Threats to national defense can be military or non-military. The greatest unresolved threat and challenge facing the Indonesian state is terrorism. The Indonesian government has dealt with terrorism, but catching terrorists remains difficult. The purpose of this research is to provide an alternative that uses Geospatial Intelligence (GEOINT) to find out where terrorists are hiding. The limitation of this research is the mountainous region in Central Sulawesi Province. The method used in this study is to use the GEOINT approach which is a combination of remote sensing, geographic information systems (GIS) and cartography, to extract information and analyze the results. The analysis was performed using a weighted linear combination method. Th...
Abstract The development success promoted by an area depends on the size of the obstacles of crime....
Drug abuse is a problem that affects almost every country in the world including Indonesia. In the l...
According to Law no. 3 of 2002, its implementation is divided into three components, namely: main co...
Terrorism is one of the Indonesia’s national security threat. The attack mostly happens in Java Isla...
In recent years, various types of terrorist attacks have occurred which have caused worldwide catast...
Terrorism has wreaked havoc on today’s society and people. The discovery of the regularity of ...
Abstract: The city of Baghdad (capital of Iraq) has witnessed at the last nine years a lot of the te...
The contemporary world has been moving to a new direction where anti-terrorist strategies are adopte...
The contemporary world has been moving to a new direction where anti-terrorist strategies are adopte...
In Colombo and its suburbs, the risks of terrorist attacks are increasing day by day. The risk of ci...
The idea of this study is to test if it is possible to use a modified Multi Critera Analysis (MCA) t...
This study predicts the presence or absence of terrorism in Europe on a previously unexplored spatia...
Terrorism Activity is the subject of the talks in various countries, especially in Indonesia. Theact...
The wave of insecurity, terrorism, kidnapping, killing, and shooting of innocent citizens, as well a...
This is a study that concentrates on methodologies on collecting and analysis of intelligence inform...
Abstract The development success promoted by an area depends on the size of the obstacles of crime....
Drug abuse is a problem that affects almost every country in the world including Indonesia. In the l...
According to Law no. 3 of 2002, its implementation is divided into three components, namely: main co...
Terrorism is one of the Indonesia’s national security threat. The attack mostly happens in Java Isla...
In recent years, various types of terrorist attacks have occurred which have caused worldwide catast...
Terrorism has wreaked havoc on today’s society and people. The discovery of the regularity of ...
Abstract: The city of Baghdad (capital of Iraq) has witnessed at the last nine years a lot of the te...
The contemporary world has been moving to a new direction where anti-terrorist strategies are adopte...
The contemporary world has been moving to a new direction where anti-terrorist strategies are adopte...
In Colombo and its suburbs, the risks of terrorist attacks are increasing day by day. The risk of ci...
The idea of this study is to test if it is possible to use a modified Multi Critera Analysis (MCA) t...
This study predicts the presence or absence of terrorism in Europe on a previously unexplored spatia...
Terrorism Activity is the subject of the talks in various countries, especially in Indonesia. Theact...
The wave of insecurity, terrorism, kidnapping, killing, and shooting of innocent citizens, as well a...
This is a study that concentrates on methodologies on collecting and analysis of intelligence inform...
Abstract The development success promoted by an area depends on the size of the obstacles of crime....
Drug abuse is a problem that affects almost every country in the world including Indonesia. In the l...
According to Law no. 3 of 2002, its implementation is divided into three components, namely: main co...