Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from the history of a variety of terrorist conflicts to understand terrorists' counter-technology efforts. Fully exploring adversaries' counter-technology behaviors can help make the best choices to protect from the nation from the threat of terrorism.
Subjects: Political Science
You do not have access to this book on JSTOR. Try logging in through your institution for access.
Log in to your personal account or through your institution.
Table of Contents
Export Selected Citations
Export to NoodleTools
Export to RefWorks
Export to EasyBib
Export a RIS file
(For EndNote, ProCite, Reference Manager, Zotero, Mendeley...)
Export a Text file