Vai al contenuto principale della pagina

Breaching the fortress wall [[electronic resource] ] : understanding terrorist efforts to overcome defensive technologies / / Brian A. Jackson ... [et al.] ; prepared for the Department of Homeland Security



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Breaching the fortress wall [[electronic resource] ] : understanding terrorist efforts to overcome defensive technologies / / Brian A. Jackson ... [et al.] ; prepared for the Department of Homeland Security Visualizza cluster
Pubblicazione: Santa Monica, CA, : Rand, 2007
Descrizione fisica: 1 online resource (183 p.)
Disciplina: 363.32572
Soggetto topico: War on Terrorism, 2001-2009 - Technology
Terrorism - Prevention
Security systems
Terrorism
National security
Altri autori: JacksonBrian A. <1972->  
Note generali: "Prepared for the Department of Homeland Security."
"MG-481-DHS".
Nota di bibliografia: Includes bibliographical references.
Nota di contenuto: Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Defensive Technologies and the Effort to CombatTerrorism; Terrorist Efforts to Overcome Defensive Technologies; About the Study; About This Monograph; Chapter Two - Palestinian Terrorist Groups; Introduction; Information Acquisition and Management; Preventive Action; Denial; Response; Conclusion; Chapter Three - Jemaah Islamiyah and Affiliated Groups; Introduction; Information Acquisition and Management; Preventive Action; Denial; Investigation; Conclusion
Chapter Four - Liberation Tigers of Tamil EelamIntroduction; Information Acquisition and Management; Denial; Conclusion; Chapter Five - Provisional Irish Republican Army; Introduction; Information Acquisition and Management; Preventive Action; Denial; Response; Investigation; Conclusion; Chapter Six - Conclusions: Understanding Terrorists' Countertechnology Efforts; Terrorist Strategies for Countering DefensiveTechnologies; Transferability of Terrorist Countertechnology Strategies; Implications of Terrorist Countertechnology Activities forHomeland Security Efforts
In Conclusion:The Role of Technology in Combating TerrorismAppendix - Prominent Acts of LTTE Suicide Terrorism, 1987-2002; Bibliography
Sommario/riassunto: The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris
Titolo autorizzato: Breaching the fortress wall  Visualizza cluster
ISBN: 1-281-18090-4
9786611180904
0-8330-4247-5
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910219987303321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Rand Corporation monograph series.