The Role of Social Media in Supporting Information and Intelligence Gathering by Densus 88
DOI:
https://doi.org/10.70710/sitj.v1i2.10Keywords:
Densus 88, Gathering, Intelligence, Social Media, TerrorismAbstract
Terrorism in the digital era has rapidly evolved, with terrorist groups increasingly utilizing social media platforms to spread radical ideologies, recruit new members, and plan attacks. Indonesia, having experienced various terrorism incidents, continues to face this ongoing threat. In this context, the Special Detachment 88 Anti-Terrorism Unit (Densus 88) leverages social media as a critical tool for intelligence gathering and preventing terrorist activities. This study aims to explore how Densus 88 utilizes platforms such as Facebook, Twitter, Instagram, and YouTube to identify, monitor, and analyze terrorism-related activities. Through a qualitative approach, this research investigates the perspectives and experiences of Densus 88 members involved in using social media as an intelligence tool. The findings indicate that social media provides a continuous data stream that can be used to monitor activities, track trends, and identify potential threats at an early stage. However, significant challenges remain, including the vast volume and complexity of data and difficulties in distinguishing genuinely dangerous activities from unrelated content. This study provides valuable insights into the strategic use of social media in counter-terrorism operations and suggests measures to enhance the effectiveness of intelligence gathering in the digital era.
Downloads
References
Abbas, T. (2002). Understanding terrorism: Definition, causes, and effects. Journal of Social and Political Studies, 12(3), 102-117.
Annur, C. M. (2022). Ratusan Aksi Terorisme Terjadi di Indonesia dalam 2 Dekade Terakhir, Bagaimana trennya, dari https://databoks.katadata.co.id/datapublish/2022/12/08/ratusan-aksi-terorisme-terjadi-di-indonesia-dalam-2-dekade-terakhir-bagaimana-trennya.
Best Jr., R. A. (2011). Intelligence, Surveillance, and Reconnaissance (ISR) Capabilities. U.S. Department of Defense.
Conway, M., Scrivens, R., & Macnair, L. (2019). The Strategic Use of Social Media by Right-Wing Extremists. Studies in Conflict & Terrorism, 42(1), 67-79. https://doi.org/10.1080/1057610X.2018.1529351
Creswell, J. W. (2018). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches (5th ed.). SAGE Publications.
Creswell, J. W., & Poth, C. N. (2018). Qualitative Inquiry and Research Design: Choosing Among Five Approaches (4th ed.). SAGE Publications.
Dewi, A. (2023). The role of social media in modern terrorism: A review of anonymity and radicalization. International Journal of Terrorism Studies, 19(2), 50-67.
Fernandez, M., & Alani, H. (2021). Detecting Extremist Content on Social Media: Challenges and Opportunities. Journal of Artificial Intelligence Research, 70, 271-309. https://doi.org/10.1613/jair.1.12231
Han, J., & Kamber, M. (2006). Data Mining: Concepts and Techniques (2nd ed.). Morgan Kaufmann Publishers.
Harb, J. G. D., & Becker, K. (2020). Using Deep Learning to Analyze Reactions to Terrorist Events on Social Media. Journal of Applied Security Research, 15(4), 504-521. https://doi.org/10.1080/19361610.2020.1818981
Hidayat, R. (2021). Social media as a tool for terrorist recruitment and planning: A case study in Southeast Asia. Journal of Terrorism and Cyber Security, 7(1), 15-29.
Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of Social Media. Business Horizons, 53(1), 59-68. https://doi.org/10.1016/j.bushor.2009.09.003
Lindekilde, L., Malthaner, S., & O’Connor, F. (2019). Lone-Actor Terrorism and Social Media: A Relational Perspective. Studies in Conflict & Terrorism, 42(1), 59-74. https://doi.org/10.1080/1057610X.2018.1531547
Matt, C., Hess, T., & Benlian, A. (2019). Digital transformation strategies: Opportunities and challenges. MIS Quarterly Executive, 18(2), 103-119.
Matt, C., Trenz, M., Cheung, C. M. K., & Turel, O. (2019). The Digitization of the Individual: Conceptual Foundations and Opportunities for Research. Electronic Markets, 29(3), 315–322. https://doi.org/10.1007/s12525-019-00348-9
Pratama, I. (2022). Adapting counter-terrorism strategies in the digital age: The role of advanced algorithms in detecting online threats. Journal of Digital Security, 14(3), 78-92.
U.S. Department of Defense. (2011). Intelligence, surveillance, and reconnaissance (ISR) operations: An overview. Washington, DC: Office of the Secretary of Defense.
Wright, A. (2021). The future of digital surveillance in counter-terrorism efforts. Journal of Strategic Security Studies, 16(1), 31-48.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Security Intelligence Terrorism Journal (SITJ)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.






