Analysis of the Meaning of Poso Terrorist Violence Codes Using a Semiotics Approach

Page created by Alfredo Rowe
 
CONTINUE READING
Analysis of the Meaning of Poso Terrorist Violence Codes Using a Semiotics Approach
REVIEW OF INTERNATIONAL GEOGRAPHICAL EDUCATION
                                                                     ISSN: 2146-0353 ● © RIGEO ● 11(5), SPRING, 2021

www.rigeo.org                                                                                             Research Article

             Analysis of the Meaning of Poso Terrorist
               Violence Codes Using a Semiotics
                             Approach
                    Lukman S. Thahir1                                               Amanah Nurish2
     Faculty of Ushuluddin, Adab and Dakwah, IAIN                          University of Indonesia, Indonesia
                  Palu, Central Sulawesi                                           amanah11@ui.ac.id
                lukmansthahir@iainpalu.ac.id

Abstract
Terrorists often use specific codes in preparing and conducting their deadly attacks. However, limited is
known the meaning of the codes and studies to understand the codes scarce. This paper, therefore, is
intended to understand the communication of the linguistic codes used by a terrorist in Poso regency
Indonesia. This study employed an interpretive qualitative case study of a terrorist recovery program in
the regency of Poso Indonesia. The data were collected through the direct involvement of the authors in
the program, which include direct observation an in-depth interview with former terrorist convicts. We
used a semiotic approach to interpret the codes made by the former terrorists. The results show eleven
most used violence codes used by the former terrorist in every deadly attack they did. The meaning of
the terrorist violence semiotic code system can be understood through linguistic, social, and contextual
structural relations. The finding contributes to understanding language codes used by terrorist and
provides a strategy for government and security agency in combating terrorism in the future.

Keywords
Code, Communication, Language, Semiotic, Violence, Terrorist, and Linguistic Structuralism

To cite this article: Thahir, L. and Nurish, A. (2021) Analysis of the Meaning of Poso Terrorist Violence Codes Using a
Semiotics Approach. Review       of   International   Geographical    Education     (RIGEO), 11(5), 2967-2978.     doi:
10.48047/rigeo.11.05.190
Submitted: 03-10-2020 ● Revised: 05-12-2020 ● Accepted: 10-02-2021
Analysis of the Meaning of Poso Terrorist Violence Codes Using a Semiotics Approach
© RIGEO ● Review of International Geographical Education                     11(5), SPRING, 2021

                                          Introduction
One of the violent forms in the early XXI century that contributed significantly to giving, producing,
and threatening human life was the global threat of terrorism. This issue has become a prevalent
threat, dominating international security agendas. Vorobej (2016) stated that terrorism had
become a dark experience of modern human life across the world. Many innocent civilians and
properties have been lost during various forms of attack. The phenomenon is also considered a
long century of civil violence that causes mass destruction. It consumes a massive amount of the
government budget to prevent and combat terrorism (Bufacchi, 2005).
The Global Terrorism Index Reliefweb (2021) identified four terrorist groups which took more
responsibility for the number of death in 2019. The notable terrorist groups were the Taliban, Boko
Haram, ISIL, and Al-Shabaab. During 2019, their violent activities increased sharply, including the
rise of civilians dead to about 32 percent or about 7,578 deaths. Thus, about 44 percent of the
total deaths in 2019 were responsible for terrorist groups. However, all groups other than Al-
Shabaab have experienced falls in terrorist activity in the past few years. Figure 1 below shows the
terrorist group responsible for the death of civilians in the world.

Source: Reliefweb (2021)

Figure 1. Four well-known terrorist groups in the world

For the first time since 2004, according to the Global Violent Deaths report, 2017, the global
terrorism was increased from 5.11 to 5.15 per 100,000 population in 2015 to 2016. The surge of
terrorism implies that non-conflict areas might be effected in the future (Evoy & Hideg, 2017). The
causes are varied. Gunning and Jackson (2011) argues because there is a fundamental belief
that the nature of international terrorism has changed and become strictly religious and deadly
(Kaur, 2019). Freis-Beattie (2020), in his doctoral dissertations at the University of New Hampshire,
Durham, stated that fear of terrorism reflect racial, cultural, and other identity-based tensions and
anxieties concerned by traditionally powerful groups across the world (Freis-Beattie, 2020). Todd
Sandler stated the political motive is to create widespread fear or revulsion (Sandler, 2014). There
is also who stated that because world leaders have misinterpreted the threat of terrorism as if it
ended with the recapture of the territories occupied by the Islamic State of Iraq and Syria (ISIS).
They are prematurely declaring "mission accomplished" because ISIS does not rely on the tamkin
movement, which relies on territorial control (Nainggolan, 2019).
In contrast to what are assumed above, this paper offers another form of violent terrorism through
violent codes constructed by the Poso terrorist group by language as a means of communication,
which Peer Boerdieu stated, apart from being a communication tool in understanding and
conveying thoughts and feelings between humans, language also has a latent role that is often
not realized, namely as a practice of power. By using language symbols, the ideology behind it
can be slowly and unobtrusively planted (Bourdieu, 1991). Thus, there is a connection between
language as a symbol which has the primary function as a means of communication between
humans, and violence which is a hegemonic-destructive human behavior. The two links include
(1) language can be used as a tool to commit violence, giving rise to a type of violence called
verbal violence, and (2) language that is not used according to its function will trigger violence

                                                2968
Hartati, Y.; Ahmad, A.; Zulkarnain, and Afandi, D. (2020) Waste Management Modelling in Siak Regency …

(Ulfah, 2013). This paper is called the code term, a system of words, letters, or signs used to
represent a message in secret form, or a system of replacing the words in a message with other
words or symbols so that nobody can understand it unless they know the system (Gough & Hillinger,
1980).
Literature studies on this issue, especially those directly correlated with terrorism issues, have not
been widely carried out. In general, the term similar to the terrorist violence codes is the term
symbolic violence, according to Pierre Bourdieu's model. For Bourdieu, the notion of symbolic
violence is central to understanding how social class inequalities are reproduced. In essence, it
represents how people play a role in producing their subordination through the gradual
internalization and acceptance of those ideas and structures that tend to subordinate them
(Connolly & Healy, 2004). That is, in the context of terrorism issues, the codes of violence of the
Poso jihadist group are a manifestation of the social class inequality experienced by the Poso
jihadist group, which then plays their role in reproducing their subordination through secret
communications that are codes or symbolic. Apart from Bourdie, Kevin Drakulich also studied the
code of violence. To Draculich, Codes of violence are norms with sanctions that regulate violent
acts. According to him, through their research in America on neighborhood violence codes, citing
Cressey’s view, he identified a Mafia code—consisting of the tenets, “be loyal to the
organization,” “don’t squeal,” “be rational,” “be a man of honor, “respect women and elders,”
“don’t sell out,” “be a stand-up guy by showing courage and heart”—which functioned to control
the behavior of members of organized crime families (Matsueda, Drakulich, & Kubrin, 2005). What
is meant by violent codes in this paper is a form of communication code in the form of words or
sentences in the language, the meaning of which is generally accepted in society, but, in the
meaning of terrorist groups, the language system is changed to a secret code, which means
connotes the meaning of violence. For example, the word long-sleeved clothes, which is generally
understood by the public is a kind of long-sleeved clothes, but, for terrorist groups, the word, with
the intention of wanting to hide or avoid so that people cannot track their struggle strategy, in
communication between them is understood as a "long-barreled gun."
The word long-sleeved clothes, which was meant "long-barreled gun" amongst the terrorists of
Poso is possible, borrowing the analysis of Ferdinand de Saussure (1857-1913), because "a linguistic
sign is not a link between a thing and a name, but between a concept [signified] and a sound
pattern [signifier]. In this study, we define a sign as a form made up of something physical - sounds,
letters, gestures, etc (Sebeok, 1999).
Terrorists in Poso regency Indonesia have used a number of codes and signs during the local
conflict between 1998 to 2013. The codes and signs they used have eased their action in carried
out many civilians attacks. Indonesia security agencies were in difficulties to solve the codes and
signs used by the terrorists. Meanwhile, limited studies have been conducted to solve and
understand the terrorists' codes. This study, therefore, was undertaken to understand the terrorist
codes used during the local conflict period. Our study will contribute to the use of semiotics
approach in solving terrorists violence codes, and it will help government security agencies in
combating terrorism in the future. To achieve to objectives, we will answer the following research
questions: What terrorists created codes in Poso during their violent attack? And how to
understand the codes based on the context and reality?

Theoretical Construct

A sign must have both a signifier and a signified. In other words, a sign is a combination of a signifier
and a signified that produce meaning for people who read it. A sign is also an object, quality,
event, or entity whose presence or appearance indicates the possible presence or occurrence
of something else. Djajasudarma (1993) said that a sign in the form of letters is called a written
symbol or symbol and what we hear from someone who functions as a communication tool is
called a symbol or symbol (Morin, Kelly, & Winters, 2020). A code is actually related to the theme
so that it has a close relationship with the connotative code, namely the theme in the whole story
text. Symbols are a characteristically structural aspect of fictional coding. Therefore, it can be said
that the symbolic code is a code in the form of letters which is said to be a symbol. In addition,
symbolic codes are codes that indicate differences, such as the difference between day and
night. In a symbolic code, the marked pattern is the pattern that people follow.
In this study, the researcher used Barthes' semiotic approach. According to Barthes (1981) there
are five code systems in semiotic studies, namely (1) puzzle code, (2) connotative code, (3)
symbolic code, (4) action code, and (5) cultural code. Semiotics is a sign of an act in
communication. Furthermore, Barthes perfected the semiotic boundaries as a literary model that

                                                  2969
© RIGEO ● Review of International Geographical Education                    11(5), SPRING, 2021
accounted for all factors and aspects of understanding signs as a distinctive means of
communication. Thus, semiotics helps us understand the meaning of a sign that will answer all
understandings that represent something else.
Furthermore, Barthes said that language is a sign system that reflects the assumptions of a
particular society at a specific time. Barthes uses the signifiant-signifies theory, which was
developed into a theory of met language and connotations. However, Barthes also said that
between E and C there must be a certain relation (R) so that it forms a sign (sign, Sn). The concept
of this relation makes the theory of signs more likely to develop because the sign users define
relations.
Barthes (1981) semiotics is composed of levels of language systems. Generally, Barthes makes it in
two levels of language. The first level language is language as an object, and the second level
language is called Metalanguage. This language is a sign system according to the signifier and
the signified. Our study developed a mechanism to read terrorists' code based on Saussure and
Peirce's semiotics interpretation model. Thus, the models of meaning interpretation follow the track
in the footsteps of Roland Barthe's theory (Barthes, 1981; Yakin & Totu, 2014).

Research Methods

This study employed a qualitative case study (Yin, 2003). A case study approach helps researchers
to understand the problem they are studying intensely (Nurdin, 2018; Nurdin, Stockdale, &
Scheepers, 2014). In our study, the case is the violence codes used by terrorists in Poso regency
Indonesia. There were five participants recruited from former terrorists in Poso. The data were
collected through direct observation, in-depth interviews with the former terrorists, and written
material obtained from local security agencies. The observation was made through the direct
involvement of the authors in a de-radicalism program of terrorists in Poso about six months in
length. During the de-radicalism program, the former terrorists were closely examined and
interviewed. Many violence codes were revealed during friendly interviews. In addition, stories
about their experience in a carried out deadly attack were also expressed.
We use a semiotic approach Vannini (2007) to understand the codes. We also built a mechanism
for understanding the violent codes by showing the relationship between the codes actual
meanings and their hidden meaning. Connotation and denotation (Czeżowski, 1979) meanings
were discussed to reveal the meanings of the codes. We used the semiotic analysis of the Saussure
interpretation model (Thibault, 1988) in interpreting the codes. Our model to interpret the codes
was presented in figure 2 below.

    Source: Based on Chandler (2017)                 Source: Based on Chandler (2017)

    Figure 2. Saussure’s model of the sign         Figure 3. Peirce’s semiotic triangle

Our model shows that the interpretation process was carried out in two stages of meanings. We
also follow Roland Barthes’ interpretation meaning model (Huppatz, 2011), but some changes
were made to fit our study (see figure 4). Saussure has defined the meaning of signification as "the
relationship between the signifier and the signified of the same sign, an integral part of it, or the
way the world is understood through the relationship between concept and designated physical
reality."

                                                2970
Hartati, Y.; Ahmad, A.; Zulkarnain, and Afandi, D. (2020) Waste Management Modelling in Siak Regency …

  Signifier 1     Signified 2

             SIGN
          Signifier 1             Signified 2

Figure 4. Semiotic Modification of Saussure and Peirce Yakin and Totu (2014).
This study was carried in a well-known conflict area Poso regency. The religious and social conflict
was started in 1998, and it continued until 2013. The conflict was not continually happened, but it
stopped few times during the period.

                                   Results And Discussion
After conducting research on various narratives made by terrorists, data on semiotic codes and
meanings in the activities of terrorists in Poso was found. The codes found in interviews with terrorists
are puzzle codes, connotative codes, symbolic codes, and action codes. The results and
discussion are presented in two parts as follows.

The Terrorist Violence Codes Based on Saussure’s Semiotic Approach

Radical acts undertaken by a local terrorist in Poso began soon after the first wave of local religious
and social conflict in 1998. The violent acts stop and continue during the period 1998 and 2013.
One notable terrorist group member was the Eastern Indonesian Mujahidin. The group members
and their actions were difficult to predict because they were nomadic. They lived in a dense forest
mountain surrounding the Poso regency. They used many codes or signs in communicating
among them. All of those codes and signs were also difficult to understand, which made their
communication was very successful. The codes and signs were used to conduct a deadly attack
and get rid of security agents' monitoring. Since monitoring their movements and actions in
carrying out violence was brutal, their deadly sequel bombings and other violence were difficult
to predict even though Indonesian security agencies tightened their supervision. Such terrorist
strategy in using secret codes and sign in communicating their action has caused uncertainty
within sescurity agencies in protecting innocent civilians (Aven & Renn, 2009).
However, terrorists in Poso regency were also committing many non-physical acts of violence. The
non-physical treats included using propaganda, executing videos, and threatening to kill (Nurdin,
2016). The terrorist in Poso also practiced non-physical violence was through verbal language or
specific codes which only understood among the local community. The words or phrases they
used are understood and accepted in society, and both the spelling and pronunciation are the
same. However, the meaning of the codes and signs conveyed is different from what was
produced and understood by the terrorist members. The word score, for example, is generally
understood as a number of points obtained in a match, but for the terrorist members, the word
score was interpreted differently. Then, the word “ustadz” (teacher or respectful cleric) was
understood as religious teachers by local communities, but the terrorist refers to the word "ustadz”
as an expert in war. Based on our semiotic interpretation model, we found approximately 11
violent codes that they have used when interacting with others (Martela & Steger, 2016). The
codes include score, playing ball, Jockey, surveyor, fa’i, ganimah, bride, ta'lim, azkari, tadrib, and
baiat as depicted in the figure 5 below:

                                                  2971
© RIGEO ● Review of International Geographical Education                      11(5), SPRING, 2021

Figure 5: Violence Codes of the Poso terrorist

Based on interviews with five former Poso terrorists, these codes of residency are not only
understood to mean the same thing among the Poso terrorist groups but also become guidelines,
values , or ethics for their struggle. Therefore, all terrorist groups in Poso must understand these
codes. The word score (1), for example, means the results obtained or the number of people killed
during the war, (2), playing football, means fighting, (3), Jockey, a person who facilitates terrorists
to commit acts of violence, (4), Surveyor, a person who conducts a survey before an act of
violence is committed, 5), Fa'i, robbing (not a war situation), (6), ghanimah, booty (in a war
situation), (7), Menikah (bride), suicide bomber for tickets heaven, (8), Ta'lim, jihad indoctrination,
(9), Azkari, military physical training, (10), tadhrib, physical warfare training, (11), bai'at, oath of
allegiance (Hines, 2003). For details on the Poso terrorist violence codes, see table 1.

Table 1:
Poso Terrorist Violence Codes

 No    Codes                                  Meaning
 1.    Score                                  The results obtained or the number of people
                                              killed during the war
 2.    Playing football                       Fighting
 3.    Jockey                                 a Person who facilitates terrorists to commit acts
                                              of violence
 4.    Surveyor                               a Person who conducts a survey before an act
                                              of violence is committed
 5.    Fa’i                                   Robbing (not a war situation
 6.    Ghanimah                               Booty (in a war situation)
 7.    Pengantin (bride)                      suicide bomber for tickets heaven
 8.    Ta’lim                                 Jihad indoctrination
 9.    Azkari                                 Military physical training
 10.   Tadrib                                 Physical warfare training
 11.   Bai’at                                 Oath of allegiance

Those terrorist codes require a specific approach from scientific perspectives to provide insight for
government and security agencies. Using a semiotic approach to understand terrorist codes is a
scientific method that has been used by some scholars (Baines & O’Shaughnessy, 2014). Such

                                                 2972
Hartati, Y.; Ahmad, A.; Zulkarnain, and Afandi, D. (2020) Waste Management Modelling in Siak Regency …

terrorist codes must be analyzed in a contextual meaning, which means the relationship between
codes and the context where the codes came from. For example, when the codes came from a
terrorist in Poso, then the context of Sausu Poso must be connected with the meaning of the
codes. Such an approach has been practiced by Somers (2001).
Some notable of the terrorist codes made by Poso terrorists include the term score, which the
terrorist members understand as the numbers of civilians killed in the battled ground. Usually, the
term score is understood by citizens as a number of points made in a football game, but the
terrorist members use the term "score" to indicate the death of civilians. Then, the phrase “play
ball” is defined by the terrorist as "any of the various forms of a game team involving kicking (and
in some cases also handling) a ball." The phrase "play football" was referred to the war against
government security staff. Furthermore, the term “Jockey," which is usually used to refer to a
person who rides a horse, was used to identify a terrorist member who conducts deadly bombing
or killing in the field. Other popular terms used by terrorists include "surveyors," which means a
terrorist conducted a field observation before attacking civilians or police targets. Meanwhile, the
term “Fa'I” (Arabic word) was used to refer to a situation that is not in war or showing the situation
is in peace at a certain period. Another Arabic term used is “Ghanimah" which means the terrorist
obtained valuable things from the war they made, such as a car, a motorcycle, etc. Finally, the
term for a teacher in their group is called "Ta’lim." The complete terms and their meaning can be
seen in the following table 2.

Table 2.
The Terrorist codes and their meanings based on semiotic analysis

                                 Codes                   Actual Meanings
                                 1. Scores               A number of scores made in a football
                                                         game
                                 2. Football play        A game of football is played which include
                                                         kicking and running
 Saussure’s model of the sign    3. Jockey               A person who rides a horse
                                 4. Surveyor             A person who observes a situation in the
                                                         field
                                 5. Fa’i                 Obtaining bounties without any fighting
                                                         against enemies
                                 6. Ghanimah             get loot without fighting
                                 7. Pengantin            A groom or bride
                                 8. Ta’lim               Islamic teachers
                                 9. Azkari               Police or Soldiers
                                 10. Tadrib              Training
                                 11. Bai’at              A loyalty oath

Through understanding the original meaning of the codes which came from local communities
and culture used by the terrorists, it will help us to understand how the meanings of the codes
have been changed when they were used by the terrorists in Poso. When the original meanings
of the codes were presented earlier, it also increases understanding of the relationship of the
original meanings and the hidden meaning of the codes when used by the terrorist (Enders,
Sandler, & Gaibulloev, 2011). The presentation of the original meaning of the codes also shows
the social and cultural context of the codes where they have emerged. The local terrorist quickly
understands the codes, but they are difficult to comprehend by security forces. Most of them
came from other provinces in Indonesia that have different social and cultural systems (Schefold,
1998). Using semiotic perspectives, the clue of the relationship between original meanings and
the changed meaning of the codes can be captured and related (Berger, 2014). For instance,
the meaning of the code “score" was used by the terrorist as a marker to determine the number
of civilians has been killed. Meanwhile, the term “playing football” was used by the terrorist in Poso
to describe they were playing with deadly weapons to attack security forces and civilians. The
complete changed of codes meaning is presented in table 3 below:

                                                  2973
© RIGEO ● Review of International Geographical Education                     11(5), SPRING, 2021

Table 3:
Secret codes used by the terrorist in Poso regency Indonesia

                       Codes                           Secret meanings
                   1. Score            Numbers of security personnel or civilians have been killed
                   2. Playing          The terrorist members were playing deadly guns to attack
                   football            civilians or security agents
                   3. Jockey           A man who controls and facilitates other terrorists to
                                       conduct acts of violence.
                   4. Surveyor         A terrorist member was observing the situation in the field
                                       before they attack their targets.
                   5. Fa’i             Bounties obtained from external sources to support their
                                       terror activities
 Violence
 Codes of the      6. Ganimah          Bounties were obtained during the war with security agents
 former Poso                           or civilians, and they were used to strengthen their war.
 terrorist         7. Brides           A terrorist member who has been prepared to die in a
                                       suicide attack
                   8. Ta’lim           Teaching and learning process with a material focus on
                                       attacking enemies according to God's wish
                   9. Azkari           Practicing military way to fight without weapons
                   10. Tadrib          Practicing to fight using weapons
                   11. Baiat           A terrorist or group of terrorists took a holly vow to be loyal
                                       to their leaders.

The contextual and social meaning of codes used by the terrorist in Poso

This section will discuss social and contextual meanings of the codes used by the terrorist in Poso.
To reveal the meaning of the violence codes, we used Pierce’s theory of semiotic interpretation
(Kalaga, 1986; Yakin & Totu, 2014) as the second marker. By using the semiotic interpretation, we
make clear the meaning of the codes through a systematic reorganizing of the codes. The codes
were presented in three components, which are icons, indexes, and symbols. An icon is a sign
which is in its original form and carries a certain meaning and sense (Parmentier, 2020).
Meanwhile, an index is understood as a sign that is related to something which is causal in nature
(Martinec, 2004). Then, a symbol is a mark to represent an object (Glenberg & Robertson, 2000).
A symbol can have meanings according to the interpreter's understanding. In our study, the three
components of icons, indexes, and symbols were presented to interpret the violence codes used
by the terrorist in Poso. For example, marker one was used for an icon, score code, and football
playing. Meanwhile, the meaning of football playing was referred to (marker 2) to the case
experienced by a bomber when he bombed a church in Palu (playing football), on twelve of
January 2002. When the bomber finished playing football, he was asked by his terrorist mates the
number of the scores he had made. The bomber replied draw, which means nobody died in the
deadly bombing.
Meanwhile, according to five former terrorists, a code for the terrorist surveyor (marker one) has its
contextual meaning (marker two). According to participants, based on the result of observation,
the church's attack must be carried out before evening prayer, and the traditional market had
been closed. At the moment of the attack, the situation around the church was quiet because
traditional merchants were no longer around the church. As such, the bombing attack was made
in less than three minutes. For the object, all the violence codes (see marker one) were the
indication of revenge towards Christian people who had killed Muslims during the religious and
social conflict in 1998 (see marker 2). Meanwhile, the object of the symbol, all the violence codes
reflect the non-physical violence. All the markers and meanings are presented in the following
table 4.

                                                2974
Hartati, Y.; Ahmad, A.; Zulkarnain, and Afandi, D. (2020) Waste Management Modelling in Siak Regency …

Table 4.
 The social and contextual meaning of violence codes of terrorists

        Mark        Signification (Code)                 Negotiation (Interpretant)
                        Marker 1                             Marker 2
                                                 Icons          Indexes     Symbols
                   1.       The code “score"     He was describing a case of attack conducted by a
                   refers to the number of       terrorist. The terrorist bombed a church (playing
                   people who have               football) on twelve of January 2002. After the terrorist
                   successfully been killed.     finished the deadly attack, he was asked by his
                   2.       The code             terrorist inmates regarding the number of scores has
                   “playing football" refers     had made. He said draw, which means nobody was
                   to a terrorist who has        killed (icon).
                   weapons, such as knives,      Another terrorist (Jockey) robbed a jewelry store
                   swords, and machine           while conducting observation before the attack. The
                   guns, when they attack        robbery was used to distract security attention.
                   enemies during the
 Violence          conflict.
 Codes of the      3.       The code
 Poso terrorist:   “jockey’ refers to a
 Saussure’s        person who supports and
                   helps terrorists commit an
 Signification
 and     Peirce    act of violence.
 Negotiation       4.       The code             The surveyor was a well-known terrorist figure in Poso.
                   “surveyor" referred to a      The terrorist figure robbed a jewelry store (Fa’i) in
                   terrorist who was in          Palu city. The loot was used to support their attack.
                   charge of observing the       The attack of the church was conducted in less than
                   situation in the field        three minutes (Icon).
                   before an attack was
                   conducted. The
                   observation included
                   church opening time, the
                   entrance, the length of
                   the exit door to the
                   roadside, and how long it
                   took to get into the
                   church area.
                   5.       The code “Fa’I”
                   referred to bounties
                   obtained from
                   supporters, and it was
                   used to support the
                   terrorist attack.
                   The code for number           During a bombing attack in Poso on sixth of June
                   seven was “bride," which      2013, a terrorist functioned as a bride (icon). He did
                   referred to sacred or it      suicide bombing in the early morning.
                   was a martyr. A terrorist
                   was promised to go to         The terrorist did suicide bombing to revenge Muslim
                   paradise when they            citizens who had been killed by Christian people
                   finished conduction a         (Indexes)
                   suicide bombing attack.       As a form (symbol) that represents the meaning of
                   All the violence codes        non-physical violence in Poso, both as a marker and
                   from 1-11                     a sign

                   All the violence codes
                   from 1-11

                                                  2975
© RIGEO ● Review of International Geographical Education                     11(5), SPRING, 2021
The use of Pierce's second model of negotiation in analyzing the terrorist codes in Poso Indonesia
provides understanding for interpreters and the public. The Pierce interpretation model at the
beginning was inspired by Roland Barthes (Tohar et al., 2007). However, this study found
differences with Roland Barthes's interpretation model. The first difference is that Barthes' first and
second signification of the model shows a new sign which is called denotation and connotation.
However, in our study, we called the first code as signification and the second code as negotiation
or interpreter. A denotation shows the meaning of a word is similar to its actual meaning (signifier).
At the same time, a connotation refers to the nonactual meaning or something else (signified).
When the signification code is not referred to as an actual meaning instead showing a hidden
meaning (signifier), then the appearance of its meaning is revealed through an object of the
code. As such, the negotiation and interpreting (signified) will refer to the social and contextual
meanings. The second difference is that, even though Barthes tried to stay away from meanings
constructed by Saussure's structural relations through the emergence of cultural myths, his model
is still close to the Saussure model. Barthes un ability to differ himself from Saussure was due to the
emergence of myths on the basis of connotation, meaning turns into denotation. In other words,
Barthes’ model of interpretation is still influenced and dominated by the structuralism paradigm
of thinking. More importantly, this proves that Barthes remains influenced by perspectives of the
structural relations of the signs, which are called denotation, connotation, and myth. However,
we distinguished ourselves with Barthes's interpretation model, where the first meaning is still
related to Saussure's structural relations.
In addition, when we discuss the second meaning, we differentiated ourselves from Barthes, which
our interpretation did not raise ideological meanings as Barthes did in myths terms. Instead, we
refer to our meaning with social aspects and contextual signs or codes. Thus, our strategy implies
that the meaning of the sign in the semiotic approach is no longer refers to the structural relations
but it refers to the social and contextual meaning of the sign. The model interpretation of the
meanings was adapted from Chandler (2017) explanation, who adopted Roman Jacobson and
Stuard Hall (2007). The model of the code interpretation is a form of the second meaning of
Peirce's sign. For more details on this code reading model, see Figure 6 below:

           Figure 6. The violence codes reading model

                                           Conclusion
Our conclusion is that preventing violence is much better than treating it. Therefore, the eleven of
Poso terrorist violence codes founded in this paper are one of the early prevention systems that
must be known and disseminated in the community so that the space for movement of the
terrorists can be detected early and the acts of violence that terrorists will carry out can be
minimized. Acts of violent terrorism globally have the same code and code, although in different
languages, so knowing the terrorism code or code is the most important and strategic marker for
terrorism prevention. By using a semiotic approach, violence codes of Poso terrorists that be
identified in this six-month study in Poso, Central Sulawesi, not only help to dismantle various
ideological veils of violent discourse produced by terrorist groups through language as a tool of
their struggle, but also help to understand and interpret the codes of violence hidden behind the
code language they created. In this way, counter-terrorism can sbe prevented earlier, and the
nature of its movement can also be predicted.

                                                2976
Hartati, Y.; Ahmad, A.; Zulkarnain, and Afandi, D. (2020) Waste Management Modelling in Siak Regency …

                                            References
Aven, T., & Renn, O. (2009). The Role of Quantitative Risk Assessments for Characterizing Risk and
        Uncertainty and Delineating Appropriate Risk Management Options, with Special
        Emphasis on Terrorism Risk. Risk Analysis, 29(4), 587-600. doi: https://doi.org/10.1111/j.1539-
        6924.2008.01175.x
Baines, P. R., & O’Shaughnessy, N. J. (2014). Al-Qaeda messaging evolution and positioning, 1998–
        2008: Propaganda analysis revisited. Public Relations Inquiry, 3(2), 163-191. doi:
        10.1177/2046147x14536723
Barthes, R. (1981). Theory of the Text. In R. Young (Ed.), Untying the Text: A Post-Structuralist Reader
        (pp. 31). London: Routledge & Kegan Paul.
Berger, A. A. (2014). Semiotics and Society. Society, 51(1), 22-26. doi: 10.1007/s12115-013-9731-4
Bourdieu, P. (1991). Language and Symbolic Power: Harvard University Press.
Bufacchi, V. (2005). Two Concepts of Violence. Political Studies Review, 3(2), 193-204. doi:
        10.1111/j.1478-9299.2005.00023.x
Chandler, D. (2007). Semiotics: The Basics (2 ed.). London: Routledge.
Chandler, D. (2017). Semiotics: The Basics. In D. Chandler (Ed.), Semiotics: The Basics (3 ed.). New
        York: Routledge.
Connolly, P., & Healy, J. (2004). Symbolic violence, locality and social class: the educational and
        career aspirations of 10-11-year-old boys in Belfast. Pedagogy, Culture & Society, 12(1), 15-
        33. doi: 10.1080/14681360400200187
Czeżowski, T. (1979). Connotation and Denotation. In J. Pelc (Ed.), Semiotics in Poland 1984–1969
        (pp. 73-80). Dordrecht: Springer Netherlands.
Djajasudarma, T. F. (1993). Semantics: Understanding the Science of Meaning (Vol. 145). Bandung:
        PT. Eresco.
Enders, W., Sandler, T., & Gaibulloev, K. (2011). Domestic versus transnational terrorism: Data,
        decomposition, and dynamics. Journal of Peace Research, 48(3), 319-337. doi:
        10.1177/0022343311398926
Evoy, C. M., & Hideg, G. (2017). Global Violent Deaths 2017 : Time To Decide (pp. 106). Switzerland
        the Small Arms Survey.
Freis-Beattie, R. C. (2020). Fear and Loathing in Post 9/11 America: Public Perceptions of Terrorism
        as Shaped by News Media and the Politics of Fear. (Doctor dissertations), University of New
        Hampshire,                       Durham                      Retrieved                      from
        https://scholars.unh.edu/cgi/viewcontent.cgi?article=3501&context=dissertation
Glenberg, A. M., & Robertson, D. A. (2000). Symbol Grounding and Meaning: A Comparison of
        High-Dimensional and Embodied Theories of Meaning. Journal of Memory and Language,
        43(3), 379-401. doi: https://doi.org/10.1006/jmla.2000.2714
Gough, P. B., & Hillinger, M. L. (1980). Learning to Read: an Unnatural Act. Bulletin of the Orton
        Society, 30, 179-196. doi: https://www.jstor.org/stable/23769975
Gunning, J., & Jackson, R. (2011). What's so ‘religious’ about ‘religious terrorism’? Critical Studies
        on Terrorism, 4(3), 369-388. doi: 10.1080/17539153.2011.623405
Hines, C. (2003). Code. Retrieved 06 August 2021, from The Chicago School of Media Theory,
        University of Chicago https://lucian.uchicago.edu/blogs/mediatheory/keywords/code/
Huppatz, D. J. (2011). Roland Barthes, Mythologies. Design and Culture, 3(1), 85-100. doi:
        10.2752/175470810X12863771378833
Kalaga, W. (1986). The Concept of Interpretant in Literary Semiotics. Transactions of the Charles S.
        Peirce Society, 22(1), 43-59. doi: https://www.jstor.org/stable/40320122
Kaur, K. H. (2019). What Is the Greatest Threat: International Terrorism, or Responses to It? (Master
        Thesis), University of Warwick, Warwick. Retrieved from 10.13140/RG.2.2.18884.17289
Martela, F., & Steger, M. F. (2016). The three meanings of meaning in life: Distinguishing coherence,
        purpose, and significance. The Journal of Positive Psychology, 11(5), 531-545. doi:
        10.1080/17439760.2015.1137623
Martinec, R. (2004). Gestures that co‐occur with speech as a systematic resource: the realization
        of experiential meanings in indexes. Social Semiotics, 14(2), 193-213. doi:
        10.1080/1035033042000238259
Matsueda, R., Drakulich, K., & Kubrin, C. (2005). Race and Neighborhood Codes of Violence. In J.
        R. D., P. L. J. Krivo & Hagan (Eds.), The Many Colors of Crime: Inequalities of Race, Ethnicity,
        and Crime in America (pp. 334-356). New York: New York University Press.

                                                  2977
© RIGEO ● Review of International Geographical Education                      11(5), SPRING, 2021
Morin, O., Kelly, P., & Winters, J. (2020). Writing, Graphic Codes, and Asynchronous
         Communication.         Topics     in    Cognitive      Science,     12(2),    727-743.     doi:
         https://doi.org/10.1111/tops.12386
Nainggolan, P. P. (2019). Ancaman Global Terorisme 3.0 Retrieved 06 August 2021, from Tempo
         https://kolom.tempo.co/read/1208767/ancaman-global-terorisme-3-0
Nurdin, N. (2016). Radicalism on Worl Wide Web and Propaganda Strategy Al-Ulum, 16(2), 265-
         288. doi: https://doi.org/10.30603/au.v16i2.42
Nurdin, N. (2018). Institutional Arrangements in E-Government Implementation and Use: A Case
         Study From Indonesian Local Government. International Journal of Electronic Government
         Research (IJEGR), 14(2), 44-63. doi: 10.4018/ijegr.2018040104
Nurdin, N., Stockdale, R., & Scheepers, H. (2014). Coordination and Cooperation in E-Government:
         An Indonesian Local E-Government Case The Electronic Journal of Information Systems in
         developing Countries, 61(3), 1-21. doi: https://doi.org/10.1002/j.1681-4835.2014.tb00432.x
Parmentier, R. J. (2020). Classes of Signs. In J. Stanlaw (Ed.), The International Encyclopedia of
         Linguistic Anthropology (pp. 1-9).
Reliefweb. (2021). Global Terrorism Index 2020: Measuring the impact of terrorism. Retrieved 06
         August         2021,       from       Institute      for      Economics        &       Peace
         https://reliefweb.int/report/world/global-terrorism-index-2020-measuring-impact-terrorism
Sandler, T. (2014). The analytical study of terrorism: Taking stock. Journal of Peace Research, 51(2),
         257-271. doi: https://doi.org/10.1177%2F0022343313491277
Schefold, R. (1998). The Domestication of Culture: Nation-building and Ethnic Diversity in Indonesia.
         Contributions To Linguistics, Geography And Ethnology, 154(2), 259-280. doi:
         http://www.jstor.org/stable/27865430.
Sebeok, T. A. (1999). Signs: An Introduction to Semiotics (2 ed.). Toronto: University of Toronto Press.
Somers, M. J. (2001). Ethical Codes of Conduct and Organizational Context: A Study of the
         Relationship Between Codes of Conduct, Employee Behavior and Organizational Values.
         Journal of Business Ethics, 30(2), 185-195. doi: 10.1023/A:1006457810654
Thibault, P. J. (1988). Re-reading Saussure: The Dynamics of Signs in Social Life (1 ed.). London:
         Routledge.
Tohar, V., Asaf, M., Kainan, A., & Shahar, R. (2007). An Alternative Approach for Personal Narrative
         Interpretation: The Semiotics of Roland Barthes. International Journal of Qualitative
         Methods, 6(3), 57-70. doi: 10.1177/160940690700600306
Ulfah. (2013). Symbolic Violence in Learning Discourse. Indonesian Journal of Educational Studies,
         14(1), 51-58. doi: https://doi.org/10.26858/ijes.v14i1.3990
Vannini, P. (2007). Social Semiotics and Fieldwork:Method and Analytics. Qualitative Inquiry, 13(1),
         113-140. doi: 10.1177/1077800406295625
Vorobej, M. (2016). The Concept of Violence New York:: Routledge, Taylor & Francis Group.
Yakin, H. S. M., & Totu, A. (2014). The Semiotic Perspectives of Peirce and Saussure: A Brief
         Comparative Study. Procedia - Social and Behavioral Sciences, 155, 4-8. doi:
         https://doi.org/10.1016/j.sbspro.2014.10.247
Yin, R. K. (2003). Case Study Research - Design and Method (3 ed.). London: Sage, Thousand Oaks.

                                                 2978
You can also read