Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies
The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to...
Autor Corporativo: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Santa Monica, CA :
RAND Homeland Security
2007.
|
Colección: | JSTOR Open Access monographs.
RAND Corporation monograph series. |
Acceso en línea: | Conectar con la versión electrónica |
Ver en Universidad de Navarra: | https://innopac.unav.es/record=b3755864x*spi |
Sumario: | The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris. |
---|---|
Notas: | "Prepared for the Department of Homeland Security." "MG-481-DHS"--Page 4 of cover. |
Descripción Física: | 1 recurso electrónico (xxviii, 153 p.) : il., mapas |
Formato: | Forma de acceso: World Wide Web. |
Bibliografía: | Incluye referencias bibliográficas (p. 139-153). |
ISBN: | 9780833042477 |