Coverart for item
The Resource Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies, Brian A. Jackson [and others]

Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies, Brian A. Jackson [and others]

Label
Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies
Title
Breaching the fortress wall
Title remainder
understanding terrorist efforts to overcome defensive technologies
Statement of responsibility
Brian A. Jackson [and others]
Contributor
Subject
Genre
Language
eng
Summary
  • Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from the history of a variety of terrorist conflicts to understand terrorists' counter-technology efforts. Fully exploring adversaries' counter-technology behaviors can help make the best choices to protect from the nation from the threat of terrorism
  • "The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terrorist conflicts to understand terrorists' countertechnology efforts. Depending on the adaptive capabilities of the adversary, a defensive model built on a variety of security measures that can be adjusted and redeployed as their vulnerable points are discovered provides a superior approach to addressing this portion of terrorist behavior. Fully exploring adversaries' countertechnology behaviors can expose vulnerabilities in U.S. defenses and help the nation make the best choices to protect it from the threat of terrorism."--BOOK JACKET
Cataloging source
YUS
Dewey number
363.325/72
Illustrations
  • illustrations
  • maps
Index
no index present
LC call number
HV6431
LC item number
.B737 2007
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1972-
http://library.link/vocab/relatedWorkOrContributorName
  • Jackson, Brian A.
  • Rand Corporation
http://library.link/vocab/subjectName
  • War on Terrorism, 2001-2009
  • Security systems
  • Terrorism
  • Terrorism
  • Terrorism
  • National security
  • POLITICAL SCIENCE
  • POLITICAL SCIENCE
  • Terrorismus
  • Bekämpfung
  • Sicherheitsmaßnahme
Label
Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies, Brian A. Jackson [and others]
Instantiates
Publication
Note
  • "MG-481."
  • "Prepared for the Department of Homeland Security"
Bibliography note
Includes bibliographical references
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Introduction -- Palestinian terrorist groups -- Jemaah Islamiyah and affiliated groups -- Liberation Tigers of Tamil Eelam -- Provisional Irish Republican Army -- Conclusions : understanding terrorists' countertechnology efforts -- Appendix. Prominent acts of LTTE suicide terrorism, 1987-2002
Control code
63125906
Dimensions
23 cm
Extent
xxviii, 153 pages
Isbn
9780833039149
Isbn Type
(pbk. : alk. paper)
Lccn
2006001721
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations, maps
System control number
(OCoLC)123126646
Label
Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies, Brian A. Jackson [and others]
Publication
Note
  • "MG-481."
  • "Prepared for the Department of Homeland Security"
Bibliography note
Includes bibliographical references
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Introduction -- Palestinian terrorist groups -- Jemaah Islamiyah and affiliated groups -- Liberation Tigers of Tamil Eelam -- Provisional Irish Republican Army -- Conclusions : understanding terrorists' countertechnology efforts -- Appendix. Prominent acts of LTTE suicide terrorism, 1987-2002
Control code
63125906
Dimensions
23 cm
Extent
xxviii, 153 pages
Isbn
9780833039149
Isbn Type
(pbk. : alk. paper)
Lccn
2006001721
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations, maps
System control number
(OCoLC)123126646

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
Processing Feedback ...