Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from the history of a variety of terrorist conflicts to understand terrorists' counter-technology efforts. Fully exploring adversaries' counter-technology behaviors can help make the best choices to protect from the nation from the threat of terrorism.Understanding Terrorist Efforts to Overcome Defensive Technologies Brian A. Jackson, Peter Chalk, Kim Cragin, Bruce ... Instructions to carry out such countertechnology strategies could be readily captured in written form and transferredanbsp;...
|Title||:||Breaching the Fortress Wall|
|Author||:||Brian A. Jackson, Peter Chalk, Kim Cragin, Bruce Newsome, John V. Parachini, R. Kim Cragin|
|Publisher||:||Rand Corporation - 2007-03-09|