Search Results
-
Hitting America's Soft Underbelly: The Potential Threat of Deliberate Biological Attacks Against the U. S. Agricultural and Food Industry
by Peter ChalkOver the past decade, the United States has endeavored to increase its ability to detect, prevent, and respond to terrorist threats and incidents. The agriculture sector and the food industry in general, however, have received comparatively little attention with respect to protection against terrori... More
Language: ENGCopyright: 2004 -
The Maritime Dimension of International Security: Terrorism, Piracy, and Challenges for the United States
by Peter ChalkThe vast size and highly unregulated nature of the world's waterways have made the maritime environment an increasingly attractive theater for perpetrators of transnational violence. Piracy and sea-borne terrorism have been on the rise since 2000. While the United States has spearheaded several impo... More
Language: ENGCopyright: 2008 -
The Malay-Muslim Insurgency in Southern Thailand--Understanding the Conflict's Evolving Dynamic
by Peter ChalkCurrent unrest in the Malay-Muslim provinces of southern Thailand hascaptured growing national, regional, and international attention due to theheightened tempo and scale of rebel attacks, the increasingly jihadistundertone that has come to characterize insurgent actions, and the centralgovernment's... More
Language: ENGCopyright: 2008 -
The Latin American Drug Trade: Scope, Dimensions, Impact, and Response
by Peter ChalkTransnational crime remains a particularly serious problem in Latin America, with most issues connected to the drug trade. There are several relevant roles that the U.S. Air Force can and should play in boosting Mexico's capacity to counter drug production and trafficking, as well as further honing ... More
Language: ENGCopyright: 2011 -
The U.S. Army in Southeast Asia: Near-Term and Long-Term Roles
by Peter ChalkThis RAND report examines the U.S. Army role in Southeast Asia. Under current benign conditions, efforts should focus on supporting defense reform, addressing transnational threats, and balancing China. If the outlook deteriorates, the United States should increase security cooperation, conclude new... More
Language: ENGCopyright: 2013 -
Indonesia's Transformation and the Stability of Southeast Asia
by Peter Chalk • Angel RabasaIndonesia, the world's fourth most populous country, is undergoing a profound transformation that could lead to a variety of outcomes, from the consolidation of democracy to return to authoritarianism or military rule, to radical Islamic rule, or to violent disintegration. The stakes are high, for ... More
Language: ENGCopyright: 2001 -
Terrorism and Development: Using Social and Economic Development to Inhibit a Resurgence of Terrorism
by Peter Chalk • Kim CraginThis report examines the social and economic development policies enacted by three countries--Israel, the Philippines, and the United Kingdom--to inhibit a resurgence of terrorism within their jurisdictions. Drawing on a broad research base, including numerous first-hand interviews, the authors outl... More
Language: ENGCopyright: 2003 -
The Global Threat of New and Reemerging Infectious Diseases
This study offers a more comprehensive analysis of the security implications of the spread of infectious diseases than has been done to date. The study examines the impact of the HIV/AIDS epidemic in South Africa, highlighting this particular crisis as a graphic example of the devastating effects th... More
Language: ENGCopyright: 2003 -
India's and Pakistan's Strategies in Afghanistan: Implications for the United States and the Region
by Peter Chalk • Larry HanauerIndia and Pakistan have very different visions for Afghanistan, and they seek to advance highly disparate interests through their respective engagements in the country. This paper reviews the countries' interests in Afghanistan, how they have tried to further their interests, how Afghanistan naviga... More
Language: ENGCopyright: 2012 -
Countering Piracy in the Modern Era: Notes from a Rand Workshop to Discuss the Best Approaches for Dealing with Piracy in the 21st Century
In March 2009, the RAND Corporation convened a small group of experts from the U.S. government, allied partner nations, the maritime industry, and academic organizations to discuss piracy in the modern era. Participants concluded that mitigating the complex nature of maritime crime requires the inpu... More
Language: ENGCopyright: 2009 -
America's Role in Nation-Building: From Germany to Iraq
The post-World War II occupations of Germany and Japan set standards for post-conflict nation-building that have not since been matched. Only in recent years has the United States has felt the need to participate in similar transformations, but it is now facing one of the most challenging prospects ... More
Language: ENGCopyright: 2003 -
Promoting Online Voices for Countering Violent Extremism
American Muslims have played an important role in helping to counter extremism and are increasingly using social media to this end. RAND researchers reviewed literature and interviewed American Muslims experienced in social media to understand and explain key challenges facing these Muslim activist... More
Language: ENGCopyright: 2013 -
Trends in Outside Support for Insurgent Movements
The most useful forms of outside support for an insurgent movement include safe havens, financial support, political backing, and direct military assistance. Because states are able to provide all of these types of assistance, their support has had a profound impact on the effectiveness of many rebe... More
Language: ENGCopyright: 2001 -
Confronting the Enemy Within: Security Intelligence, the Police, and Counterterrorism in Four Democracies
Since the September 11, 2001, terrorist attacks, critics have charged that the Federal Bureau of Investigation, while qualified to investigate terrorist incidents after the fact, is not well equipped enough to adequately gather and assess information to prevent attacks. More intrinsically, many beli... More
Language: ENGCopyright: 2004 -
Exploring Terrorist Targeting Preferences
Governments spend billions to protect against terrorism. Might it help to understand what al Qaeda would achieve with each specific attack? This book examines various hypotheses of terrorist targeting: is it (1) to coerce, (2) to damage economies, (3) to rally the faithful, or (4) a decision left to... More
Language: ENGCopyright: 2007 -
Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies
Case studies of 11 terrorist groups in Mindanao, the West Bank and Gaza Strip, and southwest Colombia show how these groups have exchanged technologies and knowledge in an effort to innovate (i.e., improve their operational capabilities). The analysis provides national security policymakers with ins... More
Language: ENGCopyright: 2007 -
Corporations and Counterinsurgency
Multinational corporations can be significant actors in zones of violent conflict. Corporate actions to shape their environment can sometimes mitigate conflict, but as the authors show in their case studies, corporate activities can help generate and sustain violence.... More
Language: ENGCopyright: 2009 -
Characterizing and Exploring the Implications of Maritime Irregular Warfare
Although irregular warfare includes a range of activities in which naval forces have played an integral role, there has been little examination of the characteristics or potential of such operations in maritime environments. An assessment of the maritime component of a series of historical and ongo... More
Language: ENGCopyright: 2012 -
Building Special Operations Partnerships in Afghanistan and Beyond: Challenges and Best Practices from Afghanistan, Iraq, and Colombia
Building the capacity of Afghan special operations forces (SOF) is a key goal of the United States and its coalition partners. This report summarizes key partnering practices and presents findings from SOF partnership case studies in Afghanistan, Iraq, and Colombia. The goal is to identify best pr... More
Language: ENGCopyright: 2015 -
Counternetwork: Countering the Expansion of Transnational Criminal Networks
by Douglas Farah • Peter Chalk • Angel Rabasa • Howard J. Shatz • Gregory Midgette • Christopher M. SchnaubeltThrough an analysis of transnational criminal networks originating in South America, this report presents operational characteristics of these networks, strategic alliances they have established, and the multiple threats that they pose to U.S. interests and to the stability of the countries where th... More
Language: ENGCopyright: 2017 -
Aptitude for Destruction, Volume 2
Better ways are needed to understand how terrorist groups increase their effectiveness and become more dangerous. Learning is the link between what a group wants to do and its ability to actually do it; therefore, a better understanding of group learning might contribute to the design of better meas... More
Language: ENGCopyright: 2005 -
Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies
Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from the history of a variety of terrorist conflicts to understand terrorists' counter-technology efforts.... More
Language: ENGCopyright: 2007 -
Securing Tyrants or Fostering Reform? U.S. Internal Security Assistance to Repressive and Transitioning Regimes
This study examines the results of U.S. assistance to the internal security forces of four repressive states: El Salvador, Uzbekistan, Afghanistan, and Pakistan. Efforts to improve the security, human rights, and accountability of security forces appear more likely to succeed in states transitioni... More
Language: ENGCopyright: 2006 -
Ungoverned Territories: Understanding and Reducing Terrorism Risks
Using a two-tiered framework areas applied to eight case studies from around the globe, the authors of this ground-breaking work seek to understand the conditions that give rise to ungoverned territories and make them conducive to a terrorist or insurgent presence. They also develop strategies to im... More
Language: ENGCopyright: 2007 -
Money in the Bank: Lessons Learned from Past Counterinsurgency (COIN) Operations
Six historic counterinsurgency (COIN) operations are examined to determine which tactics, techniques, and procedures led to success and which to failure. The Philippines, Algeria, Vietnam, El Salvador, Jammu and Kashmir, and Colombia were chosen for their varied characteristics relating to geograph... More
Language: ENGCopyright: 2007