LEADER 03660nam 22006494a 450 001 9910220106403321 005 20200520144314.0 010 $a1-281-18092-0 010 $a9786611180928 010 $a0-8330-4249-1 035 $a(CKB)1000000000481452 035 $a(EBL)322535 035 $a(OCoLC)476119923 035 $a(SSID)ssj0000245290 035 $a(PQKBManifestationID)11186454 035 $a(PQKBTitleCode)TC0000245290 035 $a(PQKBWorkID)10176832 035 $a(PQKB)10911108 035 $a(Au-PeEL)EBL322535 035 $a(CaPaEBR)ebr10225468 035 $a(Au-PeEL)EBL4969957 035 $a(CaONFJC)MIL118092 035 $a(OCoLC)1027197964 035 $a(MiAaPQ)EBC322535 035 $a(MiAaPQ)EBC4969957 035 $a(EXLCZ)991000000000481452 100 $a20060418d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aSharing the dragon's teeth $eterrorist groups and the exchange of new technologies /$fR. Kim Cragin ... [et al.] 205 $a1st ed. 210 $aSanta Monica, CA $cRand Corporation$d2007 215 $a1 online resource (137 p.) 300 $a"MG 485." 311 $a0-8330-3915-6 320 $aIncludes bibliographical references (p. 103-114). 327 $aCover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Understanding Terrorist Threats; Methodology and Parameters; Monograph Structure; Chapter Two - Organizational Theory and Terrorism; Pursuing New Technologies; Absorbing New Technologies Successfully; Conclusions; Chapter Three - Mindanao: A Mecca for Transnational Terrorism in Southeast Asia; Background: Islamic Militant Groups in Mindanao; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Mindanao; Contextualizing the Exchanges; Key Judgments 327 $aChapter Four - West Bank and Gaza: Israel as the Common EnemyBackground:Militant Groups in the West Bank and Gaza Strip; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in the West Bank and Gaza; Contextualizing the Exchanges; Key Judgments; Chapter Five - Southwest Colombia: A Safe Haven for Mutually Beneficial Exchanges; Background; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Colombia's Despeje; Key Judgments; Chapter Six - Policy Implications; Improving Threat Assessments; Disrupting Innovation Processes 327 $aAffecting Terrorists' Cost-Benefit AnalysesConclusion; Appendix; Selected Bibliography 330 $aTerrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange ""best practices."" These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an 606 $aTerrorism 606 $aTerrorism$xTechnological innovations 615 0$aTerrorism. 615 0$aTerrorism$xTechnological innovations. 676 $a363.325 701 $aCragin$b Kim$0879912 712 02$aRand Corporation. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910220106403321 996 $aSharing the dragon's teeth$92475927 997 $aUNINA