DEFENCE AND SECURITY STRATEGY OF THE INDONESIAN NAVY TO FACE PROBLEMS IN NORTH NATUNA SEA.

M. Imam Chadhafi 1 , Z. fanani 2 , Setyo Widagdo 2 , M. soleh 2 . 1. Postgraduate student of brawijaya university. 2. Postgraduate lecturer of brawijaya university. ...................................................................................................................... Manuscript Info Abstract ......................... ........................................................................ Manuscript History Received: 08 April 2019 Final Accepted: 10 May 2019 Published: June 2019 The purpose of this study are 1) to analyze the threats and disturbances that exist in the North Natuna Sea, 2) to analyze the strategy of the Navy in overcoming threats and disturbances in the North Natuna Sea, 3). Analyzing what factors hinder and support the implementation of strategies used in overcoming threats and disturbances in the North Natuna Sea and 4) finding the right and integrative strategy model used to overcome the threats and disturbances that exist in order to enforce the NKRI sovereignty in the North Natuna Sea. This research was conducted at Mako Lanal Ranai, Posal Sabang Mawang Lanal Ranai and in the sea security operation area of the Natuna Sea. While the research was conducted on September 2018 to March 2019. This study used a qualitative descriptive method with observation and deepening of material for quite a long time. The results of this study are found in the threats and disturbances found in the Natuna Sea Natuna found a strategy to overcome this problem by creating a Risk Register which can later become an important component in the preparation of the Rule of Engagement.

The purpose of this study are 1) to analyze the threats and disturbances that exist in the North Natuna Sea, 2) to analyze the strategy of the Navy in overcoming threats and disturbances in the North Natuna Sea, 3). Analyzing what factors hinder and support the implementation of strategies used in overcoming threats and disturbances in the North Natuna Sea and 4) finding the right and integrative strategy model used to overcome the threats and disturbances that exist in order to enforce the NKRI sovereignty in the North Natuna Sea. This research was conducted at Mako Lanal Ranai, Posal Sabang Mawang Lanal Ranai and in the sea security operation area of the Natuna Sea. While the research was conducted on September 2018 to March 2019. This study used a qualitative descriptive method with observation and deepening of material for quite a long time. The results of this study are found in the threats and disturbances found in the Natuna Sea Natuna found a strategy to overcome this problem by creating a Risk Register which can later become an important component in the preparation of the Rule of Engagement.

…………………………………………………………………………………………………….... Introduction:-
Indonesia is one of the largest archipelagic states in Asia and the second in the world which has 17,504 with 16,056 islands that have been standardized and submitted to the United Nations. Indonesia is a country that has an area of 6.4 million km 2 of water, with a coastline of 108,000 km, and an exclusive Economic Zone (EEZ) as wide as 200 miles in the United Nations Convention on the Law of the Sea 1982 (UNCLOS '82) with an area of 3 million km 2 (Pushidrosal, 2018). The conception of the Indonesian archipelago was introduced when the Juanda Declaration was held on December 13, 1957 which stated to the international community that Indonesia consisted of thousands of islands as a unit under Indonesian sovereignty.
Border problems that have been explained, if it is not anticipated it will develop into a threat that endangers Indonesian sovereignty. Besides carrying out maritime defenses, the Navy also seeks to implement selected strategies through pro-active activities to improve national resilience in the border region (Marsetio, 2013).
The Natuna Islands are one of 11 (eleven) islands that must receive special attention because they are located in the border region. The islands located in the middle of the South China Sea are prone to be a source of conflict related to 410 Data analysis technique:-Data obtained in this qualitative study was carried out by 1) in-depth interviews to obtain information (data) from respondents by asking face-to-face questions (Mashud and Musta'in, 2005), 2) Observation participates directly and intensively to get accurate information and data in connection with the activities studied. With observation, it can be observed the activities of people, physical characteristics, social situations, and what happens in certain places (Spradley 1980), and 3) Study of documentation.

Research Result And Discussion:-Data Analysis:-
In the past few years, the Indonesian government has faced threats and disruptions related to the North Natuna Sea. This has disrupted maritime security and affected the stability of Indonesia's national defense. From a military point of view, traditional maritime security has focused on national security in the sense of protecting a particular territorial integrity of a country from armed attacks or other forces and building the interests of the state elsewhere. The defense perspective on maritime security is then extended to a greater scope of threats. In its report on "Ocean and the Law of the Sea", the UN Secretary General identified 7 (seven) specific threats to Maritime Security, namely (Natalie Klein et al., 2010): 1. Piracy and armed piracy on ships; 2. Terrorist acts involving ships, offshore installations and other important things in the sea in view of the broad effects, including significant economic effects as a result of attacks; 3. Smuggling of light weapons and weapons of mass destruction; 4. Smuggling of narcotics and illegal drugs where 70% are captured on their way by sea; 5. Human smuggling by sea; 6. Illegal, Unreported and Unregulated (IUU) Fishing; and 7. Intentional destruction of the marine environment specifically in the form of maritime pollution.
Meanwhile, according to Rahman (2009), the notion of Maritime Security has different meanings for various people with different reasons, for example the equation with the concept of regional security to produce the terms "Comprehensive Maritime Security" and "Cooperative Maritime Security". There are 5 (five) maritime security perspectives delivered (Rahman, 2009), namely: 1. Strong environmental security; 2. Mastery of the sea; 3. Safeguarding maritime boundaries; 4. Military activities at sea; and 5. Security regulation of the maritime transportation system. The definition of "Comprehensive maritime security" is used by Bateman and Bergin (2009) to describe the conceptual purpose of protecting the state and its interests from military threats "from the sea, over the sea or under the sea" plus "non-traditional threats" to national maritime interests. They have noticed that the concept of maritime security has changed and has become more multi-dimensional with more inclination towards the civilian realm. Bateman and Bergin (2009) explain that "Comprehensive maritime security" requires: 1. Good code and conduct at sea; 2. Reducing illegal activities in the sea; 3. Protection of maritime boundaries; 4. Protection and maintenance of the maritime environment; and 5. Conservation of maritime resources.
The current condition is the fact that there has been a threat and disruption to the Indonesian maritime security against the background of the following problems: 1. China's Nine-dash line claims unilaterally in the South China Sea and covers the territory of the Continental Shelf and the Indonesian Exclusive Economic Zone in the North Natuna Sea; and 2. There is no agreement regarding the limits of the Exclusive Economic Zone between Indonesia and Vietnam which results in the existence of "Undelimited Area".
On the other hand, the existence of illegal military activities is a form of disturbance carried out by foreign parties and if the government does not take decisive action it can turn into a threat to Indonesia's sovereignty in the national 411 jurisdiction. According to UNCLOS 1982 Article 37 has been regulated on Transit Cross for ships and aircraft passing through the straits used for international shipping between the high seas and the Exclusive Economic Zone and parts of the high seas or other Exclusive Economic Zones. It was explained that ships and aircraft that carry out the Trasit Cross in the Exclusive Economic Zone must be carried out quickly, avoiding any activities other than continuous transit as soon as possible and avoiding threats or the use of any violence against sovereignty, territorial integrity or independence politics of countries bordering the strait or by any other means that violate the principles of international law. While the activities carried out by American, French and Vietnamese RIG Ships are not in accordance with the rules set out in UNCLOS 1982.
Based on the data obtained in the field as well as information from key and additional informants, it shows that the facts of threats and disturbances that occur in the North Natuna Sea are as follows: 1. Illegal fishing activities carried out by KIA China and Vietnam resulted in large losses to the Indonesian economy and damage to marine ecosystems due to the use of toxic materials and illegal fishing equipment; 2. Interventions carried out by the Chinese and Vietnamese Coast Guards when guarding and protecting their respective KIAs when carrying out illegal fishing activities, such as: 1. Ordering KRI to release KIA via radio communication; 2. Promote the KRI movement; 3. Cutting off the direction of the KRI; and 4. They hit KIA to sink and were not captured by the KRI.
Illegal military activities carried out by foreign warships in the Continental Shelf and the Indonesian Exclusive Economic Zone, such as flying helicopters, flying drones and lowering the Landing Craft Vehicle Person (LCVP). Violations that occur are not only carried out by foreign warships, but foreign government ships are also brave enough to reduce buoys around the Indonesian continental shelf. This is done when they carry out "Innocent Passage".

Strategies to Overcome the Threats and Disorders in the North Natuna Sea: -
Illegal fishing is a major problem that occurs in Indonesia's current jurisdiction, especially in the North Natuna Sea. Vietnam is a country that is still carrying out these activities. So that law enforcement officers in the sea, especially the Navy that cooperates with side units such as the Ministry of Maritime Affairs and Fisheries, in this case, IUUF 115 Task Force has carried out many KIA Vietnam arrests that carry out illegal fishing in the Continental Shelf and Exclusive Economic Zone. The high number of illegal fishing activities in Indonesia's jurisdiction is a direct impact of the lack of agreement regarding the Exclusive Economic Zone between Indonesia and Vietnam.
The main problem is that Vietnam has the perception that the definition of ZEE regime is the same as the Continental Shelf regime, whereas according to 1982 UNCLOS the understanding of the two regimes is different and until now there are still illegal fishing activities by KIA Vietnam in the Indonesian Continental Shelf, even though the boundary is clear. In order to deal with the three threats and disturbances that exist in the North Natuna Sea, the right strategy is needed for the Navy to deal with it. So far, Protap Kamla has become a permanent document used by all elemental commanders and units that are carrying out Marine Security Operations in the North Natuna Sea. In addition, the Navy also has an Operational Plan book in which there is an organizational structure, main tasks, the concept of operations, administration and logistics, command, control and communication, the legal bases used and the rules of engagement.
But the rules of engagement used still use the old guidelines. The absence of special documents in explaining the risks faced in the operating area is considered to be a deficiency that must be addressed immediately. Then the lack of updating of the Rule of Engagement to match the facts of the threats and disturbances faced in the current operating area is also a shortcoming felt by the soldiers at the operational level. In addition, the elemental commanders and units must place personnel and material security as the highest indicator in terms of what must be achieved at the end of the operation. Because even though many KIAs are able to be captured and escorted to be 412 handed over to Lanal Ranai or other nearby bases, there will be no meaning in the event of loss of personnel or material.
The strategy offered is the creation of a Risk Register as a form of document that can be used to support the Kamap Protap document that is already owned by the Navy. Risk Register is a document that contains a list of risks faced in the operating area. The Risk Register can be used as a guide and reference for elemental commanders who are carrying out operations so that they are able to anticipate the risks listed. It is expected that after completing the operation, the elemental commanders make a report and provide an evaluation of the existing Risk Register. So that the known risks that are no longer relevant and report on new risks and potential risks that will arise. This is a management function of the existing Risk Register so that it continues to be updated according to the current conditions in the operating area.
Ivana Burcar Dunovic, Mladen Radujkovic and Mladen Vukomanovic in Gradevinar Journal 1 of 2013 entitled "Risk Register Development and Implementation for Construction Projects" explained that the risk register can be classified into 3 (three) categories as mentioned below (Ivana Burcar, 2005): 1. Risk register is byproduct, which is a document that contains information about risks; 2. Risk registers are very useful tools for risk management; and 3. Risk registers are an important part of the risk management process.
Risk Register is a new document concept that has never been owned by the Navy. So far, there has never been written information regarding the risks faced in the operating area. The list of risks prepared can be said as an overview and initial information regarding the current conditions in the operating area. Because if this document is really made, then the existing control function is to ensure input data that contains new risks encountered during carrying out operations and predicting potential risks that will arise along with the development of existing conditions. This must be reported in writing by the elemental and unit Commander after completing operations in the North Natuna Sea and must continue to be updated so that the elemental Commander and the unit that will carry out the next operation have brought the latest Risk Register. It can be concluded that the right strategy for the Navy to overcome the threats and disturbances that occur in the North Natuna Sea at this time is to make the Risk Register as a special document that contains a list of risks faced in the operating area. In the Risk Register, it must also be explained about mitigation measures to suppress and even eliminate the risks present. Then using the aspects of risks that have been listed as one of the components that are useful in making the Rule of Engagement so that all rules are made in accordance with the risks faced in the operating area. It is impossible for a Rule of Engagement to be made without considering the actual conditions faced. So that it is expected that the Rule of Engagement formulated has considered the risks faced, political policies, diplomacy policies and national and international legal rules that have been ratified by the Indonesian government.

Factors that Inhibit and Support the Application of Strategies Used in Overcoming Threats and Disorders in the North Natuna Sea: -
Based on the threats and disturbances faced in the North Natuna Sea at this time, a new strategy has been offered for the Navy to overcome these threats and disturbances, such as by creating a Risk Register and then implementing it as a component in making a Rule of Engagement ) This strategy can be said as a new thing that has never been implemented before by the Navy. So that it requires the right way to be applied in the Sea Security Operation pattern carried out in the North Natuna Sea. Lanal Ranai Pangkalan which serves to support all KRI needs while carrying out operations in the North Natuna Sea also has a crucial position in the process of making the Risk Register. Where Lanal Ranai can use their intelligence data search capabilities in its working area to continuously update the conditions and actual events that occur. So as to be able to provide information in the form of a tactical description of the operating area. But what must be considered is that the Risk Register concept uses the Logical Framework Theory in its drafting process. The Logical Framework theory is still something foreign to the Indonesian military, but some organizations in Indonesia have used this theory to complete a project.
The following are factors that hinder the implementation of the Risk Register strategy as a document which will then be used as an important component when developing the Rule of Engagement for elemental and unitary commanders, Lanal Ranai and the Navy.

External
There is no good integrity and synergy between the Navy and the top, side and bottom units. Because in the process of making the Risk Register, it requires integrity and the synergy of the relevant stakeholders in order to get the actual Risk Register document and in accordance with the facts in the operating area; and The process of making the Risk Register must be fully formulated so that all parties starting from the elemental and unit commander, Lanal Ranai and the Navy can understand and understand. So that the process of making the Risk Register can run well in order to support marine security operations in Natuna.
Then it can be seen that the factors that support the implementation of the Risk Register strategy which will then be used as an important component when preparing the Rule of Engagement for the elemental and unit Commander, Lanal Ranai and the Navy are as follows: Internal 1. The desire to meet the needs of documents that specifically contain the risks faced in the operational area and the Rule of Engagement that can really be used when carrying out maritime security operations in the Natuna Sea, as one form of TNI's seriousness Navy in prioritizing personnel and material security when carrying out operations; 2. The desire to make a good risk management and minimize the occurrence of decision-making errors at crucial times. Because the decisions taken are in accordance with the government's political policies, the state's foreign diplomacy policies and the national and international legal grounds that have been ratified; and 3. Avoiding loss of personnel and material when carrying out operations.

External
The desire to build a large and professional Navy force. So that documents that really support the task of the Navy are needed to enforce the law and maintain security in the sea area of national jurisdiction in accordance with the provisions of national law and international law that has been ratified; The absence of documents made jointly by the relevant stakeholders to deal with threats and disturbances that exist in the North Natuna Sea. So that the strength of maritime security in the Natuna Sea will increase because all 414 relevant parties have integrated and synergized to make the Risk Register document an important component when creating a Rule of Engagement that can be used by all parts.
The factors that hinder and support are things that must be considered carefully so that the process of implementing the Risk Register strategy as an important component used when making the Rule of Engagement can run smoothly. The existence of good cooperation from all parties and related stakeholders is the main key so that the strategy can be accepted and implemented properly.

The Right and Integrative Strategy Model that is used to Overcome Threats and Disorders in the Context of Enforcing the Sovereignty of the Unitary Republic of Indonesia in the North Natuna Sea: -
In order to develop a Risk Register strategy which can then be used as an important component when preparing the Rule of Engagement, the right step is to use the Logical Framework Theory. It is expected that the strategies compiled are more integrative and can be easily accepted by all parties and related stakeholders. The Logical Framework Theory has not been widely known by the Indonesian military, but there are already several organizations in Indonesia that use this theory in the preparation of their projects.
Delevic Milica (2011) in the "Guide to the Logical Framework Approach" published by the Replubic of Serbia Government European Integration Office, Belgrade, 2011, ISBN 978-86-914485-0-9 explains that the Logical Framework Approach (LFA) is an analytical tool and management that is now being used (in one form or another) by most multilateral or bilateral aid agencies, international NGOs and by many partner governments for the management of development projects. Developed in the late 1960s to help the United States Agency for International Development improve its project planning and evaluation system, the Logical Framework Approach (LFA) was designed to address 3 (three) fundamental problems, they are: 1. Planning is too vague, without clear objectives that can be used to monitor and evaluate project success or failure; 2. Management responsibility is unclear; and 3. Evaluation is often a process of hostility because there is no mutual agreement on what the project really wants to achieve.
Based on the explanation presented by Delevic Milica (2011), LFA can be used to help some things that are considered to have a relationship with research and can help find new models or concepts in the end result, namely: 1. Analyze the existing situation including identifying stakeholder needs and definitions of related objectives; 2. Determine the assumption that the project logic is built; 3. Identifying risks to achieve goals and objectives; 4. Building a system to monitor and evaluate project performance; and establish a process of communication and learning among stakeholders, such as clients or people who receive benefits, planners, decision makers and implementers.
There Here are the explanations of the Risk Register manufacturing process by using the Logical Framework Theory so that it is easier to understand.

Stakeholder Analysis
At this stage, it will be carried out to identify who the stakeholders are related to the existing problems. It is hoped that with stakeholder analysis, it will be able to describe the role of stakeholders to assist law enforcement officers in the sea and enforcer of sovereignty in the territorial waters of Indonesian jurisdiction in understanding the situation on the ground, tactically, operationally and strategically. In this stage use the term WHO -WHAT -HOW (WWH) to make it easier to complete this stage. Then it will create a "Stakeholder Analysis Table" to make it easier to enter data. So that anyone who will use this new model formula can immediately understand the intent and purpose of this stage.

Problem Analysis
After completing and filling in the Stakeholder Analysis Table in accordance with WHO -WHAT -HOW, then the next step is to implement Problem Analysis. At this stage an identification of the problems faced in the field (operation area) will be carried out. This process can also be called to find a "Risk Source". By identifying the sources of risk or problems faced today in the field, it can determine what causes the problems and the consequences of these problems. So that it will be known what risks will be faced and the potential risks that exist. Based on the Logical Framework theory, the implementation of this stage can be solved by the "Problem Tree". But in the formulation of the new model that is made at this time will try to solve the Problem Analysis stage with the "Analysis of Problems and Risk Tables".

Objective Analysis
After completing the Problem Analysis stage, the next step is Objective Analysis. If the Problem Analysis stage can be solved by "Problem Tree", then at this stage in accordance with the Logical Framework theory can be solved by "Destination Tree". But at this stage, modifications are made by creating a "Risk and Mitigation Classification Table" to classify the risks that exist and look for who is responsible for the occurrence of these risks. So that it can develop solutions to the problems faced to carry out mitigation to achieve the expected goals.

Strategy Analysis
The last stage in the preparation of the Risk Register using the Logical Framework theory is Strategy Analysis.
Where at this stage, in accordance with the existing theory is to identify various strategies to achieve solutions and choose the most appropriate strategy. But in the formulation of the new model of making Risk Register, the selection of the right strategy will be carried out based on the existing problems and risks. At this stage a "Strategy and Effort Table" is prepared, taking into account MITIGATION in the "Risk and Mitigation Classification Table" so that it can be used as an appropriate effort to realize the chosen strategy.
After successfully formulating a new model for making the Risk Register using the modified Logical Framework Theory with the aim of making it easier for anyone who will use this new model, the new Risk Register model is one of the references to the formulation of the Rule of Engagement. This is a new idea that has never been before and has never been used. The Risk Register is prepared as a first step for the process of formulating the Rule of Engagement. Because until now there is still no risk register found that can be the initial guideline when the elements or units carry out operations. The current Risk Register is expected to be an important document that specifically provides a more specific tactical picture to explain what risks will be faced by actors in the operating area so that the Rule of Engagement is really needed in accordance with the conditions the latest in the field so that it can reduce, suppress and eliminate the risks that exist. In addition, with the Rule of Engagement, elemental and unit commanders can make decisions quickly and precisely when faced with situations of difficult conditions and short periods of time. This is a very crucial decision because if the decisions taken are not right, it will affect national stability and can even increase escalation and tension between related parties.
In addition to the nature of the military, another characteristic possessed by the Rule of Engagement is the concise nature, ie things that do not make sense or cannot be used by those who carry out operations need not be included. Then the legal or legal nature, namely as a basic and vital element and helps secure the legality of the use of force given in operations. When the Rule of Engagement requires review and input from legal counsel, it is not necessary to consider documents about the law or certain fields of their legal counsel. Although the legal elements in the Rule of Engagement are appropriate and sufficient, legal counsel will still be needed during the operation. Furthermore, the third nature is the nature of politics, because the military always carries out political objectives and forces are spread separately or specifically to achieve political goals. So that it can be concluded that the Rule of Engagement is the result of the ruling political leadership and is responsible for operations.

416
Based on the constituent components and the characteristics of the Rule of Engagement, the belief that the Risk Register can be one of the influential components for developing the Rule of Engagement is getting bigger. Based on the analysis and discussion that has been carried out, then a new form of component is offered and the nature of the Rule of Engagement is offered.

Conclusions:-
The threats and disturbances that exist in the North Natuna Sea at this time are: Illegal fishing activities carried out by KIA China and Vietnam resulted in large losses to the Indonesian economy and damage to marine ecosystems due to the use of toxic materials and illegal fishing equipment; Interventions carried out by the Chinese and Vietnamese Coast Guards when guarding and protecting their respective KIAs when carrying out illegal fishing activities, such as: 1. Ordering KRI to release KIA via radio communication; 2. Promote the KRI movement; 3. Cutting off the direction of the KRI; and 4. They hit KIA to sink and were not captured by the KRI.
Illegal military activities carried out by foreign warships in the Continental Shelf and the Indonesian Exclusive Economic Zone, such as flying helicopters, flying drones and lowering the Landing Craft Vehicle Person (LCVP). Violations that occur are not only carried out by foreign warships, but foreign government ships are also brave enough to reduce buoys around the Indonesian continental shelf. This is done when they carry out "Innocent Passage". 1. The right strategy to deal with Threats and Disruptions in the North Natuna Sea is the Making of a Risk Register that can be used to create a Rule of Engagement. 2. Factors that hinder the implementation of the Risk Register strategy as a document which will then be used as an important component when compiling the Rule of Engagement for elemental and unit Commander, Lanal Ranai and the Navy are as follows.

Internal
1. Not yet aware of the importance of the Risk Register to support the implementation of Marine Security Operations in the North Natuna Sea; and 2. For elemental commanders and units who do not have experience in carrying out marine security operations in the North Natuna Sea, they do not clearly understand how the tactical picture of the situation and conditions exists.

External
1. There is no good integrity and synergy between the Navy and the top, side and bottom units. Because in the process of making the Risk Register, it requires integrity and the synergy of the relevant stakeholders in order to get the actual Risk Register document and in accordance with the facts in the operating area; and 2. The process of making the Risk Register must be fully formulated so that all parties starting from the elemental and unit commander, Lanal Ranai and the Navy can understand and understand. So that the process of making the Risk Register can run well in order to support marine security operations in Natuna.
The factors that support the implementation of the Risk Register strategy which will then be used as an important component when compiling the Rule of Engagement for the elemental and unit Commander, Lanal Ranai and the Navy are as follows: Internal 1. The desire to meet the needs of documents that specifically contain the risks faced in the operational area and the Rule of Engagement that can really be used when carrying out maritime security operations in the Natuna Sea, as one form of TNI's seriousness Navy in prioritizing personnel and material security when carrying out operations;