LEADER 00000cam 2200721Ii 4500 001 ocn183658196 003 OCoLC 005 20170927053437.7 006 m o d 007 cr cnu---unuuu 008 071213s2007 cauab ob 000 0 eng d 019 83599790|a290607217|a614508337|a646742373|a655088467 |a712978054|a722661686|a855305771|a961621732|a962689177 |a966202827|a988418308|a991993812|a992086757 020 9780833042477|q(electronic bk.) 020 0833042475|q(electronic bk.) 027 RAND/MG-481-DHS 035 (OCoLC)183658196|z(OCoLC)83599790|z(OCoLC)290607217 |z(OCoLC)614508337|z(OCoLC)646742373|z(OCoLC)655088467 |z(OCoLC)712978054|z(OCoLC)722661686|z(OCoLC)855305771 |z(OCoLC)961621732|z(OCoLC)962689177|z(OCoLC)966202827 |z(OCoLC)988418308|z(OCoLC)991993812|z(OCoLC)992086757 037 22573/cttd5r2|bJSTOR 040 N$T|beng|epn|erda|cN$T|dYDXCP|dOCLCA|dOCLCQ|dIDEBK|dOCLCQ |dTUU|dOCLCQ|dMERUC|dCOO|dOCLCO|dADU|dE7B|dDOS|dCLU|dCOCUF |dUBY|dWAU|dOCLCE|dOCLCQ|dOCLCA|dJSTOR|dOCLCF|dZBL|dOCLCQ |dNLGGC|dOCLCO|dOCLCQ|dOCLCO|dUAT|dOCLCO|dOCL|dOCLCQ|dAZK |dLOA|dOCLCO|dJBG|dAGLDB|dTOA|dOCLCO|dCNNOR|dCUS|dMOR |dPIFAG|dPIFBR|dOCLCQ 049 CKEA 050 4 HV6431|b.B737 2007eb 082 04 363.325/72|222 245 00 Breaching the fortress wall :|bunderstanding terrorist efforts to overcome defensive technologies /|cBrian A. Jackson [and others]. 264 1 Santa Monica, CA :|bRAND Homeland Security,|c2007. 300 1 online resource (xxviii, 153 pages) :|billustrations, maps. 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 347 data file|2rda 490 1 Rand Corporation monograph series 500 "Prepared for the Department of Homeland Security." 500 "MG-481-DHS"--Page 4 of cover. 504 Includes bibliographical references (pages 139-153). 505 0 Ch. 1: Introduction -- ch. 2: Palestinian terrorist groups -- ch. 3: Jemaah Islamiyah and affiliated groups -- ch. 4: Liberation Tigers of Tamil Eelam -- ch. 5: Provisional Irish Republican Army -- ch. 6: Conclusions: understanding terrorists' countertechnology efforts -- Appendix -- Bibliography. 520 The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris. 588 0 Print version record. 611 27 War on Terrorism (2001-2009)|2fast|0(OCoLC)fst01754980 648 7 2001-2009|2fast 650 0 War on Terrorism, 2001-2009|xTechnology. 650 0 Security systems. 650 0 Terrorism|xPrevention. 650 0 Terrorism|xPrevention|vCase studies. 650 0 Terrorism|vCase studies. 650 0 National security. 650 7 POLITICAL SCIENCE|xPolitical Freedom & Security |xTerrorism.|2bisacsh 650 7 POLITICAL SCIENCE|xTerrorism.|2bisacsh 650 7 National security.|2fast|0(OCoLC)fst01033711 650 7 Security systems.|2fast|0(OCoLC)fst01110883 650 7 Technology.|2fast|0(OCoLC)fst01145078 650 7 Terrorism.|2fast|0(OCoLC)fst01148101 650 7 Terrorism|xPrevention.|2fast|0(OCoLC)fst01148123 650 7 Terrorismus.|2gnd 650 7 Bekämpfung.|2gnd 650 7 Sicherheitsmaßnahme.|2gnd 655 7 Case studies.|2fast|0(OCoLC)fst01423765 700 1 Jackson, Brian A.,|d1972- 710 1 United States.|bDepartment of Homeland Security. 776 08 |iPrint version:|tBreaching the fortress wall.|dSanta Monica, CA : RAND Homeland Security, 2007|z0833039148 |z9780833039149|w(DLC) 2006001721|w(OCoLC)63125906 830 0 Rand Corporation monograph series. 914 ocn183658196 994 92|bCKE
|