00926nam a2200277 i 450099100305150970753620020509111311.0980220s1987 de ||| | ger 3406322786b11101283-39ule_instPARLA174141ExLDip.to Filosofiaita192Krohn, Wolfgang48381Francis Bacon /Wolfgang KrohnMünchen :C.H. Beck,c1987204 p. :ill. ;18 cm.Grosse DenkerBeck'sche schwarze Reihe ;Bd. 509Bacon, Francis<1561-1626>.b1110128323-02-1728-06-02991003051509707536LE005 192 BAC01. KRO01. 0112005000008962le005-E0.00-l- 00000.i1123563928-06-02Francis Bacon857451UNISALENTOle00501-01-98ma -gerde 0104298nam 2200793Ia 450 991021998730332120200520144314.01-281-18090-497866111809040-8330-4247-5(CKB)1000000000481424(EBL)322533(OCoLC)476119907(SSID)ssj0000114469(PQKBManifestationID)11129086(PQKBTitleCode)TC0000114469(PQKBWorkID)10102660(PQKB)11447479(Au-PeEL)EBL322533(CaPaEBR)ebr10225503(Au-PeEL)EBL4969985(CaONFJC)MIL118090(OCoLC)1027164100(MiAaPQ)EBC322533(MiAaPQ)EBC4969985(oapen)doab114651(EXLCZ)99100000000048142420060118d2007 uy 0engur|n|---|||||txtccrBreaching the fortress wall understanding terrorist efforts to overcome defensive technologies /Brian A. Jackson ... [et al.] ; prepared for the Department of Homeland Security1st ed.Santa Monica, CA Rand20071 online resource (183 p.)Rand Corporation monograph series"Prepared for the Department of Homeland Security.""MG-481-DHS".0-8330-3914-8 Includes bibliographical references.Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Defensive Technologies and the Effort to CombatTerrorism; Terrorist Efforts to Overcome Defensive Technologies; About the Study; About This Monograph; Chapter Two - Palestinian Terrorist Groups; Introduction; Information Acquisition and Management; Preventive Action; Denial; Response; Conclusion; Chapter Three - Jemaah Islamiyah and Affiliated Groups; Introduction; Information Acquisition and Management; Preventive Action; Denial; Investigation; ConclusionChapter Four - Liberation Tigers of Tamil EelamIntroduction; Information Acquisition and Management; Denial; Conclusion; Chapter Five - Provisional Irish Republican Army; Introduction; Information Acquisition and Management; Preventive Action; Denial; Response; Investigation; Conclusion; Chapter Six - Conclusions: Understanding Terrorists' Countertechnology Efforts; Terrorist Strategies for Countering DefensiveTechnologies; Transferability of Terrorist Countertechnology Strategies; Implications of Terrorist Countertechnology Activities forHomeland Security EffortsIn Conclusion:The Role of Technology in Combating TerrorismAppendix - Prominent Acts of LTTE Suicide Terrorism, 1987-2002; BibliographyThe level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terrorisRand Corporation monograph series.War on Terrorism, 2001-2009TechnologyTerrorismPreventionCase studiesSecurity systemsTerrorismPreventionTerrorismCase studiesNational securityWar on Terrorism, 2001-2009Technology.TerrorismPreventionSecurity systems.TerrorismPrevention.TerrorismNational security.363.32572Jackson Brian A.1972-846031United States.Dept. of Homeland Security.MiAaPQMiAaPQMiAaPQBOOK9910219987303321Breaching the fortress wall1889936UNINA