MENGUNGKAP PEREKRUTAN JARINGAN KELOMPOK TEROR MUHAJIRIN AT-TAUHID (MAT) DI MEDIA SOSIAL

(1) * Guntur Yayus Putra Mail (Universitas Indonesia, Jakarta, Indonesia)
(2) Sapto Priyanto Mail (Universitas Indonesia, Jakarta, Indonesia)
*corresponding author

Abstract


Penelitian ini bertujuan untuk memberikan penjelasan komprehensif tentang bagaimana pola rekrutmen kelompok teroris MAT Indonesia melalui media sosial, antara lain; 1. Mendeskripsikan dan menganalisis metode perekrutan kelompok teror Muhajirin At-Tauhid (MAT) melalui media sosial. 2. Menganalisis penyebab media sosial dapat mendorong aksi terorisme Muhajirin At-Tauhid (MAT) di Indonesia. Penelitian ini menggunakan pendekatan kualitatif dengan pilihan narasumber secara purposive sampling. Penelitian menjelaskan bahwa kelompok teror MAT dalam  melakukan perekrutan  adalah sebagai berikut ; 1. Mengamati  obrolan  akun yang  mengarah ke pemahaman  ISIS, 2. Mulai menyebarkan konsep  dakwah  daulah islamiyah dan konsep  jihad, 3. selanjutnya  menawarkan dan  mengukur  kesediaan untuk  bersedia  bergabung  dengan  MAT  dengan  sudah dijelaskan visi dan  misi  MAT, 4. kemudian  selanjutnya  ditawarkan  untuk melakukan  mubahalah dalam  memberikan  ukuran  kesungguhan  dari jamaah  atau anggota  baru, 5. kemudian  anggota  baru yang  telah bermubahalah  mendapatkan hak akses  untuk  bergabung  di dalam  grup dan mengikuti  syura  atau diskusi  perencanaan  dalam  melakukan  amaliyah  dan  tamkin.

 


Keywords


perekrutan, terorisme, media sosial

   

DOI

https://doi.org/10.31604/jips.v8i7.2021.2247-2262
      

Article metrics

10.31604/jips.v8i7.2021.2247-2262 Abstract views : 0 | PDF views : 0

   

Cite

   

Full Text

Download

References


Arianti, V., & Singh, J. (2015). ISIS’Southeast Asia Unit: Raising the Security Threat. RSIS Commentary CO, 15220.

Awan, I. (2017). Cyber-extremism: Isis and the power of social media. Society, 54(2), 138-149.

Basri, H. (2014). Using qualitative research in accounting and management studies: not a new agenda. Journal of US-China Public Administration, 11(10), 831-838.

Berger, J. M. (2015). Tailored online interventions: The islamic state’s recruitment strategy. CTC Sentinel, 8(10), 19-23.

Berger, J. M., & Morgan, J. (2015). The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter.Conway, M. (2003). Cyberterrorism: the story so far. Journal of Information Warfare, 2(2), 33-42.

Crenshaw, M. (2004). The psychology of political terrorism (pp. 411-431). Psychology Press.

Denning, D. E. (2010). Terror’s web: how the internet is transforming terrorism. Handbook of internet crime, 194-213.

Ehrenfeld, R. (2002, March). Funding Terrorism: sources and methods. In Workshop held at Los Alamos National Laboratory March (Vol. 25, No. 29, p. 391).

FlorCruz, Michelle. (2014). Philippine Terror Group Abu Sayyaf May Be Using ISIS Link For Own Agenda. https://www.ibtimes.com/preventing-inversions-would-save-05-us-corporate-tax-revenue-1695163. Diakses 20 Mei 2021

Golose, P. R. (2015). Invasi terorisme ke cyberspace. Yayasan Pengembangan Kajian Ilmu Kepolisian.

Harrison, B. (1965). Southeast Asia: Its Historical Development. By John F. Cady. McGraw-Hill, Inc., New York, 1964. Pp. xiii, 657. Maps, Bibliography, Index. US $10.75. Journal of Southeast Asian History, 6(2), 140-143.

Helleiner, G. K. (1978). US power and the multinational corporation: The political economy of foreign direct investment: Robert Gilpin,(Basic Books, New York, 1975) pp. xii+ 291, $10.95. Journal of Development Economics, 5(2), 212-214.

Hidayat, D. N. (2003). Paradigma dan metodologi penelitian sosial empirik klasik. Jakarta: Departemen Ilmu Komunikasi FISIP Universitas Indonesia.

Jordan, J. (2009). When heads roll: Assessing the effectiveness of leadership decapitation. Security Studies, 18(4), 719-755.

McCauley, C., & Moskalenko, S. (2008). Mechanisms of political radicalization: Pathways toward terrorism. Terrorism and political violence, 20(3), 415-433.

McCusker, K., & Gunaydin, S. (2015). Research using qualitative, quantitative or mixed methods and choice based on the research. Perfusion, 30(7), 537-542.

Mohamed, Z. M., Majid, A. H. A., & Ahmad, N. (Eds.). (2010). Qualitative Research in Accounting: Malaysian Cases. Penerbit Universiti Kebangsaan Malaysia.

Moir, N. L. (2017). ISIL radicalization, recruitment, and social media operations in Indonesia, Malaysia, and the Philippines. PRISM, 7(1), 90-107.

Denzin, N. K., & Lincoln, Y. S. (Eds.). (2011). The Sage handbook of qualitative research. sage.

Golose, P. R. (2008). Seputar Kejahatan Hacking: Teori dan Studi Kasus. Yayasan Pengembangan Kajian Ilmu Kepolisian.

Horgan, J., Bloom, M., Daymon, C., Kaczkowski, W., & Tiflati, H. (2017). A new age of terror? Older fighters in the caliphate. CTC Sentinel, 10(5), 13-19.

Oots, K. L. (1989). Organizational perspectives on the formation and disintegration of terrorist groups. Studies in Conflict & Terrorism, 12(3), 139-152.

Kohlmann, E. F. (2006). The real online terrorist threat. Foreign Affairs, 115-124.

Lestari, Sri. (2014). Dukungan bagi ISIS 'mengkhawatirkan'. https://www.bbc.com/indonesia/berita_indonesia/2014/07/140724_isis_indonesia. Diakses 20 Mei 2021

Sofaer, S. (1999). Qualitative methods: what are they and why use them?. Health services research, 34(5 Pt 2), 1101.

Silke, A. (Ed.). (2018). Routledge Handbook of Terrorism and Counterterrorism. Routledge.

Sims, Alexandra. (2016). From 'blood type' to 'special skills': The 23 questions asked to prospective jihadis upon entrance into 'Islamic State'. https://www.independent.co.uk/news/world/middle-east/blood-type-special-skills-blood-type-special-skills-23-questions-asked-prospective-jihads-upon-entrance-isis-a6921881.html. Diakses 22 Mei 2021


Refbacks

  • There are currently no refbacks.