WorldCat Identities

Cragin, Kim

Overview
Works: 33 works in 159 publications in 1 language and 15,519 library holdings
Genres: Case studies 
Roles: Author, Other
Classifications: HV6431, 303.625
Publication Timeline
.
Most widely held works by Kim Cragin
The dynamic terrorist threat : an assessment of group motivations and capabilities in a changing world by Kim Cragin( )

15 editions published in 2004 in English and held by 2,680 WorldCat member libraries worldwide

As the war on terrorism wages on, our nation's policymakers will continue to face the challenge of assessing threats that various terrorist groups pose to the U.S. homeland and our interests abroad. As part of the RAND Corporation's yearlong "Thinking Strategically About Combating Terrorism" project, the authors of this report develop a way to assess and analyze the danger posed by various terrorist organizations around the world. The very nature of terrorism creates a difficulty in predicting new and emerging threats; however, by establishing these types of parameters, the report creates a fresh foundation of threat analysis on which future counterterrorism strategy may build
Sharing the dragon's teeth : terrorist groups and the exchange of new technologies by Kim Cragin( )

19 editions published between 2006 and 2007 in English and held by 2,590 WorldCat member libraries worldwide

Case studies of 11 terrorist groups in Mindanao, the West Bank and Gaza Strip, and southwest Colombia show how these groups have exchanged technologies and knowledge in an effort to innovate (i.e., improve their operational capabilities). The analysis provides national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies
Terrorism & development : using social and economic development to inhibit a resurgence of terrorism by Kim Cragin( )

17 editions published in 2003 in English and held by 2,421 WorldCat member libraries worldwide

This report examines social and economic development policies enacted by three countries--Israel, the Philippines, and the United Kingdom--to inhibit a resurgence of terrorist violence within their territorial jurisdictions. The analysis focuses on development initiatives that have been incorporated in wider peace and conflict resolution efforts in an attempt to mitigate local perceptions of past wrongdoings in communities that support terrorist groups. The research was designed to inform the U.S. governmental decisionmaking community of the benefits and possible pitfalls of emphasizing a specific social and economic dimension in strategies to counter the problem of terrorism
Arms trafficking and Colombia by Kim Cragin( )

20 editions published in 2003 in English and held by 2,343 WorldCat member libraries worldwide

Colombia has experienced significant political instability and violence over the past century due to a number of factors--the drug trade, a protracted insurgent conflict, internal corruption, and small-arms proliferation, the last being among the most serious of the country's problems. The authors identify the sources and routes used by arms traffickers to acquire, buy, sell, receive, transfer, and ship weapons. They also examine the various guerrilla groups, paramilitary organizations, criminal factions, and ordinary citizens who purchase and use these munitions. The authors then examine Colombia₂s political conflict through the lens of small-arms trafficking and conclude with policy implications for the U.S. government. The authors find that small-arms trafficking patterns--the manner by which arms and munitions are acquired and distributed--provide useful insights into the strategies used by insurgent groups engaged in conflict and a conflict's future evolution
Dissuading terror : strategic influence and the struggle against terrorism by Kim Cragin( )

13 editions published between 2004 and 2005 in English and held by 1,984 WorldCat member libraries worldwide

U.S. government decisionmakers face a number of challenges as they attempt to form policies that aim to dissuade terrorists from attacking the United States, divert youths from joining terrorist groups, and persuade the leaders of states and nongovernmental institutions to withhold support for terrorists. The successes or failures of such policies and campaigns have long-lasting effects. This report attempts to help these decisionmakers see the potential use of influence campaigns in the war on terrorism. To do this, the authors gauge the lessons learned from past U.S. operations, analyzing the "de-Nazification" efforts of postwar Germany, the psychological operations conducted during the Vietnam War, and the support of anticommunist movements and resources in Poland throughout the Cold War. Although stipulating that influence campaigns are highly sensitive to their respective operational environments, the authors arrive at the following general guidelines for the use of persuasion in the struggle against terrorism: match objectives, message, and delivery to the audience; incorporate feedback mechanisms in the planning stage; and set realistic expectations. They then apply these guidelines to three different types of audiences in the Muslim world-Yemen, Indonesia, and diaspora communities in Germany. The authors note that the use of strategic influence is not and probably never will be a "silver bullet" to removing the threat of terrorism; however, the research herein should help bring U.S. decisionmakers closer in refining how and in what circumstances such campaigns can best be applied
Women as terrorists : mothers, recruiters, and martyrs by Kim Cragin( )

12 editions published between 2008 and 2009 in English and held by 1,607 WorldCat member libraries worldwide

"Women as Terrorists is the first post-September 11 book to examine women's multifarious roles in terrorist organizations of all stripes around the world. It covers political, religious, ethno-separatist, and Maoist groups in countries as diverse as Iraq, Palestine, Chechnya, Sri Lanka, Colombia, South Africa, the Philippines, and Northern Ireland."--Jacket
Social science for counterterrorism : putting the pieces together( )

7 editions published in 2009 in English and held by 1,366 WorldCat member libraries worldwide

This monograph surveys and integrates scholarly social-science literature relevant to counterterrorism. It draws from numerous disciplines and then uses high-level conceptual models to pull the pieces together regarding root causes, individual radicalization, public support, and the ways in which terrorism fades. It identifies points of agreement and disagreement and discusses the consequences of different contexts and perspectives
Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies by Brian A Jackson( )

4 editions published in 2007 in English and held by 350 WorldCat member libraries worldwide

Technical countermeasures are key components of national efforts to combat terrorist violence. Efforts to collect data about and disrupt terrorist activities through human intelligence and direct action, information gathering, and protective technologies complement technical countermeasures, helping to ensure that terrorists are identified, their ability to plan and stage attacks is limited, and, if those attacks occur, their impact is contained. Given the potential effect of such measures on the terrorists' capabilities, it is not surprising that they act to reduce or neutralize the impact of defensive technologies on their activities. In the event that the terrorists counter-efforts are successful, the value and protection provided by defensive technologies can be substantially reduced. Through case studies of terrorist struggles in a number of nations, this document analyzes the nature and impact of such terrorist counter-efforts on the value of defensive technologies deployed against them. The information presented here should be of interest to homeland security policy makers in that it identifies potential weaknesses in defensive technology systems, thereby informing threat assessment and providing a basis for improving the design of future defensive technologies. It extends the RAND Corporation's ongoing research on terrorism and domestic security issues
What factors cause youth to reject violent extremism? : results of an exploratory analysis in the West Bank by Kim Cragin( Book )

3 editions published in 2015 in English and held by 50 WorldCat member libraries worldwide

"Continued terrorist attacks and the involvement of foreign fighters in Syria and Iraq have prompted a surge of interest among policymakers, law enforcement, journalists, and academics on both sides of the Atlantic on the topic of terrorist radicalization. Many of the factors that push or pull individuals toward radicalization are in dispute within the expert community. Instead of examining the factors that lead to radicalization and the commission of terrorist acts, this report takes a new approach. What Factors Cause Youth to Reject Violent Extremism? Results of an Exploratory Analysis in the West Bank empirically addresses the topic of why youth reject violent extremism. To do this, the authors focus on the Palestinian West Bank. The report begins with a theoretical model and then tests this model with data gathered through structured interviews and a survey. For this study, ten semistructured interviews were conducted with politicians from Hamas and Fatah in 2012. Along with these interviews, the authors conducted a survey among 600 youth (ages 18-30) who lived in Hebron, Jenin, and Ramallah. The overarching findings from this effort demonstrate that (1) rejecting violent extremism, for residents of the West Bank, is a process with multiple stages and choices within each stage; (2) family plays a greater role than friends in shaping attitudes toward nonviolence; (3) demographics do not have a significant impact on attitudes toward nonviolence; and (4) opposing violence in theory is distinct from choosing not to engage in violence"-- Provided on publisher's website
Aptitude for destruction by Brian A Jackson( )

7 editions published in 2005 in English and held by 30 WorldCat member libraries worldwide

Continuing conflicts between violent groups and states generate an ever-present demand for higher quality and more timely information to support operations to combat terrorism. In particular, better ways are needed to understand how terrorist and insurgent groups adapt over time into more-effective organizations and increasingly dangerous threats. To adapt, terrorist organizations must learn. A group's ability to learn determines its chance of success, since learning is the link between what the group wants to do and its ability to gather the needed information and resources to actually do it. Despite the importance of terrorist group learning, comparatively little focused research effort has been directed at understanding this process and identifying the factors that influence group learning ability. While relevant data and insights can be found in the literature on terrorism and terrorist organizations, this information has not been collected and systematically analyzed to assess its importance from the perspective of efforts to combat terrorism. This study addresses that need in an effort to both analyze current understanding and stimulate further study and research in this area. The RAND Corporation conducted an analysis of organizational learning in terrorist groups and assessed its implications for efforts to combat terrorism. The work was performed between November 2003 and November 2004, a period during which the threat of international terrorism was high and concern about the capabilities of terrorist organizations and how they might change over time was a central focus of policy debate and U.S. homeland security planning. The study is described in this report and in "Aptitude for Destruction, Volume 1: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism, which applies the analytical framework described in the second part of this report to the practical demands of intelligence and law enforcement activities
A strategy to counter ISIL as a transregional threat by Lynn E Davis( )

2 editions published in 2017 in English and held by 16 WorldCat member libraries worldwide

The debate in the past over counter-ISIL strategies has tended to focus on rather stark alternatives that are based on different ways to employ U.S. military forces: disengagement, containment, and aggressive rollback using combat forces. Our strategy seeks to broaden the focus to policies beyond the military dimension. Even though U.S. leverage is limited to affect the political situations in Iraq and Syria, the United States should focus on removing the underlying conditions sustaining ISIL and other violent jihadist groups, i.e., the lack of security, justice, and political representation. In addition, the United States needs to re-evaluate how to balance the aims of the counter-ISIL campaign with future territorial and political ambitions of the Kurds, given the risk of violence between Shia and Kurds in Iraq and Turkey and the YPG in Syria. In the absence of commitments on the part of the Kurds to limit their territorial ambitions, and to avoid fueling conflict across the region, the United States should be cautious in the ways it supports the YPG and peshmerga in its counter-ISIL military campaign. The debate in the past over counter-ISIL strategies has tended to focus on rather stark alternatives that are based on different ways to employ U.S. military forces: disengagement, containment, and aggressive rollback using combat forces. Our strategy seeks to broaden the focus to policies beyond the military dimension. Even though U.S. leverage is limited to affect the political situations in Iraq and Syria, the United States should focus on removing the underlying conditions sustaining ISIL and other violent jihadist groups, i.e., the lack of security, justice, and political representation. In addition, the United States needs to re-evaluate how to balance the aims of the counter-ISIL campaign with future territorial and political ambitions of the Kurds, given the risk of violence between Shia and Kurds in Iraq and Turkey and the YPG in Syria. In the absence of commitments on the part of the Kurds to limit their territorial ambitions, and to avoid fueling conflict across the region, the United States should be cautious in the ways it supports the YPG and peshmerga in its counter-ISIL military campaign
Ungoverned territories : understanding and reducing terrorism risks by Angel Rabasa( )

5 editions published in 2007 in English and held by 10 WorldCat member libraries worldwide

Ungoverned territories -- failed or failing states or ungoverned areas within otherwise viable states -- generate all manner of security problems and can become terrorist sanctuaries. Using a two-tiered framework area applied to eight case studies from around the globe, the authors seek to understand the conditions that give rise to ungoverned territories and what makes some ungoverned territories more conducive to a terrorist or insurgent presence than others. On the basis of this ground-breaking analytical work, they identify three types of ungoverned territories and their effects on U.S. security interests and develop strategies to improve the U.S. ability to mitigate these effects
Beyond al-Qaeda by Angel Rabasa( )

3 editions published between 2003 and 2006 in English and held by 10 WorldCat member libraries worldwide

The "al-Qaeda universe" does not incorporate the entirety of the terrorist threat or potential threat. A number of other militant groups threaten U.S. regional interests or allies and pose a potential direct threat to the United States. This volume, Part 2 of the study, focuses on three categories in this "second circle" of terrorist groups: (1) terrorist groups that articulate an Islamist agenda for their own country but are not directly linked to the global jihadist movement; (2) Muslim terrorist groups whose agendas are primarily separatist or ethno-nationalist but that present a threat to the stability or territorial integrity of U.S. allies, although not to the United States directly; and (3) highly capable, non-Islamist terrorist groups. By examining these groups, we hope to establish a framework for evaluating the threat that these groups currently pose and assessing the likelihood and the conditions under which some of them could evolve into regional or global threats. We also examine antiglobalization threats. Some of these groups have risen to the level of terrorism; others have not, but could. Finally, we discuss the nexus between terrorism, insurgency, and crime
Beyond al-Qaeda by Angel Rabasa( Book )

4 editions published between 2002 and 2006 in English and held by 9 WorldCat member libraries worldwide

Examines al-QaedaÂs evolution and the emergence of the broader global jihadist movement-groups affiliated, associated, or inspired by al-Qaeda-and the threat that they pose to the United States and U.S. allies and interests. The authors conclude by setting out a four-pronged strategy to counter the jihadist threat
What factors cause individuals to reject violent extremism in Yemen? by Eric Robinson( Book )

1 edition published in 2017 in English and held by 9 WorldCat member libraries worldwide

"Why do some individuals engage in political violence in Yemen, while others do not? In this report, the third in a series on this topic, the authors examine the role that social, political, and economic factors play on individual behavior toward violence in the midst of Yemen's bloody and multiyear civil war. This report uses a unique national survey conducted in Yemen in 2016, amidst active fighting, to better understand why Yemenis may reject political violence despite persistent conflict and civil unrest across the country. The report addresses how the U.S. government and its partners can strengthen efforts to undermine violent extremism in Yemen, with implications for future countering violent extremism programs worldwide."--Publisher's description
Building partner capacity to combat weapons of mass destruction by Jennifer D. P Moroney( )

3 editions published in 2009 in English and held by 7 WorldCat member libraries worldwide

This RAND National Defense Research Institute monograph outlines and then applies a four-step process for developing regional approaches to BPC to combat WMD. Limited resources, access, and incomplete knowledge of WMD threats create a need for working with appropriate partner countries around the world to address these challenges. The monograph offers seven key themes to consider when implementing BPC regional approaches. The monograph argues that the United States needs a coordinated effort to enhance partners? border security, WMD detection, and interdiction, and other capabilities to address the global nature of the threat. When nations are less capable, it is critical to focus U.S. assistance on building indigenous capacity to combat WMD threats. Developing a Process to Build Partner Capacity for Combating WMD This monograph outlines a four-step process for developing regional approaches to BPC to combat WMD threats. These steps include *identifying capabilities and desired end states relative to the WMD threat *working with potential partners * identifying relevant BPC ways and means *developing a framework to assess the effectiveness of BPC programs and activities
Understanding Terrorist Ideology by Kim Cragin( )

4 editions published in 2007 in English and held by 7 WorldCat member libraries worldwide

This variation, by its very nature, makes it somewhat difficult to identify overarching patterns in how terrorist ideologies might motivate individuals and sympathetic communities on a global level. Having said that, I am going to attempt to generalize the findings from our research as much as possible, while still providing examples of nuances in the messages and appeal of terrorist ideology whenever appropriate. For the remainder of my testimony, I will address two basic questions. First, how have al-Qa'ida leaders and other likeminded ideologues reached out to individuals and communities? And, second, how have individuals and communities responded to this appeal?
Getting inside the terrorist mind( Book )

1 edition published in 2007 in English and held by 6 WorldCat member libraries worldwide

Being able to understand the motivation of al Qaeda and other groups can help nations better disrupt, defend against, and prepare for and anticipate terrorist attacks. Three new studies, relying on a case study approach, offer insights into the terrorist mindset, focusing, in particular, on how terrorists try to get around defensive technologies, share technologies among themselves, and prioritize their targets
Understanding terrorist motivations by Kim Cragin( Book )

1 edition published in 2009 in English and held by 4 WorldCat member libraries worldwide

Testimony presented before the House Homeland Security Committee, Subcommittee on Intelligence, Information Sharing and Terrorism Risk Assessment on December 15, 2009
U.S. counterterrorism strategy must address ideological and political factors at the global and local levels( )

1 edition published in 2006 in English and held by 4 WorldCat member libraries worldwide

Although the U.S.-led global war on terrorism has had some notable successes--such as the destruction of al-Qaeda's sanctuary in Afghanistan, the elimination of many of the group's leaders, and the growing resolve of many countries to take action against al-Qaeda and its associates--no informed observers believe that al-Qaeda will be eradicated any time soon. Indeed, in some respects, al-Qaeda has metastasized into an even more formidable adversary, dispersed across the world, largely self-sustaining, and constantly adopting new and innovative tactics. The United States itself continues to be threatened by large-scale attacks. Thus, countering al-Qaeda is likely to preoccupy U.S. national security institutions for at least the remainder of this decade, and probably longer
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.06 (from 0.01 for Social sci ... to 0.71 for Understand ...)

The dynamic terrorist threat : an assessment of group motivations and capabilities in a changing world
Covers
Sharing the dragon's teeth : terrorist groups and the exchange of new technologiesTerrorism & development : using social and economic development to inhibit a resurgence of terrorismArms trafficking and ColombiaDissuading terror : strategic influence and the struggle against terrorismWomen as terrorists : mothers, recruiters, and martyrsSocial science for counterterrorism : putting the pieces togetherBreaching the fortress wall : understanding terrorist efforts to overcome defensive technologiesAptitude for destruction
Alternative Names
Cragin, Kim

Cragin, Kim 1976-

Cragin, R. Kim

Languages
English (142)