Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies

The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to...

Full description

Main Author: Jackson, Brian A.
Corporate Author: United States Department of Homeland Security
Format: eBook
Language:English
Published: Santa Monica, CA RAND Homeland Security 2007, 2007
Series:Rand Corporation monograph series
Subjects:
Online Access:
Collection: JSTOR Open Access Books - Collection details see MPG.ReNa
Summary:The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris
Item Description:"Prepared for the Department of Homeland Security.". - "MG-481-DHS"--Page 4 of cover
Physical Description:xxviii, 153 pages illustrations, maps
ISBN:9780833039149
0833039148