Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)

Vol. 03, No. 12, December 2023

                               e-ISSN: 2807-8691 | p-ISSN: 2807-839X

Perspective Of Security Intelligence in Law Enforcing Terrorism in Indonesia

Ade Mulya1, Marzuki Ismail2, Suardi Jumaeng3

Police Science, Sekolah Tinggi Ilmu Kepolisian, Indonesia1,2,3 E-mail : [email protected]

ABSTRACT

Keywords

Counter Terrorism; Intelligence

Perspective; Police Personnel Protection.

Handling criminal acts of terrorism from a counterintelligence

perspective to dissect activities carried out in the counterintelligence dimension of personnel security. The purpose

of this article is to discuss the high threat and risk of terrorist

attacks on personnel who handle terrorist crimes. The research method used prioritizes normative studies of literature on counterintelligence and counterterrorism with an emphasis on counterintelligence efforts for personnel security. In the end, the results of this research show that counterintelligence is very relevant to handling terrorism by working together and collaborating with various parties, but the counterintelligence perspective on personnel security has not become a strengthening and priority for regulators in efforts to suppress terrorism.

INTRODUCTION

The research aims for conceptual solutions and intelligence perspectives by attempting to examine counter-terrorism in detail. This is a new thing to strengthen counter-terrorism so far. The object of research is the perspective of police intelligence, with the subject of research on the protection of law enforcement officers against the process of countering criminal acts of terrorism and its prevention, both coming from outside and transiting through Indonesia. Cooperation between countries within Indonesia's borders is essential for both land and sea borders, especially in the sea, where the territory of Indonesia is relatively open with an expansive coastline. It also poses a threat to the entry of people and smuggling who are part of terrorist networks in Indonesia. Lahneman, W. J. (2010) called transnational terrorism the most visible threat today, and governments recognize that fighting adversaries such as terrorist networks operating across borders skillfully utilize travel, multifaceted communication, and expanded financial capabilities resulting from the process of globalization (Mayer 2016; WS 2018).

Cases of terror attacks in Indonesia targeting security personnel (Polri and TNI) are still common. The terrorist attack that occurred in Rutan Mako Brimob, Cimanggis, Depok, West Java, on May 8, 2018, was a prominent case and became quite intense public attention at that time. This attack killed five National Police personnel and one inmate. This attack was very shocking because it was carried out by inmates who were serving sentences at the Mako Brimob detention center. This attack was like a raid and kidnapping from inside the detention center (kompas.com). Another prominent attack was the attack by the Armed Criminal Group (KKB) on April 25, 2021, in Beoga District, Puncak, Papua, which killed Kabinda Papua Brigadier General I Gusti Putu Danny. The attack that killed Kabinda Papua was preceded by a blockade carried out by the KKB against the Task Force of the State Intelligence Agency (BIN), the Indonesian National Army (TNI) and the Indonesian National Police (cnnindonesia.com). Another terror attack targeting security personnel was the attack on the Astana Anyar Police Station of the West Java Regional Police on December 7, 2022, which killed one National Police personnel and



IJSSR Page 3125

https://doi.org/10.46799/ijssr.v3i12.620

This work is licensed under a Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)

injured 10 (ten) others. This suicide bomb terror attack was carried out when National Police personnel at the Astana Anyar Police Station were carrying out morning apples (detik.com).

From several attacks on security personnel, the intelligence operations strategy (Breakspear 2013) really needs to pay attention to the intelligence perspective on counterterrorism. The extent to which these perspectives can detect and subsequently become part of counterterrorism on a conceptual and practical level. The discussion of this article focuses on how security forces become victims of ongoing terrorist attacks, their prevention efforts, and their strengthening in the context of counterintelligence (Jusuf et al. 2022; Mengko 2022).

Intelligence activities in the exchange of information, according to Kahn's Law, can be categorized as (1) Intelligence looking at daily events; (2) Prediction intelligence looks at what might happen; (3) Intelligence alerts provide urgent notice that something may happen; (4) Intelligence investigation to uncover the problem in depth; (5) Intelligence of a scientific and technical nature including information about foreign technology. Arthur S. Hulnick (2006) offers the view that intelligence goes through an important cycle of intelligence gathering and analysis and debates the existence of intelligence support on policies that have been taken rather than receiving intelligence information.

Intelligence can be seen as the process of gathering and processing information, information as a product, and the organization that handles it. Therefore, the most important intelligence activities are collecting and searching for information, evaluating information, information integrity, analyzing, inferring, and estimating national security dynamics using scientific methods (Nugroho, 2021: 57). According to Alan Breakspear (2013), a new proposal on the definition of intelligence which reads, intelligence is the ability of organizations to predict changes in a certain period to carry out anticipatory actions. Intelligence capabilities include predicting the future (Speigel 2021), with a paradigm verified in the intelligence community anticipating changes, both positive and negative, presenting opportunities and obstacles and being able to pinpoint threats. Here, we see the heavy casualties of law enforcement officials and stakeholders' handling of terrorism. There needs to be a new strategy and comprehensive action to maintain security stability and how to conduct counter-terrorism efforts with an intelligence approach (Silke 2018; Ferdiansyah Putra 2021). Strictly speaking, there is a gap in the success of cracking down on terrorism directly proportional to the still victims of law enforcement officials.

There are still casualties from law enforcement officials, as well as from the aspect of protection of law enforcement officials, not many researchers discuss, especially in the counterintelligence aspect as in the chart. This site has not done much in-depth research (gap). Although regulations already exist, there needs to be an in-depth study of the importance of personnel protection because the threat aspect from terrorists is very high (Cahyono 2022).

The intelligence perspective on counterterrorism has at least three important approaches. First, the active approach, the passive approach, and the operations approach. These three approaches aim to discuss counterterrorism from an intelligence perspective different from the legal approach (Troesto Poernomo 2018).

In detail, active counterintelligence can be done in three ways. First, detect the presence of terrorists. Second, prevent attacks. Prevent activities with the aim of not occurring an attack or reducing the power of the attack. Third, neutralization or actively disabling the movement of terrorist groups, as well as the equipment or weapons they will use. The three counterintelligence thoughts are the result of the author's study with relevant reference sources and counterintelligence thoughts (Prunckun dan Whitford 2018)

Passive counter-terrorism means camouflaging the object they are about to attack in a way as if this object becomes invisible. Either human objects or buildings and other objects. This passive approach is camouflage in nature. Attempt to protect by disguising the target object. This passive effort

is also an active action. But in this category, passive efforts are more about one's own activities to secure and avoid being targeted by terror groups.

The second passive counterintelligence is document security. The security of this document is meant to secure the data of personnel handling criminal acts of terrorism, both directly and indirectly. The context of document security by keeping the document itself from leaking to the opposite party and maintaining the integrity of the document so that it is not altered or falsified.

A passive counterintelligence approach to terrorism could involve disciplined covert security. Confidential information is encoded or encrypted and protected so that confidential information does not fall into the group of theorists. Access management and intelligence dissemination are done so well that other parties cannot access them.

The concealment approach is the concealment of confidential communication between two parties and regulating communication channels. Concealment is the practice of exchanging information between a group of people in a hidden and secure manner and confidential in nature. As a form of counterintelligence, it is a hidden way of communication to protect from access to other parties.

There are five categories of intelligence operations that we include in this paper. First, police security or security by the police. Second, security or security by civil society. Third, operations of a special nature. Fourth, security at ports and travel security; and lastly, censorship or efforts to prohibit goods, documents, or people from entering the territory of the Republic of Indonesia. All five activities are included in intelligence operations in the framework of counterterrorism activities.


RESULTS

Fast, dynamic, and accurate coordination will accelerate intelligence in problem-solving (Armawi 2013). The way of analyzing from the point of view of intelligence is different from the legal perspective. The legal research approach tends to be normative, so the research consists of secondary data, including primary, secondary, and tertiary law. Troesto Poernomo's research (2018) shows that law enforcement and intelligence are the comprehensive means of dealing with terrorism problems. Borrowing UN resolutions that terrorism will not be wiped out by law enforcement, military action and intelligence operations alone. Meanwhile, the police have an important role in preventing terrorism by investigating and protecting targets that are vulnerable to terrorist attacks (Clarke dan Newman 2007). But here has not mentioned the real threats and risks that police officers receive, furthermore, with an intelligence perspective that can dissect conditions and situations in countering the influence of terrorism. The Criminal Intelligence Service of Canada (CISC) contributes to law enforcement intelligence and prediction in handling criminal organizations and drug network groups (Breakspear 2013).

A country took the counterintelligence approach with deterrence against enemies who infiltrate or counteract opponent intelligence (Kuswara 2019). The presence of counterintelligence to ward off the enemy's strategic impromptu from espionage, sabotage, and terrorism. Counterintelligence organizations face espionage by adversaries, such as BIN, BNPT, BSSN and intelligence organizations in their respective government agencies. The scale of threats from foreign espionage, both from Human Intelligence (Humint) and Signal Intelligence (Sigint) will continue to exist. Agencies that carry out counterintelligence functions need to accelerate steps in strengthening the Counterintelligence Agency in Indonesia by strengthening intelligence organizations (Kuswara 2019).

The Air Force military intelligence in Indonesian airspace under the category of active counterintelligence associated with intelligence sharing also carries out counterintelligence. The use of radar in anticipation of enemy aircraft without permission to enter Indonesian territory. This includes commercial aircraft and aircraft that have not been indicated. Active counterintelligence is more directed toward strengthening intelligence activities to obtain information to secure and neutralize threats (Mujianto et al. 2022). The terrorist attack with a commercial airliner on 9/11 at the World

Trade Center USA is a threat that must always be watched out for. Meanwhile, Sumarjiyo (2018) said that intelligence is related to the initial sensing process, better known as the early warning system, by detecting symptoms of threats and potential security disturbances. This early detection is what intelligence must continue to do in the movement of groups and networks in their network indications. Kontra Intelijen Aktif / Active Counterintelligence

Evidence of counterintelligence needs was in response to the data theft of some 1.7 million classified documents, including about 200,000 documents disseminated to Hong Kong media circa 2014. In addition, in 2017, about 9,000 classified documents were posted on the internet and spread quickly (Prunckun dan Whitford 2018). This is due to the lack of sufficient security to protect such important data and documents. Currently, in Indonesia, a hacker known as Bjorka claims to have sold around 105 million data belonging to Indonesian citizens (WNI) originating from the General Elections Commission (KPU) and possessing 1.3 billion Indonesian prepaid SIM card registration data, including NIK, phone number, mobile operator, and registration date. Pratama Pershada states that until now, no one knows where the SIM card registration database is stored or who manages it.

There was a physical bomb attack at the Astana Anyar police station, Bandung, West Java, in 2022, and several terrorist investigation and arrest efforts were carried out throughout the year against terror networks in Indonesia. In this situation, intelligence must actively detect, prevent, and neutralize any threat from terrorist groups. Terrorist groups, including personal information such as names, addresses, and official information, can easily exploit the leaked data containing important information. Threats not only occur in certain places but can also be individual, such as the stabbing of Wantimpres officials with sharp weapons by Syahrial Alamsyah alias Abu Rara in October 2019 in Pandegelang, Banten. Terrorist groups recognize the need to keep attack plans secret, but countries have sufficient surveillance capabilities to detect some of their plans (Juliana et al. 2021).

An active counterintelligence effort with three important jobs. First, the approach of detecting threats from terrorist groups, following their movements and identifying terrorist groups and networks. The role of police intelligence is also carried out by the special detachment intelligence function in preventing criminal acts of terrorism, namely by conducting early detection to find out all changes in social life that are worth the threat. After detecting the threat, it is followed by early warning as a basic ingredient and determining the direction for further policy and decision-making. As empirical evidence, one of the policies, duties, and functions of police intelligence is the early detection and prevention of criminal acts of terrorism by building and fostering intelligence networks. The establishment of intelligence networks with an approach to community members, religious leaders, youth, activists, sympathizers, traders, and all elements as informers (Rona et al. 2020). The role of bhabinkamtibmas is also important because it directly blends into society, where daily bhabinkamtibmas work. Police duties on aspects of crime prevention in the community (Teasdale dan Bradley-Engen 2017). Bhabinkamtibmas received good support from the community, which became the initial information about the situation.

Detection difficulties often occur. Terror incidents have occurred in Indonesia with various models of attacks. The way terror acts in Indonesia has developed in the model of "lone wolf" or individual terror perpetrators. Furthermore, it develops by involving women and children. Acts of terror with such a mode are difficult to detect. They live like ordinary families in society. The influence of radicalization is found to occur among Indonesian people at an early age and the influence of both parents and their environment. The facts show that radical ideas have been instilled through pre-school and elementary school. Furthermore, rehabilitation is carried out after becoming a prisoner and before returning to society (Mareta 2018). Legal matters, 47(4), 338-356. The aim is to provide a new view of humanity and peace by releasing their terrorism ideology. However, in the Astana Anyar police attack, the perpetrator was also a recidivist of terrorism, which showed the failure of rehabilitation (deradicalization) in the prisoner.

Efforts other than detection by intercepting the entry of terror groups from abroad with support from immigration officials. This group has the potential to disrupt security and order and can also threaten the country's sovereignty. Including the prevention of Indonesian citizens who will go to Syria and Iraq to join ISIS (in 2004-2018), moving through Turkish territory as a transit area.

The early detection process includes information products through various stages of processing foreign data through visas and passports. Immigration has accurate data processing and is integrated with the immigration information management system (Simkim). The information is made in the form of intelligence products derived from information from the public, government agencies, visiting places or buildings where information can be found about the whereabouts and activities of foreigners or conducting intelligence operations whose results are reported to the director general, including meetings in the foreigner supervision team. As an important regulation, foreigners, as investors, will receive special services, and those who fall into the category of unwanted foreigners will be processed to be refused entry to Indonesia.

Second, domestic prevention efforts against foreigners by establishing and implementing a foreigner reporting system (APOA) involving all elements of society through immigration. Entry information from hotel or homestay associations that contribute to the presence and activities of foreigners. Immigration intelligence performs prevention and profiling functions. The second way is forming an intelligence community consisting of the State Intelligence Agency, TNI, Polri, and ministries/agencies that organize intelligence at the central and regional levels (Kominpus and Kominda). The third way is cooperation with Interpol. Immigration Intelligence (Immigration) also collaborates with the National Police from various agencies. Cooperation with using the I-24/7 application, whose function can detect lost or stolen passport holder data. Issuance of Red Notice to find fugitives between countries (Mulia et al. 2021). As well as the search and circulation of illicit weapons that are targeted.

Third, neutralization efforts in police duties related to the task of preventing criminal acts of terrorism are stated in the Police Regulation of the Republic of Indonesia Number l23 of 2011 Article paragraph (16), namely, the Intelligence Field of Densus 88 Anti-Terror Polri is the main implementing element. Activities carried out by organizing and fostering the function of Intelligence in dealing with the nature of terrorism threats by carrying out investigation, investigation, observation, search for terror perpetrators through stalking activities, using equipment (surveillance), detection, field analysis and assessment (assessment) information. Neutralization is a form of counterterrorism, specifically within the official structure, including the National Counterterrorism Agency (BNPT) and other elements in charge. Intelligence measures are implemented by analyzing the activities and movements of perpetrators of criminal acts of terrorism and preventing them from accessing information on targets and prevention efforts (Aldila 2022). Neutralizing threats by first paralyzing all elements or parts in the process of terrorist attacks. The goal of the attack became a failure. Neutralization efforts against the threat of terrorism are carried out comprehensively and impartially.

Passive Counterintelligence

Counterintelligence is passively inward by prioritizing the power of the internal organization to counteract passively. By analogy, guardrails and barbed wire will block the entry of thieves. This passive counterterrorism nature is also necessary. This is done by passive counterintelligence with camouflage, hiding techniques, securing documents, and maintaining confidentiality.

First, a passive counterintelligence approach by means of camouflage by not showing movements or activities and activities openly to the opposing party and groups that are friends of the opponent. In a military context, forms of camouflage are more to disguise war vehicles, military locations, and troop movements with specific uniforms and sniper group movements. In the context of intelligence, camouflage is generally done by means of data and information storage, encrypting classified information, names used under pseudonyms, and secret objectives or ongoing missions. The

number of enforcement forces and the amount of intelligence dealing with terrorism are disguised in camouflage. On the other hand, efforts to detect the efforts of terror groups by infiltrating the network under the guise (cover job).

Second, the deterrence aspect of terrorist groups that are internationally affiliated and travel from one country to another. A way to counter it with document security. These documents include identity documents, travel documents (passports), banking documents and other documents. With the existence of security documents, the level of document forgery that terrorist groups can carry out can be avoided. This means that legal transfer routes can be monitored, and vice versa, unofficial routes to enter and exit Indonesia can be detected.

Third, concealment techniques are similar to camouflage but more to hide specifically against objects and subjects that must be secured and not scattered to the enemy. This method can also be used to hide key witnesses or sources of information that are very important and vulnerable to enemy attacks. In this position, the role of the protective institution on duty is very important. Terrorists can target witnesses and key figures. Terrorist attacks have also targeted former terrorists.

Fourth, secrecy in counterterrorism intelligence operations is necessary to implement intelligence tasks. There are at least three secret qualifications: top secret, secret and confidential. This is where the need for confidentiality discipline arises by limiting access to secrets according to qualifications. Use of such information, its distribution and management of confidential security. However, there are many assumptions from some figures about confidentiality with a smaller portion. Explanation from Ellies M. Zacharias: "95 percent of peacetime intelligence came from open source, 4 percent from semi-open sources, and only 1 percent, sometimes less, from secret agents". (Ransom, 1971:19). Samuel Wilson stated that: "Ninety percent of intelligence come from open sources. The other ten percent, the clandestine work, is just the more dramatic" (Friedman, 2004:285). Most information is obtained from open sources rather than closed sources. In addition, the percentage of information obtained from intelligence agencies is relatively low. Intelligence activities are also based on the principle of solving problems with state security threats, including information collection, analysis of information that has been collected, counterintelligence actions, and covert operations (Nugroho 2021), which can be used as a guide in efforts to counter terrorism threats.

All elements of any crime should be considered a security threat with a law enforcement approach. From the perspective of confidentiality discipline, the secret value must be maintained properly because there is a threat of loss. The planning of terrorist attacks is carried out behind closed doors using covert activities both in cells and groups. Analyzing terrorist movements requires intelligence and counterintelligence capabilities by the role and function of intelligence agencies in countering terrorism (Heniarti et al. 2022).

It is important to collect intelligence information to maintain the country's security. In police operations, it is known for high policing and low policing. Intelligence agencies such as police intelligence, MI5 and MI6 UK, Canadian Security Intelligence Service (CSIS), FBI security unit and CIA, France de la surveillance du territoire (DST) are referred to as the "intelligence community". Most countries have at least two of these institutions. One deals with internal security, and the other deals with external threats originating from abroad. All police on assignment are engaged in intelligence gathering for reinforcement. After the 9/11 terrorist attacks in the United States, there was a strong initiative, especially from the intelligence side, to integrate police policies (Tabrani 2019). Peled & Dror (2010) found the use of local assets as spies due to the scarcity of intelligence officers and the need for the time needed to train efficient intelligence assets in the fight against terrorism.

Counterintelligence Operations / Operasi Kontra Intelijen

Counterintelligence is included in the category of operations with an approach to security by the police. The role of intelligence provides security in various activities. This activity requires supporting factors in these activities in detail (1) police security, (2) civil security, (3) Special operations, (4) border control and travel security, (5) conducting censorship.

First, police security from various aspects of counterterrorism such as law enforcement, intelligence, to diplomacy in solving problems that arise. In terms of "to police" are police duties that are not only carried out by the police alone, but also other agencies, from within the country and in cooperation with neighboring countries. Policies and decisions need to be taken with the aim of counterterrorism from the aspect of preventing groups coming from abroad (Pratama dan Dewanta 2021). Cooperation in handling terrorism received support from neighboring countries such as Australia, Malaysia, Singapore, and the ASEAN group. The role of the police is very important. Police security in question, namely counterintelligence operations activities as protection for law enforcement in charge of counterterrorism. A record of law enforcement being a victim of a terrorist attack due to a very high threat. There is little attention paid to the protection of these officers. Security for officers is a concern from the police. Body system protection, which means the police protect the police in carrying out high-risk tasks. The term police protecting the police is also new and relatively rarely discussed from various forums, even though police are also ordinary people who are vulnerable to threats.

Furthermore, Presidential Instruction Number 2 of 2013 contains instructions oriented towards the effectiveness of inter-institutions such as the Ministry of Police, Ministry of Home Affairs, BIN, Polri, TNI, BNPT, Provincial and Regency / City Heads. The instruction is only limited to coordination space between state institutions to combat terrorism in Indonesia (Pratama dan Dewanta 2021). The role of the community is also needed in countering terrorism to minimize excessive expansion of authority from state institutions. A healthy democracy is characterized by democratic institutional development, and the security sector can provide good control over counter-terrorism escalation (Wibisono 2018). The security aspect is a must to be supported by community participation.

Second, look at the role of society, including intelligence gathering, in minimizing the conflict. For example, in addition to persuasion, the intelligence organization of the Special Region of Yogyakarta also conducts friendship in Interfaith Joint Prayer activities. The activity was carried out at Tugu Yogyakarta. To create security conditions from acts of disharmony between religion and local culture. The role of civil society is to hinder communication, dialogue, activities, and friendship. Intelligence gathering is carried out to prevent and resolve conflicts between religions and cultures (Purwanto 2022).

Third, special operations include returning the perpetrators of terrorism to society. The rehabilitation stage is the next stage after terrorism prisoners leave the prison. At this stage, the target of the program is prisoners and families who still have radical ideas. Rehabilitation with two coaching programs, namely (1) independence coaching and (2) personality coaching. Self-reliance coaching aims to prepare prisoners to have the skills to work after being free. Once free, it needs an adaptation process. Ultimately, they can revive the community (Adikara et al. 2021). On the other hand, special operations can also be carried out with different approaches according to local conditions and circumstances. Rehabilitation surgery becomes very important because the fact shows that terror perpetrators often repeat their actions (recidivists). Efforts to prevent radicalism and terrorism by deradicalizing. The deradicalization program consists of four parts: identification, rehabilitation, re-education, and reintegration. This process is an improvement for terrorists who are radical, hard, and extremist (Riyanta et al. 2021).

Fourth, airport security and state borders in Indonesian territory. Airport security as an entry gate for foreigners. In addition to strengthening the airport side, including Indonesia's territorial boundaries outside the airport and official ports. Strict document inspection with fingerprint and photo identification. The condition of the vast border area with the form of an island country, so many ports are not guarded. In this position, law enforcement officials must cooperate with residents and maintain regular guards. The same is true of the direct land borders with Malaysia, East Leste, and Papua New Guinea. Sea and land borders must be counterterrorism with local community approaches to create regional awareness and security. After the terrorist attacks of September 11, 2001 (9/11), a significant

concern with changes to both International Traffic in Arms Regulations (ITAR) 5 and visas for foreign scientists (Javorsek et al. 2015). Meanwhile, Venema, A. E. (2020), states that fighting organized crime and terrorism is very important for intelligence sharing.

Fifth, censorship of terrorist activities in Indonesia with the cooperation of the government and society. Activities to monitor online media content, especially social media in the context of concern for the current situation and environmental security. Censorship activities are not popular but necessary. People can get involved to become "extra eyes" by reporting content in online media that incites and provokes using religious issues, false jihad issues, calls for violence and intolerance. In addition to strengthening cyber technology and cooperation with digital companies, the government also needs to take firm action and provide sanctions according to the law to perpetrators who spread hate speech, especially if it is associated with religion and identity politics (Damayanti 2019). The emergence of the Personal Data Protection Law can be a reference that the responsibility of personal data security is the responsibility of the owner of the social media Flatform. Not solely on the owner of the data itself. It is also a very important advance in improving the management of personal data.

In the era of democracy in Indonesia, censorship is generally not common, but if there is a violation of the law and entered criminal offenses can be processed by the police. In this context, with the strong reason that terrorist activities can be the cause of the spread of violent ideologies and doctrines of terrorist attacks, of course, this censorship can be carried out appropriately. The procedure carried out must follow legal rules and norms. On the other hand, there must be a balance in counterterrorism so that the movement can be prevented before an attack occurs. The prevention aspect becomes the earliest goal to avoid the appearance of attacks. Australia, Malaysia, and Singapore have special laws for terrorism crimes that provide flexibility in carrying out preventive actions by arresting first before entering the law enforcement process. Likewise, in Indonesia, with the revision of the new law on counterterrorism. Kitson (1971: 95) states there is no doubt that intelligence is involved in counterterrorism policy. Counter-terrorist operations are mostly counter-terrorist activities to discover threats and terrorists themselves.

On a broader view, Richard J. Kilroy Jr. (2017) the role of government in using information and communication technology in democratic societies for intelligence purposes, suggests that as technology advances and new threats increase. The potential for government democracy to use technology can hurt citizens themselves if they enter the privacy space, but on the one hand, it has a good impact on the disclosure and enforcement of terrorism in Indonesia, especially with the implementation of lawful interception (Mulya et al. 2022).

Personnel Protection / Perlindungan Personel

The police carry out the orders of the law, maintain social order and maintain a civilization fraught with risks in performing law enforcement duties. The event of a terrorist attack on police officers shows a high risk. Thus, there is a need for legal regulations that can provide legal protection for police duties. So at least, there are two important factors. The first is the regulatory side of protection, and the second is the direct protection of police members. In the draft Criminal Code and the proposed revision of the police law, there needs to be a strengthening of the protection of police members to protect the police in high-risk duties as well as the main duties of the police.


Counter Intelligence Operations

(Kategori Operasi)

Active Counter Intelligence

(Kontra Intelijen Aktif)

Passive Counter Intelligence

(Kontra intelijen Pasif)

Personnel Protection (Perlindungan Personel)


Figure 2. Intelligence Perspectives in Counter Terrorism (processed by Author, October 2022)


The intelligence perspective views the position of personnel protection is at the core of the activities carried out in counterintelligence as a new view in the perspective of counterintelligence, which is based on people being given protection. The debate that arises must be admitted that more people consider that the police are much stronger than the public, so the police are also considered capable of protecting themselves. In that context, there must be a holistic and sharper perspective so that the nature of protection is not just the final part of a regulation.


CONCLUSION

The perspective of counterintelligence in counterterrorism will further enrich the series of counter-terrorism activities starting from prevention and handling to the termination of counterterrorism activities. Rehabilitation and coaching activities using an intervention perspective will strengthen efforts and support from both state security forces and civil society support. Ultimately, the personnel handling counterterrorism and their families get security protection. However, in conclusion, this counterintelligence perspective is not the only one that can be used in counterterrorism but must also look at the threats and challenges of terrorism in the future. The threat of terrorism has changed, and patterns occur regarding attacks, the side they build networks, and the equipment used. On the other hand, how terrorists hide or vice versa how they seek public attention. Anticipation of sympathizer groups that support terrorism can be directly or indirectly related and must be detectable by intelligence. Their efforts in recruitment also did not stop. Strictly speaking, prevention efforts can be carried out at every level of handling terrorism. Starting from readiness activities from individuals and groups, Intelligence must sniff from the beginning and cut off communication, human, and logistics networks.

In response to the high threat of terrorism targeting security forces, law enforcement officials must also protect themselves and their families and be trained. This counter-terrorism implementation activity cannot be carried out by one party alone. However, various stakeholders up to civil society must contribute to countering terrorism. High state readiness must be supported. This means that the key is the synergy of various parties. Mayer, M. A. (2016) believes the importance of the role of human intelligence, especially because of the encryption carried out by terrorist groups in communicating.

Second, there is a community bond among law enforcement and a development program for intelligence personnel in conducting counter-terror.

Finally, the intelligence perspective with the three categories of counterintelligence actively, passively, and operationally makes it impossible to escape the development of information technology, computers, and digital advances. This will strengthen the handling of terrorism due to the changing and complexity of the terror threat. The means of security involve complex technologies that provide the power to obtain unprecedented amounts of data, which, if analyzed correctly, wisely, and in a timely manner, signify the ability to identify and prevent terrorist attacks domestically and abroad (Richard J. Kilroy Jr., 2017). However, the main thing from an intelligence perspective in counterterrorism is the protection of the police officers themselves as the innermost core part and stakeholders involved in countering criminal acts of terrorism.


REFERENCES

Adikara APB, Zuhdi ML, Purwanto WH. 2021. Analisis Metode Penggalangan Intelijen Dalam Penerapan Program Deradikalisasi oleh BNPT. SOCIA: Jurnal Ilmu-Ilmu Sosial. 18(1):61–71.

Aldila R. 2022. Kewenangan Intelijen Kepolisian Negara Republik Indonesia Dalam Mencegah Tindak Pidana Terorisme di Indonesia.

Armawi A. 2013. Kajian Penguatan Komunitas Intelijen Daerah. Mimbar Hukum-Fakultas Hukum Universitas Gadjah Mada. 25(1):68–75.doi:10.22146/jmh.16110.

Breakspear A. 2013. A new definition of intelligence. Intelligence and National Security. 28(5):678–693.doi:10.1080/02684527.2012.699285.

Cahyono S. 2022. Penggambaran Regulasi Emosi Anggota Intelijen Polri Yang Bertugas Dalam One Man Operation (Omo) (Studi Kasus Terorisme).

Clarke R V, Newman GR. 2007. Police and the prevention of terrorism. Policing: A Journal of Policy and Practice. 1(1):9–20.doi:10.1093/police/pam003.

Damayanti A. 2019. Terorisme Daring dan Luring. Kompas.(3):1–3.

Ferdiansyah Putra MF. 2021. Kebijakan Optimalisasi Tugas dan Fungsi Intelijen Kepolisian dalam Upaya Deteksi Dini Pencegahan Tindak Pidana Terorisme (Studi Pada Satuan Intelijen Keamanan Polisi Resor Aceh Tengah).

Heniarti DD, Wahjoe O, Puspawati A, Syawali H. 2022. The role of intelligence agencies in eradicating criminal acts of terrorism. Di dalam: Islam, Media and Education in the Digital Era. Routledge. hlm. 420–426.

Hulnick AS. 2006. What’s wrong with the Intelligence Cycle. Intelligence and national Security.

21(6):959–979.doi:10.1080/02684520601046291.

Javorsek D, Rose J, Marshall C, Leitner P. 2015. A formal risk-effectiveness analysis proposal for the compartmentalized intelligence security structure. International Journal of Intelligence and CounterIntelligence. 28(4):734–761.doi:10.1080/08850607.2015.1051.

Juliana R, Juliani R, Nurkhalis N. 2021. The Development of the Constituent Social Class as Political Participation in Banda Aceh and Meulaboh. Community: Pengawas Dinamika Sosial. 7(1):15–

25.doi:10.35308/jcpds.v7i1.3625.

Jusuf M, Tampanguma M, Mewengkang F. 2022. Tindak Pidana Intersepsi (Penyadapan) Diluar Penegak Hukum Teknologi Informasi Dan Komunikasi Di Indonesia. Lex Privatum. 10(4).

Kilroy Jr RJ. 2017. Terror and technology: domestic intelligence collection and the gossamer of enhanced security. Journal of Policing, Intelligence and Counter Terrorism. 12(2):119–

141.doi:10.1080/18335330.2017.1351034.

Kuswara YB. 2019. Evaluasi Fungsi Kontra Intelijen Indonesia Dalam Menghadapi Spionase Intelijen Asing. Jurnal Kajian Stratejik Ketahanan Nasional. 2(2):114–128.

Lahneman WJ. 2010. The need for a new intelligence paradigm. International Journal of Intelligence and CounterIntelligence. 23(2):201–225.doi:10.1080/08850600903565589.

Mareta J. 2018. Rehabilitasi dalam upaya deradikalisasi narapidana terorisme. Masalah-masalah hukum.

47(4):338–356.

Mayer MA. 2016. Enhanced human intelligence is key to defeating terrorists.

Mengko DM. 2022. Intelijen dan Kekuasaan Soeharto. Yayasan Pustaka Obor Indonesia.

Mujianto M, Hidayat T, Akim A, Djuyandi Y. 2022. KONTRIBUSI INTELIJEN TNI AU DALAM KEGIATAN KONTRA TERORISME MELALUI PROGRAM ASEAN OUR EYES (AOE) GUNA MENDUKUNG

KEAMANAN NEGARA. Aliansi: Jurnal Politik, Keamanan Dan Hubungan Internasional. 1(2):89–98.

Mulia A, Lencana IWP, Seskoaria J. 2021. Perkawinan Semu dalam Perspektif Pidana Keimigrasian.

Jurnal Ilmiah Universitas Batanghari Jambi. 21(3):1254–1257.

Mulya A, Ismail M, Yuliantoro RB, Kandati H. 2022. Dampak Implementasi Lawfull Interception pada Pemberantasan Tindak Pidana Terorisme. Formosa Journal of Multidisciplinary Research. 1(2):367–382.

Nugroho MAE. 2021. Laporan Intelijen Sebagai Pembuktian Permulaan Berdasarkan Penetapan Pengadilan Pada Proses Penyidikan Tindak Pidana Terorisme Di Indonesia .

Peled AR, Dror H. 2010. HUMINT: Combating corporate crime with a counter-terrorism methodology.

Security Journal. 23:320–331.doi:10.1057/sj.2008.24.

Pratama AP, Dewanta IP. 2021. STRATEGI KONTRA-TERORISME MODEL ANTAR LEMBAGA (STUDI

PERBANDINGAN INDONESIA-AUSTRALIA). NUSANTARA: Jurnal Ilmu Pengetahuan Sosial. 8(3):95–108.

Prunckun H, Whitford T. 2018. Terrorism and counterterrorism: a comprehensive introduction to actors and actions. Lynne Rienner Publishers.

Purwanto H. 2022. Analisis peran penggalangan intelijen dalam pencegahan konflik disharmoni agama dengan budaya lokal.

Riyanta S, Rahayu AYS, Mamoto BJ. 2021. Collaborative governance in the terrorist rehabilitation programme in Indonesia. Di dalam: Civil Society Organizations Against Terrorism. Routledge. hlm. 128–148.

Rona M, Safa’at R, Madjid A, Fadli M. 2020. Restorative Justice In The Settlement Of Traffic Accident Causing Death Toll According To The Perspective Of Customary Judiciary In Sanggau District, West Kalimantan. Yustisia Jurnal Hukum. 9(1):139–151.doi:10.20961/yustisia.v9i1.39351.

Silke A. 2018. Routledge handbook of terrorism and counterterrorism. Routledge.

Speigel I. 2021. Adopting and improving a new forecasting paradigm. Intelligence and National Security.

36(7):961–977.doi:10.1080/02684527.2021.1946955.

Sumarjiyo S. 2018. Efektivitas Peralatan Intelijen Polri Dalam Rangka Deteksi Dini Guna Mencegah Tindak Pidana. Jurnal Litbang Polri. 21(1):143–177.

Tabrani D. 2019. Alternative of Police Style and Police Subculture: Some Early Notes. Budapest International Research and Critics Institute-Journal (BIRCI-Journal). 2(3):262–272.

Teasdale B, Bradley-Engen MS. 2017. Preventing crime and violence. Springer.

Troesto Poernomo. 2018. Penanganan Terorisme di Indonesia Melalui Pendekatan Hukum dan Intelijen. Venema AE. 2020. The Sum of All Friends: Improving Cross-border Intelligence Sharing in Europe-the Case of the Benelux. The International Journal of Intelligence, Security, and Public Affairs. 22(1):5–

19.doi:10.1080/23800992.2020.1744822.

Wibisono AA. 2018. Mengevaluasi Kontra-Terorisme Indonesia di Era Reformasi: Aspek Konstitusional dan Koersif. Analisis CSIS. 47(28):224.

WS TP. 2018. Penanganan Terorisme di Indonesia Melalui Pendekatan Hukum dan Intelijen.


Copyright holder:


Ade Mulya, Marzuki Ismail, Suardi Jumaeng (2023)


First publication rights:

International Journal of Social Service and Research (IJSSR)


This article is licensed under: