<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd" xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>00000cab a22000003a 4500</leader>
  <controlfield tag="001">UP-99796217609885305</controlfield>
  <controlfield tag="003">Buklod</controlfield>
  <controlfield tag="005">20231007235759.0</controlfield>
  <controlfield tag="006">m    |o  d |      </controlfield>
  <controlfield tag="007">ta</controlfield>
  <controlfield tag="008">110610s        xx     d | ||r |||||   ||</controlfield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">DENGII</subfield>
  </datafield>
  <datafield tag="041" ind1=" " ind2=" ">
   <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="100" ind1="0" ind2=" ">
   <subfield code="a">Zorpette, G.</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="2">
   <subfield code="a">A new world of terror.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">pp. 24-25</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">At first glance, at least, it seems the array of counter terrorism technologies under development in the United States and elsewhere would have been useless to prevent the 11 September attacks. Neither airport detectors that can sense plastic weapons and explosives nor state-of-the-art sensors that could ferret out the chemicals, biological agents, or nuclear materials of mass destruction would have revealed the presence of murderous fanatics armed with box-cutters. And if the deed was the work of terrorist networks that operated with minimal electronic communications among cells, there would have been little opportunity for technical methods, such as signals intelligence, to unmask the plot. After years in which technology appeared likely to make serious inroads into international terrorism, a new reality has dawned, one in which the enemy has proved far more sophisticated, determined, adaptable, and resourceful than was previously imagined. Nevertheless, that revelation does not suggest it is time to abandon or even curtail work on technical aspects of counterterrorism, some analysts say. Rather, it is time to review technical methods and intelligence as part of what must necessarily become a far larger tool box. Following the attack, it has been suggested that the emergency planners and city officials need a new strategy now that the enemy ?has our playbook?. Part of the terrorists' playbook is to inflict as much damage as possible, including maximum carnage among rescue teams. The new strategy should be to think like the terrorists</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
   <subfield code="a">United States.</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
   <subfield code="a">City officials.</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
   <subfield code="a">Counter terrorism technologies.</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
   <subfield code="a">Emergency planners.</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
   <subfield code="a">International terrorism.</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
   <subfield code="a">Signals intelligence.</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
   <subfield code="a">Technical methods.</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
   <subfield code="a">Terrorist attacks.</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
   <subfield code="a">Terrorist networks.</subfield>
  </datafield>
  <datafield tag="773" ind1="0" ind2=" ">
   <subfield code="t">IEEE spectrum</subfield>
   <subfield code="g">38, 10(duplicate) (2001).</subfield>
  </datafield>
  <datafield tag="905" ind1=" " ind2=" ">
   <subfield code="a">FO</subfield>
  </datafield>
  <datafield tag="852" ind1=" " ind2=" ">
   <subfield code="a">UPD</subfield>
   <subfield code="b">DENG-II</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
   <subfield code="a">Article</subfield>
  </datafield>
 </record>
</collection>
