The Urgency of Indonesia’s National Security Act: Addressing Fragmentation in Security Sector Regulation
DOI:
https://doi.org/10.52690/jswse.v6i1.1060Keywords:
Comparative Approach, National Interest, National Security, Statute ApproachAbstract
This study examines the urgency of the formation of the National Security Act (Kamnas Law) in Indonesia to overcome the fragmentation of regulations in the security sector. Using statute-based legal approaches (statute-based) and comparative legal approaches, this study found an overlapping gap between institutions such as the TNI, Polri, BNPT, and the Ministry of Defense due to adaptive legal instruments facing multidimensional threats. The absence of coordinative institutions such as the National Security Council (NSC) weakens synergy between institutions. The results of comparisons with countries such as the United States, Singapore, South Korea, and the Philippines show that the centralized security structure has proven effective in integrating defense, intelligence, and law enforcement policies. This study recommends that the Kamnas Law become a comprehensive legal framework to encourage sectoral coordination and institutional synergy in the corridor of democratic government.
References
Aziz, M., Rofiq, A., & Ghofur, A. (2019). Regulation of Implementation of Halal Product Assurance in Indonesia Statutory Approach Perspective. ISLAMICA: Jurnal Studi Keislaman, 14(1), 151–170.
Bali, A. S., Capano, G., & Ramesh, M. (2019). Anticipating and designing for policy effectiveness. Policy and Society, 38(1), 1–13. https://doi.org/10.1080/14494035.2019.1579502
Chawla, S., Sareen, P., Gupta, S., Joshi, M., & Bajaj, R. (2023). Technology enabled communication during COVID 19: analysis of tweets from top ten Indian IT companies using NVIVO. International Journal of Information Technology (Singapore), 15(4), 2063–2075. https://doi.org/10.1007/s41870-023-01242-6
Chen, W. (2024). Beyond Security: The Compliance Dimension of National Security Reviews in Singapore and Taiwan. SSRN Electronic Journal, August 2023. https://doi.org/10.2139/ssrn.4844646
Detzner, S. (2017). Modern post-conflict security sector reform in Africa: patterns of success and failure. African Security Review, 26(2), 116–142. https://doi.org/10.1080/10246029.2017.1302706
Dhakal, K. (2022). NVivo. Journal of the Medical Library Association, 110(2), 270–272. https://doi.org/10.5195/jmla.2022.1271
Didenko, A. N. (2020). Cybersecurity regulation in the financial sector: Prospects of legal harmonization in the European Union and beyond. Uniform Law Review, 25(1), 125–167. https://doi.org/10.1093/ulr/unaa006
Esper, T. M. (2020). Implementing the National Defense Strategy: A year of successes. July.
Gans, J. (John A. (2020). White House warriors : how the National Security Council transformed the American way of war. October 2019, 301.
Hammarberg, K., Kirkman, M., & De Lacey, S. (2016). Qualitative research methods: When to use them and how to judge them. Human Reproduction, 31(3), 498–501. https://doi.org/10.1093/humrep/dev334
Harefa, F., Aritonang, S., Supriyadi, A. A., & Harsono, C. F. (2025a). An Politicization of the Indonesian Armed Forces (TNI) Regarding ABRI’s Dual Function and Civilian Supremacy: Civilian Supremacy. Khazanah Sosial, 7(1), 67–85.
Harefa, F., Aritonang, S., Supriyadi, A. A., & Harsono, C. F. (2025b). Reengineering the Management Model of Defense to Overcome Separatism in Papua for National Interests. 17(1), 1–23. https://doi.org/10.15575/jpan.v17i1
Harefa, F., & Harsono, C. F. (2025). Socialization of uti possidetis juris principles and socio-economic approaches to eliminate separatism in Indonesia. 7(1), 13–27. https://doi.org/10.33474/jisop.v7i1.23399
Houghton, C., Murphy, K., Meehan, B., Thomas, J., Brooker, D., & Casey, D. (2017). From screening to synthesis: using nvivo to enhance transparency in qualitative evidence synthesis. Journal of Clinical Nursing, 26(5–6), 873–881. https://doi.org/10.1111/jocn.13443
Keping, Y. (2018). Governance and Good Governance: A New Framework for Political Analysis. Fudan Journal of the Humanities and Social Sciences, 11(1), 1–8. https://doi.org/10.1007/s40647-017-0197-4
Kwak, S. (2024). Dynamics between national security laws and repertoires of political action: A comparative analysis of Hong Kong and South Korea. Asian Politics and Policy, 16(1), 78–93. https://doi.org/10.1111/aspp.12725
Lane, J.-E., & Ersson, S. (2016). Culture and politics: a comparative approach. Routledge.
Lemhannas, J., & Jlri, R. I. (2024). Strengthening Non-military Defense to Strengthen the Unitary State of the Republic of Indonesia. 12(2), 163–172. https://doi.org/10.55960/jlri.v12i2.532
Li, H., Li, D., Zhang, X., Shou, G., Hu, Y., & Liu, Y. (2021). A Security Management Architecture for Time Synchronization Towards High Precision Networks. IEEE Access, 9, 117542–117553. https://doi.org/10.1109/ACCESS.2021.3107203
Ma, Y., Liu, N., Li, L., Hu, X., Zou, Z., Wang, J., Luo, S., & Gao, Y. (2017). A highly flexible and sensitive piezoresistive sensor based on MXene with greatly changed interlayer distances. Nature Communications, 8(1), 1–7. https://doi.org/10.1038/s41467-017-01136-9
Mapale, J. O. (2020). Harmonization of the Security Structure of the National Police Service as a Strategy for Addressing Security Challenges in Kenya. University of Nairobi.
Mezmir, E. A. (2020). Qualitative Data Analysis: An Overview of Data Reduction, Data Display and Interpretation. Research on Humanities and Social Sciences, 10(21), 15–27. https://doi.org/10.7176/rhss/10-21-02
Muhammad, A., Putro, U. S., Siallagan, M., Kijima, K., & Wasesa, M. (2021). System of Diagnostic Systems framework and its application to the disharmony in Indonesian national security. Systems Research and Behavioral Science, 38(1), 31–49. https://doi.org/10.1002/sres.2656
Neudorf, L. (2018). Taking Comparative Law Seriously: Rethinking the Supreme Court of Canada’s Modern Approach to Statutory Interpretation. Statute Law Review, 39(2), 184–210.
Practices, B., Benton, D. C., Benson, P. S., & Msha, R. N. (2021). A Thematic Analysis of Existing Sunrise Provisions: Challenges, Findings, and Best Practices. Journal of Nursing Regulation, 12(3), S1–S52. https://doi.org/10.1016/S2155-8256(21)00125-3
Puerta, P., Laguna, L., Vidal, L., Ares, G., Fiszman, S., & Tarrega, A. (2020). Co-occurrence networks of Twitter content after manual or automatic processing. A case-study on “gluten-free.” Food Quality and Preference, 86, 103993.
Ramadhianto, R., Rezasyah, T., Nefo, S., & Kertopati, H. (2024). Strengthening management of non-military intelligence organizations in detecting cyber threats to support national security. 1(1).
Savitri, A. R., & Alamsyah, R. (2024). Leadership Strategic in Facing Non-Military Threat in Indonesia : A Theoritical Review. 1(1), 15–20.
Schröder, N. J. S. (2019). IWRM through WFD implementation? Drivers for integration in polycentric water governance systems. Water (Switzerland), 11(5). https://doi.org/10.3390/w11051063
Sinnar, S. (2018). California Law Review Procedural Experimentation and National. 991–1060.
Viktorivna, M. V., & Bohdanivna, O. N. (2024). Legal Acts That Define The Procedure For Ensuring National Security And Defense In. 131–133. https://doi.org/10.36074/logos-18.10.2024.033
Wigell, M., Mikkola, H., & Juntunen, T. (2021). Best practices in the whole-of-society approach in countering hybrid threats (Issue May).
Wilén, N. (2020). Achieving a gendered transformation of the post-conflict military through security sector reform: unpacking the private–public dynamics. International Feminist Journal of Politics, 22(1), 86–105. https://doi.org/10.1080/14616742.2018.1559749
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Faonaso Harefa, Ignatius Eko Djoko Purwanto, Bambang Irwanto, Adang Asep Supriyadi, Guntur Eko Saputro

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.






