Browse Results What Format Should I Choose?

Showing 1 through 11 of 11 results

Aptitude for Destruction, Volume 2

by Peter Chalk Kim Cragin Brian A. Jackson John C. Baker John V. Parachini

Better ways are needed to understand how terrorist groups increase their effectiveness and become more dangerous. Learning is the link between what a group wants to do and its ability to actually do it; therefore, a better understanding of group learning might contribute to the design of better measures for combating terrorism. This study analyzes current understanding of group learning and the factors that influence it. It presents detailed case studies of learning in five terrorist organizations and develops a methodology for ascertaining what and why groups have learned, providing insights into their learning processes.

Arms Trafficking and Colombia

by Bruce Hoffman Kim Cragin Mark Berends Paul Sorensen Stephanie Williamson

Colombia has experienced significant political instability and violence over the past century due to a number of factors, including the proliferation of small-arms trafficking. The authors identify the sources and routes used by arms traffickers to acquire, buy, sell, receive, transfer, and ship weapons. They also examine the various groups and individuals who purchase and use these munitions. The authors examine Colombia's political conflict through the lens of small-arms trafficking and conclude with policy implications for the United States.

Beyond al-Qaeda: Part 1, The Global Jihadist Movement

by Peter Chalk Angel Rabasa Sara A. Daly Kim Cragin Heather S. Gregg

Examines al-Qaeda??s evolution and the emergence of the broader global jihadist movement-groups affiliated, associated, or inspired by al-Qaeda-and the threat that they pose to the United States and U.S. allies and interests. The authors conclude by setting out a four-pronged strategy to counter the jihadist threat.

Beyond al-Qaeda: Part 2, The Outer Rings of the Terrorist Universe

by Peter Chalk Angel Rabasa Sara A. Daly Kim Cragin Heather S. Gregg

Examines violent terrorist groups that, while not formally allied with al-Qaeda, could pose a threat to Americans now or in the future and to the security of our friends and allies. The authors show how terrorists use criminal organizations and connections to finance their activities, and they identify distinct strategies to neutralize or mitigate these threats.

Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies

by Peter Chalk Kim Cragin Brian A. Jackson John V. Parachini Bruce Newsome R. Kim Cragin

Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from the history of a variety of terrorist conflicts to understand terrorists' counter-technology efforts. Fully exploring adversaries' counter-technology behaviors can help make the best choices to protect from the nation from the threat of terrorism.

Dissuading Terror: Strategic Influence and the Struggle Against Terrorism

by Kim Cragin Scott Gerwehr

Combat stress casualties are not necessarily higher in city operations than operations on other types of terrain. Commanders and NCOs need to have the skills to treat and prevent stress casualties and understand their implications for urban operations. The authors review the known precipitants of combat stress reaction, its battlefield treatment, and the preventive steps commanders can take to limit its extent and severity.

The Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a Changing World

by Cheryl Y. Marcum Sara A. Daly Kim Cragin M. Rebecca Kilburn Susan S. Everingham Jill Hoube

As the war on terrorism wages on, our nation's policymakers will continue to face the challenge of assessing threats that various terrorist groups pose to the U.S. homeland and our interests abroad. As part of the RAND Corporation's yearlong "Thinking Strategically About Combating Terrorism" project, the authors of this report develop a way to assess and analyze the danger posed by various terrorist organizations around the world. The very nature of terrorism creates a difficulty in predicting new and emerging threats; however, by establishing these types of parameters, the report creates a fresh foundation of threat analysis on which future counterterrorism strategy may build.

The Lessons of Mumbai

by Peter Chalk Angel Rabasa Kim Cragin C. Christine Fair Robert D. Blackwill

This study of the Mumbai, India, terrorist attack of November 2008 identifies the operational and tactical capabilities displayed by the terrorists and evaluates the response of the Indian security forces, with the goal of helping counterterrorism authorities in India and elsewhere to prepare for or counter future terrorist attacks on urban centers.

Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies

by Peter Chalk Sara A. Daly Kim Cragin Brian A. Jackson

Case studies of 11 terrorist groups in Mindanao, the West Bank and Gaza Strip, and southwest Colombia show how these groups have exchanged technologies and knowledge in an effort to innovate (i.e., improve their operational capabilities). The analysis provides national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies.

Terrorism and Development: Using Social and Economic Development to Inhibit a Resurgence of Terrorism

by Peter Chalk Kim Cragin

This report examines the social and economic development policies enacted by three countries--Israel, the Philippines, and the United Kingdom--to inhibit a resurgence of terrorism within their jurisdictions. Drawing on a broad research base, including numerous first-hand interviews, the authors outline the initiatives implemented by each country then assess their effectiveness, with the aim of informing U.S. decisionmakers of the benefits and pitfalls of such initiatives as they develop policy to counter terrorism.

Ungoverned Territories: Understanding and Reducing Terrorism Risks

by Peter Chalk Angel Rabasa Kim Cragin Theodore W. Karasik Steven Boraz

Using a two-tiered framework areas applied to eight case studies from around the globe, the authors of this ground-breaking work seek to understand the conditions that give rise to ungoverned territories and make them conducive to a terrorist or insurgent presence. They also develop strategies to improve the U.S. ability to mitigate their effects on U.S. security interests.

Showing 1 through 11 of 11 results

Help

Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.

Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.

  • Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
  • DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
  • BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
  • MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
  • DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.