2007
DOI: 10.7249/mg481
|View full text |Cite
|
Sign up to set email alerts
|

Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies

Abstract: This product is part of the RAND Corporation monograph series.RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND monographs undergo rigorous peer review to ensure high standards for research quality and objectivity. The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. R AND's publications do not nec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0
1

Year Published

2010
2010
2015
2015

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(24 citation statements)
references
References 29 publications
0
23
0
1
Order By: Relevance
“…Jackson et al 2007) However, continued attempts to target for example major airports such as Heathrow, who since 9/11 have seen a decisive increase in security measures, contradict the prediction that terrorists will seek the weakest link to minimize costs. It appears that they are willing to pay higher prices and take on greater risks for a potentially higher return on a more prestigious target.…”
Section: Protecting Targets Against Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Jackson et al 2007) However, continued attempts to target for example major airports such as Heathrow, who since 9/11 have seen a decisive increase in security measures, contradict the prediction that terrorists will seek the weakest link to minimize costs. It appears that they are willing to pay higher prices and take on greater risks for a potentially higher return on a more prestigious target.…”
Section: Protecting Targets Against Attacksmentioning
confidence: 99%
“…As Jackson et al (2007) show, terrorist groups are capable of adapting to counterterrorism measures, e.g., by using different kinds of weapons or organization. For instance, a tightened airport control may simply result in an increased vulnerability of other parts of the transportation system, making attacks on public buses or trains more likely.…”
Section: Effects Of Counter-terrorism Policiesmentioning
confidence: 99%
“…While Grabosky and Smith (1998) (Jackson et al, 2007) are now increasingly prevalent. Criminals have been found to programme mobile phones to send or receive from specific phone numbers and are known to exploit the easy availability and poor identity checks of mobile phone prepaid SIM (Subscriber Identity Module) cards along with access to cheap handsets.…”
Section: Vulnerabilities Of Tocmentioning
confidence: 99%
“…Criminals have been found to programme mobile phones to send or receive from specific phone numbers and are known to exploit the easy availability and poor identity checks of mobile phone prepaid SIM (Subscriber Identity Module) cards along with access to cheap handsets. This allows them to reduce the risk of detection and interception and limits their links to other criminals ( Jackson et al, 2007;Waters, Ball & Dudgeon, 2008).…”
Section: Vulnerabilities Of Tocmentioning
confidence: 99%
“…Finelli [17] discusses the use of airpower in "herding targets." Jackson et al [28] describe security measures designed to identify terrorists and "funnel them inward, where they can be isolated and engaged in a place and time of advantage to the authorities." In the context of counterdrug operations, Laughton [32] discusses the use of direct or indirect military actions and the way "they 'shape' the battlefield to 'funnel' the enemy for a future decisive engagement."…”
Section: Applicationsmentioning
confidence: 99%