Skip to Main ContentCounter-Terrorism Training and Resources for Law Enforcement
FAQsSite MapContact UsSite Updates
Mission
Training and Technical Assistance
Conferences
Funding
Research and Statistics
Equipment
Planning and Risk Assessment
Publications
Legislation
Victim Assistance
Community Preparedness
Start of Main Content
Publications

Threat Assessment

2002 NASRO School Resource Officer Survey (PDF)
National Association of School Resource Officers, September 2002
Produced for the National Association of School Resource Officers, this final report presents findings from the Second Annual National Survey of School-Based Police Officers. According to the survey, 95 percent of school-based police officers believe that their schools are vulnerable to a terrorist attack; 79 percent believe that schools within their district are not adequately prepared to respond to such an attack.

2008 Counterterrorism Calendar
National Counterterrorism Center, 2008
This version of the Counterterrorism Calendar contains information on terrorist groups and wanted terrorists, as well as technical pages on threat-related issues. It marks dates according to the Gregorian and Islamic calendars and contains both dates significant in terrorism history and dates that terrorists may consider when planning “commemoration-style” attacks. This online publication is designed for anyone concerned with counter-terrorism or terrorist threats, but primarily for readers in the United States.

A Future for the Young: Options for Helping Middle Eastern Youth Escape the Trap of Radicalization
RAND Corporation, 2006
This report discusses the results of a workshop held in September 2005 sponsored by RAND's Center for Middle East Public Policy and the Initiative for Middle East Youth. Workshop participants discussed reasons young people join jihadist groups and what might be done to prevent this or to disengage members of such groups once they have joined. The presentations and discussion focus on contemporary cases and draw on previous case studies, including inner-city street gangs, the Baader Meinhof gang, the Irish Republican Army, and others.

Al Qaeda: Profile and Threat Assessment (PDF)
K. Katzman, Congressional Research Service, February 10, 2005
This report summarizes current thinking on the threat posed by Al Qaeda and Al Qaeda sympathizers.

Al Qaeda After the Iraq Conflict (PDF)
Audrey Cronin, Congressional Research Service, May 23, 2003
This report analyzes current viewpoints about the strength of al Qaeda and the threat it poses to the United States. It questions whether al Qaeda can launch additional major attacks of strategic impact or whether the organization is now largely relegated to low-level tactical attacks. This report will be updated when warranted.

Center for Contemporary ConflictAl-Qaeda and Mass Casualty Terrorism: Assessing the Threat (PDF)
Center for Contemporary Conflict, October 2003
This report defines the threat that al-Qaeda still poses to the United States and the rest of the world, reviewing past attempts of the group to develop weapons of mass destruction and areas in the nation that may be vulnerable to and exploitable by al-Qaeda.

Al-Qaeda Attack/Messaging Statistics, v 1.0, Public Release Version (PDF)
IntelCenter, August 22, 2003
To further an understanding of past trends and assist in threat assessment, this report provides a statistical breakdown of the timing of attacks by al Qaeda during the past 5 years. It also includes an analysis of public and semipublic messaging by this group since 1993.

Al-Qaeda Targeting Guidance - v1.0 (PDF)
IntelCenter, April 1, 2004
This booklet serves as an English translation of "The Targets Inside the Cities," which appeared in Camp al-Battar Magazine, a training and targeting guide published by Al Qaeda. It advises members and jihadis across the world of specific religious, economic, and human target classes upon which to focus efforts.

Al-Qaida Terrorist Selection and Recruitment
Sara A. Daly and Scott Gerwehr, originally published in McGraw-Hill Homeland Security Handbook, chapter 5, p. 73–89, © 2005, reprinted in 2006 by RAND with permission
This document describes various models that al Qaida may be using to attract new members, its approaches to recruitment, and characteristics of potential recruits. It also looks at “nodes-centers of activity,” such as mosques, universities, and charities—places where al Qaida recruits new members and where potential recruits are likely to become acquainted with the radical “jihadist” world view.

Al-Suri's Doctrines for Decentralized Jihadi Training—Part 1
Al-Suri's Doctrines for Decentralized Jihadi Training—Part 2
Brynjar Lia, Terrorism Monitor, Vol. 5, Issues 1 and 2, Jamestown Foundation, January and February 2007
According to the author, the evolution toward smaller, more autonomous and decentralized organizational structures has been a key trend in jihadi terrorism during the past few years as a result of successful counterterrorism efforts. These terrorist "defeats" have been analyzed by jihadi theoreticians, and have led them to search for effective ways to operate in a much less permissive security environment. This two-part article outlines and discusses al-Qaeda veteran Mustafa bin Abd al-Qadir's (pen name Abu Mus'ab al-Suri) training doctrine, The Call to Global Islamic Resistance , and briefly assesses its potential importance for the new generation of jihadis.

America's Publicly Available Geospatial Information: Does it Pose a Homeland Security Risk? (PDF)
RAND National Defense Research Institute, 2004
This research brief discusses an analytical process that U.S. officials can use to assess and filter publicly available geospatial information that has homeland security implications.

Analyzing Terrorism Risk (PDF)
RAND Corporation, July 2006
Written testimony submitted to the House Financial Services Committee, Subcommittee on Oversight and Investigations, and the House Homeland Security Committee, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment on July 25, 2006
Over the past 4 years, Congress and the U.S. Department of Homeland Security have made tremendous progress in maturing homeland security policy. The U.S. Government is currently in the early phases of the next step, which is to focus on risk reduction and cost effectiveness.

Annual Report—Privacy Office Annual Report to Congress (PDF)
U.S. Department of Homeland Security, July 2004–July 2006
Federal law requires that the Department of Homeland Security report each year on “activities of the department that affect privacy, including complaints of privacy violations, implementation of the Privacy Act of 1974, internal controls, and other matters.”

Aptitude for Destruction: Volume 1: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism (PDF) & Volume 2: Case Studies of Organizational Learning in Five Terrorist Groups (PDF)
RAND Corporation, 2005
These reports discuss the need to better understand how terrorist groups become more effective and dangerous, and to analyze the current understanding of group learning and the factors that influence it.

Arms Without Borders: Why a Globalised Trade Needs Global Controls (PDF)
Oxfam, October 2006
According to a report by Oxfam's Arms Control Campaign, the globalization of the arms industry has opened major loopholes in arms export regulations, allowing arms to be sold to human rights abusers and countries under arms embargoes. (Please allow sufficient time for document to open.)

Assessing the Threat of WMD Terrorism
Center for Nonproliferation Studies, August 2001
This report assesses the likelihood of a terrorist attack involving weapons of mass destruction (WMD) and recommends further empirical study based on analyses of case histories and emerging threats. The report includes a list of web-based resources for further reading.

Assessing the Tradecraft of Intelligence Analysis (PDF)
RAND Corporation, 2008
This report assesses the tradecraft of intelligence analysis throughout the main U.S. intelligence agencies and recommends improvements in analysis for a world of threats very different from that of the Cold War. The report focuses on the two essentials of intelligence analysis—people and the tools they have available.

Assessing Threats of Targeted Group Violence: Contributions From Social Psychology (PDF)
National Threat Assessment Center, 1999
Recent increases in domestic and international acts of extremist violence perpetrated against American citizens have prompted an increased need for information. To help understand and evaluate the threat posed to U.S. targets by extremist groups and their individual members, this article summarizes research on group behavior and the effects of group membership on individual behavior, proposes specific questions to consider in evaluating the risk for violence by groups and by individuals influenced by groups, and suggests further research needs.

An Assessment of Non-Lethal Weapons Science and Technology (PDF)
National Research Council of the National Academies, February 2003
Nonlethal weapons are designed to minimize fatalities and limit undesired damage to property and the environment. This report describes developments in nonlethal technology, identifies promising research areas, and addresses other issues related to nonlethal weapons, including training, handling, and operational concepts.

Bioterrorism: Preparedness Varied Across State and Local Jurisdictions (PDF)
U.S. General Accounting Office, April 2003
This report offers information on state and local preparedness and state and local concerns regarding the federal role in funding and improving preparedness. To gather this information, the U.S. General Accounting Office visited seven cities and their respective state governments, reviewed documents, and interviewed officials.

Bioterrorism as a Public Health Threat
Emerging Infectious Diseases, July-September 1998
This article describes many aspects of bioterrorism and its prospects for use. The author gives special attention to the possibility of biological attacks using smallpox.

Border Security: Strengthened Visa Process Would Benefit From Additional Management Actions by State and DHS (PDF)
U.S. Government Accountability Office, September 13, 2005
This report focuses on actions taken since 2002 to strengthen the visa process and areas that need additional attention. It discusses the status of the assignment of U.S. Department of Homeland Security (DHS) personnel to U.S. consular posts overseas. GAO recommends further improvements to both the visa process and DHS's Visa Security Program. It also recommends that the FBI and visa adjudicators increase their sharing of criminal information and allow DHS personnel in Saudi Arabia the flexibility to determine the extent of their application reviews.

Building a Disaster-Resistant University (Draft) (PDF)
Federal Emergency Management Agency, May 2000
This report details actions that universities can take to prevent and mitigate the effects of disasters. Chapters include information on the characteristics of a disaster-resistant university, risk assessments, and loss-reduction plans.

The Center for the Study of High Consequence Event Preparedness and Response
Johns Hopkins University, December 12, 2005
This Homeland Security Center of Excellence will study deterrence, prevention, preparedness, and response, including issues such as risk assessment, decisionmaking, infrastructure integrity, surge capacity, and sensor networks. In particular, it will study the interactions of networks and the need to use models and simulations.

Challenges of Applying Risk Management to Terrorism Security Policy [Testimony] (PDF)
RAND Corporation, 2008
The factors that determine terrorism risk—threat, vulnerability, and consequences—are by nature uncertain. This testimony discusses the difficulties in assessing terrorism risk, evaluating alternatives for managing terrorism risk, and building capacity for risk-informed decisionmaking.

Chemical Facility Security (PDF)
Congressional Research Service, Updated July 29, 2005
This report evaluates the proposed requirements for reducing risks to the general public of exposure to hazardous chemicals as a result of a terrorist attack at facilities where chemicals are produced, processed, stored, and used. In addition to describing the types of terrorist acts that could threaten a chemical facility, this report explores the federal mandates and incentives for reducing the risk of accidental releases from facilities and the Administration's and private sector's initiatives to improve security at chemical facilities.

Coin and Currency Production: Issues Concerning Who Should Provide Security (PDF)
U.S. General Accounting Office, July 18, 2003
This study from GAO addresses security issues at organizations (e.g., the U.S. Mint and Bureau of Engraving and Printing) that produce or handle large amounts of cash. It examines thefts and actions taken to prevent recurring thefts and analyzes the costs and benefits between using internal security and contracted security (e.g., the Secret Service Uniformed Division).

Combating Nuclear Smuggling: DHS's Decision to Procure and Deploy the Next Generation of Radiation Detection Equipment Is Not Supported by Its Cost-Benefit Analysis (PDF)
U.S. Government Accountability Office, March 14, 2007
Radiation detection portal monitors are an important resource in our nation's defense against nuclear smuggling. The Department of Homeland Security (DHS) has sponsored research, development, and testing activities to develop a modified portal monitor, known as the advanced spectroscopic portal monitor, that costs six times more than the current portal monitor. This report reviews a DHS cost-benefit analysis of the new portal monitors, and discusses whether this analysis provides an adequate basis for DHS's decision to purchase and deploy new portal monitors.

Combating Nuclear Terrorism: Federal Efforts to Respond to Nuclear and Radiological Threats and to Protect Emergency Response Capabilities Could Be Strengthened (PDF)
U.S. Government Accountability Office, September 21, 2006
The U.S. Department of Energy (DOE) maintains an emergency response capability to quickly respond to potential nuclear and radiological threats in the United States. This report discusses the capabilities and assets available to prevent and respond to potential nuclear and radiological attacks in the United States; the physical security measures in place at two key DOE emergency response facilities and whether they are consistent with DOE guidance; and the benefits of using DOE aerial background radiation surveys to enhance emergency response capabilities.

Combating Terrorism: Assessing the Threat of Biological Terrorism (PDF)
RAND, October 2001
This report presents testimony before the House Subcommittee on National Security, Veterans Affairs, and International Relations on biological terrorism—the feasibility and likelihood of terrorist groups using biological or chemical weapons and what the government can and should do to deal with biological or chemical threats.

Combating Terrorism: Assessing Threats, Risk Management, and Establishing Priorities
Center for Nonproliferation Studies, July 2000
This report presents testimony before the House Subcommittee on National Security, Veterans Affairs, and International Relations on terrorism threat assessments and risk management strategies.

Combating Terrorism: Considerations for Investing Resources in Chemical and Biological Preparedness (PDF)
Committee on Governmental Affairs, October 2001
This report presents testimony before the Senate Committee on Governmental Affairs on applying a risk management approach to determine which chemical or biological agents are of greatest immediate concern and initially investing resources in efforts with broad applicability.

Combating Terrorism: Law Enforcement Agencies Lack Directives to Assist Foreign Nations to Identify, Disrupt, and Prosecute Terrorists (PDF)
U.S. Government Accountability Office, May 25, 2007
Three U.S. national strategies, developed in the wake of the 9/11 attacks, direct U.S. law enforcement agencies (LEAs) to focus on the prevention of terrorist attacks by intensifying their efforts to help foreign nations identify, disrupt, and prosecute terrorists. This report assesses the guidance provided for LEAs to carry out these tasks and the extent to which LEAs have employed this guidance.

Commercial Radioactive Sources: Surveying the Security RisksCommercial Radioactive Sources: Surveying the Security Risks (PDF)
Center for Nonproliferation Studies, January 2003
This study examines the security risks posed by commercial radioactive sources. One of the study's major findings shows that only a small percentage of commercial radioactive sources used globally pose inherent security risks. Highly radioactive materials that are easily carried and dispersed pose the greatest threat.

Conference Proceedings—The Radicalization of Diasporas and Terrorism:
A Joint Conference by the RAND Corporation and the Center for Security Studies, ETH Zurich (PDF)
Bruce Hoffman et al., RAND Corporation, 2007
Over the past 2 years, certain diaspora communities, frustrated with a perceived war against the Muslim world, have turned against their adopted homelands, targeting the government and its people by supporting terrorist attacks against Western countries through recruitment, fundraising, and training. This conference addressed the challenge of identifying emerging threats in diaspora communities while avoiding the alienation of these groups and the adoption of only reactive policies with regard to this growing threat.

Counterterrorism and the Integration of Islam in Europe
Foreign Policy Research Institute, July 2006
Samuel Huntington's theory of a global confrontation between Islam and “the West” is particularly attractive in Europe, where problems with Islamic minorities are regarded as local skirmishes in an international struggle at the heart of which lie values, symbols, and identity, and where conflicts over what to do with Muslims have reopened old debates about the position of religion in society and have created unlikely political alliances.

Counterterrorism: The Changing Face of Terror
Online video of hearing before the Committee on Foreign Relations, U.S. Senate, 109th Congress, 2nd Session, June 13, 2006
As terrorist tactics continue to evolve, so too must the international community's strategy to defeat them, according to expert U.S. counterterrorism officials testifying before Congress.

Country Analysis Briefs: All Countries
Energy Information Administration
This e-mail newsletter analyzes major energy issues based on the best open-source intelligence available, as well as maps and charts. It covers approximately 70 countries and 10 special topics related to international energy markets and their security. These reports are generally updated on an annual basis; subscribers are notified of updates and new publications.

Country Reports on Terrorism 2007
U.S. Department of State, April 2008
This report fulfills the congressional requirement that the Secretary of State provide, by April 30 of each year, a complete account of terrorism and those countries and groups meeting criteria set forth in the legislation.

Crime in the United States: Preliminary Semiannual Uniform Crime Report
Federal Bureau of Investigation, U.S. Department of Justice, January 7, 2008
In the first 6 months of 2007, crime rates dropped for the first time in 2 years. Nationwide, violent crime fell 1.8 percent and property crime, 2.6 percent, compared with the same period in 2006. This report includes crime statistics for larger cities, regions, and the nation. 

Cyber Protests: The Threat to the U.S. Information Infrastructure (PDF)
National Infrastructure Protection Center, 2001
This report discusses the growing threat of cyber protests and provides examples of recent events.

Dam Safety and Security in the United States: A Progress Report on the National Dam Safety Program, Fiscal Years 2004 and 2005
Federal Emergency Management Agency, U.S. Department of Homeland Security, September 2006
The Dam Safety and Security Act of 2002 (Public Law 107-310) reauthorized the National Dam Safety Program and required the director of the Federal Emergency Management Agency to submit a biennial report to Congress describing the status of the program, the progress achieved by the federal agencies during the two preceding fiscal years in implementing the federal guidelines for dam safety, and the progress achieved by the states participating in the program. This biennial report highlights the program's progress for fiscal years 2004 and 2005.

Dangerous Thresholds: Managing Escalation in the 21st Century (PDF)
RAND Corporation, 2008
Historical examples and the analysis of two modified Delphi exercises augment an examination of approaches to escalation management within the demands of today's security environment and its attendant threats involving not only long-standing nuclear powers, but also insurgent groups and terrorists.

The Darker Bioweapons Future (PDF)
Central Intelligence Agency, Directorate of Intelligence, November 3, 2003
A panel of life science experts concluded that advances in biotechnology, coupled with the difficulty in detecting nefarious biological activity, have the potential to create a more dangerous biological warfare threat.

Dateline DEA
U.S. Drug Enforcement Administration
This free biweekly electronic newsletter provides the latest information on America 's fight against drugs.

Defending America: Asymmetric and Terrorist Attacks with Biological Weapons (PDF)
Center for Strategic and International Studies, February 2001
This report explores various aspects of bioterrorism, including possible avenues of attack, potential threats, and possible solutions and preventative measures.

Detention and Removal of Illegal Aliens (PDF)
U.S. Immigration and Customs Enforcement, April 2006
This report assesses the U.S. Department of Homeland Security's Immigration and Customs Enforcement program for detaining and removing illegal aliens apprehended in the United States and at ports of entry. It is based on interviews with employees and officials of relevant agencies and institutions, direct observations, and a review of applicable documents.

Developing and Testing a Method for Using 911 Calls for Identifying Potential Pre-Planning Terrorist Surveillance Activities (PDF)
RTI International for the National Institute of Justice, May 2008
This report describes a project in which researchers developed and tested a process that analyzes the data from 911 calls for service to identify potential terrorist threats. This process does not require complex analyses and software tools so jurisdictions will not have to drain scarce resources to track suspicious behavior revealed through 9-1-1 calls.

Direct Assaults Against Presidents, Presidents-Elect, and Candidates (PDF)
Congressional Research Service, Updated April 5, 2006
Direct assaults against presidents, presidents-elect, and candidates have occurred on 15 occasions and resulted in 5 deaths. Ten incumbents, including four of the past six presidents, have been victims or targets. Four of them, including one candidate, died as a result of the attacks. This report identifies these incidents and provides circumstantial information.

Dirty Bomb Attack: Assessing New York City's Level of Preparedness From a First Responder's Perspective (PDF)
J. Sudnik, Naval Postgraduate School, March 2006
In his master's thesis, John Sudnik, a deputy chief at the New York Fire Department, addresses the question of whether New York City is adequately prepared for a “dirty bomb” attack.

Dismantling Global Money Laundering Operations
Michael Morehart, Section Chief, Terrorist Financing Operations, Counterterrorism Division, Federal Bureau of Investigation, Before the House Committee on Financial Services, May 18, 2006
This document discusses the FBI's efforts to disrupt and dismantle national and international money laundering operations and the operational impact of successfully using information obtained from the financial sector.

Distribution of Losses from Large Terrorist Attacks Under the Terrorism Risk Insurance Act
RAND Corporation, 2005
The pending expiration of the Terrorism Risk Insurance Act (TRIA) of 2002 is the impetus for this assessment of how TRIA redistributes terrorism losses. The authors find that the role of taxpayers is expected to be minimal in all but very rare cases; and even with TRIA in place, a high fraction of losses would go uninsured in each of the attack scenarios examined.

The Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a Changing World (PDF)
Kim Cragin and Sara A. Daly, RAND Corporation, 2004
This report assesses the threat that terrorist groups pose to the United States and to its interests overseas. It describes the tools that these groups use to maintain group cohesion and to conduct successful attacks and discusses vulnerabilities that they often face.

Ecoterrorism: Extremism in the Animal Rights and Environmentalist Movements
Anti-Defamation League
Terrorism in the name of animal and environmental protection is a growing concern for law enforcement. Radical environmental and animal rights groups have claimed responsibility for hundreds of crimes and acts of terrorism, including arson, bombings, vandalism, and harassment. This report examines the threat currently posed by ecoterrorists, including information about the major organizations and individuals involved.

Emergency Preparedness Guidelines: Chemical, Biological, and/or Radiological Incidents (PDF)
Montgomery County Public Schools, February 2003
This document includes definitions and guidelines to help school system administrators respond to a chemical, biological, or radiological incident. An emergency/crisis checklist is attached.

Emerging Threats to National Security (PDF)
RAND Corporation, February 2005
This report contains the testimony presented to the House of Representatives Permanent Select Committee on Intelligence on future threats to our national security.

Estimating Terrorism Risk (PDF)
RAND Corporation, November 2005
This monograph offers a practical definition of terrorism risk and a method for estimating it that addresses inherent uncertainties. It also demonstrates a framework for evaluating alternative risk estimates. Finally, it makes five recommendations for improving resource allocation.

Exploring Terrorist Targeting Preferences (PDF)
RAND Corporation, February 28, 2007
This monograph discusses four hypotheses on terrorist activity that were examined using an analysis of 14 major terrorist attacks, a structured survey given to terrorism experts, and an analysis of statements made by al Qaeda. The coercion hypothesis suggests that terrorists inflict pain to frighten the United States into pursuing favorable policies (e.g., withdrawing from the Islamic world); the damage hypothesis posits that terrorists want to damage the U.S. economy to weaken its ability to intervene in the Islamic world; the rally hypothesis holds that terrorism in the United States is a means for attracting potential recruits and supporters; and the franchise hypothesis argues that today's jihadists pursue their own agendas with, at most, support and encouragement from al Qaeda itself.

Extremism at Home: Recent Trends in Domestic Extremist Groups
Anti-Defamation League, Law Enforcement Newsletter, March 6, 2007
This article describes recent trends and development among domestic extremist groups in the United States.

Extremism, Terror, and the Future of Conflict
Michael J. Mazarr, March 2006
This article by Michael Mazarr, a professor of national security strategies at the U.S. National War College, discusses the causes of warfare and the leading theories of the future of war.

Fact Sheet: Strengthening Intelligence to Better Protect America
The White House, January 2003
This fact sheet documents a presidential initiative to establish a Terrorist Threat Integration Center. The center, which will be part of the continued effort to close the gap between foreign and domestic intelligence analysis, will be tasked with fusing and analyzing all source information related to terrorism.

FBI Announces New Forensic Partnership With Savannah River National Laboratory
Federal Bureau of Investigation, November 17, 2006
The Federal Bureau of Investigation (FBI) and the Department of Energy's Savannah River National Laboratory have opened a new laboratory and office suite for the forensic examination of radiological material and associated evidence. The facility is located at the Savannah River Site near Aiken, South Carolina.

Final Report on 9/11 Commission Recommendations (PDF)
9/11 Public Discourse Project, December 5, 2005
This short document is a “report card” on U.S. progress toward completing the 9/11 Commission's recommendations in the areas entitled Homeland Security, Emergency Preparedness, and Response; Reforming the Institutions of Government; and Foreign Policy, Public Diplomacy, and Nonproliferation.

Forensic Science Communications
Federal Bureau of Investigation
Forensic Science Communications (ISSN 1528-8005) is a peer-reviewed journal published quarterly by Federal Bureau of Investigation laboratory personnel as a means of communication between forensic scientists. It supersedes the Crime Laboratory Digest.

Fusion Center Guidelines: Developing and Sharing Information and Intelligence in a New World—Executive Summary (PDF)
Global Justice Information Sharing Initiative, U.S. Department of Justice, July 2005
This executive summary discusses guidelines for establishing and operating fusion centers at the local, state, and federal levels, and for handling law enforcement intelligence, public safety, and the private sector.

Fusion Center Guidelines: Developing and Sharing Information and Intelligence in a New World—Law Enforcement Intelligence Component (PDF)
Global Justice Information Sharing Initiative, U.S. Department of Justice, July 2005,
Version 1
These guidelines pertain to law enforcement intelligence, one of three phases of guidelines being developed for fusion centers. The other two phases are public safety and the private sector.

Fusion Centers: Issues and Options for Congress
Congressional Research Service, July 6, 2007
This report discusses the fusion center concept, identifies existing fusion center models, and outlines challenges and proposed changes to solve potential problems and enhance the security and efficiency of the centers.

Geospatial Analysis of Terrorist Activities: The Identification of Spatial and Temporal Patterns of Preparatory Behavior of International and Environmental Terrorists
Brent L. Smith, Jackson Cothren, Paxton Roberts, and Kelly R. Damphousse, Terrorism Research Center in Fulbright College, University of Arkansas, February 2008
This NIJ-funded report compares how environmental and international terrorists plan and prepare for an act of terrorism. Both kinds of terrorists prepare near their targets (i.e., in a staging area) shortly before making their attempt, but international terrorists take much more time to plan. This study suggests that law enforcement agencies based near probable terrorist targets would find it useful to know what kind of preparatory behavior to look for.

Guests of the Ayatollah
Mark Bowden, Grove/Atlantic Inc., May 2006
This book chronicles the 444-day Iran hostage crisis, which began in November 1979 and is considered America 's first encounter with Islamist terrorism. This book is instructive for hostage negotiators, researchers, and related professionals.

Guidance for Protecting Building Environments from Airborne Chemical, Biological, or Radiological AttacksGuidance for Protecting Building Environments from Airborne Chemical, Biological, or Radiological Attacks (PDF)
U.S. Department of Health and Human Services, NIOSH, May 2002
This report identifies actions that building owners and managers can implement to enhance occupant protection from an airborne chemical, biological, or radiological attack. The document is not intended to address single-family or low-occupancy residential housing.

Guide to Concealable Weapons 2003 (PDF)
Federal Bureau of Investigation, 2003
In the wake of the September 11, 2001 airline highjackings, the Firearms and Toolmarks unit of the FBI Laboratory started to compile information on small and easily concealed knives. This is the first installment of a continuing effort to collect and distribute information on knives that otherwise may be dismissed as nonthreatening items.

High-Risk Series: An Update (PDF)
Government Accountability Office, January 2007
Audits and evaluations conducted by the Government Accountability Office (GAO) identify federal programs and operations that are considered high risk due to their greater vulnerabilities to fraud, waste, abuse, and mismanagement. This 2007 report update for the 110th Congress presents the status of high-risk areas identified in 2005 and identifies new high-risk areas that warrant attention by Congress.

High-Tech Terror: Al-Qaeda's Use of New Technology (PDF)
The Fletcher Forum of World Affairs, 2006
Despite the considerable resources that the United States has dedicated to combating Jihadi terrorism since the attacks of September 11, 2001, its primary terrorist enemy, Al-Qaeda, has grown more dangerous. Al-Qaeda today is no longer best conceived of as an organization, a network, or even a network of networks. Rather, by leveraging new information and communication technologies, Al-Qaeda has transformed itself into an organic social movement, making its virulent ideology accessible to anyone with a computer.

Hide and Seek: Intelligence, Law Enforcement, and the Stalled War on Terrorist Finance
J. A. Cassara, Potomac Books, Inc., ©2006, ISBN: 1574889982
Hide and Seek offers a unique look into the secretive world of terrorist finance. John Cassara spent the majority of his career in federal law enforcement investigating the flow of illegitimate funds. In this book, he describes the complexities of terrorist finance and the difficulties associated with fighting terrorism by attacking funding sources. Cassara not only provides an understanding of how terrorists finance their activities, but also offers strategies to improve law enforcement's effectiveness in cutting off the flow of money to terrorist groups.

Homegrown Terror
Michael Reynolds, November/December 2004
In this article, which appeared in the Bulletin of the Atomic Scientists, the author argues that many antigovernment extremists hold beliefs compatible with Islamist terrorist factions worldwide and that the country's most deeply entrenched and most persistent domestic terrorist threat comes from within its own borders and at the hands of its own citizens.

Homeland Defense (PDF)
U.S. Department of Defense, July 12, 2007
This publication provides doctrine for the defense of the U.S. homeland across the range of military operations. It provides information on command and control, interagency and multinational coordination, and operations required to defeat external threats to and aggression against the homeland.

Homeland Operations (PDF)
U.S. Air Force Doctrine Document AFDD 2-10, March 21, 2006
This document focuses on how the U.S. Air Force supports civilian agencies through the appropriate combatant commander in a variety of operations, such as neutralizing terrorist threats, responding to natural disasters, and supporting the traditional mission of homeland defense.

Homeland Security: Defending U.S. Airspace (PDF)
Congressional Research Service, Updated June 6, 2006
The attacks of September 11, 2001 drew attention to U.S. air defense, and the 9/11 Commission report recommended that Congress regularly assess the ability of U.S. Northern Command to defend the United States against military threats. This report discusses a number of options for protecting U.S. airspace, which may require improvements in detecting and intercepting aircraft and cruise missiles and making quick operational decisions, as well as a variety of issues that must be weighed, including expediency, cost, and keeping conflicts with civilian aviation to the minimum.

Homeland Security: Justice Department's Project to Interview Aliens after September 11, 2001
U.S. General Accounting Office (GAO), April 2003
In response to the September 11 terrorist attacks, the U.S. Department of Justice initiated a project to determine what knowledge aliens might have of terrorists and terrorist activities. Aliens whose characteristics were similar to those responsible for the attacks were interviewed. GAO examined this project and recommended that because anti-terrorism efforts will continue to rely in part on alien interview projects, the U.S. Attorney General should institute a formal review process and report on lessons learned.

Homeland Security: Key Elements of a Risk Management Approach (PDF)
U.S. General Accounting Office, October 2001
This report describes key elements of a good risk management approach, including assessment of threat, vulnerability, and criticality.

Homeland Security: A Risk Management Approach Can Guide Preparedness Efforts (PDF)
U.S. General Accounting Office, October 2001
This report discusses a risk management process used to consider the likelihood that a threat will endanger an asset and identifies actions that reduce the risk and mitigate the consequences of an attack.

Homeland Security Launches First Online Tool Assessing Stadium Vulnerabilities
U.S. Department of Homeland Security, January 7, 2005
The Department of Homeland Security's Information Analysis and Infrastructure Protection Directorate developed the first online vulnerability self-assessment tool for stadiums with large seating capacities. This tool allows stadium security managers to identify vulnerabilities and assess overall security. The department will contact stadium general managers for participation in this initiative and provide a password-protected web address to access the assessment tool.

Homeland Security Report No. 161 (PDF)
Homeland Security Group, May 2006
Geared toward keeping industry and law enforcement professionals informed about homeland security issues, this issue of the Homeland Security Report discusses the following: a Justice Department Inspector General's report that finds ferries to be a top terrorism target; the Country Reports on Terrorism 2005 report from the State Department; phishers' targeting of voice-over-IP technology; a Transportation Security Administration warning to private plane owners and airport managers of possible targeting for terrorism; a U.S. postal official's statement that federal agencies are unprepared for an Anthrax attack; and the securing of data at Bagram Air Base in Afghanistan.

How Terrorist Groups End: Implications for Countering al Qa'ida (PDF)
RAND Corporation, 2008
All terrorist groups eventually end. The evidence since 1968 indicates that most groups have ended because they joined the political process (43 percent) or local police and intelligence agencies arrested or killed key members (40 percent). Military force has rarely been the primary reason for the end of terrorist groups, and few groups within this time frame have achieved victory. This has significant implications for dealing with al Qaeda and suggests fundamentally rethinking post-9/11 U.S. counterterrorism strategy.

Indonesia: The Latent Threat (PDF)
Center for Security Policy, May 2006
Despite the efforts of some within the Indonesian political structure, a growing number of politicians are unwilling to take a firm stand against Islamism. The reluctance of many governmental officials to take action is rooted directly in the growing radical tendencies of the Indonesian Muslim population. The unwillingness of the Indonesian government to act, and the limited amount of attention paid to Islamism in Indonesia by American policymakers, creates a situation ripe for disaster.

Information Sharing: Definition of the Results to Be Achieved in Terrorism-Related Information Sharing Is Needed to Guide Implementation and Assess Progress (PDF)
Government Accountability Office, July 23, 2008
This testimony discusses progress since 2005 in design and implementation of the Information Sharing Environment, the characteristics of state and local fusion centers and how much federal efforts have helped address challenges that centers reported, and progress in streamlining policies and procedures for designating, marking, safeguarding, and disseminating sensitive but unclassified information.

Information Sharing: The Federal Government Needs to Establish Policies and Processes for Sharing Terrorism-Related and Sensitive but Unclassified Information (PDF)
U.S. Government Accountability Office, April 17, 2006
A number of initiatives to improve information sharing have been called for, including the Homeland Security Act of 2002 and specific verbiage contained in the Intelligence Reform and Terrorism Prevention Act of 2004. The 2002 act required that policies be developed for sharing classified and sensitive but unclassified homeland security information. The 2004 act called for the development of an "information sharing environment" for terrorism information. This report examines the status of efforts to establish governmentwide information sharing policies and processes, as well as the status of sensitive but unclassified designations, policies, and procedures used by the 26 agencies that GAO surveyed.

Inspection of the FBI's Security Risk Assessment Program for Individuals Requesting Access to Biological Agents and Toxins (PDF)
Office of the Inspector General, U.S. Department of Justice, March 2005
This report presents the findings of an inspection of the Security Risk Assessment (SRA) program that the Federal Bureau of Investigation established under the Public Health Security and Bioterrorism Preparedness and Response Act of 2002. The SRA program is part of an interagency effort to regulate the possession and use of dangerous biological agents and toxins, such as anthrax and the Ebola virus.

Inspection Report: Protective Force Performance Test Improprieties (PDF)
U.S. Department of Energy, January 2004
This inspection report summarizes a protective force performance test, which determines whether security features of a system are implemented as designed and are adequate for the proposed environment, that was conducted at the U.S. Department of Energy's Y–12 National Security Complex. It provides information on site safeguards, security plans, and test improprieties.

Intelligence-Led Policing: The New Intelligence Architecture (PDF)
Bureau of Justice Assistance, 2005
This monograph discusses the strengths and pitfalls of traditional intelligence-led policing and the need for fundamental change in the way information is gathered, assessed, and redistributed in the light of new dangers presented by terrorism. One of four Promising Practices Reviews from the Post-9/11 Policing Project, it elucidates the issues and explains how the United States got where it is today and what it needs to do to improve safety.

Intelligence Report: The Year in Hate
Intelligence Report, Issue 121, Southern Poverty Law Center, Spring 2006
While reporting on the progress of potentially violent extremist groups in the United States, this issue of the Intelligence Report notes that the number of hate groups operating in the United States rose from 762 in 2004 to 803 in 2005, capping an increase of 33 percent over the 5 years since 2000.

Islamist Networks: The Case of Tablighi Jamaat
United States Institute of Peace, October 2006
Policy analysts and Islamist scholars are divided in their assessments of Tablighi Jamaat, an Islamic revivalist organization that has spread from its origins in India in the 1920s to the broader Muslim world. The group appeared peripherally in high-profile cases such as those of Jose Padilla, Richard Reid, and John Walker Lindh, all of whom allegedly used the group as their stepping stone to radicalism. In an attempt to better understand this movement and its social, political, and potential security implications, the Center for Conflict Analysis and Prevention brought in Fulbright Scholar Eva Borreguero, visiting at Georgetown University's Center for Muslim-Christian Understanding, to present some of the key findings of her ongoing research on Tablighi Jamaat.

Is That Real? Identification and Assessment of the Counterfeiting Threat for U.S. Banknotes
Committee on Technologies to Deter Currency Counterfeiting, Board on Manufacturing and Engineering Design, National Research Council, The National Academies Press, 2006
The counterfeiting of U.S. banknotes has been a source of financing for rogue states such as North Korea and terrorist groups operating in unsecured areas such as northern Dagestan and Chechnya in the Russian Federation. Approximately $720 billion in U.S. banknotes are in circulation worldwide, and this amount is increasing about 6.5 percent annually. This report identifies existing and emerging technologies that pose the most significant threats to U.S. banknotes, including a wide range of digital imaging and printing techniques. It also presents an analysis of a systems approach to the counterfeiting threat.

Iran: U.S. Concerns and Policy Responses (PDF)
Congressional Research Service, Updated April 6, 2006
In addition to its nuclear program, Iran's Near East regional policies pose threats to U.S. interests, particularly through material support of groups that use violence against the American-led peace process, including Hezbollah, Hamas, and Palestinian Islamic Jihad. Officials have also accused Iran of providing arms and other material assistance to armed factions that are hostile to the United States. This report discusses issues surrounding potential Iranian security threats and U.S. policy dealing with these.

Israel-Hamas-Hezbollah: The Current Conflict (PDF)
Congressional Research Service, July 21, 2006
This report analyzes the current conflict between Israel and two U.S. State Department-designated foreign terrorist organizations—Hezbollah and Hamas, highlighting the prospects for a regional war in the Middle East, U.S. homeland security, and oil market disruptions.

The Journalist and the Jihadi: The Murder of Daniel Pearl
HBO Documentary Films, October 2006
Wall Street Journal
reporter Daniel Pearl's search for the perpetrators of the September 11, 2001attacks on the World Trade Center led to his death. This documentary tracks the lives of Pearl and British-born “jihadi” Omar Sheikh. The film follows the parallel courses of the two men's lives, including the defining events that led to their radically divergent career paths and their final fatal encounter in Pakistan in 2002. This item is available on DVD.

Lebanese Security and the Hezbollah (PDF)
A.H. Cordesman, Center for Strategic and International Studies, revised July 14, 2006
This analysis describes not only the nature of Hezbollah and its military capabilities, but the severe limits of the Lebanese Army and other divisions within Lebanon. This working paper will appeal to anyone seeking to understand the goals and methods of this group, which the U.S. government has deemed a terrorist organization.

Lebanon: The Two-in-One Crisis
Foreign Policy Research Institute, August 2006
Three weeks of war between Israel and Hezbollah did not yield a decisive result. Amid Washington's push for democracy and Tehran's push for theocracy lie monarchies and autocracies who want neither Western-style popular rule nor Shiite-Persian domination, and alliances, ideologies, balances of power (including nuclear), and the supply of oil are all at stake.

London Tube Bus Attack v1.5 (PDF)
IntelCenter, July 28, 2005
This report provides data related to the July 28, 2005 attack on the London subway and bus system. It also includes background contextual information. Due to the nature of this working document, frequent updates can be expected.

The Lugar Survey on Proliferation Threats and Responses (PDF)
Senate Foreign Relations Committee, June 2005
This report provides the results of a survey regarding the likelihood of a weapons of mass destruction attack in the near future. The survey, commissioned by the U.S. Senate Foreign Relations Committee Chairman Richard Lugar, found that there is a substantial risk of a weapons of mass destruction attack against a city or other target throughout the world within the next decade.

The Mantle of the Prophet: Religion and Politics in Iran
R. Mottahedeh, Oneworld Publications, © 1985, 2000, Reprinted 2002
Based largely on eye-witness accounts, the author discusses historical events that culminated in the 1979 Iranian Revolution in which the Ayatollah Khomeini rose to power and militant students held 65 American citizens hostage at the U.S. Embassy in Tehran. Mottahedeh also educates readers about significant Iranian intellectual and cultural traditions while he provides an overview of the particular ideas and people in that country that have "caused it to take a different course from its neighbors."

Mapping the Global Future: Report of the National Intelligence Council's 2020 Project (PDF)
National Intelligence Council, December 2004
This unclassified report analyzes global trends that could develop over the next 15 years and influence events such as terrorist attacks or attacks involving weapons of mass destruction.

Mapping the Risks: Assessing the Homeland Security Implications of Publicly Available Geospatial Information (PDF)
RAND National Defense Research Institute, 2004
This report assists decisionmakers in assessing the homeland security implications of publicly accessible geospatial information and how such information could be exploited by terrorists or other adversaries in attacking critical infrastructures and other key locations in the United States.

Maritime Terrorism: Risk and Liability (PDF)
Michael D. Greenberg, Peter Chalk, Henry H. Willis, Ivan Khilko, and David S. Ortiz, 2006,
RAND Center for Terrorism Risk Management Policy
This study focuses on terrorism risk and liability issues as they relate to two types of maritime terrorism scenarios—attacks that target passenger vessels and attacks that target (or leverage) containerized shipping. This report analyses risk by exploring underlying threats, vulnerabilities, and potential consequences. For liability, it outlines key concepts, legal authorities, and ambiguities that would apply in determining civil liability for acts of maritime terrorism, particularly for third-party (commercial) defendants.

Meeting the Challenge of Facility Protection for Homeland Security
Ernest Sternberg and George C. Lee, Journal of Homeland Security and Emergency Management: Vol. 3: No. 1, Article 11, March 2006
Terrorism casualties in the United States have been caused primarily by attacks on facilities. In earthquakes, hurricanes, infectious disease outbreaks, hazmat releases, and other disasters, peoples' safety often depends on the facilities they occupy. This article discusses the importance of facilities to homeland security. It argues that the United States should make facility protection a distinctive field of homeland security policy and support decentralized initiatives.

A Method to Assess the Vulnerability of U.S. Chemical Facilities (PDF)
National Institute of Justice, June 2002
This NIJ Special Report provides a prototype vulnerability assessment methodology developed to help chemical facilities identify and assess potential security threats, risks, and vulnerabilities and make security improvements.

Middle East Review of International Affairs
The Middle East Review of International Affairs (MERIA) is produced in conjunction with the Global Research in International Affairs Center with the goal of advancing research on the Middle East and fostering scholarly communication and cooperation. Publications are nonpartisan and span the geographical and political spectrum. MERIA contains the MERIA Journal, MERIA News, MERIA Research Guides, MERIABooks, and Current Contents of Periodicals on the Middle East.

Militant Ideology Atlas: Executive Report (PDF)
Militant Ideology Atlas: Research Compendium (PDF)
Combating Terrorism Center, U.S. Military Academy, November 2006
This report, with its accompanying compendium, is the first systematic mapping of the ideology driving the actions of the terrorists responsible for the September 11, 2001 attacks and other acts of violence around the world. The Atlas provides a detailed map of the major thinkers in the “jihadi movement” and their most salient areas of consensus and disagreement. The report uses empirical findings to identify powerful messages and influential messengers that can turn different constituencies against the jihadis.

A Military Guide to Terrorism in the Twenty-First Century, Version 3.0
U.S. Army Training and Doctrine Command, August 15, 2005
This high-level terrorism primer includes an overview of the history of terrorism, descriptions of terrorist behaviors and motivations, and a review of terrorist organizations and the threat they pose to our forces, both in the United States and overseas. It also discusses the terrorist planning cycle; operations and tactics; and firearms, improvised explosive devices, conventional munitions, and weapons of mass destruction used by terrorists. The manual is designed to help train and educate personnel to recognize the threats they face in planning for operations, both in the Continental United States and overseas.

Minimum Criminal Intelligence Training Standards for United States Law Enforcement and Other Criminal Justice Agencies (PDF)
Prepared by the Global Justice Information Sharing Initiative, Criminal Intelligence Training Coordination Strategy Working Group, U.S. Department of Justice, October 2007
This document provides perspective and guidance for developing and delivering law enforcement intelligence training. In developing these standards, subject-matter experts used a consensual approach that reflects the cumulative judgment of law enforcement intelligence practitioners, managers, executives, trainers, and scholars from all levels of government. The standards address the minimum training needed to give personnel the basic knowledge, skills, and abilities to perform their duties for each noted intelligence classification. In particular for the intelligence analyst, those duties would be at the entry level.

Mobilizing Information To Prevent Terrorism: Accelerating Development of a Trusted Information Sharing Environment (PDF)
Markle Foundation, July 13, 2006
This report offers a new "authorized use" standard for government handling of legally collected information that bases authorization to view information on how the information is going to be used, rather than on the nationality of the subject or the location of collection. The report also proposes a new risk-management approach to sharing classified information that balances the risk of leaks of classified information with the security risk that can come from failing to share information with those who need it to understand threats to national security.

Model Marin County School Emergency Disaster Preparedness and Incident Plan (HTML) (PDF)
Marin County Office of Education, 1997
This plan provides a framework for protecting students, staff, and school facilities from a wide range of emergency and disaster situations. The plan, which also describes the responsibilities of school staff members, was developed by the Marin County (California) Office of Education as a tool to help formulate and implement effective emergency preparedness programs.

More Freedom, Less Terror? Liberalization and Political Violence in the Arab World
RAND Corporation, 2008
Democratic political reforms can marginalize extremists and undermine support for political violence, but cosmetic reforms and backtracking on democratization can exacerbate the risk of terrorism.

National Intelligence Estimate: The Terrorist Threat to the U.S. Homeland (PDF)
National Intelligence Council, July 2007
This short document, really a press release, explains the key players, processes, and considerations in the production of the U.S. Homeland Threat Estimate.

The National Intelligence Strategy of the United States of America (PDF)
Office of the Director of National Intelligence, October 2005
This document, written in consultation with relevant departments, sets the framework for a more unified, coordinated, and effective intelligence community. The strategy recognizes each intelligence community member's strengths and competencies and outlines two types of strategic objectives: mission and enterprise.

The National Counterintelligence Strategy of the United States of America, 2007 (PDF)
National Counterintelligence Executive, March 27, 2007
This document elaborates on the fundamental responsibility of U.S. intelligence agencies to warn of and help prevent terrorist attacks, engage other asymmetric threats, and provide reliable intelligence on traditional and enduring strategic issues. It describes how the counterintelligence organizations of the U.S. government will engage elements in the public and private sectors to address the threat posed by the intelligence activities of foreign governments and groups; how those organizations will protect the nation's intelligence; and by which means that intelligence shall be obtained.

National Nuclear Security Administration: Additional Actions Needed to Improve Management of the Nation's Nuclear Programs (PDF)
U.S. Government Accountability Office, January 19, 2007
In 1999, Congress created the National Nuclear Security Administration (NNSA) as the agency responsible for the nation's nuclear weapons, nonproliferation, and naval reactors programs. This review assesses the extent to which NNSA has taken steps to improve security at its laboratories and plants, to improve its management practices, and to revise its organizational structure.

The National Security Strategy of the United States of America
Office of the President, March 2006
This publication illustrates many aspects of the security strategy of the United States, including issues of economic growth, alliances and enemies, and the threat of global terror.

The New Consolidated List of Individuals and Entities Belonging to or Associated With the Taliban and Al-Qaida Organisation as Established and Maintained by the 1267 Committee
United Nations (U.N.) Security Council, March 2004
The 1267 Committee maintains a list of individuals and entities belonging or related to the Taliban, Osama Bin Laden, and the Al-Qaida organization. The list is available in both PDF and HTML formats. The U.N. Security Council has obliged all states to freeze the assets, prevent the entry into or the transit through their territories, and prevent the direct or indirect supply, sale, and transfer of arms and military equipment with regard to the individuals/entities on the list.

New Rewards Offered for Two Most Wanted Terrorists
Federal Bureau of Investigation, February 12, 2007
The U.S. Department of State's Rewards for Justice program is offering a reward of up to $5 million for terrorists Mohammed Ali Hamadei, wanted for murder and hijacking TWA Flight 847 in 1985, and Ramadan Abdullah Mohammad Shallah, a founding member and leader of the Palestinian Islamic Jihad.

Nonstrategic Nuclear Weapons (PDF)
Congressional Research Service, September 9, 2004
This report summarizes issues relating to nonstrategic nuclear weapons—nuclear mines, artillery, and short- to long-range ballistic missiles—that were deployed by the United States and Russia during the Cold War. It examines concerns surrounding Russia's weapons and the possibility that some could be lost or stolen or could have been sold to another country or group.

NRC Task Force Report on Public Disclosure of Security-Related Information (PDF)
Nuclear Regulatory Commission, May 18, 2005 (approved June 30, 2005)
After the Nuclear Regulatory Commission reviewed its policy regarding public disclosure of security-related information, an NRC task force prepared this report and developed a newly approved policy of disclosure. The report concludes that "the Commission has considerable authority to withhold from public disclosure information that could be useful, or could reasonably be expected to be useful, to a terrorist, provided that the information is not readily available to the public already." The new NRC policy states that "to the extent practicable," the withholding of sensitive information from public disclosure should conform to Freedom of Information Act principles for withholding security-related information.

Nuclear Power Plants: Vulnerability to Terrorist Attack (PDF)
C. Behrens and M. Holt, Congressional Research Service, February 4, 2005
This report analyzes potential threats to nuclear power plants and covers the demise of several bills in the 108th Congress to increase nuclear security measures. It also discusses anticipated legislation to be introduced in the 109th Congress.

Nuclear Regulatory Commission: Oversight of Security at Commercial Nuclear Power Plants Needs to Be Strengthened (PDF)
U.S. General Accounting Office, September 2003
The United States' nuclear power plants are possible terrorist targets. This report identifies aspects that reduced the effectiveness of the Nuclear Regulatory Commission's oversight of security at commercial nuclear power plants and recommends two ways to strengthen it: restoring annual security inspections and revising force-on-force exercises.

Nuclear Regulatory Commission: Preliminary Observations on Efforts to Improve Security at Nuclear Power Plants (PDF)
U.S. Government Accountability Office, September 14, 2004
In this testimony before the Subcommittee on National Security, Emerging Threats, and International Relations, the Government Accountability Office (GAO) has reviewed the National Regulatory Commission's efforts since September 11, 2001 to improve security at nuclear power plants, including implementation of past GAO security and oversight recommendations.

Nuclear Security: DOE Must Address Significant Issues to Meet the Requirements of the New Design Basis Threat (PDF)
U.S. General Accounting Office, May 2004
To manage potential risks, the U.S. Department of Energy (DOE) has developed a design basis threat (DBT), a classified document that is based on information from the intelligence community that identifies the potential size and capabilities of terrorist forces. This report analyzes the current version of DBT, which was revised in May 2003 in response to the September 11 terrorist attacks.

Nuclear Security: DOE Needs to Resolve Significant Issues Before It Fully Meets the New Design Basis Threat (PDF)
U.S. General Accounting Office, April 2004
This report reviews physical security at U.S. Department of Energy (DOE) nuclear sites that house category I special nuclear material. Specifically, it details reasons why DOE needed nearly 2 years to develop a new design basis threat (DBT) (a classified document that identifies the potential size and capabilities of terrorist forces) and analyzes the higher threat contained in the new DBT.

OECD Guiding Principles for Chemical Accident Prevention, Preparedness and Response: Guidance for Industry (including Management and Labour), Public Authorities, Communities and Other Stakeholders (Second Edition) (PDF)
Organisation for Economic Co-Operation and Development, November 2003
This comprehensive document will help public authorities, industry, and communities worldwide prevent and prepare for accidents involving hazardous substances resulting from sabotage and technological and natural disasters. It discusses topics such as the development of a health infrastructure to deal with chemical accidents, implementation of principles by small and medium-size enterprises, chemical safety at transport interfaces, and guidance for audits and inspections.

On "Other War": Lessons from Five Decades of RAND Counterinsurgency Research (PDF)
RAND Corporation, August 2006
Although Operations Enduring Freedom and Iraqi Freedom have showcased the technological capability and professional prowess of the U.S. military in conventional operations, the insurgency and instability in both Afghanistan and Iraq have proved much more difficult to surmount for both the military and civilian agencies. This difficulty may embolden future opponents to embrace insurgency in combating the United States. This study makes recommendations for improving counterinsurgency operations based on a decades-long study.

Operation Rhyme Terror Convictions
London Metropolitan Police Services, June 15, 2007
Deputy Assistant Commissioner Peter Clarke, head of the London Metropolitan Police Counter Terrorism Command and National Coordinator of Terrorism Investigations, announced that Dhiren Barot and six of his operatives planned bombings on both sides of the Atlantic Ocean. Photographs, attack plans, a reconnaissance video, and other materials relating to the investigation are available on the Metropolitan Police web site.

Osama bin Laden Audio Release Analysis: v1.1 (PDF)
IntelCenter, January 4, 2004
This six-page report examines the correlation between the timing of the release of Osama bin Laden audiotapes and major attacks by al Qaeda. It includes details on the Osama bin Laden audiotape released on January 4, 2004 and its impact on the threat environment.

Out of Bounds: Innovation and Change in Law Enforcement Intelligence Analysis (PDF)
D. Osborne, Center for Strategic Intelligence Research, Joint Military Intelligence College, March 2006
This publication promotes greater awareness in the national intelligence community of the intelligence-related analytic tools, vocabulary, and assessments being used by frontline security professionals in U.S. cities.

Out of the Ordinary: Finding Hidden Threats by Analyzing Unusual Behavior (PDF)
RAND Corporation, November 2004
This RAND Corporation monograph discusses the development of the Atypical Signal Analysis and Processing (ASAP) network and database, which can be used as a central clearinghouse for intelligence data. The study presents data regarding ASAP and its ability to identify unusual and suspicious activity, producing a general understanding of a potential or existing threat.

Out of the Shadows: Getting Ahead of Prisoner Radicalization (PDF)
The George Washington University Homeland Security Policy Institute, The University of Virginia Critical Incident Analysis Group, and the U.S. Senate Committee on Homeland Security and Governmental Affairs, September 2006
This executive summary documents testimony given during a hearing before the U.S. Senate Committee on Homeland Security and Governmental Affairs. The hearing exposed the rise of terrorist recruitment within America 's local, state, and federal correctional facilities, which provide fertile grounds for radicalization and recruitment efforts by groups inspired by, but not directly linked, to Al Qaeda. It also highlights the need to learn more about the process of radicalization and how prison authorities can identify teachings that incite violence while respecting the right of inmates to have access to religious materials.

Pakistan and Terrorism: A Summary (PDF)
Congressional Research Service, March 27, 2007
This report provides a summary review of issues related to Pakistan and terrorism, especially in the context of U.S. interests, policy goals, and relevant assistance.

The Power of Truth: Questions for Ayman al-Zawahiri (PDF)
J. Brachman, B. Fishman, and J. Felter, Combating Terrorism Center at West Point, April 21, 2008
On December 16, 2007, Ayman al-Zawahiri invited journalists and “jihadist enthusiasts” to ask him questions via the primary “jihadist” web forums. On April 2, 2008, he released the first part of his response. This report analyzes 1,888 of the original questions and those that Zawahiri chose to answer, finding a major disconnect between the two.

Proactive Guide for the Threat of Terrorism in Schools (PDF)
Texas School Safety Center, Southwest Texas State University, 2003
This guide addresses the possibility that terrorists may target schools. A significant portion of the information contained in the guide is compiled from various federal, state, and local agencies responsible for keeping the public safe and informed.

Profile: Abu Musab al-Zarqawi
L.H. Teslik, Council on Foreign Relations, February 15, 2006
This “Background Q&A” provides a profile of the terrorist Abu Musab al-Zarqawi, the man responsible for coordinating suicide bombings in Amman and Madrid, multiple attacks on Iraqi Shiites and Shiite mosques, and the highly publicized beheading of American Nicholas Berg.

Protection of Classified Information by Congress: Practices and Proposals
Congressional Research Service, Updated January 11, 2006
This report discusses the protection of national security and other controlled information by Congress and proposed changes to the system, which include controversial or costly proposals and those that seek to set uniform standards or increase requirements for access.

Protecting Against the Spread of Nuclear, Biological, and Chemical Weapons: An Action Agenda for the Global Partnership (PDF)
Center for Strategic & International Studies, January 2003
This report seeks to facilitate achievement of the goals outlined in the G-8 Global Partnership by identifying solutions to bureaucratic and other obstacles that have hampered past threat-reduction activities. Specifically, the report outlines a future agenda and addresses key challenges in making the global partnership work, including how the political momentum for such an effort should be sustained and how to meet the $20 billion funding goal identified at the G-8 2002 summit. Visit the CSIS online store to purchase volumes 1-4 of the report.

Protective Intelligence and Threat Assessment Investigations: A Guide for State and Local Law Enforcement Officials Protective Intelligence and Threat Assessment Investigations: A Guide for State and Local Law Enforcement Officials (ASCII or PDF)
National Institute of Justice, January 2000
This report describes protective intelligence and threat assessment investigations, focusing on protocols and procedures for law enforcement and security agencies responsible for protecting public persons and others who are vulnerable to targeted violence.

Radicalization: An Overview and Annotated Bibliography of Open-Source Literature (PDF)
Homeland Security Institute, December 15, 2006
Intelligence analysts, law enforcement, and private sector officials gather information on radicalization—the process whereby an individual or group adopts extremist beliefs and behaviors—from a wide variety of independent domestic and international sources. This report provides an overview and annotated bibliography of the unclassified literature available about radicalization and serves as a resource for identifying areas for further research.

The Rebellion Within: An Al Qaeda Mastermind Questions Terrorism
L. Wright, The New Yorker, June 2, 2008
This article examines the ideological split occurring within radical Islamist circles concerning the use of violence against noncombatants. The focus of the article is the refutation of violence by Sayyid Imam al Sharif (Dr. Fadl), who is the former mentor of Ayman al Zawahiri, a founder of al Qaeda, and the scholar who elucidated the justification for acts of terrorism by radical Islamist groups.

Rescission of Libya's Designation as a State Sponsor of Terrorism
U.S. Department of State, May 15, 2006
This fact sheet summarizes the decision by the Secretary of the U.S. Department of State proposing that Libya's designation as a state sponsor of terror be rescinded.

Remarks Before the National Commission on Terrorist Attacks Upon the United States (PDF)
RAND Corporation, March 2003
This testimony addresses the nature of the current terrorist threat, the goals of a counter-terrorism strategy, and the use of intelligence to deal with terrorism.

Report of the Future of Terrorism Task Force (PDF)
Homeland Security Advisory Council, U.S. Department of Homeland Security, January 2007
This report examines the Homeland Security Advisory Council's assessment of potential threats to the United States over the next 5 years; addresses strategic organization of departmental structures and processes to meet those threats; and recommends how to better prepare the American public for present and future challenges.

Report of the Defense Science Board Task Force on Preventing and Defending Against Clandestine Nuclear Attack (PDF)
U.S. Department of Defense, June 2004
This report addresses the threat of nuclear attack against the United States delivered by means other than missiles or aircraft—in effect, hidden and smuggled nuclear weapons, devices, or materials.

The Rise of al-Qaedaism
Council on Foreign Relations, July 18, 2007
Since September 11, 2001, al Qaeda has transformed from a hierarchical organization with a large operating budget to an ideological movement. A July 17, 2007 National Intelligence Estimate advises that al Qaeda remains a threat to the United States and has regained its strength, particularly in the tribal areas of Pakistan. This article reviews al Qaeda's continuing metamorphosis.

Risk Management and Critical Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences (PDF)
Congressional Research Service, September 2, 2004
This report discusses the efforts of the U.S. Department of Homeland Security and its Information Analysis and Infrastructure Protection Directorate to carry out duties involving coordination of national activities to protect critical infrastructure, including using a risk management approach to set priorities.

Safety Recommendations of Laser Pointers
R.J. Rockwell and C.E. Moss
Hazards associated with laser pointers are generally limited to the unprotected eyes of individuals exposed to a direct beam. However, more powerful laser pointers are appearing, often imported into the United States without proper certification or labeling. These pointers can emit a pulse higher than the allowable limit and present significant potential for damage to the eye. The authors of this summary analyze the potential hazards based on past incidents, including injury to aircraft pilots and police, and provide safety rules and practices.

SCOTBOM: Evidence and the Lockerbie Investigation
R.A. Marquise, Algora Publishing, ©2006
The takeover of Pan Am Flight 103 by Libyan intelligence operatives over Lockerbie, Scotland on December 21, 1988 killed 270 people, including 189 Americans, and changed the way the world looked at terrorism. This firsthand account, written by the former FBI Special Agent who led the U.S. investigation, provides a rare glimpse into the inner workings of a major international criminal investigation.

Security Clearances: FBI has Enhanced its Process for State and Local Law Enforcement Officials (PDF)
U.S. General Accounting Office, April 2004
This report describes the FBI's procedures for granting security clearances to state and local law enforcement, the extent to which the FBI has met time-based goals for deciding/clearing applications, and its efforts to enhance this process.

Security: Counterfeit Identification and Identification Fraud Raise Security Concerns (PDF)
U.S. General Accounting Office, September 2003
This report summarizes investigations that demonstrate security vulnerabilities that exist because counterfeit identification can be easily produced and used to create fraudulent identities. Tests revealed security weaknesses at federal buildings and other facilities, airports, and our nation's borders, and exposed identity fraud vulnerabilities in both the application process for a Social Security number and in the administration of federal gun control laws.

Seven Years After 9/11: Al-Qaeda's Strengths and Vulnerabilities (PDF)
R. Barrett, The International Centre for the Study of Radicalisation and Political Violence, September 2008
The United Nation's highest ranking official responsible for monitoring the activities of al Qaeda and the Taliban presents a comprehensive assessment of al Qaeda's current capabilities and offers a blueprint for its defeat.

Seventeen Arrested on Anti-Terrorism Charges
Royal Canadian Mounted Police, June 3, 2006
This press release summarizes the interdiction and arrest of 17 individuals on terrorism offenses allegedly aimed at several persons and facilities within Canada's government and national economy.

Screening Inmate Mail for Threatening or Dangerous Materials (PDF)
T. Brinkley, Corrections Today, Reprint: United States Postal Service (USPS)
In this article, a USPS postal inspector advises law enforcement and corrections officers about threats, devices, and dangerous contraband that may appear in inmate mail in a post-September 11 context.

Shopping Malls: Are They Prepared to Prevent and Respond to Attack? (PDF)
R.C. Davis, NIJ Journal, Issue No. 259, National Institute of Justice, March 2008
This article discusses a study published in 2006 on the operational and emergency response procedures of U.S. retail malls. Surveying state homeland security advisors and mall security directors, researchers found significant gaps in the ability of malls to prevent and respond to emergency situations—whether a terrorist attack, mass shooting or other violent act, or natural disaster.

The Social Security Number: Legal Developments Affecting Its Collection, Disclosure, and Confidentiality (PDF)
Congressional Research Service (CRS), Updated February 21, 2008
This report surveys the increasing use of the Social Security number by both the private sector and government, despite privacy concerns. The report concludes with a chronology of federal developments affecting use of the Social Security number, including federal regulation of the number and specific authorizations, restrictions, and fraud provisions.

The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why? (PDF)
Federal Research Division, Library of Congress, September 1999
This study examines the types of individuals and groups that are prone to terrorism in an effort to help improve U.S. counter-terrorism methods and policies. The study examines relevant literature to assess the current knowledge of the subject and develops psychological and sociological profiles of foreign terrorist individuals and selected groups to use as case studies in assessing trends, motivations, and likely behavior, as well as reveal vulnerabilities that would aid in combating terrorist groups and individuals.

State and Local Intelligence in the War on Terrorism (PDF)
RAND Corporation, Safety and Environment, December 7, 2005
This report examines how state and local law enforcement agencies conducted and supported counter-terrorism intelligence activities after 9/11. It analyzes data from a 2002 survey of law enforcement preparedness in the context of intelligence, shows how eight local law enforcement agencies handle intelligence operations, and suggests ways that the job of gathering and analyzing intelligence might best be shared among federal, state, and local agencies.

Statement by Homeland Security Secretary Michael Chertoff on Passenger Name Record Agreement With European Union
U.S. Department of Homeland Security, October 6, 2006
The European Union and U.S. Department of Homeland Security have reached a final agreement regarding Passenger Name Record (PNR) data that will allow the United States to make full use of passenger data, as needed, to protect U.S. borders. Under the agreement, U.S. Customs and Border Protection will be able to share PNR data with other counter-terrorism agencies within the U.S. government.

Strategic Insights
Center for Contemporary Conflict at the U.S. Naval Postgraduate School
This electronic journal offers timely, concise assessments of U.S. and international security issues, including terrorism. Although the journal is intended for U.S. military personnel and defense policymakers, students and the general public will also find many items of interest. Subscriptions are free, and the journal's web site offers an archive of past issues.

Strengthening Relationships in the Community to Prevent Radicalization
John Miller, Assistant Director, Office of Public Affairs, Federal Bureau of Investigation, Before the Senate Committee on Homeland Security and Governmental Affairs, May 10, 2007
This testimony concerns the Federal Bureau of Investigation's efforts to strengthen its relationships with segments of the community so the bureau may better recognize and prevent violent and other illegal activities.

Terror From the Right
A. Blejwas, A. Griggs, and M. Potok, Intelligence Report, Southern Poverty Law Center, Summer 2005
In this report, the authors analyze approximately 60 right-wing terrorist plots that have been uncovered in the United States since the Oklahoma City bombing in 1995.

The Terrorism Risk Insurance Program: Current Issues and Background (PDF)
Congressional Research Service, May 31, 2007
Following the terror attacks of September 11, 2001, many businesses were unable to purchase insurance to protect them against property losses that could potentially occur as the result of a subsequent attack. In 2002, Congress passed the Terrorism Risk Insurance Act (TRIA), enabling the establishment of a 3 year agreement requiring insurance providers to offer terrorism insurance to their commercial policyholders. Concerned that the program was too limited to allow the private sector to develop the capacity to insure terrorism risk, the 109th Congress passed the Terrorism Risk Insurance Extension Act of 2005 (TRIEA), which extended the program for 2 years. With less than 1 year left in the extended program, concerns remain that the private market will be unable to provide terrorism insurance without government backing.

Terrorism: What's Coming—The Mutating Threat (PDF)
B.M. Jenkins et al., edited by J.O. Ellis III, Memorial Institute for the Prevention of Terrorism, © 2007
The authors of this report purport that some developments seen as jihadist innovations are, in fact, neither new nor unique. This assessment discerns some disturbing long-term trends, but it also points out some of terrorism's limitations. To develop a full-spectrum response, this report concludes, the government must be able and willing to develop state responses beyond the traditional police and intelligence approaches. It must consider applying a range of tools from other bodies that include immigration, customs, and other enforcement authorities; the U.S. Coast Guard (or the marine police); the military; the port, airport, and other transportation authorities; the private security industry; the finance and banking sector; the media; the telecommunications sector; community and other influential leaders; and religious and educational institutions.

Terrorists and Suicide Attacks: CRS Report for Congress (PDF)
Congressional Research Service, The Library of Congress, August 2003
Suicide attacks by terrorist organizations have become more prevalent globally, causing an interest in the threat of suicide attacks against the United States both at home and abroad. This report analyzes key lessons from the international experience with suicide attacks and examines their relevance to the United States.

Terrorist Screening and Brady Background Checks for Firearms (PDF)
Congressional Research Service, July 25, 2005
In the past, terrorist-watch lists were not checked as part of the firearm background check implemented by the Brady Handgun Violence Prevention Act. In addition, for a time, Brady background check records for approved firearm transfers were destroyed almost immediately, precluding their use as a screening tool for terrorists. In February 2004, the FBI modified its National Instant Criminal Background Check System to temporarily retain records of approved firearm transfers that resulted in hits on terrorist-watch lists. This report discusses pending amendments introduced in the 109th Congress that address terrorist-watch lists and firearm background checks.

Terrorist Watch List Screening: Recommendations to Promote a Comprehensive and Coordinated Approach to Terrorist-Related Screening (PDF)
U.S. Government Accountability Office, November 8, 2007
The Federal Bureau of Investigation's Terrorist Screening Center maintains a consolidated watch list of known or suspected terrorists and sends records from the list to agencies to support terrorism-related screening. This testimony discusses standards for including individuals on the list, the outcomes of encounters with individuals on the list, potential vulnerabilities in screening processes and efforts to address them, and actions taken to promote effective terrorism-related screening. This statement is based on the Government Accountability Office's (GAO's) report, Terrorist Watch List Screening: Opportunities Exist to Enhance Management Oversight, Reduce Vulnerabilities in Agency Screening Processes, and Expand Use of the List. To accomplish the objectives, GAO reviewed documents obtained from and interviewed officials at the Terrorist Screening Center , the FBI, the National Counterterrorism Center , the U.S. Department of Homeland Security, and other agencies that perform terrorism-related screening.

Threat Analysis: Subject—JFK Airport/Pipeline Plot (PDF)
NYPD Shield and the Terrorism Information Center, Memorial Institute for the Prevention of Terrorism, June 2007
This brief analysis details the terrorist plot aimed at JFK International Airport on June 2, 2007.

Threat Assessment in Schools: A Guide To Managing Threatening Situations and To Creating Safe School Climates (PDF)
U.S. Secret Service and U.S. Department of Education, May 2002
This document establishes a process for identifying, assessing, and managing students who may pose a threat of targeted violence in schools. The guide's intended audience includes school personnel, law enforcement officials, and others with protective responsibilities in the nation's schools.

The Threat From Iran (PDF)
Prepared testimony of K. Pollack before the House Armed Services Committee, September 29, 2005
The United States and many other Western governments are concerned with Iran's pursuit of fissile-material production, which many believe is intended to give Tehran the capability to produce nuclear weapons. Kenneth M. Pollack, Senior Fellow and Director of Research at the Saban Center for Middle East Policy at the Brookings Institution, presented this testimony to Congress. It provides a historical, sequential overview of the facts of Iran's fissile-material production and policy recommendations for dealing with the issue.

Time, Place, and Manner—Controlling the Right to Protest
M. J. King, Federal Bureau of Investigation Law Enforcement Bulletin, May 2007
“An event, activity, or meeting having political, ideological, or social significance may equally attract peaceful protestors and potential terrorists or anarchists. Thus, the dilemma long faced by law enforcement but now exacerbated by the omnipresent threat of terrorism, is how to effectively exercise control over such events—which often involve large gatherings of people—in the interest of preserving public order and safety without trammeling the First Amendment rights of protesters.” This article examines how courts have recently reconciled security-based restrictions with the right to protest.

Training Keys on Detecting and Responding to Suicide Bombers
International Association of Chiefs of Police, 2005
Part I discusses the profiles of suicide bombers, including their characteristics and beliefs behind committing these acts. Part II explains how law enforcement and other first responders should react to these incidents.

Transportation Security: Issues for the 109th Congress (PDF)
Congressional Research Service, July 12, 2005
According to this report, although making the transportation sector a more difficult target for terrorists to attack is difficult, reasonable measures can be taken to deter terrorists. This brief discusses how best to construct and finance a system of deterrence, protection, and response that reduces the possibility and consequences of terrorist attack without unduly interfering with travel, commerce, and civil liberties.

Treasury Designations Target Terrorist Facilitators
U.S. Department of the Treasury, December 7, 2006
The U.S. Department of the Treasury has identified five individuals suspected of providing financial support to al Qaeda and other terrorist organizations, as well as facilitating terrorist activity in other ways. The individuals were designated “terrorist facilitators” pursuant to Executive Order 13224 and added to the department's list of Specially Designated Global Terrorists.

Treasury Targets Iranian Companies for Supporting Weapons of Mass Destruction Proliferation
U.S. Department of the Treasury, February 16, 2007
This report identifies three Iranian companies that the U.S. Department of the Treasury has designated as supporters of Iran's proliferation of weapons of mass destruction (WMD). This action was taken pursuant to Executive Order 13382, aimed at exposing and financially isolating proliferators of WMD and their supporters. 

Treasury's Terrorist Finance Program's Access to Information Held by the Society for Worldwide Interbank Financial Telecommunication (PDF)
Congressional Research Service, July 7, 2006
This report addresses the U.S. Department of the Treasury's Terrorist Finance Tracking Program's access to international financial transactions held by the Society for Worldwide Interbank Financial Telecommunications.

Trends in Terrorism: Threats to the United States and the Future of the Terrorism Risk Insurance Act (PDF)
RAND Corporation, June 2005
The Terrorism Risk Insurance Act (TRIA), created after the 9/11 attack, requires insurance companies to make terrorism insurance available to customers and, in return, provides federal reinsurance for losses from terrorist attacks. With the TRIA Act expiring at the end of December 2005, this report examines whether TRIA provides protection against the threat of losses from future terrorist attacks.

Tribal Lands Homeland Security Report
National Native American Law Enforcement Association, February 2003
This report chronicles the findings of the National Native American Law Enforcement Association’s Summit on Homeland Security on Tribal Lands. The main purpose of the summit was to define the nature of the homeland security threat on tribal lands and to discuss the level of preparedness to meet that threat.

Unclassified Report to Congress on the Acquisition of Technology Relating to Weapons of Mass Destruction and Advanced Conventional Munitions
Office of the Director of National Intelligence, May 2006
This report details findings from the director of Central Intelligence on the acquisition of technology for the development or production of weapons of mass destruction (including nuclear, chemical, and biological weapons) and advanced conventional munitions and trends in the acquisition of such technology by foreign countries during the preceding 6 months.

Understanding Terrorist Ideology (PDF)
Kim Cragin, RAND Corporation, Testimony presented before the Senate Select Committee on Intelligence on June 12, 2007
This testimony addresses terrorist ideology as it relates to the motivation of individuals to become terrorists, as well as what influences communities to sympathize with terrorist groups.

Understanding Terror Networks
M. Sageman, University of Pennsylvania Press, 2004
This book highlights the crucial role of social networks in transforming socially isolated individuals into Islamist "jihadis." It combines theories with empirical data to provide valuable insights.

Understanding the Bioterrorist Threat: Facts and Figures (PDF)
The Heritage Foundation Backgrounder, October 2001
This article reviews the facts about various biological agents and their potential effects. Although obstacles to mounting a biological attack against America may appear daunting, they can be overcome.

United Nations Counter-Terrorism Online Handbook
United Nations Counter-Terrorism Implementation Task Force, February 16, 2007
This handbook identifies the United Nations' systemwide counter-terrorism resources and activities. Visitors may search broad areas of interest such as preventing a terrorist attack, technical assistance, mitigation, and response, or more specific areas of concern such as victim assistance, terrorist travel, law enforcement training, anti-terrorism legislation, hostage crises, and key infrastructure protection.

United States Encouraged by Report That Irish Group Has Abandoned Violence
Washington File, U.S. Department of State, October 5, 2006
A report by the Independent Monitoring Commission in Northern Ireland says that the Provisional Irish Republican Army (IRA) has forsaken terrorism and violence in favor of a political strategy. The 60-page report —released October 4, 2006 —presents statistics and trends that indicate that the IRA has disbanded units formerly used to make weapons, smuggle firearms, and recruit and train members. The Provisional IRA was formed in 1969 as the clandestine, armed wing of the political movement Sinn Fein; it has claimed responsibility for numerous terrorist attacks in the United Kingdom since the 1970s.

Uniting Against Terrorism: Recommendations for a Global Counter-Terrorism Strategy
Kofi Anan, Report to the United Nations, May 2, 2006
This report by the Secretary-General of the United Nations presents recommendations for fighting terrorism built on the fundamental components of dissuading people from resorting to terrorism or supporting it, denying terrorists the means to carry out attacks, deterring countries from supporting terrorism, developing countries' capacity to defeat terrorism, and defending human rights. 

U.S. Capitol Police: Progress Made in Addressing Prior GAO Recommendations on Administrative and Management Operations (PDF)
Government Accountability Office, July 16, 2008

From January 2004 through March 2007, GAO made 46 recommendations aimed at improving United States Capitol Police (USCP) administrative and management operations and achieving strategic goals in these areas. This testimony reports on the status of USCP's efforts to address GAO's recommendations. USCP generally agreed with the 46 recommendations and with this report on its progress in implementing them.

U.S. Citizen Sentenced to Prison for Receiving Military Training From a Terrorist Organization
U.S. Department of Justice, July 20, 2007
Daniel Joseph Maldonado, a.k.a. Daniel Aljughaifi, a U.S. citizen convicted of receiving training from a foreign terrorist organization, has been sentenced to 10 years in prison, the maximum statutory penalty for this crime.

U.S. Department of the Treasury Anti-Terrorist Financing Guidelines: Voluntary Best Practices for U.S.-Based Charities (PDF)
U.S. Department of the Treasury, December 5, 2005
These guidelines are designed to help charities protect themselves from abuse by terrorist organizations. The U.S. Department of the Treasury has released its revised version for public comment to ensure that it provides the greatest benefit possible to the charitable sector. Although the Treasury will consider all comments received on or before February 1, 2006 in finalizing these guidelines, this version immediately replaces the original guidelines. Please submit comments on these revised guidelines to http://www.treas.gov/offices/enforcement/comm ents_guidelines.html.

Use of Social Security Numbers at the Department of Homeland Security (PDF)
Privacy Policy Guidance Memorandum, June 4, 2007
The widespread use of Social Security numbers (SSNs) beyond their intended purpose raises privacy concerns and enables identity theft. In a continuing effort to minimize the use of SSNs, the U.S. Department of Homeland Security's Privacy Office has issued this guidance memorandum on collection, use, maintenance, and dissemination of SSNs.

U.S. Directorate of National Intelligence Open Source Conference (Session Presentations)
In July 2007, the U.S. Directorate of National Intelligence sponsored a conference addressing various topics related to open source information and intelligence. This archive provides several presentations from that conference.

U.S. Electronic Passport
U.S. Department of State
This web page is continuously updated to inform viewers on the proposed U.S. electronic passport—a regular passport with the addition of a small "contactless" integrated circuit (computer chip) embedded in the back cover. The chip will securely store the same data visually displayed on the photo page of the passport and will also include a digital photograph. Including the digital photograph will enable biometric comparison using facial recognition technology at international borders. The U.S. "e-passport" will also have a new look, incorporating additional antifraud and security features.

U.S. Money Laundering Threat Assessment (PDF)
U.S. Department of the Treasury, January 12, 2006
The U.S. Money Laundering Threat Assessment (MLTA) is the first governmentwide analysis of its kind to investigate money laundering vulnerabilities across a spectrum of techniques used by criminals. The laundering methodologies investigated range from banks and money transmitters to alternative methods, such as casinos, trade-based money laundering, “hawalas,” black market peso exchange, and bulk smuggling of cash across our nation's borders. MLTA also looks at new and emerging industries, such as online payment systems and stored value cards, which are vulnerable to illicit financial activities.

The Use of the Internet by Islamic Extremists
RAND Corporation, May 2006
This document provides testimony presented to the U.S. House of Representatives Permanent Select Committee on Intelligence regarding the technological advancements of terrorist organizations, including their use of the Internet.

Vehicle Bomb Mitigation Guide
Technical Support Working Group, January 2004
This guide presents reference materials for planning and executing programs and operations for protecting personnel and assets against the threat of vehicle bombs. It's available in a waterproof flip chart format and presents lessons learned from several major U.S. Air Force Protection Battlelab initiatives. Due to security concerns, this publication is restricted. To order a copy, send an e-mail request to pubs@tswg.gov and include the quantity desired, contact name, organization name, address, and telephone number. Once the request is approved, copies may be ordered directly through the Government Printing Office at orders@gpo.gov or via fax at 202-512-2250.

What Every Public Safety Officer Should Know About Radiation & Radioactive Materials (not yet available online)
National Law Enforcement Corrections & Technology Center (NLECTC), February 2003
Developed in cooperation with the Law Enforcement Technology Support Center at the U.S. Department of Energy's Savannah River Technology Center, this brochure is a quick-reference guide for public safety personnel. It provides basic information about radiation, radiation hazards, and initial response. It is not intended to replace an agency's existing policies, procedures, or training. Agency response protocols should be developed and followed for responding to incidents of suspected weapons of mass destruction. Hard copies of this publication will be available soon. Call NLECTC at 800-248-2742 or e-mail to be placed on the mailing list for this brochure.

Women as Victims and Victimizers
Mia Bloom, eJournal USA: Countering the Terrorist Mentality, May 2007
This article discusses the migration of women involved in terrorist cells from mostly supportive roles to more active, operational roles, including suicide bombers.