Breaching the fortress wall: understanding terrorist efforts to overcome defensive technologies
Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from the history of a variety of terrorist conflicts to understand terrorists' counter-technology efforts. Fully exploring adversaries' counter-technology behaviors can help make the best choices to protect from the nation from the threat of terrorism.
What people are saying - Write a review
We haven't found any reviews in the usual places.
About This Monograph
14 other sections not shown
al-Aqsa Intifada al-Aqsa Martyrs Brigade approaches areas assassinations avoid Barzilay behavior Bomb disposal bombs capabilities CCTV cell phone checkpoints circumvent counter counterstrategies countertechnology efforts Countertechnology Responses countertechnology strategies defeat defensive technologies designed detection detonation Dillon effectiveness England May 2005 example former security forces Gaza Strip Geraghty Government Countermeasures Hamas hardening homeland security individuals Indonesia interview with former interview with Sri interviews with law Ireland May 2005 Israel Jemaah Islamiyah Lanka May 2004 Lankan intelligence official law enforcement officers LTTE McGartland military Mitigation of Government monitoring nologies Northern Ireland Palestinian militants Personal interview Philippines PIRA PIRA's police protect Qassam rockets reportedly Ryder security forces member security measures Singapore specific Sri Lankan intelligence suicide bombers tactics Tamil target hardening teams tech techniques Technologies Deployed terrorist activities terrorist attacks terrorist countertechnology terrorist groups terrorist organizations Thailand April 2005 threat Tigers tion Urban vehicles WBGS weapons West Bank