Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies
RAND Corporation, 2007 - Political Science - 153 pages
The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terrorist conflicts to understand terrorists' countertechnology efforts. Depending on the adaptive capabilities of the adversary, a defensive model built on a variety of security measures that can be adjusted and redeployed as their vulnerable points are discovered provides a superior approach to addressing this portion of terrorist behavior. Fully exploring adversaries' countertechnology behaviors can expose vulnerabilities in U.S. defenses and help the nation make the best choices to protect it from the threat of terrorism.
What people are saying - Write a review
We haven't found any reviews in the usual places.
About This Monograph
14 other sections not shown
al-Aqsa Intifada al-Aqsa Martyrs Brigade approaches areas assassinations avoid Barzilay behavior Bomb disposal bombs capabilities CCTV cell phone checkpoints circumvent counter counterstrategies countertechnology efforts Countertechnology Responses countertechnology strategies defeat defensive technologies designed detection detonation Dillon effectiveness England May 2005 example former security forces Gaza Strip Geraghty Government Countermeasures Hamas hardening homeland security individuals Indonesia interview with former interview with Sri interviews with law Ireland May 2005 Israel Jemaah Islamiyah Lanka May 2004 Lankan intelligence official law enforcement officers LTTE McGartland military Mitigation of Government monitoring nologies Northern Ireland Palestinian militants Personal interview Philippines PIRA PIRA's police protect Qassam rockets reportedly Ryder security forces member security measures Singapore specific Sri Lankan intelligence suicide bombers tactics Tamil target hardening teams tech techniques Technologies Deployed terrorist activities terrorist attacks terrorist countertechnology terrorist groups terrorist organizations Thailand April 2005 threat Tigers tion Urban vehicles WBGS weapons West Bank