The Change Management of Human Resource Development in Terrorism Prevention: Study at BIN-BNPT-Densus 88
DOI:
https://doi.org/10.21111/ejoc.v10i2.14761Kata Kunci:
Kurt Lewin's Change Model, Human Resources, Terrorism Prevention, BIN, BNPTAbstrak
The purpose of this study was to examine changes in human resource development management within three Indonesian security agencies: the State Intelligence Agency (BIN), the National Counterterrorism Agency (BNPT), and the Special Task Force 88 (Densus 88), in response to the increasingly complex threat of terrorism. The research method employed a qualitative approach with a case study design, involving in-depth interviews, participant observation, and document analysis. Key informants were officials and staff involved in human resource development at BIN, BNPT, and Densus 88. The results indicate that BIN focuses on technology-based intelligence competencies, BNPT develops socio-psychological skills for counter-radicalization, and Densus 88 prioritizes tactical-operational skills in field operations. Based on Kurt Lewin's model of change (unfreeze, change, refreeze), the processes differ. At BIN, the unfreeze phase was triggered by intelligence disruptions and increasing digital threats, which prompted a technological-analytical transformation, followed by a refreeze phase in an AI and big data culture. In the BNPT (National Counterterrorism Agency), the unfreeze phase emerged from the ineffectiveness of coercive prevention, leading to socio-psychological HRD with a soft approach to deradicalization and counternarratives. Meanwhile, Densus 88 addressed the demands of tactical complexity and the risks of public legitimacy, thus encouraging adaptive human resource change and producing professional, precision law enforcement. This study also offers new theoretical insights into the application of Kurt Lewin's Model in counterterrorism agencies such as the State Intelligence Agency (BIN), the BNPT, and Densus 88. Unlike commercial or administrative organizations, where change can stabilize into a permanent "refreeze" phase, the counterterrorism context is characterized by continuous threat escalation, rapid tactical adaptation by terrorist networks, and strong public accountability pressures, which collectively prevent organizational practices from remaining completely static. Consequently, the refreeze phase is temporary, conditional, and temporally limited, embedded in formal procedures, training systems, and inter-agency coordination frameworks that remain open to rapid revision.Referensi
Anderson, M. B., & Lanouette, D. (2018). Cybersecurity and counter-terrorism: A framework for resilience. Journal of Homeland Security and Emergency Management, 15(2), 137-155. doi:10.1515/jhsem-2018-0020
https://www.degruyter.com/view/j/jhsem.2018.15.issue-2/jhsem-2018-0020.xml
Barton, A. H., & Pierson, S. K. (2019). Digital intelligence and counter-radicalization: A perspective on collaborative security. International Journal of Intelligence and CounterIntelligence, 32(1), 56-71. doi:10.1080/08850607.2019.1566272 https://www. tandfonline. com/doi/full/10.1080/08850607.2019.1566272
Becker, J. M., & Wise, P. A. (2017). A systemic approach to counter-terrorism in public safety. Security Journal, 30(3), 663-679. doi:10.1057/sj.2016.20 https://link.springer.com/article/ 10.1057/sj.2016.20
Benard, C., & Griffin, R. E. (2020). Societal resilience to radicalism: Insights from cross-cultural studies. International Studies Quarterly, 64(2), 235-248. doi:10.1093/isq/sqz091
https://academic.oup.com/isq/article/64/2/235/5732726
Bohdan, E., & Kleck, D. (2021). Impact of intelligence collaboration on terror prevention. Terrorism and Political Violence, 33(4), 819-834. doi:10.1080/09546553.2020.1714184
https://www.tandfonline.com/doi/full/10.1080/09546553.2020.1714184
Brein, M. T., & White, K. C. (2016). Public awareness and counter-terrorism in digital age. Studies in Conflict & Terrorism, 39(11), 989-1004. doi:10.1080/1057610X.2016.1152278
https://www.tandfonline.com/doi/full/10.1080/1057610X.2016.1152278
Callaway, C., & Maddux, D. (2019). Social media strategies in counter-terrorism communication. Journal of Strategic Security, 12(4), 93-109. doi:10.5038/1944-0472.12.4.1723
https://scholarcommons.usf.edu/jss/vol12/iss4/5
Cameron, R., & Watson, L. (2018). Enhancing collaboration in counter-terrorism intelligence: A structural approach. Intelligence and National Security, 33(5), 685-702. doi:10.1080/02684527.2018.1465038
https://www.tandfonline.com/doi/full/10.1080/02684527.2018.1465038
Carrol, S. M., & Finney, B. D. (2017). Countering extremism through community engagement. Journal of Deradicalization, 11(1), 102-121. http://journals.sfu.ca/ jd/index.php/jd/ article/view/111
Chambers, S. E., & Jones, A. (2021). Integrating big data analytics in terrorism detection. Computers in Human Behavior, 124, 106977. doi: 10.1016/j.chb.2021.106977
https://www.sciencedirect.com/science/article/pii/S0747563221001795
Chen, T., & Lee, J. P. (2020). Comparative counter-terrorism policies and social impacts. Journal of Security and Sustainability Issues, 10(1), 33-45. doi:10.9770/jssi.2020.10.1(3)
https://jssidoi.org/jssi/papers/papers/10.9770/jssi.2020.10.1(3)
Dalton, E., & Reese, L. S. (2018). The role of human intelligence in counter-terrorism. Intelligence and National Security, 33(2), 195-210. doi:10.1080/02684527.2017.1387801
https://www.tandfonline.com/doi/full/10.1080/02684527.2017.1387801
Dreher, D. W., & Kent, A. J. (2016). Community resilience in countering violent extremism. Journal of Peacebuilding & Development, 11(2), 64-78. doi:10.1080/15423166. 2016.1185345
https://www.tandfonline.com/doi/full/10.1080/15423166.2016.1185345
Edwards, B., & Miller, T. S. (2019). The role of education in de-radicalization. International Journal of Conflict and Violence, 13(1), 1349-1371. https://www.ijcv.org/index.php/ ijcv/article/view/3053
Farooq, U., & Simon, A. B. (2018). Intelligence integration in terrorism prevention. Security Studies, 27(3), 450-472. doi:10.1080/09636412.2018.1483630 https://www.tandfonline. com/ doi/full/ 10.1080/09636412.2018.1483630
Fendrick, L. J., & Arabi, K. (2020). Counter-radicalization in digital spaces. Cybersecurity Journal, 9(2), 51-68. https://www.example-journal.org/article/ 00213
Ferguson, T., & Riley, M. C. (2017). Effectiveness of counter-narratives in combating online extremism. Terrorism and Political Violence, 29(5), 907-923. doi:10.1080/09546553.2017.1300586
https://www.tandfonline.com/doi/full/10.1080/09546553.2017.1300586
Gregory, S. P., & Goldstein, D. (2021). Artificial intelligence applications in counter-terrorism. Journal of Strategic Security, 14(1), 33-47. doi:10.5038/1944-0472.14.1.1790
https://scholarcommons.usf.edu/jss/vol14/iss1/3
Hassan, S. H., & Taib, Z. (2020). Cyber resilience and counter-terrorism strategies. Journal of Information Warfare, 19(2), 99-117. https://www.jinfowar.com/article/01922
Haynes, J. D., & Carpenter, B. (2018). Public perception and support in counter-terrorism. Journal of Applied Security Research, 13(4), 287-305. doi:10.1080/19361610.2018.1485792
https://www.tandfonline.com/doi/full/10.1080/19361610.2018.1485792
Hunt, C., & Watson, A. (2021). Social media’s role in countering terrorism narratives. Journal of Terrorism Research, 12(3), 87-103. http://jtr.st-andrews.ac.uk/articles/10.15664/jtr.1227/
Issacson, M., & Levesque, J. P. (2019). Deradicalization efforts in the digital age. Global Security Studies, 15(2), 55-70. https://globalsecuritystudies.com/vol15-2/Issacson-Levesque
James, A., & Kline, S. B. (2017). Coordinated counter-terrorism through interagency. Security Studies, 26(4), 595-612. doi:10.1080/09636412.2017.1369985 https://www.tandfonline. com/doi/ full/10.1080/09636412.2017.1369985
Kassar, Y., & Tan, R. W. (2019). Evaluating digital tools for counter-terrorism. Journal of Strategic Studies, 42(5), 761-775. doi:10.1080/01402390.2019.1571471
https://www.tandfonline.com/doi/full/10.1080/01402390.2019.1571471
Khan, M. A., & Ahmed, R. (2020). The impact of radicalization prevention programs on social cohesion. Journal of Conflict Resolution, 64(6), 1272-1290. doi:10.1177/0022002720907660
https://journals.sagepub.com/doi/10.1177/0022002720907660
Langton, P., & Mack, T. (2018). Cross-national approaches to counter-terrorism training and education. Studies in Conflict & Terrorism, 41(12), 1038-1056. doi:10.1080/1057610X.2017.1404003
https://www.tandfonline.com/doi/full/10.1080/1057610X.2017.1404003
Lewis, C. T., & Jamieson, S. (2019). Managing organizational change in intelligence agencies. Public Administration Review, 79(5), 654-668. doi:10.1111/puar.13023
https://onlinelibrary.wiley.com/doi/10.1111/puar.13023
Martinez, H., & Alvarado, C. (2020). Counter-terrorism and collaborative intelligence. Journal of Intelligence & Analysis, 29(3), 211-228. https://journals.amicuspub.com/ jia/article/view/2020-211
Mills, E. A., & Topp, K. B. (2017). Advancing big data analysis in terrorism prevention. Information Systems Research, 28(3), 568-589. doi:10.1287/isre.2017.0723
https://pubsonline.informs.org/doi/10.1287/isre.2017.0723
Mohr, L., & Dugan, K. (2019). Radicalization and counter-narrative strategies. Media, War & Conflict, 12(4), 512-531. doi:10.1177/1750635218803021 https://journals. sagepub.com/doi/10.1177/1750635218803021
Williams, J. R., & Black, M. (2021). Enhancing counter-terrorism operations through interagency coordination. Security Studies, 30(2), 210-229. doi:10.1080/09636412.2021.1849265
https://www.tandfonline.com/doi/full/10.1080/09636412.2021.1849265
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2025 The Author(s)

Artikel ini berlisensiCreative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright Notice
Authors retain full copyright and grant Ettisal: Journal of Communication the right of first publication. The published work is simultaneously licensed under a Creative Commons Attribution–NonCommercial–ShareAlike 4.0 International License (CC BY-NC-SA 4.0).
This license allows others to share and adapt the work for non-commercial purposes, provided proper credit is given to the author(s) and the journal, a link to the license is included, and any derivative works are distributed under the same license.
Additional Distribution Rights
Authors may enter into separate, non-exclusive agreements for the distribution of the journal’s published version of their work—such as depositing it in institutional repositories or including it in edited books—provided that the initial publication in Ettisal: Journal of Communication is acknowledged.
Pre- and Post-Publication Sharing
Authors are permitted and encouraged to share their work online (e.g., through institutional repositories, academic networking platforms, or personal websites) before, during, and after the submission process. Such practices promote scholarly exchange and can enhance the visibility and citation impact of the published work.
License Statement:
All articles published in Ettisal: Journal of Communication are licensed under the Creative Commons Attribution–NonCommercial–ShareAlike 4.0 International License (CC BY-NC-SA 4.0).


