Network Technologies for Networked Terrorists
Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations
Download
Download eBook for Free
Full Document
Format | File Size | Notes |
---|---|---|
PDF file | 0.7 MB | Use Adobe Acrobat Reader version 10 or higher for the best experience. |
Summary Only
Format | File Size | Notes |
---|---|---|
PDF file | 0.2 MB | Use Adobe Acrobat Reader version 10 or higher for the best experience. |
Purchase
Purchase Print Copy
Format | List Price | Price | |
---|---|---|---|
Add to Cart | Paperback100 pages | $25.50 | $20.40 20% Web Discount |
Understanding how terrorists conduct successful operations is critical to countering them. Terrorist organizations use a wide range of network technologies as they plan and stage attacks. This book explores the role that these communications and computer technologies play and the net effect of their use, the purpose and manner in which the technology is used, the operational actions of terrorists and possible responses of security forces. The authors conclude that future network technologies modestly improve terrorist group efficiency, particularly for their supporting activities, but do not dramatically improve their attack operations. Precluding terrorists from getting the technology they want is impractical; developing direct counters is unlikely to yield high payoffs. Instead, exploiting the technologies and the information such technologies use to enable more direct security force operations are more promising options.
Table of Contents
Chapter One
Introduction
Chapter Two
What Could Terrorists Do with Network Technology?
Chapter Three
Security Force Responses to Terrorists’ Acquisition and Use of Network Technologies
Chapter Four
Conclusions and Recommendations
The research described in this report was prepared for the United States Department of Homeland Security and conducted under the auspices of the Homeland Security Program within RAND Infrastructure, Safety, and Environment.
This report is part of the RAND Corporation Technical report series. RAND technical reports may include research findings on a specific topic that is limited in scope or intended for a narrow audience; present discussions of the methodology employed in research; provide literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; or deliver preliminary findings. All RAND reports undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.
This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.
The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.