Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

Breaching the fortress wall [electronic resource] : understanding terrorist efforts to overcome defensive technologies / Brian A. Jackson ... [et al.].

Contributor(s): Jackson, Brian A, 1972- | United States. Department of Homeland Security.
Material type: TextTextSeries: Rand Corporation monograph series: Publisher: Santa Monica, CA : RAND Homeland Security, 2007Description: 1 online resource (xxviii, 153 p.) : ill., maps.ISBN: 9780833042477 (electronic bk.); 0833042475 (electronic bk.); 9780833039149 (pbk. : alk. paper); 0833039148 (pbk. : alk. paper).Subject(s): War on Terrorism, 2001-2009 -- Technology | Security systems | Terrorism -- Prevention | Terrorism -- Prevention -- Case studies | Terrorism -- Case studies | National security | POLITICAL SCIENCE -- Political Freedom & Security -- Terrorism | Terrorismus | Bek�ampfung | Sicherheitsma�nahmeGenre/Form: Electronic books.Additional physical formats: Print version:: Breaching the fortress wall.DDC classification: 363.325/72 Online resources: EBSCOhost
Contents:
Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Palestinian Terrorist Groups; Chapter Three -- Jemaah Islamiyah and Affiliated Groups; Chapter Four -- Liberation Tigers of Tamil Eelam; Chapter Five -- Provisional Irish Republican Army; Chapter Six -- Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography;
Summary: The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

"Prepared for the Department of Homeland Security."

"MG-481-DHS"--P. [4] of cover.

Includes bibliographical references (p. 139-153).

Description based on print version record.

Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Palestinian Terrorist Groups; Chapter Three -- Jemaah Islamiyah and Affiliated Groups; Chapter Four -- Liberation Tigers of Tamil Eelam; Chapter Five -- Provisional Irish Republican Army; Chapter Six -- Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography;

The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris.

Mode of access: World Wide Web.

There are no comments for this item.

Log in to your account to post a comment.

Other editions of this work

Breaching the fortress wall ©2007
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter