Jakarta: Yayasan Pustaka Obor Indonesia.
Subekti (2012) �Modernisasi Alutsista TNI AD Untuk
Mencapai Pembangunan Kekuatan Pokok Minimum�. Jurnal Angkatan Darat Yudhagama
Vol.32. No.1. Maret 2012.
Sugiyono (2011) Metode Penelitian Kuantitatif,
Kualitatif dan R&D. Bandung: Afabeta
Sugiyono (2008) Metode Penelitian Pendidikan
Pendekatan Kuantitatif, Kualitatif dan R & D. Bandung: Alfabeta.
Sugiyono (2007) Metode Penelitian Kuantitatif
Kualitatif, R&D. Bandung.
Sukandarrumidi. (2006). Metodologi Penelitian
Petunjuk Praktis untuk Peneliti Pemula. Yogjakarta: Gajah Mada University
Press.
Sugiyono (2005). Memahami Penelitian Kualitaif.
Bandung: Alfa Beta.
Tiara Firdaus Jafar (2019) dalam Ketahanan
Nasional Menghadapi Ancaman Lone Wolf Terrorism Di Jawa Barat, Departemen
Hubungan Internasional FISIP Unpad.
Tippe, Syarifuddin. (2016). Ilmu Pertahanan:
Sejarah, Konsep, Teori, dan Implementasi. Jakarta: Salemba Humanika
Vento Saudale (2019) Polisi Stres Paksa Masuk
Istana Bogor Ingin Temui Jokowi
https://www.beritasatu.com/megapolitan/573030/polisi-stres-paksa-masuk-istana-bogor-ingin.
Wibisono, M. K. (2013). Manajemen supervisi
pengawalan tamu VVIP oleh satuan Pamwal Ditlantas Polda Metro Jaya.
Winartha, I. M. (2006). Metodologi penelitian
kuantitatif dan kualitatif. Yogyakarta: Gaha ilmu.
Yusuf, A. M. (2014). Kuantitatif, Kualitatif,
& Penelitian Gabungan. Jakarta: Kencana.