Full Description
Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from the history of a variety of terrorist conflicts to understand terrorists' counter-technology efforts. Fully exploring adversaries' counter-technology behaviors can help make the best choices to protect the nation from the threat of terrorism.
Contents
Summary; Introduction; Palestinian Terrorist Groups; Jemaah Islamiyah and Affiliated Groups; Liberation Tigers of Tamil Eelam; Provisional Irish Republican Army; Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography.



