Network Technologies for Networked Terrorists. Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations" by Bruce W. Don, David R. Frelinger, Scott Gerwehr, Eric Landree, Brian A. Jackson
RAND | 2007 | ISBN: 083304141X | 100 pages | PDF | 1 Mb
RAND | 2007 | ISBN: 083304141X | 100 pages | PDF | 1 Mb
This report analyzes terrorist groups’ use of advanced information and communication technologies in efforts to plan, coordinate, and command their operations. The goal of the investigation reported here is to identify which network technologies might be used to support the activities that terrorists must perform to conduct successful operations, understand terrorists’ decisions about when and under what conditions particular technologies will be used and determine the implications of these insights for efforts to combat terrorism.
The information presented in this report should be of interest to homeland security policymakers because it can be used to guide research, development, testing, and evaluation of techniques for collecting counterterrorist intelligence and developing measures to combat terrorism. The results of this analysis may also help inform technology and regulatory policy regarding the development, use, and management of systems that terrorists could use.
Table of Contents
Preface
Figures
Tables
Summary
Abbreviations
CHAPTER ONE
Introduction
The Scope and Purpose of the Analysis
Research Approach
What Could Terrorists Do with Network Technology?
Which Network Technologies Are Most Attractive to Terrorists? .
How Would Specific Network Technologies Fit Within Terrorist Groups’ Broader Approaches to Acquiring and Using Technologies? .
What Should Security Forces Do to Counter This?
What Conclusions and Recommendations Can Be Drawn from This Analysis?
How This Report Is Organized
CHAPTER TWO
What Could Terrorists Do with Network Technology?
Recruiting
Current State-of-the-Art Recruiting
The Future of Recruiting
Acquiring Resources
Current State-of-the-Art Resource Acquisition
The Future of Resource Acquisition
Training 17
Current State-of-the-Art Training
The Future of Training
Creating False Identities, Forgery, and Other Deception
Current State-of-the-Art of Deception
The Future of Forgery and Other Deception
Reconnaissance and Surveillance
Current State-of-the-Art Reconnaissance and Surveillance
The Future of Reconnaissance and Surveillance
Planning and Targeting
Current State-of-the-Art Planning and Targeting
The Future of Planning and Targeting
Communication
Current State-of-the-Art Communication Practices
Future Communication Technologies
Future Communication Practices and Terrorist Activities
Overall Effects of Changes in Communication Technology
Attack Operations
Current State-of-the-Art Operations
The Future of Terrorist Operations
Propaganda and Persuasion
Current State-of-the-Art Propaganda and Persuasion
The Future of Propaganda and Persuasion
Which of These Network Technologies Are Potentially Most Attractive to Terrorists?
Network Technologies That Can Enhance Strategic or Enabling Activities
Network Technologies That Can Enhance the Direct Outcomes of Attacks
CHAPTER THREE
Security Force Responses to Terrorists’ Acquisition and Use of Network Technologies
The Role of Specific Network Technologies Within Terrorist Groups’ Technology Strategies
Benefits and Risks from Network Technology Use
Benefits and Risks of Using Network Technology for Terrorist Groups
Benefits and Risks to Security Forces of Terrorist Use of Network Technology
Options for Countering Terrorist Use of Network Technologies
Evaluating the Countermeasure Options
Network Technologies Within Specialized Technology Strategies
Network Technologies Within Versatility- and Variety-Based Strategies
Network Technologies Pursued Opportunistically
Countermeasure Approach Suggested by the Evaluation
CHAPTER FOUR
Conclusions and Recommendations
Conclusions
Major Breakthroughs in Terrorist Attack Operations?
Versatility, Variety, Efficiency, and Effectiveness
Precluding Terrorists from Getting Technology and Developing Direct Counters
Exploitation Seems the More Promising Option
Security Services’ Role
Recommendations
Design a System to Address Terrorist Use of Network Technologies
Acquire and Retain People Who Can Make the System Work
Take the Initial Steps Needed to Implement Such a System Promptly
Bibliography
with TOC BookMarkLinks
More : You find here