• Political Science
  • Published 2009

Technology Strategies for Homeland Security Adaptation and Coevolution of Offense and Defense

@inproceedings{Jackson2009TechnologySF,
  title={Technology Strategies for Homeland Security Adaptation and Coevolution of Offense and Defense},
  author={Brian A. Jackson},
  year={2009}
}
Terrorists' technology choices are a key part of their ability to create fear in target populations and audiences. Terrorists' interaction with technologies that perform key functions within modern society - e.g., communications or infrastructures - can also be strategies through which they can produce damage and fear. It is the way the terrorist chooses to apply technologies - to cause death and destruction - that sets him apart from the criminal who may be comparably armed and equipped but… CONTINUE READING

Citations

Publications citing this paper.

Modeling attacker-technology system interaction in transportation networks: P2I3-model

  • 2011 IEEE International Conference on Technologies for Homeland Security (HST)
  • 2011
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

References

Publications referenced by this paper.
SHOWING 1-2 OF 2 REFERENCES

Costs and benefits of prey specialization in a generalist insect predator

See Joel Kniskern, D Mark

    Jackson and David Frelinger , “ Rifling Through the Terrorists ’ Arsenal : Exploring Groups ’ Weapon Choices and Technology Strategies

    D. Edmund
    • The Gun in Politics : An Analysis of Irish Political Conflict , 1916 - 1986