Strategi Kodam III/ Siliwangi Menangani Paham Radikalisme Di Jawa Barat

Hadi Purwanto, Djatmoko Djatmoko, M. Kemalsyah

Abstract


Penelitian ini bertujuan untuk menganalisa Strategi Kodam III/ Siliwangi Menangani Paham Radikalisme Di Jawa Barat. Metode yang digunakan adalah deskriptif kualitatif dengan menggunakan pendekatan SWOT. Hasil penelitian menunjukkan bahwa fondasi utama.Kodam III/Siliwangi dapat memperkuat pencegahan radikalisme di Jawa Barat melalui beberapa strategi terintegrasi. Pertama, pemanfaatan teknologi digital seperti big data analytics dan sistem pengawasan berbasis digital memungkinkan deteksi dan pencegahan radikalisasi yang lebih efektif. Teknologi ini mendukung pemantauan real-time dan analisis data untuk mendeteksi ancaman secara lebih akurat, namun membutuhkan dukungan infrastruktur dan pelatihan personel. Kedua, program Kemanunggalan TNI dengan Rakyat meningkatkan hubungan antara TNI dan masyarakat, mengedukasi tentang bahaya radikalisme, dan mendorong partisipasi aktif dalam melaporkan aktivitas mencurigakan. Pendekatan ini memperkuat pengawasan lokal dengan melibatkan tokoh masyarakat dan pemuda. Ketiga, sinergi dengan Polri, BIN, dan pemerintah daerah memperkuat implementasi kebijakan anti-terorisme melalui koordinasi penegakan hukum dan pemanfaatan intelijen. Sinergi ini juga mendukung kebijakan hukum dan meningkatkan kesadaran masyarakat terhadap ancaman terorisme.Keempat, kerjasama internasional, termasuk pelatihan bersama dan pertukaran pengetahuan, meningkatkan kapasitas personel Kodam III/Siliwangi dalam kontra-terorisme. Kerjasama ini juga melibatkan pertukaran informasi intelijen untuk mendeteksi ancaman lintas batas. Terakhir, kolaborasi dengan lembaga pendidikan dan keagamaan untuk mencegah radikalisme melalui program edukasi dan kampanye kesadaran memperkuat nilai toleransi dan kebangsaan. Evaluasi berkala terhadap program-program ini penting untuk memastikan efektivitas dan penyesuaian strategi. Pendekatan holistik ini memperkuat keamanan dan stabilitas di Jawa Barat.

Kata kunci: Strategi; Terorisme; Lone Wolf Terrorism


Full Text:

PDF

References


Atran, S., & Gomez, A. (2023). The role of counter-terrorism professionals in national deradicalization programs. Journal of Peace and Conflict Studies, 45(2), 113-130. [DOI: 10.1080/10087097.2023.2109792]

Berger, J. M., & Morgan, M. (2022). Understanding the dynamics of radicalization and deradicalization: A review of global strategies. Counter-Terrorism Review, 18(1), 25-39. [DOI: 10.1080/20500750.2022.2050821]

Badan Intelijen Negara. (2011). Undang-Undang No. 17 Tahun 2011 tentang Intelijen Negara. Jakarta: BIN.

Brown, L. (2019). Regional intelligence networks and their role in counter-terrorism. Global Security Review, 45(3), 210-225.

Chien, C.-F., & Lin, C.-J. (2023). Big data analytics for counter-terrorism: A review. Journal of Intelligence Studies, 18(1), 34-48. [DOI: 10.1002/jis.2023]

Guo, Y., Zhang, J., & Wang, X. (2022). Artificial intelligence in national security: Applications and challenges. International Journal of Cybersecurity, 27(3), 245-263. [DOI: 10.1007/s10544-022-01312-1]

Hasan, A. (2021). The role of community awareness in counter-terrorism efforts. Journal of Security Studies, 35(2), 45-67.

Harris, T. (2022). Enhancing intelligence capabilities through technological innovations. Journal of Defense Studies, 56(4), 300-315.

Hiltz, S. R., & Turoff, M. (2022). The role of international intelligence cooperation in counter-terrorism efforts. Journal of Strategic Security, 15(2), 56-73. [DOI: 10.5038/1944-0472.15.2.2117]

Horgan, J., & Braddock, K. (2024). The psychology of terrorist radicals and the effectiveness of deradicalization programs. Journal of Terrorism Research, 16(3), 45-63. [DOI: 10.14102/jtr.2024.0032]

International Crisis Group. (2019). Terrorism in Indonesia: Countermeasures and challenges. Jakarta: ICG.

Johnson, A., & Lee, K. (2021). Advancements in intelligence technology for counter-terrorism efforts. Technology and Security Review, 22(2), 102-119. [DOI: 10.1177/08933420211023456]

Johnson, M., & Lee, A. (2020). Technological advancements in remote intelligence gathering. International Journal of Intelligence and CounterIntelligence, 33(1), 75-90.

Johnson, M., & Wilson, R. (2022). Covert operations and community involvement: A strategic approach to counter-terrorism. International Journal of Intelligence and Counter-Terrorism, 28(4), 123-145.

Khosrokhavar, F. (2021). Deradicalization programs: Lessons learned from international experiences. International Journal of Radicalisation and Political Violence, 10(2), 102-119. [DOI: 10.1177/2044215821103479

Lewis, J. A., & Galipeau, S. A. (2023). Optimizing intelligence sharing for global security: Best practices and lessons learned. International Journal of Intelligence and CounterIntelligence, 37(1), 101-119. [DOI: 10.1080/08850607.2023.2139898]

Liu, H., & Zhang, S. (2024). Integrating big data and AI for enhanced security operations. Journal of Defense Technology, 29(4), 188-203. [DOI: 10.1016/j.jdeftech.2024.03.005]

McCoy, A. (2022). Enhancing national security through international intelligence partnerships. Journal of Intelligence Studies, 20(3), 89-105. [DOI: 10.1002/jis.2022.203]

O’Hara, P., & Roberts, S. (2024). Advancements in data exchange for intelligence agencies: A global perspective. Global Security Review, 28(4), 234-250. [DOI: 10.1016/j.gsr.2024.05.008]

Patel, R., & Kumar, S. (2018). Improving coordination in intelligence communities. Strategic Security Journal, 29(2), 195-210.

Presiden Republik Indonesia. (2012). Peraturan Presiden No. 90 Tahun 2012 tentang BIN. Jakarta: Sekretariat Negara.

Ramadhan, A. (2022). Cyber intelligence in combating terrorism. Jurnal Intelijen Indonesia, 9(1), 45-56.

Sageman, M. (2023). Countering extremism: The role of intelligence agencies in deradicalization efforts. Global Security Journal, 29(4), 205-220. [DOI: 10.1016/j.gsj.2023.04.004]

Smith, J. (2020). Public engagement and intelligence gathering: Best practices. Counter-Terrorism Review, 42(3), 89-103.

Smith, R. (2021). Intelligence coordination and technology integration. Security Studies Journal, 34(2), 125-140.

Smith, R., & Bennett, R. (2021). International collaboration in counter-terrorism: Strategies and challenges. Journal of National Security and International Affairs, 29(2), 43-62. [DOI: 10.1016/j.nsia.2021.04.003]

Supriyadi, A. (2020). The role of human intelligence in preventing terrorist attacks. Journal of Terrorism Studies, 8(2), 112-124.

Taylor, L., & Green, T. (2023). Combining covert and overt strategies in counter-terrorism. Security Policy Journal, 50(1), 67-82.

Wang, Q., & Zhao, L. (2022). Improving counter-terrorism strategies with real-time data analytics. Journal of Information Security and Applications, 59, 1028-1043. [DOI: 10.1016/j.jisa.2022.103217]

Wibowo, A. (2020). The role of intelligence in counterterrorism efforts in West Java. Journal of Security and Intelligence Studies, 15(2), 200-217.

Williams, H. (2021). Effective communication strategies for counter-terrorism campaigns. Journal of Public Security, 38(2), 101-115.

Zubaidi, M. (2021). Counterterrorism strategies in Indonesia: A case study of West Java. Yogyakarta: UGM Press.




DOI: http://dx.doi.org/10.31604/jim.v8i4.2024.%25p

Article Metrics

Abstract view : 109 times
PDF - 6 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.