Previous Chapter: 1 INTRODUCTION
Suggested Citation: "2 FINDING THE WEAK LINKS (WORKSHOP 1)." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
Page 16
Suggested Citation: "2 FINDING THE WEAK LINKS (WORKSHOP 1)." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
Page 17
Suggested Citation: "2 FINDING THE WEAK LINKS (WORKSHOP 1)." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
Page 18
Suggested Citation: "2 FINDING THE WEAK LINKS (WORKSHOP 1)." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
Page 19
Suggested Citation: "2 FINDING THE WEAK LINKS (WORKSHOP 1)." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
Page 20
Suggested Citation: "2 FINDING THE WEAK LINKS (WORKSHOP 1)." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
Page 21
Suggested Citation: "2 FINDING THE WEAK LINKS (WORKSHOP 1)." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
Page 22
Suggested Citation: "2 FINDING THE WEAK LINKS (WORKSHOP 1)." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
Page 23
Suggested Citation: "2 FINDING THE WEAK LINKS (WORKSHOP 1)." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
Page 24
Suggested Citation: "2 FINDING THE WEAK LINKS (WORKSHOP 1)." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
Page 25
Suggested Citation: "2 FINDING THE WEAK LINKS (WORKSHOP 1)." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
Page 26
Suggested Citation: "2 FINDING THE WEAK LINKS (WORKSHOP 1)." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
Page 27
Suggested Citation: "2 FINDING THE WEAK LINKS (WORKSHOP 1)." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
Page 28
Suggested Citation: "2 FINDING THE WEAK LINKS (WORKSHOP 1)." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
Page 29
Next Chapter: 3 PREDICTING IMPROVISED EXPLOSIVE DEVICE ACTIVITIES (WORKSHOP 2)
Subscribe to Email from the National Academies
Keep up with all of the activities, publications, and events by subscribing to free updates by email.