Loading…

Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies

Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how te...

Full description

Saved in:
Bibliographic Details
Published in:Policy File 2007
Main Authors: Cragin, Kim, Chalk, Peter, Daly, Sara A, Jackson, Brian A
Format: Report
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page
container_issue
container_start_page
container_title Policy File
container_volume
creator Cragin, Kim
Chalk, Peter
Daly, Sara A
Jackson, Brian A
description Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an effort to reveal some of their vulnerabilities. The analysis provides the Department of Homeland Security and other national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies.
format report
fullrecord <record><control><sourceid>proquest_AOXKD</sourceid><recordid>TN_cdi_proquest_reports_1820733206</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1820733206</sourcerecordid><originalsourceid>FETCH-proquest_reports_18207332063</originalsourceid><addsrcrecordid>eNqNyrEKwjAQANAsDqL-w-HSSagNqLjWqpMgdi-hvSaBkot3Kfr5FvEDnN7y5ur-cIZ9sJAcwomNpZAJ1IjJHSeYib0kuDCNUcCE7hurd-tMsAjUww1fU2xdoIGsR1mqWW8GwdXPhVqfq7q8biLTc0RJDWMkTtJsD0W-17rId_qv9AHjNTiA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype><pqid>1820733206</pqid></control><display><type>report</type><title>Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies</title><source>Policy File Index</source><creator>Cragin, Kim ; Chalk, Peter ; Daly, Sara A ; Jackson, Brian A</creator><creatorcontrib>Cragin, Kim ; Chalk, Peter ; Daly, Sara A ; Jackson, Brian A</creatorcontrib><description>Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an effort to reveal some of their vulnerabilities. The analysis provides the Department of Homeland Security and other national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies.</description><language>eng</language><publisher>RAND Corporation</publisher><subject>RAND Corporation ; Science/Technology/Public policy ; Terrorism</subject><ispartof>Policy File, 2007</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/1820733206?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>776,780,4476,43724,72839,72844</link.rule.ids><linktorsrc>$$Uhttps://www.proquest.com/docview/1820733206?pq-origsite=primo$$EView_record_in_ProQuest$$FView_record_in_$$GProQuest</linktorsrc></links><search><creatorcontrib>Cragin, Kim</creatorcontrib><creatorcontrib>Chalk, Peter</creatorcontrib><creatorcontrib>Daly, Sara A</creatorcontrib><creatorcontrib>Jackson, Brian A</creatorcontrib><title>Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies</title><title>Policy File</title><description>Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an effort to reveal some of their vulnerabilities. The analysis provides the Department of Homeland Security and other national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies.</description><subject>RAND Corporation</subject><subject>Science/Technology/Public policy</subject><subject>Terrorism</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2007</creationdate><recordtype>report</recordtype><sourceid>ABWIU</sourceid><sourceid>AFVLS</sourceid><sourceid>ALSLI</sourceid><sourceid>AOXKD</sourceid><sourceid>DPSOV</sourceid><recordid>eNqNyrEKwjAQANAsDqL-w-HSSagNqLjWqpMgdi-hvSaBkot3Kfr5FvEDnN7y5ur-cIZ9sJAcwomNpZAJ1IjJHSeYib0kuDCNUcCE7hurd-tMsAjUww1fU2xdoIGsR1mqWW8GwdXPhVqfq7q8biLTc0RJDWMkTtJsD0W-17rId_qv9AHjNTiA</recordid><startdate>20070101</startdate><enddate>20070101</enddate><creator>Cragin, Kim</creator><creator>Chalk, Peter</creator><creator>Daly, Sara A</creator><creator>Jackson, Brian A</creator><general>RAND Corporation</general><scope>ABWIU</scope><scope>AFVLS</scope><scope>ALSLI</scope><scope>AOXKD</scope><scope>DPSOV</scope></search><sort><creationdate>20070101</creationdate><title>Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies</title><author>Cragin, Kim ; Chalk, Peter ; Daly, Sara A ; Jackson, Brian A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_reports_18207332063</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2007</creationdate><topic>RAND Corporation</topic><topic>Science/Technology/Public policy</topic><topic>Terrorism</topic><toplevel>online_resources</toplevel><creatorcontrib>Cragin, Kim</creatorcontrib><creatorcontrib>Chalk, Peter</creatorcontrib><creatorcontrib>Daly, Sara A</creatorcontrib><creatorcontrib>Jackson, Brian A</creatorcontrib><collection>Social Science Premium Collection</collection><collection>Policy File Index</collection><collection>Politics Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Cragin, Kim</au><au>Chalk, Peter</au><au>Daly, Sara A</au><au>Jackson, Brian A</au><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><atitle>Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies</atitle><jtitle>Policy File</jtitle><date>2007-01-01</date><risdate>2007</risdate><abstract>Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an effort to reveal some of their vulnerabilities. The analysis provides the Department of Homeland Security and other national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies.</abstract><pub>RAND Corporation</pub></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof Policy File, 2007
issn
language eng
recordid cdi_proquest_reports_1820733206
source Policy File Index
subjects RAND Corporation
Science/Technology/Public policy
Terrorism
title Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T09%3A15%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_AOXKD&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.atitle=Sharing%20the%20Dragon's%20Teeth:%20Terrorist%20Groups%20and%20the%20Exchange%20of%20New%20Technologies&rft.jtitle=Policy%20File&rft.au=Cragin,%20Kim&rft.date=2007-01-01&rft_id=info:doi/&rft_dat=%3Cproquest_AOXKD%3E1820733206%3C/proquest_AOXKD%3E%3Cgrp_id%3Ecdi_FETCH-proquest_reports_18207332063%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1820733206&rft_id=info:pmid/&rfr_iscdi=true