Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies

The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to...

Full description

Bibliographic Details
Corporate Author: United States. Dept. of Homeland Security (-)
Other Authors: Jackson, Brian A., 1972- (-)
Format: eBook
Language:Inglés
Published: Santa Monica, CA : Rand 2007.
Edition:1st ed
Series:Rand Corporation monograph series.
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009423742306719
Description
Summary:The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris
Item Description:"Prepared for the Department of Homeland Security."
"MG-481-DHS".
Physical Description:1 online resource (183 p.)
Bibliography:Includes bibliographical references.
ISBN:9781281180902
9786611180904
9780833042477
Access:Open access