’S NETIZEN POTENTIAL ON COUNTER-CYBER RADICALIZATION

Rizky Reza Lubis1

Indonesia Defense University ([email protected])

Abstract - This paper discusses the process of radicalization in cyberspace. It will look at how and why Indonesia are vulnerable in society and targeted by terrorist organizations in an attempt to recruit them, especially in cyberspace. The terrorists have become expert, not only using the latest tools of communications, but to do it in a way that can shield their identities and even their locations when spreading the radical ideology. The concept that used in this paper is cyber-radicalization, which is the new concept that merged from cyber threat and radicalization. The result from this paper shown that Indonesia netizens (internet users) had great potency to fight radicalization in the cyberspace and the capacity for supporting government counter-cyber radicalization agenda. However, fighting cyber radicalization in that way faced several challenges. Therefore, Indonesia’s government should benefited the netizens to reach the optimum point on counter-cyber radicalization agenda. Keywords: cyber, radicalization, terrorism, Indonesia Preface

nitially the Internet was created to However, it also experienced a shift in facilitate communication between function, the Internet is also used as a I the academic and military circles medium in committing criminal acts, one connected in the network of The of which is acts of terrorism. Terror acts Advanced Research Projects Agency carried out with internet related Network (ARPANET) in 1969.2 Along with instruments are known as cyber terrorism the development of Technology and acts. Cyber terrorism poses a threat to Information (ICT), the internet can be used state defense and security because it is freely as a public service to communicate. capable of destruction, alteration, and acquisition and retransmission to real

objects and cyber networks.3

1 The alumni of Indonesia Defense University, Defense Diplomacy Study Program. 2 Petrus Reinhard Golose, Seputar Kejahatan Hacking: Teori dan Studi Kasus, (: Yayasan Pengembangan Kajian Kepolisian Indonesia, 2008). 3 Dorothy E. Denning, Terror’s Web: How the Internet Is Transforming Terrorism, Handbook on Internet Crime, (New York: Willan Publishing, 2009).

Indonesia’s Netizen Potential on Counter-Cyber Radicalization | Rizky Reza Lubis | 19

According to Dorothy E. Denning, Antiterrorism and Effective Death Penalty the phrase cyber terrorism was first Act of 1996 used the website to commit created in 1982 by Barry Collin who acts of terrorism.7 emphasized his definition of the situation The use of cyberspace in acts of when the physical world and cyberspace terror is a real and new threat to some collide,4 then when a crime or act of terror countries.8 The worst scenario is when a occurs in the situation it is later called as country will not only take steps that have cyber terrorism.5 Collin asserted that in been controlled by the majority of future cyber warfare will involve terrorists countries, that is the traditional approach; who use cyberspace to carry out their Military facing military or state facing the attacks on critical infrastructure. With the country. But the enemy will have an rapid development of technology today, it unprecedented new pattern, including the is possible to perform an attack through a utilization of non-state actors that trigger single push of a button on the computer to asymmetric warfare, one of which is the damage and blow up infrastructure use of terrorist groups.9 Terrorists resulting in casualties, material loss and performing their action on cyberspace and disruptive impact on state stability.6 get support from a country will be a global Relevant to the process of establishing threat. Countries that benefit from this and running an organization of terrorism, context are countries that have superior which tend to closely related to the technological capabilities (predominantly development of technology, especially the developed countries) and are willing to Internet. There has been a great deal of seriously exploit the potential of terrorist crime within cyberspace, its cyberspace as an element of state defense starting point in 1998 in which half of the and security.10 thirty terrorist organizations set by the U.S

4 The word cyberspace often used as cyber world 8 James Andrew Lewis, Assessing the Risks of which means being in the realm of cyberspace. Cyber Terrorism, Cyber War and Other Cyber 5 Dorothy E. Denning, op. cit., pp. 194-212 Threats, (Washington, DC: Center for Strategic 6 Clay Wilson, “Computer Attack and Cyber & International Studies, 2002). Terrorism: Vulnerabilities and Policy Issues for 9 David J. Kilcullen, “Three Pillars of Congress”, Focus on Terrorism, Vol. 9, 2003, pp. Counterinsurgency”, Pidato pada the U.S 1-42. Government Counterinsurgency Conference, 7 Petrus Reinhard Golose, Invasi terorisme ke Washington D.C, 28 September 2006, on cyberspace. (Jakarta: YPKIK/Yayasan https://www.researchgate.net/publication/237 Pengembangan Kajian Ilmu Kepolisian, 2015). 538249_Three_Pillars_of_Counterinsurgency. 10 James Andrew Lewis, op.cit, hlm. 4.

20 | Journal of Defense & State Defense | August 2017, Volume 7 Number 2

Interestingly, in addition to and extreme ideology tend to get the committing acts of terror, terrorist courage to join the terrorist network networks utilize cyberspace as a medium after obtaining radical material on the in spreading radical or radicalization. internet. Despite the many positive things of the 4. The Internet provides higher security Internet, the internet with all the features guarantees than radicalization in the and freedom of access (especially in real world. Given the teaching of radical democracies) provides opportunities to ideology can be done without having to occur or at least support radicalization meet directly. This will guarantee effectively and efficiently. The opportunity confidentiality of identity and location. referred to the research of Von Bher, Anais With all the advantages provided by Reding, and Edward Gribbon on the internet in the context of "radicalization in the digital age" radicalization in cyberspace, the elaborated with the author's analysis, as government's handling also needs to be in follows:11 cyberspace. Interestingly, for democracies 1. Internet connecting people without that have the demand to guarantee knowing the territorial borders of the freedom of expression and association country opens the opportunity to suffer a dilemma when implementing disseminate and instill ideology and counter-cyber radicalization programs or radical understanding to all internet counter-radicalization efforts in users in the world. cyberspace. The country cannot brutally 2. Internet as "echo-chamber", where the block the websites and internet provides easy access to obtain because it would violate some of its various information, including citizens' rights. In addition, the information about terrorism. The assessment of "terrorists" and "radicals" information obtained will continue to is the subjectivity of its judges. So, the grow and spread to other media. process of filtering web sites and social 3. The Internet becomes an accelerator of media accounts are very selective. The radicalization. Internet users who have government needs a creative way of an understanding that leads to radical

11 Von Bher et. al., Radicalization in the Digital Era, (Santa Monica: RAND Corporation, 2013).

Indonesia’s Netizen Potential on Counter-Cyber Radicalization | Rizky Reza Lubis | 21 counter-cyber radicalization without with the development of technology, violating the rights of its citizens. radicalization or how to spread radical understanding also experiences the Cyber Radicalization development of cyberspace, as Before going further in discussing mentioned earlier, namely cyber radicalism in cyberspace, basically radicalization. Here are the phases of radicalization needs to be understood not radicalization along with the development as a form of dissemination of terror, but as of technology:14 a “process” in developing extremist • Phase 1: In 1984, radicalization began ideology and belief. Referring to the with sermons / lectures, printed Oxford Dictionary, Radicalization is an act newspapers / magazines, and video or process that causes individuals to be in tapes of lectures or "struggles" by a radical position in political and social force. 12 issues. This is in line with the definition of • Phase 2: The mid-1990s, internet sites, 13 radicalization of Wilner and Dubouloz: such as Al-Neda and Azzam “Radicalization is a personal process Publications. in which individuals adopt extreme political, social, and/or religious • Phase 3: Mid 2000s, interactive forum ideals and aspirations, and where on cyberspace. At that time began to the attainment of particular goals justifies the use of indiscriminate emerge online forums of discussion on violence. It is both a mental and extremist ideology and belief. emotional process that prepares and motivates an individual to pursue • Phase 4: late 2000s; the spread of violent behavior”. radicalism into the realm of social Thus, from this definition it can be media along with the increase of social understood that radicalization as a media users. The social media that is “process” in making individuals adopt often used is , Youtube and radical thinking that has consequences for . acts of terrorism and extremism. Along

12 “Radicalization”, Oxford Dictionary, on understanding radicalization”, Global Change, https://en.oxforddictionaries.com/definition/ra Peace & Security, Vol. 22, No. 1, 2010, pp.33-51. dicalization, 19 July 2017, accessed on 19 July 14 Aaron Y. Zelin, Richard Borow Fellow, “The 2017 State of Global Jihad Online: A Qualitative, 13 Alex S. Wilner and Claire-Jehanne Dubouloz, Quantitative, and Cross-Lingual Analysis”, Homegrown terrorism and transformative Washington Institute for Near East Policy, learning: an interdisciplinary approach to January 2013.

22 | Journal of Defense & State Defense | August 2017, Volume 7 Number 2

Radicalization in cyberspace will themselves. The results of the continue as radical dissemination and investigation indicate that the terrorists propaganda will be more effective and gain an understanding of the internet and efficient when done in cyberspace. Cyber then visit Al-Qaeda to get training that radicalization will create opportunities for culminates in a "Jihad" action in their own self-radicalization, in which individuals country.17 become terrorists without direct As for cyber radicalization has a affiliation with radical groups but they still variety of forms, at the stage of promoting gain influence from the ideology and the ideology or understanding of terrorist message of the terrorists, commonly groups, they tend to use social media with called "lone wolf" terrorists.15 links leading to websites or online forums Although not moving in groups, that provide more detailed information terrorists created from self-radicalization than social media that is too open to the are a serious threat. There is a tendency public. The websites or online forums are for massively moving terrorist groups to diverse and numerous in shape, and tend get help from those who do self- to have the following features;18 radicalization and even they come to the • Contains persuasive content in group to propose themselves as justifying terrorist beliefs and members. This can be seen from the case ideologies and affirming the errors of of Mohammed Atta and three others other ideological beliefs, including the directly involved in the 9/11 attacks, ideology of secular states. withdrawing them, themselves domiciled • There are photo news, and videos that in Hamburg, Germany which then traveled show suffering and oppression to raise to Pakistan.16 Then another case in London sympathy, but there are also those who suicide bombings in 2005 conducted by show extremist "action". terrorists who are British citizens

15 “Self-Radicalization”, Citizendium, dalam Terrorist Threat: al-Qaeda on the Run or on the http://en.citizendium.org/wiki/Self- March?, (George Washington D.C: Middle East radicalization, 23 September 2013, accessed on Policy, 2013). 2 June 2017. 18 Anton Ali Abas, The presentation of Media and 16 Ruth Stein, For Love of the Father: A Terrorism Course, Asymmetric Warfare Study Psychoanalytic Study of Religious Terrorism, Program, Indonesia Defense University, 13 (Stanford: Stanford University Press, 2010). October 2015. 17 Bruce Hoffman, Challenges for the U.S. Special Operations Command posted by the Global

Indonesia’s Netizen Potential on Counter-Cyber Radicalization | Rizky Reza Lubis | 23

• Having two or more language versions, and effective instrument in cyber it shows the target of cyber radicalization. One example is the radicalization is a global society. recruitment of jihadist candidates through • Specifically for members / passwords Facebook to be sent to Syria in 2014, (password-protected) in order to enter among them citizens who have been and view the content of the website. deported from Turkey and examined as This is done as a form of anticipation of witnesses. According to his statement, terrorist organizations so as not to be they will leave for Syria by gaining access seen by the government or cyber from friends on Facebook. Initially, the police. Although, cyber police will be witness received a friendship invitation on very easy to check the contents of Facebook with an unknown person, the online discussion forums that use a witness accepted the friendship because it password or private but if not open to saw the writings on the Facebook page is the public, it is likelyhood to be known very Islamic and tell a lot about daulah or by cyber police will be smaller. ISIS power in Syria. Friendship on Use of websites and online Facebook continues with the use of a discussion forums is an effective option in personal chat facility which in turn gets an recruiting and gathering sympathy. This offer to go to Syria.19 can be seen from the number of members The example shows one form in of the closed online groups. These are the promoting radical ideology and garnering most famous international discussion support through social media. Social forums and have many active members media is the most frequently used are (see Table 1). social media with the most demands, In promoting these websites and where the top three are Facebook, online discussion forums terrorist groups Youtube and Twitter. The character of tend to use social media. In addition, social social media accounts in the context of media is understood as a fairly relevant radicalization can be seen in the Table 2.

19 Petrus Reinhard Golose, op.cit.

24 | Journal of Defense & State Defense | August 2017, Volume 7 Number 2

Table 1. Radical Online Sites and Forums

Source: Anton Ali Abas, the Presentation of Media and Terrorism Courses, Asymmetric Warfare Study Program, Indonesia Defense University, 13 October 2015.

Table 2. Social Media Used as Cyber Radicalization Instrument Facebook Multiple accounts Private Messaging and Chat Closed groups YouTube Media dissemination Validation Messaging Twitter Wide broadcast Multiple accounts Direct Messaging

Source: Anton Ali Abas, the Presentation of Media and Terrorism Courses, Asymmetric Warfare Study Program, Indonesia Defense University, 13 October 2015.

Related to the use of social media that are usually uploaded to the internet whose main function is to share videos, by terrorist groups:20 such as Youtube, cyber-radicalization is 1. Operational Video (at the time of their done by spreading the specifically themed assault). video. There are six categories of themes 2. Hostage Video

20 Anton Ali Abas, op.cit.

Indonesia’s Netizen Potential on Counter-Cyber Radicalization | Rizky Reza Lubis | 25

3. Videos that provide statements such as Indonesia, it will be even more representing their groups. complicated to choose what comes first 4. Tribute Video. between tackling economic problems or 5. Internal Training Video tackling terrorism. Not to mention for the 6. Videos that give instructions to the majority Muslim countries, often the public. government has to deal with its own Cyber-radicalization through social community. Basically, not all Muslims in media is a matter to watch out for because Indonesia have radical understanding and it is most easily spread and popular. In lead to the terrorist movement, but based addition, the majority of users are on the diversity of religion in Indonesia, teenagers who do not have the mental terrorist acts are often done by the party establishment so vulnerable to be a target who claims that he is a Muslim and it is a of radicalization. Although cyber- risk for majority religion.21 It is this kind of radicalization (as well as all other dilemma that sometimes triggers terrorism-related matters) tends to be domestic tensions that can trigger the indiscriminate against its target. disintegration of the nation. Under these

Cyber Radicalization in Indonesia conditions, it can be understood that terrorism has become a real threat to Since the collapse of the World Trade Indonesia.22 Center (WTC) in September 2011 and in Indonesia is a country vulnerable to particular on the Bomb I event, the threat of terrorism, this can be seen Indonesia has been paying serious from the many acts of terror in Indonesia, attention to the issue of terrorism and as in the big cases: Bali Bomb I in October actively participating in the "war on 2002, Bali Bomb II in October 2005, JW terror" policy launched by the United Marriot Hotel and Hotel Ritz Calton in July States. But this becomes a dilemma of its 2009, the Australian Embassy in own. For countries that are still facing unemployment and poverty problems

21 “Terorisme Dikaitkan Islam, BNPT: Itu Resiko 22 “Terorisme masih jadi ancaman nyata tahun Agama Mayoritas”, Republika, 15 April 2016, on 2016”, Rappler, 29 December 2015, on http:// http://nasional.republika.co.id/berita/nasional/ www.rappler.com/indonesia/117434- umum/16/04/15/o5neyu377-terorisme- terorismemasih-jadi-ancaman-nyata-tahun- dikaitkanislam-bnpt-itu-resiko-agama- 2016, accessed on 13 August 2016. mayoritas, accessed on 17 July 2017.

26 | Journal of Defense & State Defense | August 2017, Volume 7 Number 2

September 2004.23 Plaza Sarinah in referring to the statistical data of the January 2016, to the Kampung Melayu Ministry of Communications and Terminal in May 2017. In addition, there is Informatics, Indonesia occupy the top also the involvement of Indonesian position of vulnerability in cyberattacks. citizens in international terrorist networks This makes Indonesia often a target of such as ISIS, Al-Qaeda, Jamaah Islamiyah, attacks on cyberspace when compared Abu Sayyaf and so on.24 As for the threat with other countries as illustrated in the of terror that occurred in cyberspace, Graph 1.

Graph 1. Countries Targeted by Cyberattack and Cyber terror in 2012-2014

Source: Ministry of Communications and Informatics, 2017, Data and Statistics; Cyber Security and Governance, in https://statistik.kominfo.go.id/site/searchKonten?iddoc=1370, accessed on 2nd June 2017.

23 Jeneman Iskandar, “Perubahan Pola Serangan 24 Golose, op.cit. Teorisme di Indonesia: Studi Kasus Tahun 2000- 2013”, (Jakarta: Dapur Buku, 2014).

Indonesia’s Netizen Potential on Counter-Cyber Radicalization | Rizky Reza Lubis | 27

One of the cases of terrorism with In addition, there is a case called Santoso the use of cyberspace in Indonesia that who leads the network of the East received the spotlight is the case of Imam Indonesian Mujahidin Group who Samudra, a convicted individual who died expressed their support for ISIS leader on the Bali Bomb case. At that time, Imam Abu Bakar Al Bahgdadi through a video on Samudra could control the terrorist YouTube. The action ended with a number network from his prison cell using the of Indonesians who claimed to be in ISIS, internet.25 In addition, the most frequent Iraq and Syria, and invited the public to threat in cyberspace in Indonesia is the use join the jihad with ISIS in the country. 28 of internet sites in conducting propaganda As a precaution against the recurrence of and brain washing to spread radical such acts of terror and radicalization and ideology or commonly called cyber restricting the movement of terrorist radicalization.26 networks in Indonesian cyberspace, the Indonesian government with the The Indonesian government itself in legitimacy granted to the National Agency assessing some cases of internet use as a for the Control of Terrorism (BNPT) has media of cyber radicalization is still blocked sites considered to spread radical subjective, whether the action leads to and extreme insights. Here's a list of terror acts or not. As for the case which eleven popular sites and getting clearly states cyber radicalization and blocked:29 continued with terror in Indonesia is Al- 1. voa-islam.com Kitabatul Maut Al Alamiya website or the 2. nahimunkar.com international death brigade which claimed 3. kiblat.net responsibility in Bali Bomb I case in 2002.27 4. bisyarah.com

25 managed to smuggle the laptop 28 “ISIS Sebar Pemahaman Radikal melalui Media into the cell with the help of a Kerobokan Prison Digital”,on Warden, who had previously been recruited http://www.bbc.com/indonesia/berita_indones into a terrorist member in the prison. According ia/2015/03/150301_radikalisme_anakmuda_sos to the International Growth Center Report in med, 2 March 2015, accessed on 6 June 2017. Peter Reinhard Golose, Invasi Terorisme ke 29 “11 Situs terbaru yang diblokir pemerintah”, on Cyberspace, (Jakarta: YPKIK/Yayasan http://megapolitan.kompas.com/read/2017/01/0 Pengembangan Kajian Ilmu Kepolisian, 2015), 4/10150067/ini.dia.11.situs.yang.terbaru.diblokir pp. 18-19. .pemerintah, 1 April 2017, accessed on 6 June 26 Von Bher, op.cit. 2017. 27 “We Bombed Bali”, on http://www.theage. com.au/articles/2002/12/12/1039656175179.html, 13 December 2002, accessed on 6 June 2017.

28 | Journal of Defense & State Defense | August 2017, Volume 7 Number 2

5. dakwahtangerang.com and social media will continue to exist and 6. islampos.com regenerate with new accounts. In 7. suaranews.com addition, brutal blocking and removal will 8. izzamedia.com create a negative value for a democratic 9. gensyiah.com country that supports freedom of 10. muqawamah.com expression. 11. abuzubair.net. In this context, the focused model of In addition, BNPT has also blocked handling is counter-cyber radicalization several personal sites like blogspot and which departs from the concept of cyber wordpress that have radical content. The security and counter-radicalization. challenge faced is the large number of Counter radicalization is essentially an private sites users in Indonesia (see Graph effort other than de-radicalization in 2), thus made this blocking approach take preventing the growing extremist considerable time, considering when the tendencies in society. If wisely site is blocked or deleted by the implemented counter-radicalization will government, new sites will appear be more effective than de-radicalization because the site is unpaid and new or because counter-radicalization is an double account creation procedures can opposition to the process of spreading be done easily (see Graph 2). radical ideas and focuses on embryonic

Indonesian Potential Internet Users in radicalization, whereas de-radicalization Counter-Cyber Radicalization focuses on changing the radical (back to normal).30 Cyber radicalization is different from Utilization of cyberspace conventional radicalization (which takes instruments, especially in the context of place in the real world), a special approach social media to counter-radicalization can is needed in the realm of cyberspace. be categorized as counter-cyber Governments can easily block or delete radicalization. Counter-cyber sites, personal blogs, and social media radicalization needs to be done because accounts that are considered to have today more and more terrorists are in the radical content. The problem is the site

30 Farhan Zahid, “Analyzing the Counter- analyzes/analyzing-the-counter-radicalization- Radicalization and De-Radicalization Models”, and-deradicalization-models.php, 13 December on http://www.cf2r.org/fr/foreign- 2016, accessed on 19 July 2017.

Indonesia’s Netizen Potential on Counter-Cyber Radicalization | Rizky Reza Lubis | 29 virtual world in the dissemination of content (which is propaganda) and massages, hostile propaganda and the campaign to counter radicalization on the promotion of acts of violence. Some internet, the most effective is to use findings of cyberspace use by terrorist hashtag. Internet users who capture the group in Indonesia that cyberspace is used massage are likely to spread the content to release manifestos, propaganda and and make it a trend. According to the agitative statements, garner support and author, of many contexts in cyberspace, network strengthening, communicate social media is the most important thing to between networks and recruit new note as and issue tends to be popular and member.31 spread quickly through social media. According to the authors' note, Moreover, the use of internet in Indonesia there are some potential Indonesian is dominated for social media purposes, as internet users to counteract or become illustrated in the Graph 3. part of a counter-radicalization agenda Secondly, the Indonesian Society is that is not only on normative ground, but able to produce joke products very quickly focuses on embryo radicalization in the and make it popular with a matter of cyberspace. Firstly, the large number of minutes in cyber space. The humor of internet users in Indonesia and tendencies Indonesian society has been recognized to be very active in social media makes by the world community. This is evident Indonesia easy to raise something into from the Bomb case in the Sarinah viral issues only with capitalize the Thamrin area on January 14th, 2016, after hashtags.32 Cyber-radicalization done the incident in a matter of minutes the through social media will be ineffective if trend in the social media world the majority of social media users immediately turned into the issue of the participate in disseminating content that bombing. Interestingly, unlike the case of contradicts radical ideology. Thus, the terrorism in Paris, France33, the majority of tasks of the government are to release

31 Petrus Reinhard Golose, op.cit. pada Sosial Media”, on 32 Hashtag is a word or phrase, without spaces, http://organixdigital.com/blog/read/definisidan which starts with a hash symbol (“#”). Hashtag fungsihashtagpadasosialmedia 11 April 2014, is enabled for classify more spesific themes or accessed on 3 June 2017 topics in social media, and on the other hand, 33 “Paris Massacre: At least 128 died in attacks”, hashtag is also easier for others to find topics on that are interconnected. See, “Definisi Hashtag http://edition.cnn.com/2015/11/13/world/parissh

30 | Journal of Defense & State Defense | August 2017, Volume 7 Number 2

Graph 3. Internet User’s Activity by Individuals in Indonesia

Source: Ministry of Communications and Informatics, 2017, Data and Statistics; Cyber Security and Governance (Ditjen PPI), available at ttps://statistik.kominfo.go.id/site/searchKonten?iddoc=1370, accessed on 2 June 2017. Indonesian (especially Jakarta) responses that spread throughout the world. It in social media do not show the fear of shows that acts of terrorism aimed at terror; It makes the act of terrorism a spreading terror and fear have failed or matter of joke and satire against radical can be denied by the response of ideologies. This is indicated by the large Indonesian internet users.34 number of meme productions (pictures In addition, in the case of the with writing) and the social status of the Kampung Melayu Terminal bombing in media that are satirical. At that time, the May 2017, the "#KamiTidakTakut" hashtag response of internet users in Indonesia became a world trend. This is a became a symbol that terrorism does not simultaneous response of Indonesian make the Indonesian people fear that is internet users without any party marked by hashtag "#KamiTidakTakut" coordination. Therefore, if the

ooting/index.html, 14 November 2015, accessed Internship Program 2016 on Germany, Theme: on 4 June 2017. The Role of Young Generation in Counter 34 Rizky Reza Lubis, “Fight Radicalization with Terrorism, FPCI. ‘Ridicoulization’”, Essay for FPCI International

Indonesia’s Netizen Potential on Counter-Cyber Radicalization | Rizky Reza Lubis | 31 government is able to exploit these "terrorist" candidate. But with so many potentials by making it part of the counter- social media accounts opposing and cyber radicalization agenda then this will portraying such acts as silly acts then it will be the most efficient and effective way. show terrorists in the delivery of their Because after all the atmosphere of terror messages through the act of failed and public opinion created can only be terrorism.

35 controlled by the public itself. Counter-Cyber Radicalization Challenge in Technically the government can utilize Indonesia well-known public figures and is active in Indonesia with its potential internet users cyberspace as an agent in controlling in counter-cyber radicalization has three public opinion. Status on Facebook, challenges to be considered: first, the lack Twitter chirp and Youtube Videos by the of public awareness of "terrorism" characters tend to be more quickly matters. If people are able to change accepted and spread in cyberspace. popular culture that radicalism and acts of The engagement of Indonesian terror are a joke so that the enthusiasts or internet users on the counter-cyber victims of radicalization will decline, the radicalization agenda will have an impact consequence will be to reduce the on two phases; First, when cyber awareness that has been awakened by a radicalization takes place where internet sense of "fear" of acts of terrorism. users who are part of the agenda will However, the lack of radical interest in counter radical ideology and cyberspace does not mean stopping the understanding by turning them into jokes action of terrorist networks. This makes that ultimately make the ideology and counter-radicalization efforts through the understanding unpopular. Second, in the utilization of internet users in cyberspace event of acts of terror such as bombing effective but will create a new blind spot. and suicide bombing. Such terror acts will The government should be able to close have the effect of fear and panic which are the blind spot by continuing to give the main objectives of terrorists; which is continuous appeals without causing panic also considered a terrorist success in and fear. conveying the message to the next

35 Ibid.

32 | Journal of Defense & State Defense | August 2017, Volume 7 Number 2

Second, discredit certain groups. one of which is to utilize the potential of Giving public opinion to assume an Indonesian people who use the internet. ideology or understanding is radical and Many Indonesian internet users and extreme has the consequence of creatively able to raise a viral issue to be discrediting and creating stereotypes in used as counter-cyber radicalization society with groups (in this context of agenda in controlling public opinion that religious teachings) which are the basic radical understanding is a negative thing. logic of the terror act. As in Indonesia, the In addition, when an act of terror internet majority of terrorists claim to be Muslims, users by itself will fight the panic and fear though not in accordance with the original generated with the social media. It will teachings of Islam, but this will lead to reduce radical ideology enthusiasts. But in public opinion that the basic or pure practice, the government should pay religion that the terrorist claims is part of attention to the level of "awareness" of the joke. This has the potential to become the community and the position of a one of the disintegrating factors of the particular religion in order not to be nation. discredited, given the number of

Conclusion campaigns in cyberspace that oppose radicalism. Cyber radicalization is a real threat to a country and Indonesia is one of the most References potential countries to be a target of Book terrorists and radicalization (including its Denning, Dorothy E. 2009. Terror’s Web: How the Internet Is Transforming cyberspace). Attempts to deal with Terrorism, Handbook on Internet radicalization in cyberspace will not be as Crime. New York: Willan Publishing. effective as handling it in the real world. Golose, Petrus R. 2008. Seputar Kejahatan Hacking: Teori dan Studi Kasus. Moreover, Indonesia is a democratic Jakarta: Yayasan Pengembangan country that keeps the freedom of Kajian Kepolisian Indonesia. expression of its people, so it cannot Golose, Petrus R. 2015. Invasi Terorisme ke Cyberspace. Jakarta : Yayasan arbitrarily block social media sites and Pengembangan Kajian Ilmu accounts. Kepolisian. Creative and effective ways are Hoffman, Bruce. 2013. Challenges for the U.S. Special Operations Command needed in counter-cyber radicalization, posted by the Global Terrorist Threat:

Indonesia’s Netizen Potential on Counter-Cyber Radicalization | Rizky Reza Lubis | 33

Al-Qaeda on the Run or On the Website March?. George Washington D.C.: “Definisi Hashtag pada Sosial Media”, on Middle East Policy. http://organixdigital.com/blog/read/ Iskandar, Jeneman. 2014. Perubahan Pola definisidanfungsihashtagpadasosial Serangan Teorisme di Indonesia: Studi media, 11 April 2014, accessed on 3 Kasus Tahun 2000-2013. Jakarta: June 2017. Dapur Buku. “ISIS Sebar Pemahaman Radikal melalui Lewis, James A. 2002. Assessing the Risks Media Digital”, on of Cyber Terrorism, Cyber War and http://www.bbc.com/indonesia/beri Other Cyber Threats. Washington, ta_indonesia/2015/03/150301_radikal DC: Center for Strategic & isme_anakmuda_sosmed 2 March International Studies. 2015, accessed on 6 June 2017. Stein, Ruth. 2010. For Love of the Father: A Kilcullen, David J, “Three Pillars of Psychoanalytic Study of Religious Counterinsurgency”, Speech on the Terrorism. Stanford: Stanford U.S Government Counterinsurgency University Press. Conference, Washington D.C, 28 Von Bher et. al. 2013. Radicalization in the September 2006, on Digital Era, Santa Monica: RAND https://www.researchgate.net/publi Corporation. cation/237538249_Three_Pillars_of_ Counterinsurgency. Zelin, Aaron Y dan Richard Borow Fellow. 2013. The State of Global Jihad Online: “Paris Massacre: At least 128 die in attack A Qualitative, Quantitative, and Cross- s”, on Lingual Analysis. Washington : http://edition.cnn.com/2015/11/13/wo Washington Institute for Near East rld/paris•shooting/index.html, 14 Policy. November 2015, accessed on 4 June 2017. Journal “Radicalization”, Oxford Dictionary, on Jackson, Richard. 2007. Constructing https://en.oxforddictionaries.com/d Enemies: ‘Islamic terrorism’ in efinition/radicalization, accessed on political and academic 19 July 2017. discourse. Government and Opposition. Vol. 42. No. 3. “Self-Radicalization”, on http://en.citizendium.org/wiki/Selfra Wilner, Alex S. and Claire-Jehanne dicalization, 23 September 2013, Dubouloz. 2010. “Homegrown accessed on 2 June 2017. terrorism and transformative learning: an interdisciplinary “Situs terbaru yang diblokir pemerintah”, approach to understanding on radicalization”. Global Change, Peace http://megapolitan.kompas.com/rea & Security. Vol. 22 No. 1. d/2017/01/04/10150067/ini.dia.11.situs .yang.terbaru.diblokir.pemerintah, 1 Wilson, Clay. 2003. Computer Attack and April 2017, accessed on 6 June 2017. Cyber Terrorism: Vulnerabilities and Policy Issues for Congress. Focus on “Terorisme masih jadi ancaman nyata Terrorism. Vol. 9. tahun 2016”, on http://www.rappler.com/indonesia/1 17434-terorisme-masih-jadi-

34 | Journal of Defense & State Defense | August 2017, Volume 7 Number 2

ancaman-nyata-tahun-2016, 29 December 2015, accessed on 13 August 2016. “We Bombed Bali”, on http://www.theage.com.au/articles/ 2002/12/12/1039656175179.html, 13 December 2002, accessed on 6 June 2017. Farhan Zahid, “Analyzing the Counter- Radicalization and De-Radicalization Models” on http://www.cf2r.org/fr/foreign- analyzes/analyzing-the-counter- radicalization-and-de-radicalization- models.php, 13 December 2016, accessed on 19 July 2017. Others Abas, Anton A. 13 October 2015, The Presentation of Media and Terrorism Course, Indonesia Defense University. Lubis, Rizky Reza. 2016. “Fight Radicalization with “Ridiculization”. Essay for FPCI International Internship Program 2016 on Germany. Theme: The Role of Young Generation in Counter Terrorism, FPCI.

Indonesia’s Netizen Potential on Counter-Cyber Radicalization | Rizky Reza Lubis | 35