WorldCat Identities

Cragin, Kim

Overview
Works: 35 works in 166 publications in 1 language and 15,567 library holdings
Genres: Case studies 
Roles: Author, Other
Classifications: HV6431, 303.625
Publication Timeline
.
Most widely held works by Kim Cragin
The dynamic terrorist threat : an assessment of group motivations and capabilities in a changing world by Kim Cragin( )

15 editions published in 2004 in English and held by 2,686 WorldCat member libraries worldwide

As the war on terrorism wages on, our nation's policymakers will continue to face the challenge of assessing threats that various terrorist groups pose to the U.S. homeland and our interests abroad. In addition, the struggle against terrorism likely will be in constant competition with other U.S. international policy issues that come to the fore. As part of the RAND Corporation's yearlong "Thinking Strategically About Combating Terrorism" project, the authors of this report develop a way to assess, analyze, and prioritize the danger posed by various terrorist organizations around the world. The authors also look at how different terrorist groups adapt and change over time, emphasizing that understanding these changes may help policymakers identify terrorists' greatest vulnerabilities. Of course, the very nature of terrorism creates a difficulty in predicting new and emerging threats; however, by establishing these types of parameters, the report creates a fresh foundation of threat analysis on which future counterterrorism strategy maybuild
Sharing the dragon's teeth : terrorist groups and the exchange of new technologies by Kim Cragin( )

19 editions published between 2006 and 2007 in English and held by 2,603 WorldCat member libraries worldwide

Case studies of 11 terrorist groups in Mindanao, the West Bank and Gaza Strip, and southwest Colombia show how these groups have exchanged technologies and knowledge in an effort to innovate (i.e., improve their operational capabilities). The analysis provides national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists1 adoption of new technologies
Terrorism & development : using social and economic development to inhibit a resurgence of terrorism by Kim Cragin( )

17 editions published in 2003 in English and held by 2,410 WorldCat member libraries worldwide

This report examines social and economic development policies enacted by three countries--Israel, the Philippines, and the United Kingdom--to inhibit a resurgence of terrorist violence within their territorial jurisdictions. The analysis focuses on development initiatives that have been incorporated in wider peace and conflict resolution efforts in an attempt to mitigate local perceptions of past wrongdoings in communities that support terrorist groups. The research was designed to inform the U.S. governmental decisionmaking community of the benefits and possible pitfalls of emphasizing a specific social and economic dimension in strategies to counter the problem of terrorism
Arms trafficking and Colombia by Kim Cragin( )

20 editions published in 2003 in English and held by 2,353 WorldCat member libraries worldwide

Colombia has experienced significant political instability and violence over the past century due to a number of factors, including the proliferation of small-arms trafficking. The authors identify the sources and routes used by arms traffickers to acquire, buy, sell, receive, transfer, and ship weapons. They also examine the various groups and individuals who purchase and use these munitions. The authors examine Colombia?s political conflict through the lens of small-arms trafficking and conclude with policy implications for the United States
Dissuading terror : strategic influence and the struggle against terrorism by Kim Cragin( )

14 editions published between 2004 and 2005 in English and held by 1,980 WorldCat member libraries worldwide

U.S. government decisionmakers face a number of challenges as they attempt to form policies that aim to dissuade terrorists from attacking the United States, divert youths from joining terrorist groups, and persuade the leaders of states and nongovernmental institutions to withhold support for terrorists. The successes or failures of such policies and campaigns have long-lasting effects. This report attempts to help these decisionmakers see the potential use of influence campaigns in the war on terrorism. To do this, the authors gauge the lessons learned from past U.S. operations, analyzing the "de-Nazification" efforts of postwar Germany, the psychological operations conducted during the Vietnam War, and the support of anticommunist movements and resources in Poland throughout the Cold War. Although stipulating that influence campaigns are highly sensitive to their respective operational environments, the authors arrive at the following general guidelines for the use of persuasion in the struggle against terrorism: match objectives, message, and delivery to the audience; incorporate feedback mechanisms in the planning stage; and set realistic expectations. They then apply these guidelines to three different types of audiences in the Muslim world-Yemen, Indonesia, and diaspora communities in Germany. The authors note that the use of strategic influence is not and probably never will be a "silver bullet" to removing the threat of terrorism; however, the research herein should help bring U.S. decisionmakers closer in refining how and in what circumstances such campaigns can best be applied
Women as terrorists : mothers, recruiters, and martyrs by Kim Cragin( )

12 editions published between 2008 and 2009 in English and held by 1,624 WorldCat member libraries worldwide

"Women as Terrorists is the first post-September 11 book to examine women's multifarious roles in terrorist organizations of all stripes around the world. It covers political, religious, ethno-separatist, and Maoist groups in countries as diverse as Iraq, Palestine, Chechnya, Sri Lanka, Colombia, South Africa, the Philippines, and Northern Ireland."--Jacket
Social science for counterterrorism : putting the pieces together( )

9 editions published in 2009 in English and held by 1,366 WorldCat member libraries worldwide

This monograph surveys and integrates scholarly social-science literature relevant to counterterrorism. It draws from numerous disciplines and then uses high-level conceptual models to pull the pieces together regarding root causes, individual radicalization, public support, and the ways in which terrorism fades. It identifies points of agreement and disagreement and discusses the consequences of different contexts and perspectives
Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies by Brian A Jackson( )

4 editions published in 2007 in English and held by 362 WorldCat member libraries worldwide

The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris
What factors cause youth to reject violent extremism? : results of an exploratory analysis in the West Bank by Kim Cragin( Book )

3 editions published in 2015 in English and held by 50 WorldCat member libraries worldwide

"Continued terrorist attacks and the involvement of foreign fighters in Syria and Iraq have prompted a surge of interest among policymakers, law enforcement, journalists, and academics on both sides of the Atlantic on the topic of terrorist radicalization. Many of the factors that push or pull individuals toward radicalization are in dispute within the expert community. Instead of examining the factors that lead to radicalization and the commission of terrorist acts, this report takes a new approach. What Factors Cause Youth to Reject Violent Extremism? Results of an Exploratory Analysis in the West Bank empirically addresses the topic of why youth reject violent extremism. To do this, the authors focus on the Palestinian West Bank. The report begins with a theoretical model and then tests this model with data gathered through structured interviews and a survey. For this study, ten semistructured interviews were conducted with politicians from Hamas and Fatah in 2012. Along with these interviews, the authors conducted a survey among 600 youth (ages 18-30) who lived in Hebron, Jenin, and Ramallah. The overarching findings from this effort demonstrate that (1) rejecting violent extremism, for residents of the West Bank, is a process with multiple stages and choices within each stage; (2) family plays a greater role than friends in shaping attitudes toward nonviolence; (3) demographics do not have a significant impact on attitudes toward nonviolence; and (4) opposing violence in theory is distinct from choosing not to engage in violence"-- Provided on publisher's website
Aptitude for destruction by Brian A Jackson( )

9 editions published in 2005 in English and held by 32 WorldCat member libraries worldwide

Continuing conflicts between violent groups and states generate an ever-present demand for higher-quality and more timely information to support operations to combat terrorism. Better ways are needed to understand how terrorist and insurgent groups adapt over time into more-effective organizations and increasingly dangerous threats. Because learning is the link between what a group wants to do and its ability to gather the needed information and resources to actually do it, a better understanding of the group learning process could contribute to the design of more-effective measures for combating terrorism. This study analyzes current understanding of that process and the factors that influence organizational learning. Part I presents detailed case studies of learning in five terrorist organizations: Aum Shinrikyo, The Radical Environmentalist Movement, Hizballah, Jemaah Islamiyah, and the Provisional Irish Republican Army. In Part II, a methodology is developed for ascertaining what and why groups learned, gaining insights into their learning processes, and discerning ways in which the law enforcement and intelligence communities might apply that understanding. Insights drawn from the organizational learning literature are then applied to the case studies. A companion report, Aptitude for Destruction, Volume 1: Organizational Learning in Terrorist Groups and its Implications for Combating Terrorism, MG-331-NIJ, focuses on the application of the concepts developed in this study to policy for combating terrorism. That report presents an abbreviated overview of the research presented here and explores the application of the results by law enforcement and intelligence activities
A strategy to counter ISIL as a transregional threat by Lynn E Davis( )

2 editions published in 2017 in English and held by 20 WorldCat member libraries worldwide

The debate in the past over counter-ISIL strategies has tended to focus on rather stark alternatives that are based on different ways to employ U.S. military forces: disengagement, containment, and aggressive rollback using combat forces. Our strategy seeks to broaden the focus to policies beyond the military dimension. Even though U.S. leverage is limited to affect the political situations in Iraq and Syria, the United States should focus on removing the underlying conditions sustaining ISIL and other violent jihadist groups, i.e., the lack of security, justice, and political representation. In addition, the United States needs to re-evaluate how to balance the aims of the counter-ISIL campaign with future territorial and political ambitions of the Kurds, given the risk of violence between Shia and Kurds in Iraq and Turkey and the YPG in Syria. In the absence of commitments on the part of the Kurds to limit their territorial ambitions, and to avoid fueling conflict across the region, the United States should be cautious in the ways it supports the YPG and peshmerga in its counter-ISIL military campaign. The debate in the past over counter-ISIL strategies has tended to focus on rather stark alternatives that are based on different ways to employ U.S. military forces: disengagement, containment, and aggressive rollback using combat forces. Our strategy seeks to broaden the focus to policies beyond the military dimension. Even though U.S. leverage is limited to affect the political situations in Iraq and Syria, the United States should focus on removing the underlying conditions sustaining ISIL and other violent jihadist groups, i.e., the lack of security, justice, and political representation. In addition, the United States needs to re-evaluate how to balance the aims of the counter-ISIL campaign with future territorial and political ambitions of the Kurds, given the risk of violence between Shia and Kurds in Iraq and Turkey and the YPG in Syria. In the absence of commitments on the part of the Kurds to limit their territorial ambitions, and to avoid fueling conflict across the region, the United States should be cautious in the ways it supports the YPG and peshmerga in its counter-ISIL military campaign
What factors cause individuals to reject violent extremism in Yemen? by Eric Robinson( Book )

1 edition published in 2017 in English and held by 9 WorldCat member libraries worldwide

"Why do some individuals engage in political violence in Yemen, while others do not? In this report, the third in a series on this topic, the authors examine the role that social, political, and economic factors play on individual behavior toward violence in the midst of Yemen's bloody and multiyear civil war. This report uses a unique national survey conducted in Yemen in 2016, amidst active fighting, to better understand why Yemenis may reject political violence despite persistent conflict and civil unrest across the country. The report addresses how the U.S. government and its partners can strengthen efforts to undermine violent extremism in Yemen, with implications for future countering violent extremism programs worldwide."--Publisher's description
Beyond al-Qaeda by Angel Rabasa( )

5 editions published between 2002 and 2006 in English and held by 9 WorldCat member libraries worldwide

Examines al-QaedaÂs evolution and the emergence of the broader global jihadist movement-groups affiliated, associated, or inspired by al-Qaeda-and the threat that they pose to the United States and U.S. allies and interests. The authors conclude by setting out a four-pronged strategy to counter the jihadist threat
Beyond al-Qaeda by Angel Rabasa( )

3 editions published between 2003 and 2006 in English and held by 8 WorldCat member libraries worldwide

The "al-Qaeda universe" does not incorporate the entirety of the terrorist threat or potential threat. A number of other militant groups threaten U.S. regional interests or allies and pose a potential direct threat to the United States. This volume, Part 2 of the study, focuses on three categories in this "second circle" of terrorist groups: (1) terrorist groups that articulate an Islamist agenda for their own country but are not directly linked to the global jihadist movement; (2) Muslim terrorist groups whose agendas are primarily separatist or ethno-nationalist but that present a threat to the stability or territorial integrity of U.S. allies, although not to the United States directly; and (3) highly capable, non-Islamist terrorist groups. By examining these groups, we hope to establish a framework for evaluating the threat that these groups currently pose and assessing the likelihood and the conditions under which some of them could evolve into regional or global threats. We also examine antiglobalization threats. Some of these groups have risen to the level of terrorism; others have not, but could. Finally, we discuss the nexus between terrorism, insurgency, and crime
Understanding Terrorist Ideology by Kim Cragin( )

4 editions published in 2007 in English and held by 7 WorldCat member libraries worldwide

This variation, by its very nature, makes it somewhat difficult to identify overarching patterns in how terrorist ideologies might motivate individuals and sympathetic communities on a global level. Having said that, I am going to attempt to generalize the findings from our research as much as possible, while still providing examples of nuances in the messages and appeal of terrorist ideology whenever appropriate. For the remainder of my testimony, I will address two basic questions. First, how have al-Qa'ida leaders and other likeminded ideologues reached out to individuals and communities? And, second, how have individuals and communities responded to this appeal?
Ungoverned territories : understanding and reducing terrorism risks by Angel Rabasa( )

4 editions published in 2007 in English and held by 6 WorldCat member libraries worldwide

Ungoverned territories -- failed or failing states or ungoverned areas within otherwise viable states -- generate all manner of security problems and can become terrorist sanctuaries. Using a two-tiered framework area applied to eight case studies from around the globe, the authors seek to understand the conditions that give rise to ungoverned territories and what makes some ungoverned territories more conducive to a terrorist or insurgent presence than others. On the basis of this ground-breaking analytical work, they identify three types of ungoverned territories and their effects on U.S. security interests and develop strategies to improve the U.S. ability to mitigate these effects
Getting inside the terrorist mind( Book )

1 edition published in 2007 in English and held by 6 WorldCat member libraries worldwide

Being able to understand the motivation of al Qaeda and other groups can help nations better disrupt, defend against, and prepare for and anticipate terrorist attacks. Three new studies, relying on a case study approach, offer insights into the terrorist mindset, focusing, in particular, on how terrorists try to get around defensive technologies, share technologies among themselves, and prioritize their targets
Developing a process to build partner capacity for combating weapons of mass destruction( )

1 edition published in 2009 in English and held by 5 WorldCat member libraries worldwide

How can the United States better support its partners' efforts to combat the threat of weapons of mass destruction (WMD) proliferation? Although the United States has instituted a number of programs to combat the spread of WMD, it does not have the resources necessary to stop all WMD threats. Instead, it needs to pursue a more coordinated effort to enhance partners' border security, WMD detection, interdiction, and other capabilities to address the global nature of the threat
Understanding terrorist motivations by Kim Cragin( Book )

1 edition published in 2009 in English and held by 4 WorldCat member libraries worldwide

Testimony presented before the House Homeland Security Committee, Subcommittee on Intelligence, Information Sharing and Terrorism Risk Assessment on December 15, 2009
Ungoverned territories : a unique front in the war on terrorism( )

1 edition published in 2007 in English and held by 4 WorldCat member libraries worldwide

This research brief describes a RAND Project AIR FORCE study of the factors that give rise to ungoverned territories and make some of them conducive to terrorists and insurgents
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.06 (from 0.02 for Social sci ... to 0.76 for Ungoverned ...)

The dynamic terrorist threat : an assessment of group motivations and capabilities in a changing world
Covers
Sharing the dragon's teeth : terrorist groups and the exchange of new technologiesTerrorism & development : using social and economic development to inhibit a resurgence of terrorismArms trafficking and ColombiaDissuading terror : strategic influence and the struggle against terrorismWomen as terrorists : mothers, recruiters, and martyrsSocial science for counterterrorism : putting the pieces togetherBreaching the fortress wall : understanding terrorist efforts to overcome defensive technologiesAptitude for destructionBeyond al-Qaeda
Alternative Names
Cragin, Kim

Cragin, Kim 1976-

Cragin, R. Kim

Languages
English (145)