Sharing the dragon's teeth : : terrorist groups and the exchange of new technologies / / R. Kim Cragin ... [et al.].
Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange ""best practices."" These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understa...
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2007 |
Edition: | 1st ed. |
Language: | English |
Physical Description: | 1 online resource (137 p.) |
Notes: | "MG 485." |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993628572404498 |
---|---|
ctrlnum |
(CKB)1000000000481452 (EBL)322535 (OCoLC)476119923 (SSID)ssj0000245290 (PQKBManifestationID)11186454 (PQKBTitleCode)TC0000245290 (PQKBWorkID)10176832 (PQKB)10911108 (Au-PeEL)EBL322535 (CaPaEBR)ebr10225468 (Au-PeEL)EBL4969957 (CaONFJC)MIL118092 (OCoLC)1027197964 (MiAaPQ)EBC322535 (MiAaPQ)EBC4969957 (EXLCZ)991000000000481452 |
collection |
bib_alma |
record_format |
marc |
spelling |
Sharing the dragon's teeth : terrorist groups and the exchange of new technologies / R. Kim Cragin ... [et al.]. 1st ed. Santa Monica, CA : Rand Corporation, 2007. 1 online resource (137 p.) text txt computer c online resource cr Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Understanding Terrorist Threats; Methodology and Parameters; Monograph Structure; Chapter Two - Organizational Theory and Terrorism; Pursuing New Technologies; Absorbing New Technologies Successfully; Conclusions; Chapter Three - Mindanao: A Mecca for Transnational Terrorism in Southeast Asia; Background: Islamic Militant Groups in Mindanao; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Mindanao; Contextualizing the Exchanges; Key Judgments Chapter Four - West Bank and Gaza: Israel as the Common EnemyBackground:Militant Groups in the West Bank and Gaza Strip; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in the West Bank and Gaza; Contextualizing the Exchanges; Key Judgments; Chapter Five - Southwest Colombia: A Safe Haven for Mutually Beneficial Exchanges; Background; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Colombia's Despeje; Key Judgments; Chapter Six - Policy Implications; Improving Threat Assessments; Disrupting Innovation Processes Affecting Terrorists' Cost-Benefit AnalysesConclusion; Appendix; Selected Bibliography Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange ""best practices."" These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an English Description based on publisher supplied metadata and other sources. "MG 485." Includes bibliographical references (p. 103-114). Terrorism. Terrorism Technological innovations. 0-8330-3915-6 Cragin, Kim. Rand Corporation. |
language |
English |
format |
eBook |
author2 |
Cragin, Kim. Rand Corporation. |
author_facet |
Cragin, Kim. Rand Corporation. Rand Corporation. |
author2_variant |
k c kc |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_corporate |
Rand Corporation. |
author_sort |
Cragin, Kim. |
title |
Sharing the dragon's teeth : terrorist groups and the exchange of new technologies / |
spellingShingle |
Sharing the dragon's teeth : terrorist groups and the exchange of new technologies / Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Understanding Terrorist Threats; Methodology and Parameters; Monograph Structure; Chapter Two - Organizational Theory and Terrorism; Pursuing New Technologies; Absorbing New Technologies Successfully; Conclusions; Chapter Three - Mindanao: A Mecca for Transnational Terrorism in Southeast Asia; Background: Islamic Militant Groups in Mindanao; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Mindanao; Contextualizing the Exchanges; Key Judgments Chapter Four - West Bank and Gaza: Israel as the Common EnemyBackground:Militant Groups in the West Bank and Gaza Strip; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in the West Bank and Gaza; Contextualizing the Exchanges; Key Judgments; Chapter Five - Southwest Colombia: A Safe Haven for Mutually Beneficial Exchanges; Background; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Colombia's Despeje; Key Judgments; Chapter Six - Policy Implications; Improving Threat Assessments; Disrupting Innovation Processes Affecting Terrorists' Cost-Benefit AnalysesConclusion; Appendix; Selected Bibliography |
title_sub |
terrorist groups and the exchange of new technologies / |
title_full |
Sharing the dragon's teeth : terrorist groups and the exchange of new technologies / R. Kim Cragin ... [et al.]. |
title_fullStr |
Sharing the dragon's teeth : terrorist groups and the exchange of new technologies / R. Kim Cragin ... [et al.]. |
title_full_unstemmed |
Sharing the dragon's teeth : terrorist groups and the exchange of new technologies / R. Kim Cragin ... [et al.]. |
title_auth |
Sharing the dragon's teeth : terrorist groups and the exchange of new technologies / |
title_new |
Sharing the dragon's teeth : |
title_sort |
sharing the dragon's teeth : terrorist groups and the exchange of new technologies / |
publisher |
Rand Corporation, |
publishDate |
2007 |
physical |
1 online resource (137 p.) |
edition |
1st ed. |
contents |
Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Understanding Terrorist Threats; Methodology and Parameters; Monograph Structure; Chapter Two - Organizational Theory and Terrorism; Pursuing New Technologies; Absorbing New Technologies Successfully; Conclusions; Chapter Three - Mindanao: A Mecca for Transnational Terrorism in Southeast Asia; Background: Islamic Militant Groups in Mindanao; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Mindanao; Contextualizing the Exchanges; Key Judgments Chapter Four - West Bank and Gaza: Israel as the Common EnemyBackground:Militant Groups in the West Bank and Gaza Strip; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in the West Bank and Gaza; Contextualizing the Exchanges; Key Judgments; Chapter Five - Southwest Colombia: A Safe Haven for Mutually Beneficial Exchanges; Background; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Colombia's Despeje; Key Judgments; Chapter Six - Policy Implications; Improving Threat Assessments; Disrupting Innovation Processes Affecting Terrorists' Cost-Benefit AnalysesConclusion; Appendix; Selected Bibliography |
isbn |
1-281-18092-0 9786611180928 0-8330-4249-1 0-8330-3915-6 |
callnumber-first |
H - Social Science |
callnumber-subject |
HV - Social Pathology, Criminology |
callnumber-label |
HV6431 |
callnumber-sort |
HV 46431 S46655 42007 |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
360 - Social problems & social services |
dewey-ones |
363 - Other social problems & services |
dewey-full |
363.325 |
dewey-sort |
3363.325 |
dewey-raw |
363.325 |
dewey-search |
363.325 |
oclc_num |
476119923 1027197964 |
work_keys_str_mv |
AT craginkim sharingthedragonsteethterroristgroupsandtheexchangeofnewtechnologies AT randcorporation sharingthedragonsteethterroristgroupsandtheexchangeofnewtechnologies |
status_str |
n |
ids_txt_mv |
(CKB)1000000000481452 (EBL)322535 (OCoLC)476119923 (SSID)ssj0000245290 (PQKBManifestationID)11186454 (PQKBTitleCode)TC0000245290 (PQKBWorkID)10176832 (PQKB)10911108 (Au-PeEL)EBL322535 (CaPaEBR)ebr10225468 (Au-PeEL)EBL4969957 (CaONFJC)MIL118092 (OCoLC)1027197964 (MiAaPQ)EBC322535 (MiAaPQ)EBC4969957 (EXLCZ)991000000000481452 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Sharing the dragon's teeth : terrorist groups and the exchange of new technologies / |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1806236781779091456 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01149nam a22003134a 4500</leader><controlfield tag="001">993628572404498</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr -n---------</controlfield><controlfield tag="008">060418s2007 cau ob 000 0 eng </controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-281-18092-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611180928</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-4249-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)1000000000481452</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)322535</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)476119923</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0000245290</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11186454</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0000245290</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)10176832</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)10911108</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL322535</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10225468</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL4969957</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL118092</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1027197964</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC322535</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC4969957</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)991000000000481452</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6431</subfield><subfield code="b">.S46655 2007</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Sharing the dragon's teeth :</subfield><subfield code="b">terrorist groups and the exchange of new technologies /</subfield><subfield code="c">R. Kim Cragin ... [et al.].</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">Rand Corporation,</subfield><subfield code="c">2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (137 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Understanding Terrorist Threats; Methodology and Parameters; Monograph Structure; Chapter Two - Organizational Theory and Terrorism; Pursuing New Technologies; Absorbing New Technologies Successfully; Conclusions; Chapter Three - Mindanao: A Mecca for Transnational Terrorism in Southeast Asia; Background: Islamic Militant Groups in Mindanao; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Mindanao; Contextualizing the Exchanges; Key Judgments</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter Four - West Bank and Gaza: Israel as the Common EnemyBackground:Militant Groups in the West Bank and Gaza Strip; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in the West Bank and Gaza; Contextualizing the Exchanges; Key Judgments; Chapter Five - Southwest Colombia: A Safe Haven for Mutually Beneficial Exchanges; Background; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Colombia's Despeje; Key Judgments; Chapter Six - Policy Implications; Improving Threat Assessments; Disrupting Innovation Processes</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Affecting Terrorists' Cost-Benefit AnalysesConclusion; Appendix; Selected Bibliography</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange ""best practices."" These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"MG 485."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 103-114).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Technological innovations.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-8330-3915-6</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cragin, Kim.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-08-02 02:51:16 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2012-02-26 00:45:56 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350490830004498&Force_direct=true</subfield><subfield code="Z">5350490830004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350490830004498</subfield></datafield></record></collection> |