Back
About RSIS
Introduction
Building the Foundations
Welcome Message
Board of Governors
Staff Profiles
Executive Deputy Chairman’s Office
Dean’s Office
Management
Distinguished Fellows
Faculty and Research
Associate Research Fellows, Senior Analysts and Research Analysts
Visiting Fellows
Adjunct Fellows
Administrative Staff
Honours and Awards for RSIS Staff and Students
RSIS Endowment Fund
Endowed Professorships
Career Opportunities
Getting to RSIS
Research
Research Centres
Centre for Multilateralism Studies (CMS)
Centre for Non-Traditional Security Studies (NTS Centre)
Centre of Excellence for National Security (CENS)
Institute of Defence and Strategic Studies (IDSS)
International Centre for Political Violence and Terrorism Research (ICPVTR)
Research Programmes
National Security Studies Programme (NSSP)
Social Cohesion Research Programme (SCRP)
Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
Other Research
Future Issues and Technology Cluster
Research@RSIS
Science and Technology Studies Programme (STSP) (2017-2020)
Graduate Education
Graduate Programmes Office
Exchange Partners and Programmes
How to Apply
Financial Assistance
Meet the Admissions Team: Information Sessions and other events
Outreach
Global Networks
About Global Networks
International Programmes
About International Programmes
Asia-Pacific Programme for Senior Military Officers (APPSMO)
Asia-Pacific Programme for Senior National Security Officers (APPSNO)
International Conference on Cohesive Societies (ICCS)
International Strategy Forum-Asia (ISF-Asia)
Executive Education
About Executive Education
SRP Executive Programme
Terrorism Analyst Training Course (TATC)
Public Education
About Public Education
RSIS Alumni
Publications
RSIS Publications
Annual Reviews
Books
Bulletins and Newsletters
RSIS Commentary Series
Counter Terrorist Trends and Analyses
Commemorative / Event Reports
Future Issues
IDSS Papers
Interreligious Relations
Monographs
NTS Insight
Policy Reports
Working Papers
External Publications
Authored Books
Journal Articles
Edited Books
Chapters in Edited Books
Policy Reports
Working Papers
Op-Eds
Glossary of Abbreviations
Policy-relevant Articles Given RSIS Award
RSIS Publications for the Year
External Publications for the Year
Media
Video Channel
Podcasts
News Releases
Speeches
Events
Contact Us
S. Rajaratnam School of International Studies Think Tank and Graduate School RSIS30th
Nanyang Technological University Nanyang Technological University
  • About RSIS
      IntroductionBuilding the FoundationsWelcome MessageBoard of GovernorsHonours and Awards for RSIS Staff and StudentsRSIS Endowment FundEndowed ProfessorshipsCareer OpportunitiesGetting to RSIS
      Staff ProfilesExecutive Deputy Chairman’s OfficeDean’s OfficeManagementDistinguished FellowsFaculty and ResearchAssociate Research Fellows, Senior Analysts and Research AnalystsVisiting FellowsAdjunct FellowsAdministrative Staff
  • Research
      Research CentresCentre for Multilateralism Studies (CMS)Centre for Non-Traditional Security Studies (NTS Centre)Centre of Excellence for National Security (CENS)Institute of Defence and Strategic Studies (IDSS)International Centre for Political Violence and Terrorism Research (ICPVTR)
      Research ProgrammesNational Security Studies Programme (NSSP)Social Cohesion Research Programme (SCRP)Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      Other ResearchFuture Issues and Technology ClusterResearch@RSISScience and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      Graduate Programmes OfficeExchange Partners and ProgrammesHow to ApplyFinancial AssistanceMeet the Admissions Team: Information Sessions and other events
  • Outreach
      Global NetworksAbout Global Networks
      International ProgrammesAbout International ProgrammesAsia-Pacific Programme for Senior Military Officers (APPSMO)Asia-Pacific Programme for Senior National Security Officers (APPSNO)International Conference on Cohesive Societies (ICCS)International Strategy Forum-Asia (ISF-Asia)
      Executive EducationAbout Executive EducationSRP Executive ProgrammeTerrorism Analyst Training Course (TATC)
      Public EducationAbout Public Education
  • RSIS Alumni
  • Publications
      RSIS PublicationsAnnual ReviewsBooksBulletins and NewslettersRSIS Commentary SeriesCounter Terrorist Trends and AnalysesCommemorative / Event ReportsFuture IssuesIDSS PapersInterreligious RelationsMonographsNTS InsightPolicy ReportsWorking Papers
      External PublicationsAuthored BooksJournal ArticlesEdited BooksChapters in Edited BooksPolicy ReportsWorking PapersOp-Eds
      Glossary of AbbreviationsPolicy-relevant Articles Given RSIS AwardRSIS Publications for the YearExternal Publications for the Year
  • Media
      Video ChannelPodcastsNews ReleasesSpeeches
  • Events
  • Contact Us
    • Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
      rsisvideocast
      school/rsis-ntu
      rsis.sg
      rsissg
      RSIS
      RSS
      Subscribe to RSIS Publications
      Subscribe to RSIS Events

      Getting to RSIS

      Nanyang Technological University
      Block S4, Level B3,
      50 Nanyang Avenue,
      Singapore 639798

      Click here for direction to RSIS
Connect
Search
  • RSIS
  • Publication
  • RSIS Publications
  • Countering Online Radicalisation in Indonesia – Policy Needs to Keep Pace with Changes
  • Annual Reviews
  • Books
  • Bulletins and Newsletters
  • RSIS Commentary Series
  • Counter Terrorist Trends and Analyses
  • Commemorative / Event Reports
  • Future Issues
  • IDSS Papers
  • Interreligious Relations
  • Monographs
  • NTS Insight
  • Policy Reports
  • Working Papers

CO26016 | Countering Online Radicalisation in Indonesia – Policy Needs to Keep Pace with Changes
Nauval El Ghifari

28 January 2026

download pdf

SYNOPSIS

Recent incidents involving an Indonesian youth in Jordan exposed to ISIS content, and the bomb attack on Jakarta’s State Senior High School 72, reveal that youth radicalisation in Indonesia is increasingly occurring through mainstream digital platforms rather than closed online spaces. There is a need for policy to keep pace with these evolving circumstances.

Source: unsplash
Source: unsplash

COMMENTARY

Online extremism today no longer resembles a structured enemy with clear organisational boundaries or identifiable ideological markers. Instead, it increasingly operates as a “ghost” within digital spaces. It is anonymous, fragmented, and difficult to trace, thriving in environments where attribution is weak and identities are easily concealed. This “ghost-like” nature allows extremist narratives to circulate across platforms with minimal disruption, often escaping early scrutiny by both authorities and platform moderation systems.

At the same time, online extremism operates like a “poisonous chameleon”. Instead of positioning itself against mainstream culture, it embeds itself within it. Extremist narratives increasingly mimic popular digital forms such as memes, viral sounds, popular music, humour, and visual aesthetics that resonate with younger audiences. By adopting familiar cultural cues, these narratives become harder to distinguish from ordinary content. They circulate without triggering immediate suspicion, normalising extremist ideas through repetition and emotional resonance rather than explicit ideological instruction.

This dual character poses a fundamental challenge for counter-radicalisation efforts. If online extremism is invisible, like a “ghost”, and adaptive, like a “poisonous chameleon”, it cannot be effectively addressed through countermeasures designed for static and easily identifiable threats. Yet many existing responses continue to rely on detection models that assume identifiable patterns, stable narratives, and predictable forms of expression in online extremism. This mismatch raises a critical question. Why do counter-radicalisation strategies remain largely reactive when the threat they seek to counter is fluid, anonymous, and constantly changing shape?

Why Current Countermeasures Are Misaligned

Current counter-radicalisation approaches remain poorly aligned with the evolving nature of online extremism. Government responses, including in Indonesia, continue to prioritise blunt takedowns after incidents have already occurred. These measures are largely reactive by design, focusing on content removal rather than early-stage intervention. While takedowns may limit short-term exposure, they do little to address how extremist narratives emerge, adapt, and embed themselves within everyday digital culture.

Social media platforms, meanwhile, rely heavily on AI-driven moderation systems built around pattern recognition and rule-based enforcement. These systems assume that extremist content can be identified through stable markers such as keywords, symbols, or recurring visual cues. However, this assumption increasingly fails when extremist narratives survive precisely by altering their appearance. When content is anonymous and constantly shifting, attribution becomes weak, and detection models struggle to keep pace. Algorithmic governance without cultural literacy creates blind spots, particularly when extremist narratives draw on local references, humour, or visual styles that appear benign to external reviewers.

As a result, counter-radicalisation efforts often end up chasing a threat that has already changed its form. By the time harmful content is identified and removed, new variations have already surfaced elsewhere. This reactive cycle reinforces enforcement over prevention and leaves policymakers perpetually one step behind an adversary that thrives on adaptation.

This gap points to a structural weakness in how platforms govern harmful content. If extremist narratives no longer appear in fixed and recognisable forms, moderation cannot rely solely on automated detection. Social media companies, therefore, need to invest not only in more sophisticated AI, but in institutionalised human judgement.

One practical step is to create dedicated “trust and safety” units tasked with developing a continuously updated “narrative hub”, a glossary that maps how extremist ideas are articulated, reframed, and culturally embedded across digital spaces. Such a system would track not only explicit keywords, but symbolic references, visual tropes, humour, music, and aesthetic cues through which extremist narratives circulate.

Closing this gap demands more than technical capacity alone. It calls for cultural and linguistic literacy among professionals in these units, particularly an understanding of local youth culture and online subcultures, so platforms can anticipate narrative shifts rather than merely react to them. Without this, algorithmic governance will remain structurally blind to the very forms of extremism that are now most effective.

When Policy Design Lags Behind Youth Digital Reality

Youth occupy a paradoxical position within online radicalisation dynamics. They are the primary audience of digital cultural spaces and, increasingly, the primary targets of extremist narratives. Yet within policy design, youth are rarely treated as active stakeholders. More often, they are framed as passive recipients of messaging or as risk groups in need of protection, rather than as contributors capable of shaping preventive strategies.

This blind spot persists despite growing recognition at the global level. The Youth, Peace, and Security (YPS) agenda has emphasised the importance of youth participation in peacebuilding and conflict prevention. However, its application in digital counter-radicalisation remains limited. In practice, youth inclusion is often reduced to consultation exercises or awareness campaigns that do not meaningfully influence how policies are designed or implemented.

A significant generational gap further compounds the problem. Policymakers and security institutions do not inhabit the same digital ecosystems as younger users. The platforms, cultural references, and modes of expression that shape youth’s online experience are often poorly understood by decision-makers.

The gap between policy language and lived digital reality continues to widen. Whereas official counter-narratives depend on formal messaging and institutional authority, extremist narratives resonate by drawing on belonging, identity, and shared cultural codes.

A strategy that excludes youth perspectives is therefore structurally incapable of understanding how online radicalisation works. Without insight into how narratives resonate within youth culture, prevention efforts remain detached from the environments where radicalisation takes root.

As Indonesia prepares its National Action Plan on Preventing and Countering Violent Extremism (RAN PE), 2025-2029, this gap should not be repeated. The National Counter Terrorism Agency (BNPT) needs to treat youth not merely as target audiences, but as policy partners. This requires structured collaboration with young digital practitioners, social media companies, and civil society organisations working on youth-focused Preventing and Countering Violent Extremism (P/CVE) work, so that preventive policy reflects how radicalisation unfolds online, not how institutions assume it does.

Conclusion

Online extremism is no longer a fixed or easily identifiable threat. It operates invisibly like a “ghost”, enabled by anonymity, and adapts like a “poisonous chameleon” by embedding itself within mainstream digital culture. As long as counter-radicalisation strategies remain reactive and youth remain marginal to policy design, prevention efforts will continue to chase a threat that has already shifted form.

Addressing online radicalisation, therefore, requires more than enforcement and takedowns. It demands a preventive approach grounded in cultural literacy, anticipatory governance, and meaningful youth participation. Without a shift from reactive enforcement to culturally informed prevention, counter-radicalisation policy will remain structurally misaligned and permanently behind the threat it aims to manage.

About the Author

Nauval El Ghifari is a Master of Science student in Strategic Studies at the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University (NTU), Singapore. He is an alumnus of Young Leaders for the Online Prevention and Countering of Violent Extremism (PCVE) in Southeast Asia organised by the United Nations Office of Counter-Terrorism (UNOCT).

Categories: RSIS Commentary Series / Country and Region Studies / Singapore and Homeland Security / East Asia and Asia Pacific / South Asia / Southeast Asia and ASEAN / Global
comments powered by Disqus

SYNOPSIS

Recent incidents involving an Indonesian youth in Jordan exposed to ISIS content, and the bomb attack on Jakarta’s State Senior High School 72, reveal that youth radicalisation in Indonesia is increasingly occurring through mainstream digital platforms rather than closed online spaces. There is a need for policy to keep pace with these evolving circumstances.

Source: unsplash
Source: unsplash

COMMENTARY

Online extremism today no longer resembles a structured enemy with clear organisational boundaries or identifiable ideological markers. Instead, it increasingly operates as a “ghost” within digital spaces. It is anonymous, fragmented, and difficult to trace, thriving in environments where attribution is weak and identities are easily concealed. This “ghost-like” nature allows extremist narratives to circulate across platforms with minimal disruption, often escaping early scrutiny by both authorities and platform moderation systems.

At the same time, online extremism operates like a “poisonous chameleon”. Instead of positioning itself against mainstream culture, it embeds itself within it. Extremist narratives increasingly mimic popular digital forms such as memes, viral sounds, popular music, humour, and visual aesthetics that resonate with younger audiences. By adopting familiar cultural cues, these narratives become harder to distinguish from ordinary content. They circulate without triggering immediate suspicion, normalising extremist ideas through repetition and emotional resonance rather than explicit ideological instruction.

This dual character poses a fundamental challenge for counter-radicalisation efforts. If online extremism is invisible, like a “ghost”, and adaptive, like a “poisonous chameleon”, it cannot be effectively addressed through countermeasures designed for static and easily identifiable threats. Yet many existing responses continue to rely on detection models that assume identifiable patterns, stable narratives, and predictable forms of expression in online extremism. This mismatch raises a critical question. Why do counter-radicalisation strategies remain largely reactive when the threat they seek to counter is fluid, anonymous, and constantly changing shape?

Why Current Countermeasures Are Misaligned

Current counter-radicalisation approaches remain poorly aligned with the evolving nature of online extremism. Government responses, including in Indonesia, continue to prioritise blunt takedowns after incidents have already occurred. These measures are largely reactive by design, focusing on content removal rather than early-stage intervention. While takedowns may limit short-term exposure, they do little to address how extremist narratives emerge, adapt, and embed themselves within everyday digital culture.

Social media platforms, meanwhile, rely heavily on AI-driven moderation systems built around pattern recognition and rule-based enforcement. These systems assume that extremist content can be identified through stable markers such as keywords, symbols, or recurring visual cues. However, this assumption increasingly fails when extremist narratives survive precisely by altering their appearance. When content is anonymous and constantly shifting, attribution becomes weak, and detection models struggle to keep pace. Algorithmic governance without cultural literacy creates blind spots, particularly when extremist narratives draw on local references, humour, or visual styles that appear benign to external reviewers.

As a result, counter-radicalisation efforts often end up chasing a threat that has already changed its form. By the time harmful content is identified and removed, new variations have already surfaced elsewhere. This reactive cycle reinforces enforcement over prevention and leaves policymakers perpetually one step behind an adversary that thrives on adaptation.

This gap points to a structural weakness in how platforms govern harmful content. If extremist narratives no longer appear in fixed and recognisable forms, moderation cannot rely solely on automated detection. Social media companies, therefore, need to invest not only in more sophisticated AI, but in institutionalised human judgement.

One practical step is to create dedicated “trust and safety” units tasked with developing a continuously updated “narrative hub”, a glossary that maps how extremist ideas are articulated, reframed, and culturally embedded across digital spaces. Such a system would track not only explicit keywords, but symbolic references, visual tropes, humour, music, and aesthetic cues through which extremist narratives circulate.

Closing this gap demands more than technical capacity alone. It calls for cultural and linguistic literacy among professionals in these units, particularly an understanding of local youth culture and online subcultures, so platforms can anticipate narrative shifts rather than merely react to them. Without this, algorithmic governance will remain structurally blind to the very forms of extremism that are now most effective.

When Policy Design Lags Behind Youth Digital Reality

Youth occupy a paradoxical position within online radicalisation dynamics. They are the primary audience of digital cultural spaces and, increasingly, the primary targets of extremist narratives. Yet within policy design, youth are rarely treated as active stakeholders. More often, they are framed as passive recipients of messaging or as risk groups in need of protection, rather than as contributors capable of shaping preventive strategies.

This blind spot persists despite growing recognition at the global level. The Youth, Peace, and Security (YPS) agenda has emphasised the importance of youth participation in peacebuilding and conflict prevention. However, its application in digital counter-radicalisation remains limited. In practice, youth inclusion is often reduced to consultation exercises or awareness campaigns that do not meaningfully influence how policies are designed or implemented.

A significant generational gap further compounds the problem. Policymakers and security institutions do not inhabit the same digital ecosystems as younger users. The platforms, cultural references, and modes of expression that shape youth’s online experience are often poorly understood by decision-makers.

The gap between policy language and lived digital reality continues to widen. Whereas official counter-narratives depend on formal messaging and institutional authority, extremist narratives resonate by drawing on belonging, identity, and shared cultural codes.

A strategy that excludes youth perspectives is therefore structurally incapable of understanding how online radicalisation works. Without insight into how narratives resonate within youth culture, prevention efforts remain detached from the environments where radicalisation takes root.

As Indonesia prepares its National Action Plan on Preventing and Countering Violent Extremism (RAN PE), 2025-2029, this gap should not be repeated. The National Counter Terrorism Agency (BNPT) needs to treat youth not merely as target audiences, but as policy partners. This requires structured collaboration with young digital practitioners, social media companies, and civil society organisations working on youth-focused Preventing and Countering Violent Extremism (P/CVE) work, so that preventive policy reflects how radicalisation unfolds online, not how institutions assume it does.

Conclusion

Online extremism is no longer a fixed or easily identifiable threat. It operates invisibly like a “ghost”, enabled by anonymity, and adapts like a “poisonous chameleon” by embedding itself within mainstream digital culture. As long as counter-radicalisation strategies remain reactive and youth remain marginal to policy design, prevention efforts will continue to chase a threat that has already shifted form.

Addressing online radicalisation, therefore, requires more than enforcement and takedowns. It demands a preventive approach grounded in cultural literacy, anticipatory governance, and meaningful youth participation. Without a shift from reactive enforcement to culturally informed prevention, counter-radicalisation policy will remain structurally misaligned and permanently behind the threat it aims to manage.

About the Author

Nauval El Ghifari is a Master of Science student in Strategic Studies at the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University (NTU), Singapore. He is an alumnus of Young Leaders for the Online Prevention and Countering of Violent Extremism (PCVE) in Southeast Asia organised by the United Nations Office of Counter-Terrorism (UNOCT).

Categories: RSIS Commentary Series / Country and Region Studies / Singapore and Homeland Security

Popular Links

About RSISResearch ProgrammesGraduate EducationPublicationsEventsAdmissionsCareersRSIS Intranet

Connect with Us

rsis.ntu
rsis_ntu
rsisntu
rsisvideocast
school/rsis-ntu
rsis.sg
rsissg
RSIS
RSS
Subscribe to RSIS Publications
Subscribe to RSIS Events

Getting to RSIS

Nanyang Technological University
Block S4, Level B3,
50 Nanyang Avenue,
Singapore 639798

Click here for direction to RSIS

Get in Touch

    Copyright © S. Rajaratnam School of International Studies. All rights reserved.
    Last updated on
    Privacy Statement / Terms of Use
    Help us improve

      Rate your experience with this website
      123456
      Not satisfiedVery satisfied
      What did you like?
      0/255 characters
      What can be improved?
      0/255 characters
      Your email
      Please enter a valid email.
      Thank you for your feedback.
      This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
      OK
      Latest Book
      more info