Search Results
-
Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies
Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from the history of a variety of terrorist conflicts to understand terrorists' counter-technology efforts.... More
Language: ENGCopyright: 2007 -
Terrorism and Development: Using Social and Economic Development to Inhibit a Resurgence of Terrorism
by Peter Chalk • Kim CraginThis report examines the social and economic development policies enacted by three countries--Israel, the Philippines, and the United Kingdom--to inhibit a resurgence of terrorism within their jurisdictions. Drawing on a broad research base, including numerous first-hand interviews, the authors outl... More
Language: ENGCopyright: 2003 -
Dissuading Terror: Strategic Influence and the Struggle Against Terrorism
by Kim Cragin • Scott GerwehrCombat stress casualties are not necessarily higher in city operations than operations on other types of terrain. Commanders and NCOs need to have the skills to treat and prevent stress casualties and understand their implications for urban operations. The authors review the known precipitants of co... More
Language: ENGCopyright: 2005 -
Arms Trafficking and Colombia
Colombia has experienced significant political instability and violence over the past century due to a number of factors, including the proliferation of small-arms trafficking. The authors identify the sources and routes used by arms traffickers to acquire, buy, sell, receive, transfer, and ship wea... More
Language: ENGCopyright: 2003 -
Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies
Case studies of 11 terrorist groups in Mindanao, the West Bank and Gaza Strip, and southwest Colombia show how these groups have exchanged technologies and knowledge in an effort to innovate (i.e., improve their operational capabilities). The analysis provides national security policymakers with ins... More
Language: ENGCopyright: 2007 -
What Factors Cause Individuals to Reject Violent Extremism in Yemen?
by Kim Cragin • Melissa A. Bradley • Paul S. Steinberg • Eric Robinson • Daniel Egel • Kate Frier • LoidoltWhy do some individuals engage in political violence in Yemen, while others do not? We examine the role that social, political, and economic factors play on individual behavior toward violence in the midst of Yemen’s bloody and multiyear civil war. We use a unique national survey conducted in Yemen ... More
Language: ENGCopyright: 2017 -
The Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a Changing World
by Cheryl Y. Marcum • Sara A. Daly • Kim Cragin • M. Rebecca Kilburn • Susan S. Everingham • Jill HoubeAs the war on terrorism wages on, our nation's policymakers will continue to face the challenge of assessing threats that various terrorist groups pose to the U.S. homeland and our interests abroad. As part of the RAND Corporation's yearlong "Thinking Strategically About Combating Terrorism" project... More
Language: ENGCopyright: 2004 -
Aptitude for Destruction, Volume 2
Better ways are needed to understand how terrorist groups increase their effectiveness and become more dangerous. Learning is the link between what a group wants to do and its ability to actually do it; therefore, a better understanding of group learning might contribute to the design of better meas... More
Language: ENGCopyright: 2005 -
Ungoverned Territories: Understanding and Reducing Terrorism Risks
Using a two-tiered framework areas applied to eight case studies from around the globe, the authors of this ground-breaking work seek to understand the conditions that give rise to ungoverned territories and make them conducive to a terrorist or insurgent presence. They also develop strategies to im... More
Language: ENGCopyright: 2007 -
The Lessons of Mumbai
This study of the Mumbai, India, terrorist attack of November 2008 identifies the operational and tactical capabilities displayed by the terrorists and evaluates the response of the Indian security forces, with the goal of helping counterterrorism authorities in India and elsewhere to prepare for or... More
Language: ENGCopyright: 2009 -
Beyond al-Qaeda: Part 1, The Global Jihadist Movement
Examines al-Qaeda??s evolution and the emergence of the broader global jihadist movement-groups affiliated, associated, or inspired by al-Qaeda-and the threat that they pose to the United States and U.S. allies and interests. The authors conclude by setting out a four-pronged strategy to counter the... More
Language: ENGCopyright: 2006 -
Beyond al-Qaeda: Part 2, The Outer Rings of the Terrorist Universe
Examines violent terrorist groups that, while not formally allied with al-Qaeda, could pose a threat to Americans now or in the future and to the security of our friends and allies. The authors show how terrorists use criminal organizations and connections to finance their activities, and they ident... More
Language: ENGCopyright: 2006