Kontraintelijen Pada Era Kontemporer Dalam Mencegah Ancaman Intelijen Asing dan Implikasinya Terhadap Ketahanan Wilayah Ibu Kota Nusantara di Kalimantan Timur

https://doi.org/10.22146/jkn.110054

Stanislaus Riyanta(1*), Diah Ayu Permatasari(2)

(1) Universitas Indonesia Universitas Bhayangkara Jakarta Raya
(2) Universitas Bhayangkara Jakarta Raya
(*) Corresponding Author

Abstract


Abstrak

Artikel ini mengkaji peran krusial kontraintelijen dalam mendukung fungsi deteksi dini dan pencegahan ancaman asing di era kontemporer, serta implikasinya terhadap ketahanan wilayah Ibu Kota Nusantara. Melalui pendekatan studi literatur kualitatif, penelitian ini menganalisis definisi, fungsi, dan evolusi kontraintelijen, serta adaptasinya terhadap tantangan modern seperti kemajuan teknologi, keterbatasan sumber daya, dan dilema etika. Hasil analisis menunjukkan bahwa kontraintelijen, dengan komponen utama seperti pencegahan, deteksi, penipuan, dan kontraespionase, berperan penting dalam meningkatkan keamanan nasional, mendukung pengambilan keputusan strategis, serta mencegah kerugian finansial dan membangun kepercayaan publik. Disimpulkan bahwa kontraintelijen merupakan elemen integral dalam strategi ketahanan nasional yang memerlukan adaptasi berkelanjutan, kolaborasi antar lembaga, transparansi, dan akuntabilitas untuk melindungi Ibu Kota Nusantara dari ancaman yang terus berkembang

Keywords


Kontraintelijen; Ketahanan Nasional; Ancaman Nasional, Ibu Kota Nusantara

Full Text:

PDF


References

ACSS. (2024) Mapping a Surge of Disinformation in Africa. Africa Center for Strategic Studies. Tersedia di: https://africacenter.org/wp-content/uploads/2024/05/Regional-Map-of-Disinformation-in-Africa-2024.pdf (Diakses: 13 Maret 2024). Aldrich, R. J. (2001) The Hidden Hand. London: John Murray. Andrew, C. (2009) The Defence of the Realm: The Authorized History of MI5. London: Penguin. Ashley, C. (2004) CIA SpyMaster. Gretna, LA: Pelican Press. Bamford, J. (2012) The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America. Doubleday. Barnea, A. (2020) 'Filling the Void in Counterintelligence Literature', International Journal of Intelligence and CounterIntelligence, 33(1), pp. 199-202. doi: 10.1080/08850607.2019.1675487. Bachmann, D., Putter, D. and Duczynski, G. (2023) 'Covert action as hybrid warfare–clarifying the semantics', Journal of Information Warfare, 22(3), pp. 60–77. Black, I. (2005) Israel's Secret Wars: A History of Israel's Intelligence Services. London: St. Martin's Press. Better World Campaign. (2024) The Damaging Deluge of Disinformation: What Researchers are Learning from Africa’s Digital Boom. Tersedia di: https://betterworldcampaign.org/blog/disinformation (Diakses: 1 Februari 2024). Braman, S. (2006) The Information Revolution: A Historical Perspective. New York: Routledge. Cathcart, B. (1994) Test of Greatness: Britain’s Struggle for the Atomic Bomb. London: John Murray. Calista, D. J. (2014) 'Enduring Inefficiencies in Counterintelligence by Reducing Type I and Type II Errors Through Parallel Systems: A Principal-Agent Typology', International Journal of Intelligence and CounterIntelligence, 27(1), pp. 109-131. doi: 10.1080/08850607.2014.842809. Daugherty, W. J. (2007) 'The role of covert action', in Loch, K. J. (ed.) Handbook of Intelligence Studies. Vol. 2. New York: Routledge, pp. 279–288. Davies, P. H. J. (2024) 'Counterintelligence and escalation from hybrid to total war in the Russo-Ukrainian conflict 2014–2024', Intelligence and National Security, 39(3), pp. 496-514. doi: 10.1080/02684527.2024.2329419. De Jong, L. (2006) The Secret War: Gladio and NATO's Stay-Behind Armies. London: Routledge. Davies, P. H. J. and Steward, T. J. (2024) 'The trouble with TESSOC: the coming crisis in British and allied military counterintelligence doctrine', Defence Studies. Dylan, H. (2015) 'Operation TIGRESS: deception for counterintelligence and Britain’s 1952 atomic test', Journal of Intelligence History, 14(1), pp. 1-15. doi: 10.1080/16161262.2014.943996. Dheeraj, P. C. (2018) 'Seaborne terrorism and counterintelligence in India: challenges and concerns', Journal of the Indian Ocean Region, 14(3), pp. 277-295. doi: 10.1080/19480881.2018.1519054. Goodman, M. (2007) Spying on the Nuclear Bear. Stanford: Stanford University Press. Gupta, A. (2000) Kargil: The Saga of Valor. New Delhi: HarperCollins. Haggerty, K. D. and Ericson, R. V. (2000) 'The Surveillant Assemblage', British Journal of Sociology, 51(4), pp. 605-622. Hennessy, P. (2000) The Prime Minister: The Office and its Holders Since 1945. London: Penguin. Hoffman, B. (2006) Inside Terrorism. New York: Columbia University Press. Hosaka, S. (2025) 'The Sino–Soviet Intelligence War: The KGB Counterintelligence Perspective', International Journal of Intelligence and CounterIntelligence, 38(2), pp. 462-494. doi: 10.1080/08850607.2024.2350423. Hough, M. (2002) The ANC and the Struggle for a New South Africa. London: Zed Books. Ilardi, G. J. (2009) 'The 9/11 Attacks—A Study of Al Qaeda’s Use of Intelligence and Counterintelligence', Studies in Conflict & Terrorism, 32(3), pp. 171-187. doi: 10.1080/10576100802670803. Ingesson, T. and Andersson, M. (2024) 'Clandestine communications in cyber-denied environments', Journal of Policing, Intelligence and Counter Terrorism, 19(2), pp. 144-165. doi: 10.1080/18335330.2023.2209578. Khan, A. (2015) The War on Terror: Pakistan's Role and Challenges. Islamabad: Institute of Strategic Studies. Libicki, M. C. (1995) What is Information Warfare? National Defence University, Centre for Advanced Command Concepts and Technology. Tersedia di: https://smallwarsjournal.com/documents/libicki.pdf (Diakses: 2025). Lowenthal, M. M. (2017) Intelligence: From Secrets to Policy. 7th edn. CQ Press. Lyman, B. J. (2023) 'In the eye of the Sphinx: US army intelligence collection and surveillance, 1965–1970', Journal of Intelligence History, 22(3), pp. 376-397. doi: 10.1080/16161262.2022.2099190. Lyon, D. (2003) Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination. Routledge. Magee, A. C. (2024) 'Counterintelligence Black Swan: KGB Deception, Countersurveillance, and Active Measures Operation', International Journal of Intelligence and CounterIntelligence, 37(1), pp. 232-264. doi: 10.1080/08850607.2023.2192374. Mahnken, T. G. (2007) The Limits of Military Innovation: The United States and the Soviet Union in the Cold War. New York: Routledge. Ndlovu-Gatsheni, S. J. and Ruhanya, P. (Eds.) (2020) The History and Political Transition of Zimbabwe: From Mugabe to Mnangagwa. Cham: Palgrave McMillan. Olson, J. M. (2019) To catch a spy: the art of counterintelligence. Georgetown University Press. Prados, J. (2006) The Family Jewels: The CIA, Secrecy, and Presidential Power. New York: The New Press. Prunckun, H. (2011) 'A Grounded Theory of Counterintelligence', American Intelligence Journal, 29(2), pp. 6-15. doi: 10.2307/26201945. Prunckun, H. (2019) Counterintelligence Theory and Practice. 2nd edn. Rowman & Littlefield. Putter, D. (2024) 'Navigating the interplay of cognitive warfare and counterintelligence in African security strategies: insights and case studies', Journal of Policing, Intelligence and Counter Terrorism, 20(2), pp. 173-192. doi: 10.1080/18335330.2024.2440873. Pyle, C. H. (1970) 'CONUS Intelligence: The Army Watches Civilian Politics', Washington Monthly, January. Richelson, J. T. (2007) The U.S. Intelligence Community. Boulder, CO: Westview Press. Robarge, D. (2003) 'Moles, Defectors, and Deceptions: James Angleton and CIA Counterintelligence', Journal of Intelligence History, 3(2), pp. 21-49. doi: 10.1080/16161262.2003.10555085. Rojas, C. (2015) The French Secret Services: From the Dreyfus Affair to the Present. London: Routledge. Rositzke, H. (1988) The CIA's Secret Operations: Espionage, Counterespionage, and Covert Action. Westview Press. Riehle, K. P. (2015) 'A Counterintelligence Analysis Typology', American Intelligence Journal, 32(1), pp. 55-60. doi: 10.2307/26202104. Reed, R. L. Jr. and Mc Ivor, A. D. (2005) 'Counterintelligence as a Strategic Asset: Thinking Anew', American Intelligence Journal, 23(1), pp. 64-66. doi: 10.2307/44327039. Shambaugh, D. (2013) China Goes Global: The Partial Power. Oxford: Oxford University Press. Selth, A. (2025) 'Spy Versus Spy: Myanmar’s Multiple Counterintelligence Challenges', International Journal of Intelligence and CounterIntelligence. Serscikov, G. (2024) 'Israel’s Intelligence Services in Iran: Exploiting Vulnerabilities for Penetration', International Journal of Intelligence and CounterIntelligence, 37(1), pp. 89-120. Shaffer, R. (2022) 'Decoding the Samba spy scandal: false spies, counterintelligence and military intelligence in India', Journal of Intelligence History. Smith, J. (2020) Intelligence and Warfare: The Role of Intelligence in World War II. New York, NY: Historical Press. Stouder, M. D. and Gallagher, S. (2015) 'Counterintelligence Outreach: Building a Strategic Capability', International Journal of Intelligence and CounterIntelligence. United Nations. (2011) The United Nations and the Protection of Human Rights. United Nations. Van Cleave, M. K. (2007) 'Counterintelligence and national strategy'. Tersedia di: https://apps.dtic.mil/sti/citations/ADA471485. Walzer, M. (2015) Just and Unjust Wars: A Moral Argument with Historical Illustrations. Basic Books. Wettering, F. L. (2000) 'Counterintelligence: The Broken Triad', International Journal of Intelligence and CounterIntelligence, 13(3), pp. 265-300. doi: 10.1080/08850600050140607. Yang, Z. (2022) 'The Chinese Communist Party’s exploitation of the Second United Front: intelligence and counterintelligence on a middle force territory', Intelligence and National Security, 37(1), pp. 73-89. doi: 10.1080/02684527.2021.1984017. Zedner, L. (2009) 'Security, the State and the Citizen: The Changing Face of Security', Theoretical Criminology, 13(3), pp. 299-318. Zegart, A. (2007) Spying Blind: The CIA, the FBI, and the Origins of 9/11. Princeton, NJ: Princeton University Press.



DOI: https://doi.org/10.22146/jkn.110054

Article Metrics

Abstract views : 1224 | views : 593

Refbacks

  • There are currently no refbacks.




Copyright (c) 2025 Stanislaus Riyanta

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


web
analytics View My Stats