Sharing the dragon's teeth : : terrorist groups and the exchange of new technologies / / R. Kim Cragin ... [et al.].

Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange ""best practices."" These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understa...

Full description

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2007
Edition:1st ed.
Language:English
Physical Description:1 online resource (137 p.)
Notes:"MG 485."
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993628572404498
ctrlnum (CKB)1000000000481452
(EBL)322535
(OCoLC)476119923
(SSID)ssj0000245290
(PQKBManifestationID)11186454
(PQKBTitleCode)TC0000245290
(PQKBWorkID)10176832
(PQKB)10911108
(Au-PeEL)EBL322535
(CaPaEBR)ebr10225468
(Au-PeEL)EBL4969957
(CaONFJC)MIL118092
(OCoLC)1027197964
(MiAaPQ)EBC322535
(MiAaPQ)EBC4969957
(EXLCZ)991000000000481452
collection bib_alma
record_format marc
spelling Sharing the dragon's teeth : terrorist groups and the exchange of new technologies / R. Kim Cragin ... [et al.].
1st ed.
Santa Monica, CA : Rand Corporation, 2007.
1 online resource (137 p.)
text txt
computer c
online resource cr
Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Understanding Terrorist Threats; Methodology and Parameters; Monograph Structure; Chapter Two - Organizational Theory and Terrorism; Pursuing New Technologies; Absorbing New Technologies Successfully; Conclusions; Chapter Three - Mindanao: A Mecca for Transnational Terrorism in Southeast Asia; Background: Islamic Militant Groups in Mindanao; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Mindanao; Contextualizing the Exchanges; Key Judgments
Chapter Four - West Bank and Gaza: Israel as the Common EnemyBackground:Militant Groups in the West Bank and Gaza Strip; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in the West Bank and Gaza; Contextualizing the Exchanges; Key Judgments; Chapter Five - Southwest Colombia: A Safe Haven for Mutually Beneficial Exchanges; Background; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Colombia's Despeje; Key Judgments; Chapter Six - Policy Implications; Improving Threat Assessments; Disrupting Innovation Processes
Affecting Terrorists' Cost-Benefit AnalysesConclusion; Appendix; Selected Bibliography
Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange ""best practices."" These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an
English
Description based on publisher supplied metadata and other sources.
"MG 485."
Includes bibliographical references (p. 103-114).
Terrorism.
Terrorism Technological innovations.
0-8330-3915-6
Cragin, Kim.
Rand Corporation.
language English
format eBook
author2 Cragin, Kim.
Rand Corporation.
author_facet Cragin, Kim.
Rand Corporation.
Rand Corporation.
author2_variant k c kc
author2_role TeilnehmendeR
TeilnehmendeR
author_corporate Rand Corporation.
author_sort Cragin, Kim.
title Sharing the dragon's teeth : terrorist groups and the exchange of new technologies /
spellingShingle Sharing the dragon's teeth : terrorist groups and the exchange of new technologies /
Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Understanding Terrorist Threats; Methodology and Parameters; Monograph Structure; Chapter Two - Organizational Theory and Terrorism; Pursuing New Technologies; Absorbing New Technologies Successfully; Conclusions; Chapter Three - Mindanao: A Mecca for Transnational Terrorism in Southeast Asia; Background: Islamic Militant Groups in Mindanao; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Mindanao; Contextualizing the Exchanges; Key Judgments
Chapter Four - West Bank and Gaza: Israel as the Common EnemyBackground:Militant Groups in the West Bank and Gaza Strip; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in the West Bank and Gaza; Contextualizing the Exchanges; Key Judgments; Chapter Five - Southwest Colombia: A Safe Haven for Mutually Beneficial Exchanges; Background; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Colombia's Despeje; Key Judgments; Chapter Six - Policy Implications; Improving Threat Assessments; Disrupting Innovation Processes
Affecting Terrorists' Cost-Benefit AnalysesConclusion; Appendix; Selected Bibliography
title_sub terrorist groups and the exchange of new technologies /
title_full Sharing the dragon's teeth : terrorist groups and the exchange of new technologies / R. Kim Cragin ... [et al.].
title_fullStr Sharing the dragon's teeth : terrorist groups and the exchange of new technologies / R. Kim Cragin ... [et al.].
title_full_unstemmed Sharing the dragon's teeth : terrorist groups and the exchange of new technologies / R. Kim Cragin ... [et al.].
title_auth Sharing the dragon's teeth : terrorist groups and the exchange of new technologies /
title_new Sharing the dragon's teeth :
title_sort sharing the dragon's teeth : terrorist groups and the exchange of new technologies /
publisher Rand Corporation,
publishDate 2007
physical 1 online resource (137 p.)
edition 1st ed.
contents Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Understanding Terrorist Threats; Methodology and Parameters; Monograph Structure; Chapter Two - Organizational Theory and Terrorism; Pursuing New Technologies; Absorbing New Technologies Successfully; Conclusions; Chapter Three - Mindanao: A Mecca for Transnational Terrorism in Southeast Asia; Background: Islamic Militant Groups in Mindanao; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Mindanao; Contextualizing the Exchanges; Key Judgments
Chapter Four - West Bank and Gaza: Israel as the Common EnemyBackground:Militant Groups in the West Bank and Gaza Strip; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in the West Bank and Gaza; Contextualizing the Exchanges; Key Judgments; Chapter Five - Southwest Colombia: A Safe Haven for Mutually Beneficial Exchanges; Background; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Colombia's Despeje; Key Judgments; Chapter Six - Policy Implications; Improving Threat Assessments; Disrupting Innovation Processes
Affecting Terrorists' Cost-Benefit AnalysesConclusion; Appendix; Selected Bibliography
isbn 1-281-18092-0
9786611180928
0-8330-4249-1
0-8330-3915-6
callnumber-first H - Social Science
callnumber-subject HV - Social Pathology, Criminology
callnumber-label HV6431
callnumber-sort HV 46431 S46655 42007
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 360 - Social problems & social services
dewey-ones 363 - Other social problems & services
dewey-full 363.325
dewey-sort 3363.325
dewey-raw 363.325
dewey-search 363.325
oclc_num 476119923
1027197964
work_keys_str_mv AT craginkim sharingthedragonsteethterroristgroupsandtheexchangeofnewtechnologies
AT randcorporation sharingthedragonsteethterroristgroupsandtheexchangeofnewtechnologies
status_str n
ids_txt_mv (CKB)1000000000481452
(EBL)322535
(OCoLC)476119923
(SSID)ssj0000245290
(PQKBManifestationID)11186454
(PQKBTitleCode)TC0000245290
(PQKBWorkID)10176832
(PQKB)10911108
(Au-PeEL)EBL322535
(CaPaEBR)ebr10225468
(Au-PeEL)EBL4969957
(CaONFJC)MIL118092
(OCoLC)1027197964
(MiAaPQ)EBC322535
(MiAaPQ)EBC4969957
(EXLCZ)991000000000481452
carrierType_str_mv cr
is_hierarchy_title Sharing the dragon's teeth : terrorist groups and the exchange of new technologies /
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1806236781779091456
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01149nam a22003134a 4500</leader><controlfield tag="001">993628572404498</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr -n---------</controlfield><controlfield tag="008">060418s2007 cau ob 000 0 eng </controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-281-18092-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611180928</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-4249-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)1000000000481452</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)322535</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)476119923</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0000245290</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11186454</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0000245290</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)10176832</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)10911108</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL322535</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10225468</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL4969957</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL118092</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1027197964</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC322535</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC4969957</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)991000000000481452</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6431</subfield><subfield code="b">.S46655 2007</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Sharing the dragon's teeth :</subfield><subfield code="b">terrorist groups and the exchange of new technologies /</subfield><subfield code="c">R. Kim Cragin ... [et al.].</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">Rand Corporation,</subfield><subfield code="c">2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (137 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Understanding Terrorist Threats; Methodology and Parameters; Monograph Structure; Chapter Two - Organizational Theory and Terrorism; Pursuing New Technologies; Absorbing New Technologies Successfully; Conclusions; Chapter Three - Mindanao: A Mecca for Transnational Terrorism in Southeast Asia; Background: Islamic Militant Groups in Mindanao; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Mindanao; Contextualizing the Exchanges; Key Judgments</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter Four - West Bank and Gaza: Israel as the Common EnemyBackground:Militant Groups in the West Bank and Gaza Strip; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in the West Bank and Gaza; Contextualizing the Exchanges; Key Judgments; Chapter Five - Southwest Colombia: A Safe Haven for Mutually Beneficial Exchanges; Background; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Colombia's Despeje; Key Judgments; Chapter Six - Policy Implications; Improving Threat Assessments; Disrupting Innovation Processes</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Affecting Terrorists' Cost-Benefit AnalysesConclusion; Appendix; Selected Bibliography</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange ""best practices."" These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"MG 485."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 103-114).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Technological innovations.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-8330-3915-6</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cragin, Kim.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-08-02 02:51:16 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2012-02-26 00:45:56 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5350490830004498&amp;Force_direct=true</subfield><subfield code="Z">5350490830004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350490830004498</subfield></datafield></record></collection>