Network Technologies for Networked Terrorists

Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations

Bruce W. Don, David R. Frelinger, Scott Gerwehr, Eric Landree, Brian A. Jackson

ResearchPublished Sep 16, 2007

Understanding how terrorists conduct successful operations is critical to countering them. Terrorist organizations use a wide range of network technologies as they plan and stage attacks. This book explores the role that these communications and computer technologies play and the net effect of their use, the purpose and manner in which the technology is used, the operational actions of terrorists and possible responses of security forces. The authors conclude that future network technologies modestly improve terrorist group efficiency, particularly for their supporting activities, but do not dramatically improve their attack operations. Precluding terrorists from getting the technology they want is impractical; developing direct counters is unlikely to yield high payoffs. Instead, exploiting the technologies and the information such technologies use to enable more direct security force operations are more promising options.

Order a Print Copy

Format
Paperback
Page count
100 pages
List Price
$25.50
Buy link
Add to Cart

Topics

Document Details

  • Availability: Available
  • Year: 2007
  • Print Format: Paperback
  • Paperback Pages: 100
  • Paperback Price: $25.50
  • Paperback ISBN/EAN: 978-0-8330-4141-8
  • Document Number: TR-454-DHS

Citation

RAND Style Manual
Don, Bruce W., David R. Frelinger, Scott Gerwehr, Eric Landree, and Brian A. Jackson, Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations, RAND Corporation, TR-454-DHS, 2007. As of September 24, 2024: https://www.rand.org/pubs/technical_reports/TR454.html
Chicago Manual of Style
Don, Bruce W., David R. Frelinger, Scott Gerwehr, Eric Landree, and Brian A. Jackson, Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations. Santa Monica, CA: RAND Corporation, 2007. https://www.rand.org/pubs/technical_reports/TR454.html. Also available in print form.
BibTeX RIS

The research described in this report was prepared for the United States Department of Homeland Security and conducted under the auspices of the Homeland Security Program within RAND Infrastructure, Safety, and Environment.

This publication is part of the RAND technical report series. RAND technical reports, products of RAND from 2003 to 2011, presented research findings on a topic limited in scope or intended for a narrow audience; discussions of the methodology employed in research; literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; and preliminary findings. All RAND technical reports were subject to rigorous peer review to ensure high standards for research quality and objectivity.

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.

RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.