Cover image for Breaching the Fortress Wall : Understanding Terrorist Efforts to Overcome Defensive Technologies.
Breaching the Fortress Wall : Understanding Terrorist Efforts to Overcome Defensive Technologies.
Title:
Breaching the Fortress Wall : Understanding Terrorist Efforts to Overcome Defensive Technologies.
Author:
Jackson, Brian A.
ISBN:
9780833042477
Personal Author:
Physical Description:
1 online resource (183 pages)
Contents:
Cover -- Preface -- Contents -- Figures -- Tables -- Summary -- Acknowledgments -- Abbreviations -- Chapter One - Introduction -- Defensive Technologies and the Effort to CombatTerrorism -- Terrorist Efforts to Overcome Defensive Technologies -- About the Study -- About This Monograph -- Chapter Two - Palestinian Terrorist Groups -- Introduction -- Information Acquisition and Management -- Preventive Action -- Denial -- Response -- Conclusion -- Chapter Three - Jemaah Islamiyah and Affiliated Groups -- Introduction -- Information Acquisition and Management -- Preventive Action -- Denial -- Investigation -- Conclusion -- Chapter Four - Liberation Tigers of Tamil Eelam -- Introduction -- Information Acquisition and Management -- Denial -- Conclusion -- Chapter Five - Provisional Irish Republican Army -- Introduction -- Information Acquisition and Management -- Preventive Action -- Denial -- Response -- Investigation -- Conclusion -- Chapter Six - Conclusions: Understanding Terrorists' Countertechnology Efforts -- Terrorist Strategies for Countering DefensiveTechnologies -- Transferability of Terrorist Countertechnology Strategies -- Implications of Terrorist Countertechnology Activities forHomeland Security Efforts -- In Conclusion:The Role of Technology in Combating Terrorism -- Appendix - Prominent Acts of LTTE Suicide Terrorism, 1987-2002 -- Bibliography.
Abstract:
The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terrorist conflicts to understand terrorists' counter-technology efforts. Depending on the adaptive capabilities of the adversary, a defensive model built of a variety of security measures that can be adjusted and redeployed as their vulnerable points are discovered provides a superior approach to addressing this portion of terrorist behavior. Fully exploring adversaries' counter-technology behaviors can expose vulnerabilities in U.S. defenses and help the nation make the best choices to protect it from the threat of terrorism.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: