Loading…
Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies
Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how te...
Saved in:
Published in: | Policy File 2007 |
---|---|
Main Authors: | , , , |
Format: | Report |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | |
container_start_page | |
container_title | Policy File |
container_volume | |
creator | Cragin, Kim Chalk, Peter Daly, Sara A Jackson, Brian A |
description | Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an effort to reveal some of their vulnerabilities. The analysis provides the Department of Homeland Security and other national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies. |
format | report |
fullrecord | <record><control><sourceid>proquest_AOXKD</sourceid><recordid>TN_cdi_proquest_reports_1820733206</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1820733206</sourcerecordid><originalsourceid>FETCH-proquest_reports_18207332063</originalsourceid><addsrcrecordid>eNqNyrEKwjAQANAsDqL-w-HSSagNqLjWqpMgdi-hvSaBkot3Kfr5FvEDnN7y5ur-cIZ9sJAcwomNpZAJ1IjJHSeYib0kuDCNUcCE7hurd-tMsAjUww1fU2xdoIGsR1mqWW8GwdXPhVqfq7q8biLTc0RJDWMkTtJsD0W-17rId_qv9AHjNTiA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype><pqid>1820733206</pqid></control><display><type>report</type><title>Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies</title><source>Policy File Index</source><creator>Cragin, Kim ; Chalk, Peter ; Daly, Sara A ; Jackson, Brian A</creator><creatorcontrib>Cragin, Kim ; Chalk, Peter ; Daly, Sara A ; Jackson, Brian A</creatorcontrib><description>Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an effort to reveal some of their vulnerabilities. The analysis provides the Department of Homeland Security and other national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies.</description><language>eng</language><publisher>RAND Corporation</publisher><subject>RAND Corporation ; Science/Technology/Public policy ; Terrorism</subject><ispartof>Policy File, 2007</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/1820733206?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>776,780,4476,43724,72839,72844</link.rule.ids><linktorsrc>$$Uhttps://www.proquest.com/docview/1820733206?pq-origsite=primo$$EView_record_in_ProQuest$$FView_record_in_$$GProQuest</linktorsrc></links><search><creatorcontrib>Cragin, Kim</creatorcontrib><creatorcontrib>Chalk, Peter</creatorcontrib><creatorcontrib>Daly, Sara A</creatorcontrib><creatorcontrib>Jackson, Brian A</creatorcontrib><title>Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies</title><title>Policy File</title><description>Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an effort to reveal some of their vulnerabilities. The analysis provides the Department of Homeland Security and other national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies.</description><subject>RAND Corporation</subject><subject>Science/Technology/Public policy</subject><subject>Terrorism</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2007</creationdate><recordtype>report</recordtype><sourceid>ABWIU</sourceid><sourceid>AFVLS</sourceid><sourceid>ALSLI</sourceid><sourceid>AOXKD</sourceid><sourceid>DPSOV</sourceid><recordid>eNqNyrEKwjAQANAsDqL-w-HSSagNqLjWqpMgdi-hvSaBkot3Kfr5FvEDnN7y5ur-cIZ9sJAcwomNpZAJ1IjJHSeYib0kuDCNUcCE7hurd-tMsAjUww1fU2xdoIGsR1mqWW8GwdXPhVqfq7q8biLTc0RJDWMkTtJsD0W-17rId_qv9AHjNTiA</recordid><startdate>20070101</startdate><enddate>20070101</enddate><creator>Cragin, Kim</creator><creator>Chalk, Peter</creator><creator>Daly, Sara A</creator><creator>Jackson, Brian A</creator><general>RAND Corporation</general><scope>ABWIU</scope><scope>AFVLS</scope><scope>ALSLI</scope><scope>AOXKD</scope><scope>DPSOV</scope></search><sort><creationdate>20070101</creationdate><title>Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies</title><author>Cragin, Kim ; Chalk, Peter ; Daly, Sara A ; Jackson, Brian A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_reports_18207332063</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2007</creationdate><topic>RAND Corporation</topic><topic>Science/Technology/Public policy</topic><topic>Terrorism</topic><toplevel>online_resources</toplevel><creatorcontrib>Cragin, Kim</creatorcontrib><creatorcontrib>Chalk, Peter</creatorcontrib><creatorcontrib>Daly, Sara A</creatorcontrib><creatorcontrib>Jackson, Brian A</creatorcontrib><collection>Social Science Premium Collection</collection><collection>Policy File Index</collection><collection>Politics Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Cragin, Kim</au><au>Chalk, Peter</au><au>Daly, Sara A</au><au>Jackson, Brian A</au><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><atitle>Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies</atitle><jtitle>Policy File</jtitle><date>2007-01-01</date><risdate>2007</risdate><abstract>Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an effort to reveal some of their vulnerabilities. The analysis provides the Department of Homeland Security and other national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies.</abstract><pub>RAND Corporation</pub></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | Policy File, 2007 |
issn | |
language | eng |
recordid | cdi_proquest_reports_1820733206 |
source | Policy File Index |
subjects | RAND Corporation Science/Technology/Public policy Terrorism |
title | Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T09%3A15%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_AOXKD&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.atitle=Sharing%20the%20Dragon's%20Teeth:%20Terrorist%20Groups%20and%20the%20Exchange%20of%20New%20Technologies&rft.jtitle=Policy%20File&rft.au=Cragin,%20Kim&rft.date=2007-01-01&rft_id=info:doi/&rft_dat=%3Cproquest_AOXKD%3E1820733206%3C/proquest_AOXKD%3E%3Cgrp_id%3Ecdi_FETCH-proquest_reports_18207332063%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1820733206&rft_id=info:pmid/&rfr_iscdi=true |