"Israel." . . "Ammunition and Explosives." . . "United states government." . . "History." . . "Information exchange." . . "Urban warfare." . . "RAND CORP SANTA MONICA CA." . . "Organization theory." . . "Counterterrorism." . . "Bombs." . . "Rand Corporation" . . "Transfer of training." . . "Leadership." . . "Detonators." . . "Terrorism States 19th century Case studies Liberia." . . "Electronic books." . . . . . . . "Sharing the dragon's teeth : terrorist groups and the exchange of new technologies" . . . . . . . . . . . . . . . . . . . . . "Terrorist groups -- both inside and outside the al Qaeda network -- sometimes form mutually beneficial partnerships to exchange \"best practices.\" These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an effort to reveal some of their vulnerabilities. The analysis provides the Department of Homeland Security and other national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies."@en . "Sharing the Dragon's Teeth Terrorist Groups and the Exchange of New Technologies"@en . . "Livres électroniques" . . "Computer network resources"@en . . . . . . . . . . . . . . "Operation Enduring Freedom and the global war on terrorism forced many members of al Qaeda to disperse, as the U.S. Government and its allies removed safe havens and arrested a number of key leaders. As a result, the nature of the terrorist threat against the United States appears to have changed. For example, some like-minded terrorist groups that perhaps do not have the global reach of a pre-9/11 al Qaeda nevertheless have formed regional alliances. Similarly, other events have caused terrorist groups that are not linked ideologically to form mutually beneficial partnerships. These partnerships have provided otherwise less capable terrorist groups with the opportunity to improve their skills and their reach. In each circumstance, emerging alliances could increase the threat that terrorism will pose to the United States in the next 3-15 years. Understanding these interactions, therefore, is essential to ongoing and future efforts in the U.S. global war on terrorism. Terrorist groups in three areas -- Mindanao, the West Bank and Gaza Strip, and southwest Colombia -- have exchanged technologies and knowledge in an effort to improve their operational capabilities. Studying these situations can provide the Department of Homeland Security (DHS) with examples of why and how terrorists might share new technologies in the future, as well as the degree to which these exchanges might be successful. The authors chose these case studies because the terrorist groups active in these regions are highly capable. This book examines a variety of different technologies and exchange processes, ranging from remote-detonation devices to converted field ordnance to katyusha rockets. In some instances, terrorists successfully obtained and deployed the technologies involved. Counterterrorism forces disrupted other technology exchanges. In total, the authors examined 11 terrorist groups that operate in these three regions."@en . . "Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies"@en . . . . "Sharing the dragon's teeth terrorist groups and the exchange of new technologies" . "Sharing the dragon's teeth terrorist groups and the exchange of new technologies"@en . . . . . . . "Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange \"best practices.\" These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowled."@en . "Electronic books"@en . "Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange \"best practices.\" These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an effort to reveal some of their vulnerabilities. The analysis provides the Department of Homeland Security and other national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies."@en . . . . "Case studies of 11 terrorist groups in Mindanao, the West Bank and Gaza Strip, and southwest Colombia show how these groups have exchanged technologies and knowledge in an effort to innovate (i.e., improve their operational capabilities). The analysis provides national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies." . . . . . . . . . . . . . . . . . . "Technology transfer." . . "POLITICAL SCIENCE International Relations General." . . "Improvised weapons." . . "Information Science." . . "Terrorism." . . "Terrorism" . "Terrorismus" . . "Terrorism Technological innovations 19th century Case studies Liberia." . . "Threat evaluation." . . "POLITICAL SCIENCE Political Freedom & Security Terrorism." . . "Diffusion." . . "Explosives." . . "Mortars." . . "Profiles." . . "Terrorismo." . . "Motivation." . . . . "Terrorismo Innovaciones tecnológicas." . . "Terrorism Technological innovations." . . "Terrorism Technological innovations" . "Neue Technologie" . . "Terrorists." . . "Unconventional Warfare." . . "Philippines." . . "POLITICAL SCIENCE Political Freedom & Security International Security." . . "Case studies." . . "Guerrilla warfare." . . "Organizations." . . "Interactions." . .