Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies

The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to...

Descripción completa

Detalles Bibliográficos
Autor Corporativo: United States. Dept. of Homeland Security (-)
Otros Autores: Jackson, Brian A., 1972- (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Santa Monica, CA : Rand 2007.
Edición:1st ed
Colección:Rand Corporation monograph series.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009423742306719
Tabla de Contenidos:
  • Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Defensive Technologies and the Effort to CombatTerrorism; Terrorist Efforts to Overcome Defensive Technologies; About the Study; About This Monograph; Chapter Two - Palestinian Terrorist Groups; Introduction; Information Acquisition and Management; Preventive Action; Denial; Response; Conclusion; Chapter Three - Jemaah Islamiyah and Affiliated Groups; Introduction; Information Acquisition and Management; Preventive Action; Denial; Investigation; Conclusion
  • Chapter Four - Liberation Tigers of Tamil EelamIntroduction; Information Acquisition and Management; Denial; Conclusion; Chapter Five - Provisional Irish Republican Army; Introduction; Information Acquisition and Management; Preventive Action; Denial; Response; Investigation; Conclusion; Chapter Six - Conclusions: Understanding Terrorists' Countertechnology Efforts; Terrorist Strategies for Countering DefensiveTechnologies; Transferability of Terrorist Countertechnology Strategies; Implications of Terrorist Countertechnology Activities forHomeland Security Efforts
  • In Conclusion:The Role of Technology in Combating TerrorismAppendix - Prominent Acts of LTTE Suicide Terrorism, 1987-2002; Bibliography