The Change Management of Human Resource Development in Terrorism Prevention: Study at BIN-BNPT-Densus 88
DOI:
https://doi.org/10.21111/ettisal.v10i02.19Keywords:
Kurt Lewin's Change Model, Human Resources, Terrorism Prevention, BIN, BNPT, Densus 88Abstract
The purpose of this study was to examine changes in human resource development management within three Indonesian security agencies: the State Intelligence Agency (BIN), the National Counterterrorism Agency (BNPT), and the Special Task Force 88 (Densus 88), in response to the increasingly complex threat of terrorism. The research method employed a qualitative approach with a case study design, involving in-depth interviews, participant observation, and document analysis. Key informants were officials and staff involved in human resource development at BIN, BNPT, and Densus 88. The results indicate that BIN focuses on technology-based intelligence competencies, BNPT develops socio-psychological skills for counter-radicalization, and Densus 88 prioritizes tactical-operational skills in field operations. Based on Kurt Lewin's model of change (unfreeze, change, refreeze), the processes differ. At BIN, the unfreeze phase was triggered by intelligence disruptions and increasing digital threats, which prompted a technological-analytical transformation, followed by a refreeze phase in an AI and big data culture. In the BNPT (National Counterterrorism Agency), the unfreeze phase emerged from the ineffectiveness of coercive prevention, leading to socio-psychological HRD with a soft approach to deradicalization and counternarratives. Meanwhile, Densus 88 addressed the demands of tactical complexity and the risks of public legitimacy, thus encouraging adaptive human resource change and producing professional, precision law enforcement. This study also offers new theoretical insights into the application of Kurt Lewin's Model in counterterrorism agencies such as the State Intelligence Agency (BIN), the BNPT, and Densus 88. Unlike commercial or administrative organizations, where change can stabilize into a permanent "refreeze" phase, the counterterrorism context is characterized by continuous threat escalation, rapid tactical adaptation by terrorist networks, and strong public accountability pressures, which collectively prevent organizational practices from remaining completely static. Consequently, the refreeze phase is temporary, conditional, and temporally limited, embedded in formal procedures, training systems, and inter-agency coordination frameworks that remain open to rapid revision.
References
Anderson, M. B., & Lanouette, D. (2018). Cybersecurity and counter-terrorism: A framework for resilience. Journal of Homeland Security and Emergency Management, 15(2), 137-155. doi:10.1515/jhsem-2018-0020
Barton, A. H., & Pierson, S. K. (2019). Digital intelligence and counter-radicalization: A perspective on collaborative security. International Journal of Intelligence and CounterIntelligence, 32(1), 56-71. doi:10.1080/08850607.2019.1566272
Becker, G. S. (1964). Human capital: A theoretical and empirical analysis, with special reference to education. University of Chicago Press.
Becker, J. M., & Wise, P. A. (2017). A systemic approach to counter-terrorism in public safety. Security Journal, 30(3), 663-679. doi:10.1057/sj.2016.20
Benard, C., & Griffin, R. E. (2020). Societal resilience to radicalism: Insights from cross-cultural studies. International Studies Quarterly, 64(2), 235-248. doi:10.1093/isq/sqz091
Bohdan, E., & Kleck, D. (2021). Impact of intelligence collaboration on terror prevention. Terrorism and Political Violence, 33(4), 819-834. doi:10.1080/09546553.2020.1714184
Boin, A., ’t Hart, P., Stern, E., & Sundelius, B. (2017). The politics of crisis management: Public leadership under pressure (2nd ed.). Cambridge University Press.
Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101.
Brein, M. T., & White, K. C. (2016). Public awareness and counter-terrorism in digital age. Studies in Conflict & Terrorism, 39(11), 989-1004. doi:10.1080/1057610X.2016.1152278
Brown, S. L., & Eisenhardt, K. M. (1997). The art of continuous change: Linking complexity theory and time-paced evolution in relentlessly shifting organizations. Administrative Science Quarterly, 42(1), 1–34.
Callaway, C., & Maddux, D. (2019). Social media strategies in counter-terrorism communication. Journal of Strategic Security, 12(4), 93-109. doi:10.5038/1944-0472.12.4.1723
Cameron, R., & Watson, L. (2018). Enhancing collaboration in counter-terrorism intelligence: A structural approach. Intelligence and National Security, 33(5), 685-702. doi:10.1080/02684527.2018.1465038
Carrol, S. M., & Finney, B. D. (2017). Countering extremism through community engagement. Journal of Deradicalization, 11(1), 102-121. http://journals.sfu.ca/ jd/index.php/jd/ article/view/111
Chambers, S. E., & Jones, A. (2021). Integrating big data analytics in terrorism detection. Computers in Human Behavior, 124, 106977. doi: 10.1016/j.chb.2021.106977
Chen, T., & Lee, J. P. (2020). Comparative counter-terrorism policies and social impacts. Journal of Security and Sustainability Issues, 10(1), 33-45. doi:10.9770/jssi.2020.10.1(3)
Cherney, A., & Hartley, J. (2017). Community engagement to tackle terrorism and violent extremism. Terrorism and Political Violence, 29(2), 329–349. https://doi.org/10.1080/09546553.2015.1050485
Dalton, E., & Reese, L. S. (2018). The role of human intelligence in counter-terrorism. Intelligence and National Security, 33(2), 195-210. doi:10.1080/02684527.2017.1387801
Dreher, D. W., & Kent, A. J. (2016). Community resilience in countering violent extremism. Journal of Peacebuilding & Development, 11(2), 64-78. doi:10.1080/15423166. 2016.1185345
Edwards, B., & Miller, T. S. (2019). The role of education in de-radicalization. International Journal of Conflict and Violence, 13(1), 1349-1371. https://www.ijcv.org/index.php/ ijcv/article/view/3053
Farooq, U., & Simon, A. B. (2018). Intelligence integration in terrorism prevention. Security Studies, 27(3), 450-472. doi:10.1080/09636412.2018.1483630
Fendrick, L. J., & Arabi, K. (2020). Counter-radicalization in digital spaces. Cybersecurity Journal, 9(2), 51-68.
Ferguson, T., & Riley, M. C. (2017). Effectiveness of counter-narratives in combating online extremism. Terrorism and Political Violence, 29(5), 907-923. doi:10.1080/09546553.2017.1300586
George, A. L., & Bennett, A. (2005). Case studies and theory development in the social sciences. MIT Press. https://mitpress.mit.edu/9780262572224
Gerring, J. (2017). Case study research: Principles and practices (2nd ed.). Cambridge University Press. https://doi.org/10.1017/9781316848596
Gregory, S. P., & Goldstein, D. (2021). Artificial intelligence applications in counter-terrorism. Journal of Strategic Security, 14(1), 33-47. doi:10.5038/1944-0472.14.1.1790
Hassan, S. H., & Taib, Z. (2020). Cyber resilience and counter-terrorism strategies. Journal of Information Warfare, 19(2), 99-117. https://www.jinfowar.com/article/01922
Haynes, J. D., & Carpenter, B. (2018). Public perception and support in counter-terrorism. Journal of Applied Security Research, 13(4), 287-305. doi:10.1080/19361610.2018.1485792
Heath-Kelly, C. (2013). Counter-terrorism and the counterfactual: Producing the “radicalisation” discourse. British Journal of Politics and International Relations, 15(3), 394–415.
https://doi.org/10.1111/j.1467-856X.2011.00489.
Hidayat, C., & Zarkasyi, F. I. (2024). The National Counterterrorism Agency’s efforts to improve intelligence institution collaboration in countering terrorism in Indonesia. International Journal of Social Science and Religion, 5(3), 271–284. https://doi.org/10.53639 /ijssr.v5i3.271. https://www.ijssr.net/index.php/ijssr/article/view/271
Hunt, C., & Watson, A. (2021). Social media’s role in countering terrorism narratives. Journal of Terrorism Research, 12(3), 87-103. http://jtr.st-andrews.ac.uk/articles/10.15664/jtr.1227/
Issacson, M., & Levesque, J. P. (2019). Deradicalization efforts in the digital age. Global Security Studies, 15(2), 55-70. https://globalsecuritystudies.com/vol15-2/Issacson-Levesque
James, A., & Kline, S. B. (2017). Coordinated counter-terrorism through interagency. Security Studies, 26(4), 595-612. doi:10.1080/09636412.2017.1369985
Kassar, Y., & Tan, R. W. (2019). Evaluating digital tools for counter-terrorism. Journal of Strategic Studies, 42(5), 761-775. doi:10.1080/01402390.2019.1571471
Khan, M. A., & Ahmed, R. (2020). The impact of radicalization prevention programs on social cohesion. Journal of Conflict Resolution, 64(6), 1272-1290. doi:10.1177/0022002720907660
Langton, P., & Mack, T. (2018). Cross-national approaches to counter-terrorism training and education. Studies in Conflict & Terrorism, 41(12), 1038-1056. doi:10.1080/1057610X.2017.1404003
Lewin, K. (1951). Field theory in social science: Selected theoretical papers. Harper & Row.
Lewis, C. T., & Jamieson, S. (2019). Managing organizational change in intelligence agencies. Public Administration Review, 79(5), 654-668. doi:10.1111/puar.13023
Martinez, H., & Alvarado, C. (2020). Counter-terrorism and collaborative intelligence. Journal of Intelligence & Analysis, 29(3), 211-228. https://journals.amicuspub.com/ jia/article/view/2020-211
Mills, E. A., & Topp, K. B. (2017). Advancing big data analysis in terrorism prevention. Information Systems Research, 28(3), 568-589. doi:10.1287/isre.2017.0723
Mohr, L., & Dugan, K. (2019). Radicalization and counter-narrative strategies. Media, War & Conflict, 12(4), 512-531. doi:10.1177/1750635218803021
Schmid, A. P. (2020). Prevention of terrorism: Towards a multi-disciplinary approach. Perspectives on Terrorism, 14(2), 1–20. https://www.terrorismanalysts.com/pt/ index.php/pt/article/view/820
Silke, A. (2018). Terrorism, counter-terrorism and human rights. Routledge. https://www. routledge.com/Terrorism-Counter-Terrorism-and-Human-Rights/Silke/p/book/ 97811386 83443
Taylor & Francis. (2025). Journal of Policing, Intelligence and Counter Terrorism. Routledge. https://www.tandfonline.com/loi/rpic20
Widjanarko, P., & Chusjairi, J. A. (2025). Transmedia-organizing in preventing/countering violent extremism (P/CVE) initiatives in Indonesia. Interaksi: Jurnal Ilmu Komunikasi, 14(1), 138–163. https://doi.org/10.14710/interaksi.14.1.138-163-2025.
Williams, J. R., & Black, M. (2021). Enhancing counter-terrorism operations through interagency coordination. Security Studies, 30(2), 210-229. doi:10.1080/09636412.2021.1849265
Yin, R. K. (2018). Case study research and applications: Design and methods (6th ed.). Sage Publications.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 The Author(s)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Ettisal: Journal of Communication is committed to the principle that making research freely available to the public supports a greater global exchange of knowledge.
All articles published in Ettisal are open access and freely available online immediately upon publication, without any subscription or access fees. Readers are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles, or use them for any other lawful purpose, without asking prior permission from the publisher or the author, provided that the use is non-commercial and the original source is properly cited.
All works published in Ettisal: Journal of Communication are licensed under the Creative Commons Attribution–NonCommercial–ShareAlike 4.0 International License (CC BY-NC-SA 4.0).
This means:
-
Users may share (copy and redistribute) and adapt (remix, transform, and build upon) the material in any medium or format for non-commercial purposes.
-
Appropriate credit must be given to the author(s) and the journal, a link to the license must be provided, and any derivative works must be distributed under the same license.
-
Commercial use of the published material is not permitted without prior written consent from the author(s) and the journal.
Authors retain full copyright to their work and grant Ettisal: Journal of Communication the right of first publication. Authors may also deposit their published articles in institutional repositories or personal websites, acknowledging the journal as the original place of publication.
Through this open access policy, Ettisal: Journal of Communication aims to promote ethical scholarship, knowledge dissemination, and public engagement with communication studies worldwide.