Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sara A. Daly is active.

Publication


Featured researches published by Sara A. Daly.


Archive | 2007

Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies

Kim Cragin; Peter Chalk; Sara A. Daly; Brian A. Jackson

Abstract : Operation Enduring Freedom and the global war on terrorism forced many members of al Qaeda to disperse, as the U.S. Government and its allies removed safe havens and arrested a number of key leaders. As a result, the nature of the terrorist threat against the United States appears to have changed. For example, some like-minded terrorist groups that perhaps do not have the global reach of a pre-9/11 al Qaeda nevertheless have formed regional alliances. Similarly, other events have caused terrorist groups that are not linked ideologically to form mutually beneficial partnerships. These partnerships have provided otherwise less capable terrorist groups with the opportunity to improve their skills and their reach. In each circumstance, emerging alliances could increase the threat that terrorism will pose to the United States in the next 3-15 years. Understanding these interactions, therefore, is essential to ongoing and future efforts in the U.S. global war on terrorism. Terrorist groups in three areas -- Mindanao, the West Bank and Gaza Strip, and southwest Colombia -- have exchanged technologies and knowledge in an effort to improve their operational capabilities. Studying these situations can provide the Department of Homeland Security (DHS) with examples of why and how terrorists might share new technologies in the future, as well as the degree to which these exchanges might be successful. The authors chose these case studies because the terrorist groups active in these regions are highly capable. This book examines a variety of different technologies and exchange processes, ranging from remote-detonation devices to converted field ordnance to katyusha rockets. In some instances, terrorists successfully obtained and deployed the technologies involved. Counterterrorism forces disrupted other technology exchanges. In total, the authors examined 11 terrorist groups that operate in these three regions.


Archive | 2004

The Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a Changing World

Kim Cragin; Sara A. Daly


Archive | 2006

Beyond Al-Qaeda, Part 1: The Global Jihadist Movement

Angel Rabasa; Peter Chalk; Kim Cragin; Sara A. Daly; Heather S. Gregg; Theodore W. Karasik; Kevin A. O'Brien; William Rosenau


Archive | 2006

Beyond Al-Qaeda: Part 2: The Outer Rings of the Terrorist Universe

Angel Rabasa; Peter Chalk; Kim Cragin; Sara A. Daly; Heather S. Gregg; Theodore W. Krasik; Kevin A. O'Brien; William Rosenau


Archive | 2006

Beyond al-Qaeda

Angel Rabasa; Peter Chalk; Kim Cragin; Sara A. Daly; Heather S. Gregg; Theodore W. Karasik; Kevin A. O'Brien; William Rosenau


Archive | 2005

Aum Shinrikyo, Al Qaeda, and the Kinshasa Reactor: Implications of Three Case Studies for Combating Nuclear Terrorism

Sara A. Daly; John V. Parachini; William Rosenau


Archive | 2005

Aum Shinrikyo, Al Qaeda, and the Kinshasa Reactor

Sara A. Daly; John V. Parachini; William Rosenau


Archive | 2004

The Dynamic Terrorist Threat

Kim Cragin; Sara A. Daly


Archive | 2004

Coordinating the war on terrorism

Lynn E. Davis; Gregory F. Treverton; Daniel Byman; Sara A. Daly; William Rosenau


Archive | 2004

Assessing the Dynamic Terrorist Threat

Kim Cragin; Sara A. Daly

Collaboration


Dive into the Sara A. Daly's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge