Skip to Main ContentCounter-Terrorism Training and Resources for Law Enforcement
FAQsSite MapContact UsSite Updates
Mission
Training and Technical Assistance
Conferences
Funding
Research and Statistics
Equipment
Planning and Risk Assessment
Publications
Legislation
Victim Assistance
Community Preparedness
Start of Main Content
Publications

Research & Statistics

Analysis & Evaluation

2004 Report of the Information Security Oversight Office (PDF)
Information Security Oversight Office, March 2005
This report provides information on the status of the security classification program as required by Executive Order 12958, as amended, "Classified National Security Information." It includes statistics and analysis concerning components of the system, primarily classification, declassification, and the Information Security Oversight Office's inspection program. It also discusses industrial security in the private sector as required by Executive Order 12829, as amended, "National Industrial Security Program."

2008 MIPT Junior Fellows Report: Terrorism and the Law (PDF)
Memorial Institute for the Prevention of Terrorism, 2008
This report explores the attempt to draw an analogy between terrorism and the age-old scourge of piracy, and to use the similarities between the two in order to create a terrorism-specific legal framework.

Al Qaeda: Statements and Evolving Ideology (PDF)
C.M. Blanchard, Congressional Research Service, February 4, 2005
This report reviews Al Qaeda's use of public statements from the mid-1990s to the present and analyzes the evolving ideological and political content of those statements. It focuses on statements made by Osama Bin Laden, Ayman Al Zawahiri, and Abu Musab Al Zarqawi.

Al-Qaeda in the Arabian Peninsula: Shooting, Hostage Taking, Kidnapping
Wave—May/June 2004 v.1.1 (PDF)

IntelCenter, July 10, 2004
This document assesses a wave of hostage takings, shootings, and kidnappings of American and foreign military personnel and civilian noncombatants from May to June 2004 by al-Qaeda's regional arm in Saudi Arabia. At least seven attacks were conducted in rapid succession in three cities: al-Kohbar, Riyadh, and Yanbu.

An Analysis of First Responder Grant Funding (PDF)
House Select Committee on Homeland Security, April 2004
This report provides a comprehensive analysis of the current first responder grant system of the U.S. Department of Homeland Security (DHS) and the way it is implemented across the nation. The House Select Committee examined (1) whether DHS was making its terrorism preparedness grant funds available to states in a timely and effective manner; (2) how DHS grants were being allocated by states to their internal jurisdictions; (3) how these grants were being used; and (4) the reasons for any delay in spending these funds.

Anthrax Detection: Agencies Need to Validate Sampling Activities in Order to Increase Confidence in Negative Results (PDF)
U.S. Government Accountability Office, March 2005
In this report, the Government Accountability Office (GAO) assessed the methods used to detect anthrax in postal facilities as a result of the anthrax-laced letters mailed through the U.S. Postal Service in September and October 2001. GAO also assessed the results of agencies' testing and whether agencies' detection activities were validated.

The A.Q. Khan Network: Causes and Implications (PDF)
Christopher O. Clary, Naval Postgraduate School, December 2005
This thesis by Christopher Clary, a civilian employee with the Department of the Navy, traces the development of the A.Q. Khan nuclear network from its beginnings as a part of the Pakistani procurement system of the 1970s and 1980s. It also presents new information about how the Pakistani state organized, managed, and oversaw its nuclear weapons laboratories.

Arab Cultural Awareness: 58 Factsheets
Office of the Deputy Chief of Staff for Intelligence, U.S. Army Training and Doctrine Command, Ft. Leavenworth, Kansas, January 2006
This handbook provides the military trainer with a pocket resource that gives soldiers a basic overview of Arab culture. Police trainers may want to adapt information from this handbook to their training objectives.

Armed Groups: A Tier-One Security Priority (PDF)
United States Air Force Institute for National Security Studies, September 2004
This document outlines the post-Cold War security context in which armed groups thrive, highlights the threats posed by armed groups and their strategic impact, proposes an analytic framework for constructing an operational profile of an armed group, and identifies trends that demonstrate that armed groups will pose security challenges to the United States in the decades ahead.

Assessing an Automated, Information Sharing Technology in the Post “9-11” Era—Do Local Law Enforcement Officers Think It Meets Their Needs? (PDF)
Martin J. Zaworski, Florida International University, February 2005
This dissertation presents a study that compares two sheriff's offices to determine if, and how, information-sharing technology helps law enforcement. The study determines that technology makes a positive contribution, but finds that variables such as computer training, experience, and management style may play a role in the findings.

Assessing the Tradecraft of Intelligence Analysis (PDF)
RAND Corporation, 2008
This report assesses intelligence analysis, a focus of public attention since September 11 and the war in Iraq. RAND interviewed analysts from the U.S. intelligence community in order to understand how analytic agencies think of their task and what initiatives they are taking to build capacity. The report also speculates about the future of intelligence analysis.

Ataxia: The Chemical and Biological Terrorism Threat and the U.S. Response
Chemical and Biological Weapons Nonproliferation Project, Henry L. Stimson Center, October 2000
This report examines many facets of the terrorism issue in the United States, including the threat of terrorism involving chemical and biological weapons; various federal response assets, training, and equipment programs; and feedback from the front lines on federal efforts. This report also describes chronologically local responses to a possible chemical or biological terrorist attack and presents ideas from local emergency personnel on strategies for dealing with these types of incidents.

Better Management Oversight and Internal Controls Needed to Ensure Accuracy of Terrorism-Related Conviction Statistics (PDF)
U.S. General Accounting Office, January 2003
The U.S. General Accounting Office has recommended that the U.S. Department of Justice implement a formal system to oversee and validate the accuracy of case classification and conviction data entered in the Executive Office for the United States Attorneys case tracking system. The U.S. Attorney General has accepted this evaluation and has agreed to adopt the recommendation to improve the accuracy and reliability of terrorism-related statistics.

Beyond September 11th: An Account of Post-Disaster Research (PDF)
Natural Hazards Research and Applications Information Center, September 2003
This publication includes selections written by researchers who were mobilized to conduct field investigations in the immediate aftermath of the September 11th disaster. Each selection takes a distinct view of the disaster; their topics span engineering, information technology, and behavioral sciences. The findings, lessons, and recommendations collected in the book are meant to contribute to the further exploration and dissemination of information to help people, localities, and organizations make risk-informed decisions.

Breathing Easier? (PDF)
The Century Foundation, January 2005
This report examines how states and cities used public health funding following the anthrax attacks in fall 2001.

Call-Tracking Data and the Public Health Response to Bioterrorism-Related Anthrax
Centers for Disease Control and Prevention, October 2002
In response to the terrorist attacks on the World Trade Center and the Pentagon in September 2001, preestablished emergency operations centers at the Centers for Disease Control and Prevention were combined into an agencywide Emergency Operations Center (EOC) to help coordinate the public health response. This online article describes the nature and volume of telephone calls received by the EOC.

Collaboration Between Public Health and Law Enforcement: New Paradigms and Partnerships for Bioterrorism Planning and Response
Centers for Disease Control and Prevention, October 2002
The biological attacks with powders containing Bacillus anthracis sent through the mail during September and October 2001 led to unprecedented public health and law enforcement investigations that involved thousands of investigators from federal, state, and local agencies. This online article describes the collaborations between the Centers for Disease Control and Prevention and the FBI during the investigation of the 2001 anthrax attacks and highlights the challenges and successes of public health and law enforcement collaborations in general.

Combating Terrorism: Research Priorities in the Social, Behavioral, and Economic Sciences (PDF)
National Science and Technology Council, May 2005
This report describes the resources and tools that the social, behavioral, and economic sciences offer in creating and maintaining effective anti-terrorism strategies. Much of this research contributes to the understanding of the origins of terrorism, how to prepare for terrorist incidents, and how to deal with the effects of attacks and their mitigation.

Combating Terrorism: Threat and Risk Assessments Can Help Prioritize and Target Program Investments (ASCII or PDF)
U.S. General Accounting Office, April 1998
This report reviews the implementation of the Nunn-Lugar-Domenici (NLD) domestic preparedness program, including an assessment of the program's status and progress, the criteria and methodology used to select cities that receive assistance, the approach used to determine the capabilities and needs of participating cities, and the potential cost of equipping a city to respond to a terrorist incident involving a weapon of mass destruction.

The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction
Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction, March 31, 2005
In this report, the commission concluded that the intelligence community was wrong about Iraq's capabilities regarding weapons of mass destruction. The report includes recommendations for the intelligence community to prevent future intelligence failures. A portion of these recommendations would affect federal law enforcement intelligence efforts and thus, in some measure, the state and local police agencies that work with federal authorities in counter-terrorism activities.

Compensation for Losses from the 9/11 Attacks (PDF)
RAND Corporation, November 2004
This report examines the benefits received by those who were seriously injured and by the families of those who were killed in the 9/11 attacks and the benefits provided to individuals and businesses in New York City due to the attack on the World Trade Center.

Cornerstone Reports
U.S. Immigration and Customs Enforcement
U.S. Immigration and Customs Enforcement seeks to detect and close down vulnerabilities within U.S. financial, trade, and transportation sectors that criminal networks could exploit. Its Cornerstone Reports cover topics related to these financial investigations and potential vulnerabilities in the financial and trade sectors.

Countering the Changing Threat of International Terrorism Countering the Changing Threat of International Terrorism
National Commission on Terrorism, June 2000
This report presents the results of the National Commission on Terrorism's evaluation of laws, policies, and practices for preventing and punishing terrorism directed at American citizens. It focuses on the gap between sound policies and poor implementation.

Counter-Terrorism After 9/11: Justice, Security and Ethics Reconsidered
John Crank and Patricia Gregor, 2004
This book reviews the many facets of the war on terrorism. Terrorism and counter-terrorism are defined and the following topics are discussed: surveillance; preparation for terror; detainment, seizure, registration, and surveillance of Middle-Eastern immigrants in the United States since 9/11; Guantanamo Bay and the treatment of foreign prisoners; critical and ethical assessments of the war on terror; and considerations for governing a free society.

Counter-Terrorism Training Coordination Working Group: 2002 Annual Report (PDF)
Counter-Terrorism Training Coordination Working Group (CTTCWG), 2003
CTTCWG examines the availability, quality, effectiveness, consistency, and coordination of U.S. Department of Justice (DOJ) and non-DOJ justice-related anti-terrorism technical assistance and training activities. The annual report describes the background and implementation of the group and its member agencies and major initiatives.

Covert Biological Weapons Attacks Against Agricultural Targets: Assessing the Impact Against U.S. Agriculture
Belfer Center for Science and International Affairs, August 2001
This report assesses the potential economic impact that an altercation using biological weapons would have on the U.S. agricultural sector.

Crimes Committed by Terrorist Groups: Theory, Research and Prevention Final Report (PDF)
National Institute of Justice, 2005
This report examines terrorists' involvement in a variety of crimes as a means of funding terrorist activities in the face of the decline of state-funded terrorism.

Data Mining: An Overview (PDF)
J.W. Siefert, Congressional Research Service, December 16, 2004
Used to detect fraud, assess risk, and, in the private sector, to retail products, data mining uses data analysis tools to discover patterns and relationships in large datasets. In a homeland security context, data mining is often viewed as a potential means to identifying terrorist activities such as terror financing, communications, and travel by individual terrorists via the tracking of immigration records.

Defense Budget: Tracking of Emergency Response Funds for the War on Terrorism (PDF)
U.S. General Accounting Office, April 2003
This report reviews the Department of Defense's (DOD's) management of emergency response funds. Specifically, the report examines (1) DOD's adherence to the Office of Management and Budget guidance in managing funds, (2) the sufficiency of DOD's guidance on the use of these funds, and (3) DOD's ability to track the use of emergency response funds.

The Diversity of Muslims in the United States: Views as Americans
Qamar-ul Huda, U.S. Institute of Peace, February 2006
Within the context of the war against terrorism and increased attention on the Muslim world, this report analyzes the ways Muslims in the United States understand their roles as Americans in combating terrorism and their unique contributions toward conflict prevention and peacemaking. The assimilation and integration of American Muslims has effectively enabled dozens of national and regional organizations to work in the areas of civil rights, human rights, interfaith dialogue, education, charity, public diplomacy, political activism, and other religious and secular activities.

Effects of Catastrophic Events on Transportation System Management and Operations: Executive Summary of the August 2003 Northeast Blackout, Great Lakes and New York City (Final Report)
U.S. Department of Transportation, May 2004
This report chronicles the incidents of August 14, 2003, in which "a series of seemingly small events" resulted in the largest blackout in U.S. history, affecting eight states and the maritime Canadian provinces. A plan of action to properly respond to possible future events of this magnitude is proposed.

The Emergency Alert System (EAS): An Assessment (PDF)
Partnership for Public Warning, February 2004
This document assesses past and present versions of the Emergency Alert System and makes recommendations for improvements based on significant policy, management, and operational challenges of the current system.

Emergency Responder Injuries & Fatalities: An Analysis of Surveillance Data (PDF)
RAND Corporation, March 2004
This report provides a collection of available data on casualties experienced by the emergency responder community. An analysis of the data, along with the interests and concerns of the emergency responder community and the expertise of staff from the National Institute of Occupational Safety and Health, will help develop potential objectives and related research tasks directed at personal protective technologies for emergency responders.

Estimating Terrorism Risk (PDF)
Rand Corporation, November 2005
The Department of Homeland Security is responsible for protecting the United States from terrorism. It does so partly through the Urban Areas Security Initiative, though its distribution has been criticized for not reflecting risk. This monograph offers a practical definition of terrorism risk and a method for estimating it that addresses inherent uncertainties.

The Evolution of Terrorism as a Global Test of Wills: A Personal Assessment and Perspective (PDF)
S. Sloan, Memorial Institute for the Prevention of Terrorism, 2008
A veteran scholar in the study of terrorism reflects on the evolution of his field and the future of this major threat to national and international security.

Federal Building and Fire Safety Investigation of the World Trade Center: Final Report of the National Construction Safety Team on the Collapse of the World Trade Center Towers (Draft) (PDF)
National Institute of Standards and Technology, June 2005
This final report of a study on the collapse of the World Trade Center towers determines why and how each building collapsed following the initial impact of the aircraft, analyzes the injuries and fatalities in both structures, and determines what procedures and practices were used in the original design, construction, and maintenance of the buildings. The report also lists recommendations to improve the safety of tall buildings, their occupants, and emergency responders based on the investigation of the World Trade Center towers.

Female Suicide Bombers (PDF)
Strategic Studies Institute of the U.S. Army War College, June 2004
This research paper reviews the historical use of female suicide bombers, focuses on their characteristics, analyzes recent changes in their use by various terrorist organizations, and provides implications of change within a strategic assessment of future female suicide bombings.

Foreign Terrorist Organizations (PDF)
Congressional Research Service, Library of Congress, February 2004
This report analyzes the status of many major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. It also characterizes each group in several categories, such as goals and objectives, history, tactics and activities, and areas of operation.

For a Few Dollars More: How al Qaeda Moved Into the Diamond Trade
Global Witness Limited, April 2003
This report chronicles an investigation by the Nobel-nominated Global Witness organization showing how al Qaeda easily infiltrated diamond trading networks. By taking advantage of illicit trading structures, weak government and trade regulations, organized criminal networks, and politically corrupt regimes, al Qaeda has raised funds for their operatives and laundered significant sums of money.

A Global Overview of Narcotics-Funded Terrorist and Other Extremist Groups (PDF)
Federal Research Division, Library of Congress, May 2002
This report assesses the intersection between selected anti-U.S. terrorist and extremist groups and organized crime, specifically related to drug trafficking around the world (e.g., Latin America, Central and East Asia, Southern Europe, and the Middle East) and examines how this relationship may be vulnerable to countermeasures.

The Great Divide: How Westerners and Muslims View Each Other
According to the findings of this survey, conducted in the United States and 12 other countries from March 31­ to May 14, 2006, most Muslims and Westerners believe that relations between them today are generally bad. Yet, despite the deep attitudinal divide between the Western and Muslim publics, this latest survey by the Pew Global Attitudes Project also finds that the views of each toward the other are far from uniformly negative.

Half of Americans Fear Terrorists Might Mount Successful Cyber-Attacks Against Key American Businesses and Utilities (PDF)
Pew Internet & American Life Project, August 2003
Federal Computer Week magazine and the Pew Internet & American Life Project conducted a survey to assess public sentiment about America's emergency preparedness and warning systems 2 years after the September 11 terror attacks. The survey results presented in this memo describe Americans' fear of cyberterrorism, their viewpoints on the current warning system, and where they go for information on terrorism.

Harmony and Disharmony: Exploiting al-Qa'ida's Organizational Vulnerabilities (PDF)
Combating Terrorism Center, February 2006
This theoretically informed analysis, along with assessments of the individual captured documents, contributes to existing bodies of research on al-Qa'ida. It provides several tools for identifying and exacerbating existing fissures as well as locating new insertion points for counter-terrorism operations. It presents an analytical model that lays the foundation for a more intellectually informed approach to counter-terrorism.

Holy War, Inc.: Inside the Secret World of Osama bin Laden
Peter L. Bergen, Touchstone, 2002
In this volume, Peter Bergen, one of a handful of Western journalists who has interviewed Osama bin Laden, recounts the evolution of the al Qaeda terrorist network, characterizing it as "a corporation that has exploited modern technology and weaponry in the service of global terrorism and the destruction of the West." This book is available through libraries, bookstores, and online vendors.

Homeland Security: Selected Recommendations from Congressionally Chartered Commissions and GAO (PDF)
U.S. General Accounting Office (GAO), March 2004
Hundreds of recommendations aimed at improving homeland security strategic planning and program development have been made by nationally chartered commissions and GAO. This report identifies such recommendations and organizes them by critical mission and topical areas.

Hot Programs at Community Colleges (PDF)
American Association of Community Colleges, October 2004
Community colleges represent the largest, fastest growing sector of higher education, currently educating the majority of the nation's first responders, according to the preliminary results of a survey published by the American Association of Community Colleges.

Intelligence Issues for Congress (PDF)
R.A. Best, Jr., Congressional Research Service, February 1, 2005
This report analyzes the most recent developments, proposed and implemented, in the handling of U.S. intelligence matters, including the effects of the 9/11 Commission recommendations, international terrorism, intelligence support to military operations, and recently passed legislation.

Inventory and Assessment of Databases Relevant for Social Science Research on Terrorism (PDF)
Congressional Research Service, November 2003
This report assesses online databases dealing with social science research on terrorism, including web sites that provide data such as names of terrorist organizations and incidents of terrorist activity and those with search capabilities. The sites are maintained primarily by U.S. government agencies, non-U.S. research centers, and international organizations. An appendix lists additional resources that analyze terrorism events and trends.

Islamic Religious Schools, Madrasas: Background (PDF)
F. Armanios and C. M. Blanchard, Congressional Research Service, February 10, 2005
Since the terrorist attacks of September 11, U.S. policymakers have become increasingly interested in Islamic religious schools known as madrasas in the Middle East and Central and Southeast Asia. Some allege ties between madrasas and terrorist organizations; others maintain that most of these religious schools have been blamed unfairly for fostering anti-U.S. sentiments and for producing terrorists. This report reviews madrasas, their role in the Muslim world, and issues related to their alleged financing by Saudi Arabia and other donors. It also addresses related findings of the 9/11 Commission and issues relevant to the 109th Congress.

Islamic Rulings on Warfare
Sherifa D. Zuhur, Ph.D., and Youssef H. Aboul-Enein, October 2004
In this analysis of the rules of war in the Islamic tradition, the authors assert that "suicide bombings are not part of this heritage." According to the authors, terrorist "groups purposely suppress this fact because it does not fit with their agenda," taking advantage of the fact that the majority of Muslims do not speak or read Arabic (the language of the Quran) and therefore allowing radicals to manipulate its varying translations. This Strategic Studies Institute paper provides a solid foundation for those interested in understanding and countering the dogma of terrorists.

The Islamic Traditions of Wahhabism and Salafiyya (PDF)
C.M. Blanchard, Congressional Research Service, February 10, 2005
This report reviews Wahhabi Islam and its association with militant fundamentalist groups. It also summarizes recent charges against Wahhabism, responses to those charges, and related findings of the final report of the 9/11 Commission and bills relevant to the 109th Congress.

Jihad: The Rise of Militant Islam in Central Asia
Ahmed Rashid, Yale University Press, 2002
This book explores terrorism and religious extremism in five central Asian republics (Kazakhstan, Uzbekistan, Turkmenistan, Kyrgyzstan, and Tajikistan) adjacent to Afghanistan and its implications for the United States and the global war on terror.

The Links Between Intellectual Property Crime and Terrorist Financing: Text of Public Testimony of Ronald K. Noble, Secretary General of Interpol
Interpol, July 16, 2003
This testimony was made before a hearing of the U.S. Congress, House of Representatives Committee on International Relations, regarding the links between intellectual property crime and the financing of terrorist organizations.

Local Prosecutors' Response to Terrorism (PDF)
M. Elaine Nugent, James L. Johnson, Brad Bartholomew, and Delene Bromirski, April 2005, Alexandria, VA: American Prosecutors Research Institute for the National Institute of Justice
This study by the research arm of the National District Attorneys Association assesses how prosecutors can best respond to terrorism. It helps discern how new responsibilities for prosecutors under their states' anti-terrorism legislation are implemented at the local level; the challenges associated with integrating local, state, and federal legislation; and strategies for overcoming the challenges posed by homeland security threats.

The Maritime Dimension of International Security: Terrorism, Piracy, and Challenges for the United States (PDF)
RAND Corporation, 2008
Acts of piracy and terrorism at sea are increasing, but little evidence supports the concern of some governments and international organizations that pirates and terrorists are beginning to collude with one another.

Mass Transit Defends Itself Against Terrorism
Steve Dunham, March 2002
In this article by a public transit advocate, the author summarizes the history of attacks on public transportation and discusses the renewed emphasis on security, the role of transportation in emergency response, the risks of different forms of transportation, preparedness planning, and industry responses (including security improvements and public education efforts).

The Middle East Journal
Middle East Institute
This quarterly journal publishes articles dealing with the post-World War II Middle East, including Pakistan, the Caucasus, and Central Asia. Articles are based on original research and analysis and are subject to peer review. The journal also independently reviews books and provides notices of relevant courses and conferences.

Militant Islam in Southeast Asia: Crucible of Terror
Zachary Abuza, Lynne Rienner Publishers, 2003
Drawing on intensive investigation and interviews with key militants, this book explains the emergence of radical Islamist groups in the region and examines Al Qaeda's role as an organizational catalyst. It also analyzes national strategies for combating, co-opting, and coping with militant Islamist groups.

National Commission on Terrorist Attacks Upon the United States: Monograph on Terrorist Financing: Staff Report to the Commission (PDF)
J. Roth, D. Greenburg, and S. Wille, August 21, 2004
Some of the specialized staff work of the National Commission on Terrorist Attacks Upon the United States (the 9/11 Commission), although not appropriate for inclusion in the Commission's final report, offered substantial information or analysis that supplemented the final report and could be prepared to a publishable standard before the Commission expired. This report on terrorist financing represents the work and views of the Commission staff and does not necessarily reflect the views of the Commissioners.

National Emergency Powers (PDF)
Congressional Research Service, Updated February 10, 2006
The President of the United States has certain powers that may be exercised in the event the nation is threatened by crisis, exigency, or emergency circumstances. This report discusses the scope, limits, and restraints on the President in the exercise of these powers.

Nations Hospitable to Organized Crime and Terrorism (PDF)
Federal Research Division, Library of Congress, October 2003
This report assesses conditions that contribute or are potentially hospitable to transnational criminal activity and terrorist activity in selected regions of the world, including countries bordering the United States.

North Korean Counterfeiting of U.S. Currency (PDF)
Congressional Research Service, March 22, 2006
This report discusses North Korea's use of illegal means to fund its merchandise trade deficit, including selling illegal drugs, shipping illegal cargo between third countries, and counterfeiting U.S. currency. It describes what is known from available government information and other open-source media.

Nuclear Threat Initiative: 2001 Annual Report (PDF)
Nuclear Threat Initiative (NTI), 2002
NTI works to strengthen global security by reducing the risk and preventing the spread of weapons of mass destruction. This annual report summarizes the programs and projects undertaken by NTI during its initial year to reduce the gap between the global threats and the global response.

On Their Own Terms: A Lexicon with an Emphasis on Information-Related Terms Produced by the U.S. Federal Government (PDF)
Susan Maret, Ph.D., November 2005
This publication helps the ordinary citizen comprehend the vocabulary and origins of government information policy. The author, an adjunct professor of library science at the University of Denver, provides a concise definition of terms as well as links to official sources.

Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind
Edited by Walter Reich, The Woodrow Wilson Center Press, 1998
This study examines and explains from a psychological perspective the nature and sources of terrorists' beliefs, actions, goals, worldviews, and states of mind. The book is available from libraries, bookstores, and online vendors.

Osama: The Making of a Terrorist
Jonathan Randal, Alfred A. Knopf/Random House, 2004
Jonathan Randal has compiled all known information on Osama Bin Laden to provide a personality sketch of the world's most notorious terrorist. He has also traced Bin Laden's finances worldwide, explaining how Al Qaeda has misused the traditional Middle-Eastern hawala system to fund terrorism. To learn further details addressed in this work, listen to the National Public Radio archived interview with the author entitled Book Explores Bin Laden's Mystique. Osama: The Making of a Terrorist is available through bookstores, libraries, and online vendors.

Overstay Tracking: A Key Component of Homeland Security and a Layered Defense (PDF)
U.S. General Accounting Office, May 21, 2004
This report describes the extent of and implications related to foreign visitors overstaying their authorized periods of admission in the United States, particularly the impact that the weak tracking system and significant levels of overstaying may have on domestic security.

Partnerships in Preparedness: A Compendium of Exemplary Practices in Emergency Management, Volume IV (PDF)
Federal Emergency Management Agency, January 2000
This publication contains information about more than 30 exemplary emergency management programs. Each entry includes a program description and information about the program's budget, funding sources, and target population. Programs are listed alphabetically by state and indexed by title, subject, location, and contact for ease of use. Also see earlier volumes.

Public Safety Communications: Policy, Proposals, Legislation and Progress (PDF)
Congressional Research Service, Updated June 8, 2005
This report provides an analysis of major federal policy questions regarding public safety communications, including unifying spectrum policies, goals, and concerns; using signal-corps type skills and technology to achieve interoperability; and evaluating the pace and effectiveness of federal actions taken to date.

Progress Report on Implementing the “Intelligence Reform and Terrorism Prevention Act of 2004” (PDF)
Director of National Intelligence, May 2006
This report to Congress, recently unclassified, outlines first-year progress on implementing the Intelligence Reform and Terrorism Prevention Act of 2004 and its effectiveness.

Review of EPA Homeland Security Efforts: Safe Buildings Program Research Implementation Plan
National Academies Press, 2003
This book presents findings and recommendations from a review of the Research Implementation Plan (RIP), a component of the Environmental Protection Agency's Safe Buildings Program. RIP outlines research areas, proposals, and timeframes of the Safe Buildings Program. It is designed to address building protection and decontamination needs, identify high-priority needs for immediate action, and determine how to meet those needs.

Saudi Arabia: Terrorist Financing Issues (PDF)
A. Prados, Congressional Research Service, December 8, 2004
The final report of the 9/11 Commission indicated that no evidence could be found that the Saudi government or senior Saudi officials funded al Qaeda. However, the report also stated that Saudi Arabia "was a place where al Qaeda raised money directly from individuals and through charities," including those with, "significant Saudi government sponsorship" which may have diverted funding to al Qaeda. This report explores what is known concerning this finding, updating the Congressional Research Service's Saudi Arabia: Current Issues and U.S. Relations.

Science and Technology: A Foundation for Homeland Security (PDF)
Office of Science and Technology Policy, April 2005
This document details the accomplishments in science and technology that have helped to secure the nation. Some of these achievements include bolstering border security by developing and deploying nuclear detection equipment, providing an early warning system for biothreats through Project BioWatch, and expediting development and procurement of new medical countermeasures against chemical, biological, radiological, and nuclear terrorist threats through Project BioShield.

Science and Technology Snapshots
U.S. Department of Homeland Security's Science and Technology Directorate
This free newsletter features stories about current research projects and opportunities with laboratories, universities, government agencies, and the private sector.

September 11: Recent Estimates of Fiscal Impact of 2001 Terrorist Attack on New York (PDF)
U.S. Government Accountability Office, March 2005
This report indicates that previous estimates of New York tax revenue losses from the terrorist attack on September 11, 2001, were less severe than initially expected; however, the measurement of the attack's effect on economic activity and tax revenues is difficult to assess and report on accurately.

Small-scale Terrorist Attacks Using Chemical and Biological Agents: An Assessment Framework and Preliminary Comparisons (PDF)
Dana A. Shea and Frank Gottron, Congressional Research Service, May 20, 2004
This report addresses the potential use of chemical and biological (C/B) agents, including toxins, as part of a small-scale, targeted attack. The material is designed to be used as a potential springboard to assess and prioritize responses to various C/B agents.

A Special TRAC Report: Criminal Enforcement Against Terrorists
Transactional Records Access Clearinghouse (TRAC), Syracuse University, December 2001
This special report discusses the gap between the number of reported federal investigations of terrorists and the number of cases referred to the U.S. Department of Justice for prosecution, describes reasons for the discrepancy, and presents other indicators of federal efforts to contain domestic and international terrorism.

Spent Nuclear Fuel: Options Exist to Further Enhance Security (PDF)
U.S. General Accounting Office, August 2003
Based on studies by the U.S. Department of Energy and the Nuclear Regulatory Commission, this report concluded that the risk of radiological contamination to the public in the event of a terrorist attack or accident would be low. It noted that the spent fuel from nuclear reactors is difficult to disperse and is secured in protective metal containers. Pervasive harm could only occur under extreme circumstances involving spent fuel stored in storage pools.

Terror in the Mind of God: The Global Rise of Religious Violence
Mark Juergensmeyer, University of California Press, © 2000/2001/2003
This study of religious terrorism includes personal interviews with 1993 World Trade Center bomber Mahmud Abouhalima, Christian Right activist Mike Bray, Hamas leaders Sheik Yassin and Abdul Azis Rantisi, and Sikh political leader Simranjit Singh Mann. The newest revision is set for release in September 2003. This book is available through libraries, bookstores, and online vendors.

Terrorism and National Security: Issues and Trends (PDF)
Raphael Perl, Congressional Research Service, July 6, 2004 (update)
This brief examines international terrorist actions, terrorist threats, and U.S. policy response.

Terrorism and Organized Hate Crime Intelligence Gathering, Analysis, and InvestigationsTerrorism and Organized Hate Crime Intelligence Gathering, Analysis, and Investigations
Michael R. Ronczkowski, CRC Press, 2004
The author provides a framework for exploring the issues encountered by new and existing analysts and investigators, including what information to gather and how to analyze it and the effectiveness of crime analysts investigating terrorism. This book is available through libraries, bookstores, and online vendors.

Terrorism and Political Violence
Frank Cass Publishers, Published Quarterly
In addition to focusing on the political meaning of terrorist activity, this journal examines related forms of violence by rebels and states, and the links among political violence, organized crime, protest, rebellion, revolution, and human rights.

Terrorism: What's Coming—The Mutating Threat (PDF)
Memorial Institute for the Prevention of Terrorism, 2007
In this report, experts read behind the alarming headlines and revelations of new terrorist plots, look back in time to spot long-term trends, peer forward to discern how terrorism might evolve, distill lessons learned, and offer new strategies.

Terrorist Financing: U.S. Agencies Should Systematically Assess Terrorists' Use of Alternative Financing Mechanisms (PDF)
U.S. General Accounting Office, November 14, 2003
This report assesses the nature of terrorists' use of key alternative financing mechanisms for earning, moving, and storing assets; what is known about the extent of terrorists' use of alternative financing mechanisms; and challenges the U.S. government faces in monitoring terrorists' use of alternative financing.

Terrorist and Organized Crime Groups in the Tri-Border Area (TBA) of South America (PDF)
Federal Research Division, Library of Congress, July 2003
This report assesses the activities of organized crime groups, terrorist groups, and narcotics traffickers in the border area of Argentina, Brazil, and Paraguay. It concludes that since 1999 Islamic terrorist groups have used this area for fundraising, recruiting, and plotting terrorist attacks.

Transportation Security: Agenda for the 21st Century (PDF)
Transportation Research Board TR News, November-December 2000
This article discusses the need for counter-terrorism planning and increased security in the transportation industry. It examines threats to public transportation, bottom-line concerns, and resource investment and allocation.

Trends in State Terrorism Preparedness
National Emergency Management Association, December 2001
This report presents a snapshot of domestic preparedness activities in each state, showcasing common as well as unique approaches.

The USA PATRIOT Act: A Legal Analysis (PDF)
Charles Doyle, Congressional Research Service, April 15, 2002
This report explains several legislation aspects embodied by the USA PATRIOT Act: criminal and foreign intelligence investigations, money laundering, alien terrorists and victims, and crimes and penalties. An abbreviated version of this report (The USA PATRIOT ACT: A Sketch) is also available.

When Terrorism Hits Home: How Prepared Are State and Local Law Enforcement? (PDF)
RAND Corporation, November 2004
This document presents the results of a 2002 survey conducted by RAND, one year after the 9/11 attacks and prior to the formation of the U.S. Department of Homeland Security, assessing how prepared for terrorism are state and local law enforcement agencies.

Wrong Then, Wrong Now: Racial Profiling Before & After September 11, 2001 (PDF)
Leadership Conference on Civil Rights Education Fund, 2003
In the months preceding September 11, a national consensus emerged on the need to combat racial profiling. In the fearful aftermath of the terrorist attacks, some reevaluated their views. This report compares the post-September 11 practice of "traditional" street-level racial profiling of Arabs, Muslims, and South Asians. It concludes that profiling is just as wrong now as it was before the war on terrorism began.

History & Statistics

9/11 and Terrorist Travel: Staff Report of the National Commission on Terrorist Attacks Upon the United States (PDF)
T.R. Eldridge, S. Ginsburg, W.T. Hempel II, J.L. Kephart, and K. Moore, August 21, 2004
Some of the specialized staff work of the National Commission on Terrorist Attacks Upon the United States (the (9/11 Commission), although not appropriate for inclusion in the Commission's final report, offered substantial information or analysis that supplemented the final report and could be prepared to a publishable standard before the Commission expired. This study on immigration, border security, and terrorist travel issues represents the work and views of the Commission staff and does not necessarily reflect the views of the Commissioners.

2002 Yearbook of Immigration Statistics
U.S. Department of Homeland Security (DHS), October 2003
Offered on behalf of DHS, this technical report provides immigration-related data and historical information. A few of the topics explored include immigrants admitted for lawful permanent residence, refugees approved and admitted, aliens naturalized, and deportable aliens located and removed. Printed copies can be obtained by calling the National Technical Information Service at 1-800-553-6847 or 703-605-6000.

A Chronology of Significant International Terrorism for 2004 (PDF)
National Counterterrorism Center, April 29, 2005
The National Counterterrorism Center (NCTC) compiled this chronology in support of the U.S. Department of State's Patterns of Global Terrorism (renamed Country Reports on Terrorism). Because of the methodology used, however, the chronology does not accurately reflect the totality of terrorist incidents worldwide and could lead to anomalous and potentially inaccurate results. NCTC therefore will follow this release in June 2005 with a more comprehensive dataset with regular updates to better inform the public.

Country Reports on Terrorism
U.S. Department of State
These annual reports by the Department of State provide Congress with a complete report on terrorism for 22 countries, including detailed assessments of foreign countries where significant terrorist acts occurred and countries that are known to support international terrorism. Before the 2004 report, this series was entitled Patterns of Global Terrorism.

Cuba and the State Sponsors of Terrorism List (PDF)
Congressional Research Service, Updated May 12, 2005
This publication traces the history of, rationale for, and related issues surrounding Cuba's placement and retention on the U.S. Department of State's list of states that sponsor international terrorism.

Cuba: Issues for the 109th Congress (PDF)
Congressional Research Service, Updated May 25, 2005
This report offers a historical overview of U.S. policy toward Cuba since the 1959 revolution and the installation of the Castro regime. It discusses tightened U.S. sanctions against that country, the status of cooperative illicit drug interdiction, Cuba and terrorism, and pertinent immigration issues.

Fact Sheet—Foreign Terrorist Organizations
U.S. Department of State, October 2005
Foreign terrorist organizations (FTOs) are foreign organizations that are designated as such by the U.S. Secretary of State in accordance with section 219 of the Immigration and Nationality Act, as amended. FTO designations play a critical role in the fight against terrorism and are an effective means of curtailing support for terrorist activities and pressuring groups to get out of the terrorism business.

Federal Funding To Combat Terrorism, Including Defense Against Weapons of Mass Destruction, FY 1998-2001
Center for Nonproliferation Studies, 2001
This resource presents tables showing federal funding in aggregate and by agency, allocated to combat terrorism for fiscal years 1998-2001. Requested federal funding for fiscal year 2001 is included.

Foreign Terrorist Organizations
U.S. Department of State
Published every 2 years by the Secretary of State, this report provides a comprehensive list of designated foreign terrorist organizations.

Frontline: In Search of bin Laden (a.k.a. Hunting bin Laden)
Public Broadcasting Service
This PBS-produced video and its companion web site investigate the life, ideology, and crimes of Osama bin Laden and the al Qaeda terrorist network.

The Future of Jemaah Islamiyah and the Radical Islamist Challenge in Southeast Asia (PDF)
Z. Abuza, Strategic Studies Institute of the U.S. Army War College, April 2005
Dr. Zachary Abuza, author of Militant Islam in Southeast Asia: Crucible of Terror, prepared this slide briefing as part of a panel presentation entitled “The Radical Islamist Challenge” at the U.S. Army War College (USAWC) 16th Annual Strategy Conference. It provides specific information about radical groups in Southeast Asia, their members and leaders, and recent terrorist events.

Iran's Nuclear Program: Recent Developments (PDF)
Congressional Research Service, Updated August 2, 2005
This report outlines the history of Iran's 50-year-old nuclear program, focusing on recently discovered activities that have potential application for nuclear weapons.

Jihad: The Trail of Political Islam
Gilles Kepel, Harvard University Press, 2002
This book places the events of September 11, 2001 within a historical framework by following the history and geography of the Islamist political-religious phenomenon over the last 25 years of the twentieth century.

Jihadi Tactics and Targeting Statistics (PDF)
IntelCenter, October 2006
This timeline covers attacks by Al Qaeda and its affiliates and their targets.

Major Conventional Terrorist Incidents 1980s to 2000
Center for Nonproliferation Studies, 2000
This chronology briefly describes more than 15 major terrorist incidents that occurred in the United States and abroad between 1980 and 2000.

Major Terrorism Events and Their U.S. Outcomes (1988–2001) (Working Paper #107)
National Hazards Research & Applications Information Center, Institute of Behavioral Science, University of Colorado, March 2003
This report documents and examines major terrorist events from 1988 to 2001. The report outlines the findings of a project designed to (1) systematically identify and analyze major defining events and document them in a narrative chronology, (2) identify and describe the major outcomes from each defining event, and (3) describe the causal relationships between the events and their major outcomes.

The MIPT Terrorism Annual, 2004 (PDF)
National Memorial Institute for the Prevention of Terrorism (MIPT), 2005
This yearbook is designed to further the vital link between policymakers, emergency responders, public officials, scholars, and the public.

National Atlas of the United States National Atlas of the United States®
This largely digital edition of the National Atlas of the United States delivers easy to use, maplike views of America’s natural and sociocultural landscapes. The interactive browser allows users to make their own maps. This resource can also be used to view detailed aerial photographs and large-scale topographic maps.

National Transportation Statistics (PDF)
U.S. Department of Transportation, April 2001
This annual publication presents information on the U.S. transportation system, including its physical components, safety record, economic performance, energy use, and environmental impacts.

Political Violence Against Americans (PDF)
U.S. Department of State, 1998
This annual report provides an overview of the political violence that American citizens and interests encounter abroad. Incidents are selected based on their seriousness, the use of unusual tactics or weapons, or the specific targeting of representatives of the United States.

Tabernacle of Hate: Why They Bombed Oklahoma City
Kerry Noble, Voyageur Publishing, 1998
As a former leader of a right-wing, extremist, Christian Identity organization, the author provides a unique view of this movement, which has been closely linked with domestic terrorism. This book is available through libraries, bookstores, and online vendors.

Terrorism in the United States, 1999 (PDF)
Federal Bureau of Investigation, 1999
This annual publication reviews the current year's terrorist incidents, suspected terrorist incidents, arrests that prevented terrorist attacks, and other significant events. The report also describes 30-year feuds in domestic and international terrorism and the FBI's response.

Terrorism: Middle Eastern Groups and State Sponsors, 1999
Congressional Research Service, August 1999
This report analyzes developments in Middle Eastern terrorism between January 1998 and June 1999. It discusses groups attempting to derail the Arab-Israeli peace process; those fighting to overthrow moderate, pro-U.S. governments; and those attempting to cause the United States to withdraw its troops from Middle Eastern countries. It contains an extensive section on terrorist financier Usama bin Laden and his organization.

Unclassified Report to Congress on the Acquisition of Technology Relating to Weapons of Mass Destruction and Advanced Conventional Munitions
Central Intelligence Agency, September 2001
This report summarizes (by country) all acquisition activities related to weapons of mass destruction, including nuclear, chemical, biological, and advanced conventional weapons, that occurred between July 1, 2000, and December 31, 2000.

WMD Terrorism and Usama bin Laden
Center for Nonproliferation Studies, March 2001
This report discusses the trial of Usama bin Laden and others for the August 7, 1998, bombings of the U.S. embassies in Kenya and Tanzania and describes bin Laden's efforts to acquire weapons of mass destruction.

The Wolves of Islam: Russia and the Faces of Chechen Terrorism
P. Murphy, Potomac Books, Inc., 2004
The author, an academician and former U.S. counter-terrorism official, provides his personal analysis of the Chechen terrorists who have sought to drive Russia out of the North Caucasus by carrying out acts of violence against Slavic and Chechen noncombatants alike. Based on his extensive experience and travels throughout Russia, including the entire North Caucasus region, he recounts the history of Russo-Chechen conflicts, concentrating on recent actors, events, and tactics that resulted in Chechnya's declared independence from the Russian Federation and three subsequent wars. This book examines the central groups and individuals responsible for terrorist acts rather than providing a comprehensive study of the political, military, and humanitarian issues surrounding Chechnya.

The World Factbook 2008 The World Factbook 2008
Central Intelligence Agency
Updated periodically throughout the year, the World Factbook provides information on a country's background, geography, people, government, economy, communications, transportation, military, and transnational issues.