Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies
Technical countermeasures are key components of national efforts to combat terrorist violence. Efforts to collect data about and disrupt terrorist activities through human intelligence and direct action, information gathering, and protective technologies complement technical countermeasures, helping to ensure that terrorists are identified, their ability to plan and stage attacks is limited, and, if those attacks occur, their impact is contained. Given the potential effect of such measures on the terrorists' capabilities, it is not surprising that they act to reduce or neutralize the impact of defensive technologies on their activities. In the event that the terrorists counter-efforts are successful, the value and protection provided by defensive technologies can be substantially reduced. Through case studies of terrorist struggles in a number of nations, this document analyzes the nature and impact of such terrorist counter-efforts on the value of defensive technologies deployed against them. The information presented here should be of interest to homeland security policy makers in that it identifies potential weaknesses in defensive technology systems, thereby informing threat assessment and providing a basis for improving the design of future defensive technologies. It extends the RAND Corporation's ongoing research on terrorism and domestic security issues.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Chapter One Introduction
Chapter Two Palestinian Terrorist Groups
Chapter Three Jemaah Islamiyah and Affiliated Groups
Chapter Four Liberation Tigers of Tamil Eelam
Chapter Five Provisional Irish Republican Army
Other editions - View all
al-Aqsa Intifada al-Aqsa Martyrs Brigade areas assassinations avoid Barzilay behavior bombs capabilities CCTV cell phone checkpoints circumvent counter counterstrategies countertechnology efforts Countertechnology Responses countertechnology strategies defeat defensive technologies designed detection detonation devices Eelam effectiveness England May 2005 example explosives forensic former security forces Gaza Strip Geraghty Hamas hardening homeland security individuals Indonesia Intended Mitigation interview with former interview with law interview with Sri Ireland May 2005 Israel Jemaah Islamiyah JI’s Lanka May 2004 Lankan intelligence official limit LTTE McGartland military Mitigation of Government monitoring nologies Northern Ireland Palestinian Islamic Jihad Palestinian militants Personal interview Philippines PIRA PIRA’s police protect Qassam rockets reportedly rorist Ryder security measures Singapore specific Sri Lankan intelligence suicide bombers tactics Tamil teams tech Technologies Deployed terrorist activities Terrorist Attacks terrorist countertechnology terrorist efforts terrorist groups terrorist organizations Thailand Thailand April 2005 threat Tigers tion vehicles WBGS weapons West Bank