Intelligence Strategy on Deradicalization Program to Prevent Acts of Terrorism by Ex-Napiter Network of JAD Group
DOI:
https://doi.org/10.46799/ijssr.v3i4.351Keywords:
former convicts related to terrorism, deradicalization programs, intelligence preventionAbstract
The deradicalization programs conducted by BNPT and other stakeholders have been running since the enactment of Undang Undang Nomor 5 Tahun 2018 as a starting point for changing the paradigm of handling terrorism in Indonesia. Terrorism convicts are then assessed, rehabilitated, re-educated, and reintegrated. The program also runs outside the prison for ex-terrorism convicts so that they can back to the community. However, some ex-convicts return to commit terrorist crimes, so preventive measures are needed, especially in term of strategic intelligence measures to prevent this. This paper uses a qualitative approach with case study research. Data collected through interviews as primary data and supported by secondary data derived from official government documents and other journal articles. The case study on the application of the intelligence strategy is explained in the handling of ex-convict P in Solo Raya, in which the intelligence strategy implemented is able to monitor the movement of ex-convicts, help integrate into society and be able to help officers communicate with ex-convicts who are still closed
References
Adikara, A. P. B., Zuhdi, M. L., & Purwanto, W. H. (2021). Analisis Metode Penggalangan Intelijen Dalam Penerapan Program Deradikalisasi oleh BNPT. SOCIA: Jurnal Ilmu-Ilmu Sosial, 18(1), 61-71.
Ahmadi, R., & Rose, K. R. (2014). Metodologi penelitian kualitatif. Ar-Ruzz Media : Yogyakarta.
Arham, L., & Runturambi, J. S. (2020). Kebijakan Perlakuan Narapidana Teroris Menggunakan Risk Need Responsivity (RNR) di Lembaga Pemasyarakatan Kelas I Cipinang. Deviance Jurnal kriminologi, 4(1), 45-66.
Ashar, A. R. (2023). Indonesia’s vicious cycle: Terrorist convicts making a comeback? Diplomat (Rozelle, N.S.W.).
Booth, A., Sutton, A., Clowes, M., & Martyn-St James, M. (2021). Systematic approaches to a successful literature review.
Cormac, R. (2013). Much ado about nothing: Terrorism, intelligence, and the mechanics of threat exaggeration. Terrorism and Political Violence, 25(3), 476-493. https://doi.org/10.1080/09546553.2012.667018
Fitriana, S., Utomo, T. C., & Pattipelohy, S. C. (2017). Upaya Bnpt Dalam Melaksanakan Program Deradikalisasi Di Indonesia. Journal of International Relations, 3(1), 187-194.
Hettiarachchi, M. (2018). Rehabilitation to deradicalise detainees and inmates: A counter-terrorism strategy. Journal of Policing, Intelligence and Counter Terrorism, 13(2), 267-283. https://doi.org/10.1080/18335330.2018.1476774
Indrawan, J., & Aji, M. P. (2019). Efektivitas Program Deradikalisasi Badan Nasional Penanggulangan Terorisme Terhadap Narapidana Terorisme Di Indonesia. Jurnal Pertahanan & Bela Negara, 9(2), 1-20.
Islam, M. D. (2019). De-radicalisation of Terrorists. Counter Terrorist Trends and Analyses, 11(5), 6-12.
Jensen, T. (2016). National responses to transnational terrorism: Intelligence and counterterrorism provision. The Journal of Conflict Resolution, 60(3), 530-554. https://doi.org/10.1177/0022002714545221
Nugrahani, F. (2014). Metode penelitian kualitatif. Solo: Cakra Books, 1(1), 3-4.
Omand, D. (2021). The ethical limits we should place on intelligence gathering as part of an integrated CT strategy. Terrorism and Political Violence, 33(2), 290-301. https://doi.org/10.1080/09546553.2021.1880225
Phythian, M. (2013). In Phythian M. (Ed.), Understanding the intelligence cycle. Routledge. https://doi.org/10.4324/9780203558478
Rufaedah, A., & Putra, I. (2018). Coping with stigma and social exclusion of terror-convicts’ wives in indonesia: An interpretative phenomenological analysis. Qualitative Report, 23(6), 1334-1346. https://doi.org/10.46743/2160-3715/2018.3118
Spaaij, R. (2012;2011;). Understanding lone wolf terrorism: Global patterns, motivations and prevention (1. Aufl. ed.). Springer Netherlands. https://doi.org/10.1007/978-94-007-2981-0
Subagyo, A. (2021). The implementation of the pentahelix model for the terrorism deradicalization program in indonesia. Cogent Social Sciences, 7(1)https://doi.org/10.1080/23311886.2021.1964720
Riedel, B. (2011). Terrorist intelligence capabilities: Lessons from the battlefield. Georgetown Journal of International Affairs, 12(1), 26-33.
Mayer, M. A. (2016). Enhanced Human Intelligence Is Key to Defeating Terrorists. American Enterprise Institute. http://www.jstor.org/stable/resrep03250
O'Brien, K. A. (2008). Assessing hostile reconnaissance and terrorist intelligence activities: The case for a counter strategy. The RUSI Journal, 153(5), 34-39. https://doi.org/10.1080/03071840802521903
Mobley, B. W. (2008). Terrorist group counterintelligence. Proquest LLC.
Coman, C., Andrioni, F., Ghita, R., & Bularca, M. C. (2021). Social and emotional intelligence as factors in terrorist propaganda: An analysis of the way mass media portrays the behavior of islamic terrorist groups. Sustainability (Basel, Switzerland), 13(21), 12219. https://doi.org/10.3390/su132112219
Published
Issue
Section
License
Copyright (c) 2023 Ika Veni Anisa, Muhamad Syauqillah
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International. that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.