"Prepared for the Department of Homeland Security."
"MG-481-DHS"--Page 4 of cover.
Includes bibliographical references (pages 139-153).
Ch. 1: Introduction -- ch. 2: Palestinian terrorist groups -- ch. 3: Jemaah Islamiyah and affiliated groups -- ch. 4: Liberation Tigers of Tamil Eelam -- ch. 5: Provisional Irish Republican Army -- ch. 6: Conclusions: understanding terrorists' countertechnology efforts -- Appendix -- Bibliography.
The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris.
Text this item to your phone! Text message will contain the location, call number, and title of the item on this page. Texting may not work for items with multiple volumes. WARNING: Texting fees may apply. close