Stealing the sword limiting terrorist use of advanced conventional weapons

Part of a series examining the technology competition between security organizations and terrorist organizations, this report focuses on understanding how terrorist groups make technology choices and consequently how the United States can discourage their adoption of advanced conventional weapons. F...

Full description

Bibliographic Details
Main Author: Bonomo, James
Format: eBook
Language:English
Published: Santa Monica, CA RAND Corp. 2007, 2007
Subjects:
Online Access:
Collection: JSTOR Open Access Books - Collection details see MPG.ReNa
LEADER 02955nam a2200445 u 4500
001 EB001842328
003 EBX01000000000000001006317
005 00000000000000.0
007 tu|||||||||||||||||||||
008 180730 r ||| eng
020 |a 9781281181268 
020 |z 0833039652 
020 |a 0833039652 
020 |a 1281181269 
020 |a 6611181261 
020 |a 9786611181260 
020 |z 9780833039651 
020 |a 9780833039651 
050 4 |a UF500 
100 1 |a Bonomo, James 
245 0 0 |a Stealing the sword  |h Elektronische Ressource  |b limiting terrorist use of advanced conventional weapons  |c James Bonomo [and others] 
260 |a Santa Monica, CA  |b RAND Corp.  |c 2007, 2007 
300 |a xxvii, 126 pages  |b illustrations 
505 0 |a Includes bibliographical references (pages 117-126) 
505 0 |a Ch. 1: Introduction -- ch. 2: What types of advanced military weapons could become available to terrorists? -- ch. 3: What advanced conventional weapons are potentially most useful and attractive to terrorists? -- ch. 4: What opportunities exist for controlling weapons of particular concern? -- ch. 5: How might use controls deter terrorist organizations? -- ch. 6: Observations and implications 
651 4 |a United States / fast 
653 |a Arms control 
653 |a POLITICAL SCIENCE / Security (National & International) 
653 |a Terrorism / Prevention 
653 |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism 
653 |a Weapons systems 
041 0 7 |a eng  |2 ISO 639-2 
989 |b ZDB-39-JOA  |a JSTOR Open Access Books 
500 |a "MG-510"--Page 4 of cover 
773 0 |t Books at JSTOR: Open Access 
776 |z 0833042874 
776 |z 9780833042873 
856 4 0 |u https://www.jstor.org/stable/10.7249/mg510dhs  |x Verlag  |3 Volltext 
082 0 |a 363.325/16 
520 |a Part of a series examining the technology competition between security organizations and terrorist organizations, this report focuses on understanding how terrorist groups make technology choices and consequently how the United States can discourage their adoption of advanced conventional weapons. Five types of advanced conventional weapons are identified that could provide terrorists with a new and qualitatively different weapon capability: sniper rifles, squad-level weapons, antitank missiles, large limpet mines, and mortar systems. Two key methods of limiting the threat from these systems in the hands of terrorists are explored: raising awareness of the threat, and reducing the threat through procedural and technical use controls. The U.S. Department of Homeland Security (DHS) can play a key role in both these steps by pushing to begin diplomatic discussions and by conducting a detailed study, perhaps with the National Security Agency, of the technical architecture for use controls. Additionally, DHS should become a permanent member of the interagency panels considering arms exports