TERRORISM 2007
Special Bibliography No. 332


July 2007

Compiled by Bibliography Branch
Muir S. Fairchild Research Information Center
Maxwell AFB, AL


Contents

For older material, see these Fairchild Center bibliographies:  (Terrorism2006), (Terrorism 2005), (Terrorism 2004), (Terrorism Today 2003), (Terrorism: The Threat & Post 9/11 Trends 2002), (Terrorists & Insurgent Organizations 2000).

The appearance of hyperlinks does not constitute endorsement by the U.S. Air Force of this web site or the information, products, or services contained therein.  For other than authorized activities such as military exchanges and morale, welfare and recreation sites, the U.S. Air Force does not exercise any editorial control over the information you may find at these locations.  Such links are provided consistent with the stated purpose of this DoD web site.

Some articles listed require access to subscription databases.  If you cannot gain access, contact your local library for availability.  AU students and faculty can contact the Center's Web Maintainer for a password.

All sites listed were last accessed on July 27, 2007.



Terrorism, General Information

 

Internet Resources

Combating Terrorism Center at West Point
Available online at:  http://www.ctc.usma.edu/
Stated vision is to arm current and future leaders with the the intellectual tools needed to defeat and deter terrorist threats to our nation. Contains links to their research, outside reports and sites.

Congressional Research Service Reports on Terrorism
Available online at:  http://www.fas.org/sgp/crs/terror/index.html

Country Reports on Terrorism 2006.  Washington, U.S. Department of State, 2006.
Available online at:  http://www.state.gov/s/ct/rls/crt/2006/
Covers developments in countries in which acts of terrorism occurred, countries that are state sponsors of terrorism, and countries determined to be of particular interest in the GWOT. Provides information on terrorist groups, their umbrella groups and state sponsors of terror.

Federal Bureau of Investigation - Counterterrorism and Terrorism
Available online at:  http://www.fbi.gov/terrorinfo/counterrorism/waronterrorhome.htm
Information on Protecting the U.S.; Taking Precautions; Major Cases.

Jamestown Foundation
Available online at:  http://www.jamestown.org/
Mission is to inform and educate policy makers and the broader policy community about events and trends in those societies which are strategically or tactically important to the U.S. Utilizes indigenous and primary sources.

MIPT Terrorism Knowledge Base
Available online at:  http://www.tkb.org/AboutTKB.jsp
Resource for comprehensive research and analysis on global terrorist incidents, terrorism-related court cases, and terrorist groups and leaders. Covers the history, affiliations, locations, and tactics of terrorist groups operating across the world.

National Counterterrorism Center (NCTC)
Available online at:  http://www.nctc.gov/
Serves as the primary organization in the U.S. Government for integrating and analyzing all intelligence pertaining to terrorism and counterterrorism. Has links to a Worldwide Incidents Tracking System & FBI's Most Wanted Terrorists.

South Asia Terrorism Portal
Available online at:  http://www.satp.org/
Largest website on terrorism and low intensity warfare in South Asia. Contains a database and analytic context for research and analysis of all extremist movements in the region. Concentrates especially on India.

Terrorism 2006, compiled by Glenda Armstrong.  Maxwell AFB, AL, Muir S. Fairchild Research Information Center, August 2006.  55 p.
Available online at:  http://www.au.af.mil/au/aul/bibs/terror06.htm

Subject resource guide listing internet resources, books, documents, and magazine articles on the topic, many items available full-text online.

U.S. Department of State.  Office of the Coordinator for Counterterrorism
Available online at:  http://www.state.gov/s/ct/
Mission is to forge partnerships with non-state actors, multilateral organizations, and foreign governments to advance the counterterrorism objectives and national security of the U.S. Serves as a primary coordinator for the Executive Branch in dealing with international terrorism.


Terrorism, General Information -- Books

Altheide, David L.  Terrorism and the Politics of Fear.  New York, AltaMira Press, 2006.  247 p.
Book call no.:  302.230973 A467t

Arena, Michael P. and Arrigo, Bruce A.  The Terrorist Identity:  Explaining the Terrorist Threat.  New York, New York University Press, 2006.  301 p.
Book call no.:  363.325 A681t

Barrett, Wayne and Collins, Dan.  Grand Illusion:  The Untold Story of Rudy Giuliani and 9/11.  New York, HarperCollins Publishers, 2006.  390 p.
Book call no.:  974.71044 B274g

Combs, Cindy C.  Terrorism in the Twenty-First Century.  Upper Saddle River, NJ, Prentice Hall, 2006.  334 p.
Book call no.:  303.625 C731t

D'Souza, Dinesh.  The Enemy at Home:  The Cultural Left and Its Responsibility for 9/11.  New York, Random House, 2007.  333 p.
Argues that the American cultural left is the primary cause of the anger against America in the Muslim world.
Book call no.:  973.931 D811e

Debunking 9/11 Myths:  Why Conspiracy Theories Can't Stand up to the Facts, edited by David Dunbar and Brad Reagan.  New York, Hearst Books, 2006.  170 p.
Book call no.:  973.931 D289

Gacemi, Baya.  I, Nadia, Wife of a Terrorist.  Lincoln, NE, University of Nebraska Press, 2006.  157 p.
Book call no.:  965.05092 G121i

German, Mike.  Thinking Like a Terrorist:  Insights of a Former FBI Undercover Agent.  Washington, Potomac Books, 2007.  239 p.
Book call no.:  363.325 G373t

Griffin, David Ray.  Christian Faith and the Truth Behind 9/11:  A Call to Reflection and Action.  Louisville, KY, Westminister John Knox Press, 2006.  246 p.
Book call no.:  973.931 G851c

Guelke, Adrian.  Terrorism and Global Disorder:  Political Violence in the Contemporary World.  New York, I. B. Taueris, 2006.  284 p.
Book call no.:  303.625 G925t

How the World's News Media Reacted to 9/11:  Essays from Around the Globe, edited by Tomasz Pludowski.  Spokane, WA, Marquette Books LLC, 2007.  384 p.
Book call no.:  070.449973931 H847

Insurgent Terrorism, edited by Geralde Cromer.  Aldershot, UK, Ashgate Publishing, 2006.  524 p.
Brings together studies about terrorists' use of verbal strategy.
Book call no.:  363.325 I59

Jane's World Insurgency and Terrorism.  Alexandria, VA, Jane's Information Group Inc., 2006.  865 p.
"Profiles every significant terrorist, guerrilla and insurgency movement around the world. Analyzes terrorist tactics and methodology, assesses each group's capability to impact state security and details their internal command structures and inventories."
Book call no.:  R 364.1 J33 iss.23 2006

Jebb, Cindy R.  The Fight for Legitimacy:  Democracy vs. Terrorism.  Westport, CT, Praeger Security International, 2006.  182 p.
Book call no.:  363.32516 f4711

Jenkins, Brian Michael.  Unconquerable Nation:  Knowing Our Enemy, Strengthening Ourselves.  Santa Monica, CA, RAND, 2006.  236 p.
Also available online at:  http://www.rand.org/pubs/monographs/2006/RAND_MG454.pdf
Book call no.:  363.325156 i J52u

Mockaitis, Thomas R.  The "New" Terrorism Myths and Reality.  Westport, CT, Praeger Security International, 2007.  158 p.
Book call no.:  363.325 M688n

Nacos, Brigitte L.  Mass-Mediated Terrorism:  The Central Role of the Media in Terrorism and Counterterrorism.  New York, Rowman & Littlefield Publishers, 2007.  251 p.
Book call no.:  070.449303625 N125m 2007

National Counterterrorism Center (U.S.).  NCTC Report on Incidents of Terrorism 2005.  Virginia, National Counterterrorism Center, 2006.  80 p.
Also available online at:  http://wits.nctc.gov/reports/crot2005nctcannexfinal.pdf
Book call no.:  363.32512 N277r

No More States?  Globalization, National Self-Determination, and Terrorism, edited by Richard N. Rosecrance and Arthur A. Stein.  New York, Rowman & Littlefield, 2006.  305 p.
Book call no.:  320.1 N739

The Politics of Terrorism:  A Survey, edited by Andrew T. H. Tan.  New York, Routledge, 2006.  268 p.
Book call no.:  322.42 P7692

Robb, John.  Brave New War:  The Next Stage of Terrorism and the End of Globalization.  Hoboken, NJ, John Wiley & Sons, 2007.  208 p.
Argues that the shift from state against state conflicts to wars against small bands of insurgents will lead to a world with as many tiny armies as there are causes to fight for.
Book call no.:  363.325 R631b

Rosenau, William.  Subversion and Insurgency.  Santa Monica, CA, National Defense Research Institute, Rand, 2007.  24 p.
Book call no.:  327.12 R813s

Shultz, Richard H. and Dew, Andrea J.  Insurgents, Terrorists, and Militias:  The Warriors of Contemporary Combat.  New York, Columbia University Press, 2006.  316 p.
Book call no.:  355.0218 S562i

Simonsen, Clifford E. and Spindlove, Jeremy R.  Terrorism Today:  The Past, the Players, the Future.  Upper Saddle River, NJ, Pearson Prentice Hall, 2007.  604 p.
Book call no.:  303.62509 S611t

Sloan, Stephen.  Terrorism:  The Present Threat in Context.  New York, Berg, 2006.  140 p.
Book call no.:  365.325 S634t

Stapley, Lionel F.  Globalization and Terrorism:  Death of a Way of Life.  London, Karnac, 2006.  159 p.
Book call no.:  303.625 S794g

Terror and Violence:  Imagination and the Unimaginable, edited by Andrew Strathern.  Ann Arbor, MI, Pluto, 2006.  250 p.
Book call no.:  303.625 T3289

Terrorism Country by Country, edited by Ardas V. Klidev.  New York, Nova Science Publishers, 2006.  127 p.
Book call no.:  303.625 T32828

Unmasking Terror:  A Global Review of Terrorist Activities, edited by Jonathan D. Hutzley.  Washington, Jamestown Foundation, 2007.  543 p.
Book call no.:  363.325 U58 v.3 2007

White, James E.  Contemporary Moral Problems:  War and Terrorism.  Belmont, CA, Thomson Wadsworth, 2006.  88 p.
Book call no.:  303.625 C7611

Whittaker, David J.  Terrorism:  Understanding the Global Threat.  New York, Longman/Pearson, 2007.  236 p.
Book call no.:  303.625 W624t


Terrorism, General Information -- Periodicals

Abrahms, Max.  Why Terrorism Does Not Work.  International Security 31:42-78 Fall 2006.

Arquilla, John.  The End of War as We Knew It?  Insurgency, Counterinsurgency and Lessons from the Forgotten History of Early Terror Networks.   Third World Quarterly 28:369-386 2007.
Argues that the range of choices available to networks covers an entire spectrum of conflict, posing the prospect of significant blurring of the lines between insurgency, terror and war.

Canetti-Nisim, Daphna.  Victimization from Terrorist Attacks:  Randomness or Routine Activities?  Terrorism and Political Violence 18:485-501 Winter 2006.

Desouza, Kevin C. and Hensgen, Tobin.  Connectivity among Terrorist Groups:  A Two Models Business Maturity Approach.  Studies in Conflict & Terrorism 30:593-613 July 2007.
Article "outlines two models that demonstrate how cooperation between terrorists and criminal institutions contribute to terrorist successes."

Hutchison, Harold.  Avast! Hold and Deliver -- the Modern Version of an Ancient Scourge:  Piracy.  Soldier of Fortune 31:52+ August 2006.

Kazanjian, Michael M.  Toward Proactive Peace:  A Science of Terrorism Prevention.  Infantry 96:18-20 January-February 2007.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=25101761&site=ehost-live&custid=airuniv

Kibble, David G.  Is Democracy a Cure for Terrorism?  A Review of Natan Sharansky's The Case for Democracy:  The Power of Freedom to Overcome Tyranny and Terror:  Review Essay.  Studies in Conflict and Terrorism 29:383-391 June 2006.

Kydd, Andrew and Walter, Barbara F.  The Strategies of Terrorism.  International Security 31:49-80 Summer 2006.

Murphy, Martin.  Maritime Terrorism:  The Threat in Context.  Jane's Intelligence Review 18:20-25 February 2006.



Radical Political Islam

 

Internet Resources

Ahrari, Ehsan.  Countering the Ideological Support for HT and the IMU:  The Case of the Ferghana Valley.  Garmisch-Partenkirchen, Germany, George C. Marshall European Center for Security Studies, October 2006.(Occasional paper, no. 3).
Available online at:  http://www.marshallcenter.org/site-graphic/lang-en/page-occpapers-research-1/static/xdocs/research/static/occpapers/occ-paper_3-en.pdf

Baran, Zeyno.  Islamic Radicalism in Central Asia and the Caucasus:  Implications for the EU.  Washington, Central Asia-Caucasus Institute & Silk Road Studies Program, Johns Hopkins University, July 2006.
Available online at:  http://www.silkroadstudies.org/new/docs/Silkroadpapers/0607Islam.pdf

Bell, Paul M.  Pakistan's Madrassas -- Weapons of Mass Instruction?  Monterey, CA, Naval Postgraduate School, March 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA467143

Blanchard, Christopher M.  Islam:  Sunnis and Shiites.  Washington, Library of Congress, Congressional Research Service, December 11, 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA460673

Blanchard, Christopher M.  Islamic Religious Schools, Madrasas:  Background.  Washington, Library of Congress, Congressional Research Service, January 23, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA463792

Blanchard, Christopher M.  The Islamic Traditions of Wahhabism and Salafiyya.  Washington, Library of Congress, Congressional Research Service, January 17, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA463789

Chan, Wing K.  Defeating the Logic of Islamist Terrorism.  Carlisle Barracks, PA, U.S. Army War College, March 8, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA467234

Collins, Susan.  Senator Collins Releases Statement on Terror Plot to Blow up JFK AirportFDCH Press Releases June 3, 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=32X3065798332&site=ehost-live
Statement released describing the foiled plot by Muslim extremists to blow up jet fuel arteries of John F. Kennedy airport.

Dobrot, Laurence A.  The Global War on Terrorism:  A Religious War?  Carlisle Barracks, PA, U.S. Army War College, March 13, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA468448

Esposito, John L. and Mogahed, Dalia.  Battle for Muslims' Hearts and Minds:   The Road Not (Yet) Taken.  Middle East Policy 14:27-41 Spring 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24361547&site=ehost-live

Islam:   The People, Culture, and Politics, compiled by Glenda Armstrong.  Maxwell AFB, AL, Muir S. Fairchild Research Information Center, June 2006.  49 p.
Available online at:  http://www.au.af.mil/au/aul/bibs/Islam06.htm
Subject resource guide listing internet resources, books, documents, and magazine articles on the topic, many items available full-text online.  Provides a separate section on "Radical Political Islam".

Jenkins, Brian M.  Building an Army of Believers:  Jihadist Radicalization Recruitment.  Santa Monica, CA, Rand, April 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA465567
Reports on testimony before Congress on how jihadists recruit "home grown" terrorists in the U.S.

Karagiannis, Emmanuel.  The Challenge of Radical Islam in Tajikistan:  Hizb ut-Tahrir al-Islami.  Nationalities Papers 34:1-20 March 2006.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=20338657&site=ehost-live

Middle East Media Research Institute.  Jihad and Terrorism Studies Project
Available online at:  http://www.memri.org/jihad.html
Monitors militant-Islamic groups that educate and preach Jihad and martyrdom. Also focuses on individuals and radical Islamist organizations, sermons and religious rulings (fatwas) and reactions to terrorist attacks both in the U.S. and abroad.

Niksch, Larry.  Abu Sayyaf:  Target of Philippine-U.S. Anti-Terrorism Cooperation.  Washington, Library of Congress, Congressional Research Service, January 24, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA463896

Rand.  RAND Voices of Jihad Database
Available online at:  http://www.rand.org/research_areas/terrorism/database/
"A compilation of speeches, interviews, statements, and publications of jihadist leaders, foot soldiers, and sympathizers."

Ray, Rebecca S.  Pakistan Education Systems and the Radical Islamic Jihadist Ideology.  Fort Leavenworth, KS, Army Command and General Staff College, December 15, 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA464137

Rodriguez-Rey, Patricia.  A Balancing Act:  Anti-Terror Financing Guidelines and Their Effects on Islamic Charities.  Monterey, CA, Naval Postgraduate School, December 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA462637

Schneider, Frank.  Hizb ut-Tahrir:  A Threat Behind a Legal Facade?  Monterey, CA, Naval Postgraduate School, June 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA457669

Shepard, Scott.  The Rise of Pan-Islamism in Britain.  Monterey, CA, Naval Postgraduate School, December 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA462712

Tausch, Arno.  Quantitative World System Studies Contradict Current Islamophobia:  World Political Cycles, Global Terrorism, and World Development Alternatives:  Turkish Journal of International Relations  6:15-81 Spring 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24314917&site=ehost-live

Vaughn, Bruce.  Islamist Extremism in Bangladesh.  Washington, Library of Congress, Congressional Research Service, January 31,2007.
Available online at:  http://handle.dtic.mil/100.2/ADA464832


Radical Political Islam -- Books

Allen, Charles.  God's Terrorists:  The Wahhabi Cult and the Hidden Roots of Modern Jihad.  Cambridge, MA, Da Capo Press, 2006.  349 p.
Book call no.:  297.814 A425g

Bar, Shmuel.  Warrant for Terror:  Fatwas of Radical Islam and the Duty of Jihad.  New York, Rowman & Littlefield Publishers, 2006.  134 p.
Book call no.:  297.72 B223w

Bascio, Patrick.  Defeating Islamic Terrorism:  An Alternative Strategy.  Wellesley, MA, Branden Books, 2007.  256 p.
Book call no.:  363.32516 B298d

Bascio, Patrick.  Defeating Islamic Terrorism:  The Wahhabi Factor.  Boston, Branden Publishing Co, 2007.  256 p.
Book call no.:  363.32516 B298d

Chehab, Zaki.  Inside Hamas:  The Untold Story of the Militant Islamic Movement.  New York, Nation Books, 2007.  244 p.
Book call no.:  322.42095694 C515i

Chomsky, Noam.  Perilous Power:  The Middle East & U.S. Foreign Policy:  Dialogues on Terror, Democracy, War, and Justice.  Boulder, CO, Paradigm Publishers, 2007.  276 p.
Book call no.:  327.73056 C548p

Crosston, Matthew.  Fostering Fundamentalism:  Terrorism, Democracy, and American Engagement in Central Asia.  Aldershot, UK, Ashgate, 2006.  186 p.
Book call no.:  327.73058 C951f

Emerson, Steven.  Jihad Incorporated:  A Guide to Militant Islam in the US.  Amherst, NY, Prometheus Books, 2006.  535 p.
Book call no.:  363.3250973 E53j

Fredholm, Michael.  Uzbekisten & the Threat from Islamic Extremism.  Camberley, UK, Conflict Studies Research Centre, Royal Military Academy Sandhurst, 2003.  19 p.
Book call no.:  320.55709587 F852u

Gabriel, Brigette.  Because They Hate:  A Survivor of Islamic Terror Warns America.  New York, St. Martin's Press, 2006.  258 p.
Book call no.:  956.7204 G118b

Gardiner, Nile and Phillips, James.  The London Bombings:  How the U.S. and the U.K. Should Respond.  Washington, Heritage Foundation, 2005.  12 p.
Book call no.:  363.32516 G223L

Gerges, Fawaz A.  Journey of the Jihadist:  Inside Muslim Militancy.  Orlando, FL, Harcourt, 2006.  312 p.
Book call no.:  322.42088297 G367j

Globalization, Violent Conflict and Self-Determination, edited by Valpy FitzGerald.  New York, Palgrave Macmillan, 2006.  270 p.
Multiple Causes of Conflict in Algeria:  National Identity, Inequality and Political Islam, by Cathie Lloyd, pp 179-202.
Book call no.:  303.6091724 G562

Gompert, David C.  Heads We Win:  The Cognitive Side of Counterinsurgency (COIN).  Santa Monica, CA, National Defense Research Institute, Rand, 2007.  62 p.
Contends that what the US COIN strategy needs are "stronger cognitive capabilities that will enable more effective COIN against Islamist insurgents."
Also available online at:  http://www.rand.org/pubs/occasional_papers/2007/RAND_OP168.pdf
Book call no.:  355.0218 G634h

Habeck, Mary R.  Knowing the Enemy:  Jihadist Ideology and the War on Terror.  New Haven, CT, Yale University Press, 2006.  243 p.
Book call no.:  297.272 H113k

In the Tracks of Tamerlane:  Central Asia's Path to the 21st Century, edited by Daniel L. Burghart.  Washington, Center for Technology and National Security Policy, National Defense University, 2004.  478 p.
Book call no.:  958.4086 I35

Islam:  Between Globalization & Counter-Terrorism, edited by Alamin M. Mazrui.  Trenton, NJ, Africa World Press, 2006.  331 p.
Book call no.:  297.27 M476i

Islam, Oil, and Geopolitics:  Central Asia after September 11, edited by Elizabeth Van Wie Davis and Rouben Azizian.  Lanham, MD, Rowman & Littlefield Publishers, 2007.  308 p.
Book call no.:  958.043 I82

Johnson, Lena.  Tajikistan in the New Central Asia:  Geopolitics, Great Power Rivalry and Radical Islam.  London, I. B. Tauris, 2006.  252 p.
Discusses the foreign policy of Tajikistan during the first four years after the terrorist attacks of September 11, which led the U.S. to engage not only in Afghanistan but also in Uzbekistan, Kyrgystan, and Tajikistan.
Book call no.:  958.6086 J81t

Jordan's 9/11:  Dealing with Jihadi Islamism.  Brussels, International Crisis Group, November 23, 2005.  28 p.
Also available online at:  http://www.crisisgroup.org/library/documents/middle_east___north_africa/iraq_iran_gulf/47_jordan_s_9_11_dealing_with_jihadi_islamism.pdf
Book call no.:  363.3250956954 J82

Leech, Gary.  Crude Interventions:  The US, Oil and the New World (Dis)order.  New York, Zed Books, 2006.  248 p.
Argues that the US military presence in Central Asia and Washington's support for secular governments marked by repression, corruption and nepotism have increased anti-American sentiments among the region's Muslim population and have fueled terrorism.
Book call no.:  327.73 L483c

Macdonald, Douglas J.  The New Totalitarians:  Social Identities and Radical Islamist Political Grand Strategy.  Carlisle Barracks, PA, U.S. Army War College, January 2007.  79 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA462576
Book call no.:  320.557 M135n

Michael, George.  The Enemy of My Enemy:  The Alarming Convergence of Militant Islam and the Extreme Right.  Lawrence, KS, University Press of Kansas, 2006.  397 p.
Book call no.:  363.3250973 M621e

Militant Ideology Atlas:  Executive Report, edited by William F. McCants and Jarret Brachman.  West Point, NY, Combating Terrorism Center, 2006.  22 p.
Also available online at:  http://www.ctc.usma.edu/atlas/Atlas-ExecutiveReport.pdf
Book call no.:  297.72 M644

Naumkin, Vitaly V.  Radical Islam in Central Asia:  Between Pen and Rifle.  Lanham, MD, Rowman & Littlefield Publiswhers, 2005.  285 p.
Book call no.:  320.5570958 N299r

Nazir-Ali, Michael.  Conviction and Conflict:  Islam, Christianity and World Order.  New York, Continuum, 2006.  186 p.
Note chapters "The Role of Religion in Conflict and Peacemaking"; "Encounters and Clashes:  Muslims, Christians and Jews from the Beginning"; and "Liberation, Nationalism and Islamism".
Book call no.:  261.27 N335c

Olcott, Martha Brill.  Roots of Radical Islam in Central Asia.  Washington, Carnegie Endowment for International Peace, January 2007.  39 p. (Carnegie Papers, no. 77)
Also available online at:  http://www.carnegieendowment.org/files/cp%5F77%5Folcott%5Froots%5Ffinal.pdf
Book call no.:  320.5570958 O43r

Phares, Walid.  The War of Ideas:  Jihadism Against Democracy.  New York, Palgrave Macmillan, 2007.  266 p.
Book call no.:  320.557 P536w

Phillips, Melanie.  Londonistan.  New York, Encounter Books, 2006.  213 p.
Book call no.:  363.3250941 P562L

Rai, Milan.  7/7 The London Bombings:  Islam & the Iraq War.  Ann Arbor, MI, Pluto Press, 2006.  196 p.
Book call no.:  942.1086 R149s

Rawshandil, Jalil and Chadha, Sharon.  Jihad and International Security.  New York, Palgrave Macmillan, 2006.  235 p.
Book call no.:  363.325 R262j

Ryan, Kevin J.  Radical Eye for the Infidel Guy:  Inside the Strange World of Militant Islam.  Amherst, NY, Prometheus Books, 2007.  272 p.
Book call no.:  297.27 R988r

Shai, Shaul.  Islamic Terror and the Balkans.  New Brunswick, NJ, Transaction Publishers, 2007.  218 p.
Book call no.:  363.325 s526i

The State We Are in:  Identity, Terror and the Law of Jihad, edited by Aftab Ahmad Malik.  Bristol, UK, Amal Press, 2006.  140 p.
Contains essays that "address the crucial contemporary issues and challenges facing Muslims in the West."
Book call no.:  297.72 S797

Takeyh, Ray and Gvosdev, Nikolas K.  The Receding Shadow of the Prophet:  The Rise and Fall of Radical Political Islam.  Westport, CT, Praeger, 2004.  186 p.
Book call no.:  320.557 T136r

Venter, Al J.  Allah's Bomb:  The Islamic Quest for Nuclear Weapons.  Guilford, CT, Lyons Press, 2007.  312 p.
Book call no.:  355.825119091767 V465a

Williams, Paul L.  The Dunces of Doomsday:  10 Blunders that Gave Rise to Radical Islam, Terrorist Regimes, and the Threat of an American Hiroshima.  Nashville, TN, WND Books, 2006.  231 p.
Book call no.:  327.7301767 W726d

With All Our Might:  A Progressive Strategy for Defeating Jihadism and Defending Liberty, edited by Will Marshall.  Lanham, MD, Rowman & Littlefield, 2006.  252 p.
Book call no.:  363.325156 W822


Radical Political Islam -- Documents

Ackerman, Todd E.  A Constructive Strategy for Militant Islamic Fundamentalism.  Maxwell AFB, AL, Air Command and Staff College, 2005.  32 p.
Recommends reconstruction of the U.S. foreign policy apparatus and Middle East educational system.
Doc. call no.:  M-U 43122 A1823c

Brinkley, W. David.  Radical Theology as a Destabilizing Aspect of the 21st Century Strategic Security Continuum.  Carlisle Barracks, PA, U.S. Army War College, 2006.  16 p.
"Reviews the basic definitions and causes of secular terrorism and examines radical religious ideology using contemporary cases to study organizational goals and fundamental beliefs of politically radical religious groups."
Also available online at:  http://handle.dtic.mil/100.2/ADA448500
Doc. call no.:  M-U 39080-537 B8581r

Calabrese, Maurizio D.  Emerging Threats and the War on Terrorism:  The Formation of Radical Islamist Movements in Sub-Saharan Africa.  Monterey, CA, Naval Postgraduate School, 2005.  57 p.
"The goal of the thesis is to try and generate an initial understanding of the underlying conditions that cause radical group formation to help tailor U.S. policy goals toward fighting radical Islamist group emergence through prevention."
Also available online at:  http://handle.dtic.mil/100.2/ADA435589
Doc. call no.:  M-U 42525 C1411e

Charamut, William J.  Policing the Silk Road:  Do the Central Asian States Need the United States and Russia to Create and Maintain Stability?  Monterey, CA, Naval Postgraduate School, 2005.  75 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA443244
Doc. call no.:  M-U 42525 C4691p

Dooghan, James K.  Muslim Prison Ministry:  Hindering the Spread of the Radical, Militant, Violent and Irreconcilable Wing of Islam.  Fort Leavenworth, KS, School of Advanced Military Studies, Army Command and General Staff College, 2006.  64 p.
Argues for a peaceful coexistence among religions, beginning with an intellectual understanding of Islamic ideologies and empathy for the Muslims caught in the war between terrorists and the coalition forces.
Also available online at:  http://handle.dtic.mil/100.2/ADA450078
Doc. call no.:  M-U 42022-2 D691m

Genasci, Andy J.  Overt Indicators of Islamic Extremism in Nigeria.  Fort Leavenworth, KS, U.S. Army Command and General Staff College, 2006.  66 p.
"Makes recommendations to US planners on how to better characterize an Islamic extremist safe haven."
Also available online at:  http://handle.dtic.mil/100.2/ADA451891
Doc. call no.:  M-U 42022 G324o

Klempp, Tonya M.  Contemporary Radical Islam as a Consequence of Traditional Legacies and Globalization:  A Case Study of the Southern Philippines.  Monterey, CA, Naval Postgraduate School, 2006.  93 p.
"Concludes that contemporary radical Islam in the southern Philippines a fusion of both traditionalism and globalization.
Also available online at:  http://handle.dtic.mil/100.2/ADA445416
Doc. call no.:  M-U 42525 K644c

Rice, Sean P.  Sun Tzu:  Ancient Theories for a Strategy Against Islamic Extremism.  Carlisle Barracks, PA, U.S. Army War College, 2006.  22 p.
"Assesses the current threat, Islamic extremism, by exploring its foundation, methods, goals and the conditions that allow the threat to flourish."
Also available online at:  http://handle.dtic.mil/100.2/ADA449442
Doc. call no.:  M-U 39080-537 R497s

Ruder, Daniel J.  The Long War in Central Asia:  Hizb-ut-Tahrir's Caliphate.  Fort Leavenworth, KS, School of Advanced Military Studies, Army Command General Staff College, 2006.  59 p.
Hizb-ut-Tahrir is a transnational radical Islamist political movement that aims to overthrow a Central Asian government and restore the Islamic Caliphate.
Also available online at:  http://handle.dtic.mil/100.2/ADA450614
Doc. call no.:  M-U 42022-2 R913L

Sanders, Michael J.  Using Strategic Communication More Effectively in the Global War on Terror.  Carlisle Barracks, PA, U.S. Army War College, 2006.  22 p.
Contends that planning, coordinating and executing a strategic communiction campaign plan would be an essential first step in countering the ideology of violent radical Islamists.
Also available online at:  http://handle.dtic.mil/100.2/ADA449548
Doc. call no.:  M-U 39080-537 S215u

Wallace, Mark R.  A Review of America's Strategy:  What It Will Take to Win the Global War on Terror.  Carlisle Barracks, PA, U.S. Army War College, 2006.  17 p.
Argues that we are engaged in fighting a war of ideas with terrorism.  Analyzes al-Qaida's strategy and proposes how the U.S. and its allies should craft an international strategic response to the threat.
Also available online at:  http://handle.dtic.mil/100.2/ADA448728
Doc. call no.:  M-U 39080-537 W192r


Radical Political Islam -- Periodicals

Bailey, Timothy D. and Grimaila, Michael R.  Running the Blockade:  Information Technology, Terrorism and the Transformation of Islamic Mass Culture.  Terrorism and Political Violence 18:523-543 Winter 2006.

Becker, Felicitas.  Rural Islamism During the 'War on Terror':  A Tanzanian Case Study.  African Affairs 105:583-603 October 2006.
"In the Tanzania and country town of Rwangwa, a bitter confrontation has developed between Sufi Muslims and Islamist reformers."

Blair, Tony.  A Battle for Global Values.  Foreign Affairs 86:79-90 January-February 2007.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=23521763&site=ehost-live&custid=airuniv

Borer, Douglas A. and Berger, Mark T.  All Roads Lead to and from Iraq:  The Long War and the Transformation of the Nation-State System.  Third World Quarterly 28:457-463 2007.
Concludes that the 'real' Long War may be a struggle within the 'Muslim world' rather than the ostensible struggle between the 'West' and 'Islam'.

Cetron, Marvin J.  Defeating Terrorism:  Is It Possible?  Is It Probable?  The Futurist 41:18-24 May-June 2007.
Also available online at:  http://proquest.umi.com/pqdweb?did=1269347551&sid=1&Fmt=3&clientId=417&RQT=309&VName=PQD

Conceiving 'Islamo-Fascism.'  Jane's Islamic Affairs Analyst, pp 12-13, December 2006.
The latest attempt to rename the war on terrorism draws unlikely parallels to the Second World War, with Osama bin Laden likened to Adolf Hitler. Article examines the connections the Bush administration has made with its recently coined phrase, Islamo-Facism.

Czwarno, Monica.  Misjudging Islamic Terrorism:  The Academic Community's Failure to Predict 9/11.  Studies in Conflict & Terrorism 29:657-678 October-November 2006.
Performs a quantitative study to determine the nature and scope of the apparent analytical failure on the part of academics in International Relations and other specialized disciplines to predict 9/11 and aims to address why this failure took place.

Drennan, Shane and Black, Andrew.  Fourth Generation Warfare and the International Jihad.  Jane's Intelligence Review 18:18-23 October 2006.

Gartenstein-Ross, Daveed and Dabruzzi, Kyle.  Jihad's New Leaders.  Middle East Quarterly 14:3-10 Summer 2007.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25286788&site=ehost-live&custid=airuniv

Hassan, Muhammad Haniff.  Key Considerations in Counterideological Work Against Terrorist Ideology.  Studies in Conflict and Terrorism 29:561-588 September 2006.

Henry, Terrence.  Get Out of Jihad Free.  Atlantic Monthly 299:39-40 June 2007.
Reports on how the Saudi Arabian government offered amnesty and rehabilitation to anyone willing to turn themselves in and renounce Islamic terrorism.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25007079&site=ehost-live&custid=airuniv

Hunt, Emily.  Counter-Terrorism Successes Force Algerian Militants to Evolve.  Jane's Intelligence Review 18:11-16 June 2006.
"Focuses on the threat posed by the Salafish Group for Preaching and Combat to the Algerian regime."

Hunt, Matthew.  Bleed to Bankruptcy:  Economic Targeting Tactics in the Global Jihad.  Jane's Intelligence Review 19:14-17 January 2007.

Katz, Rita and Devon, Josh.  Web of Terror.  Forbes 179:184-188 May 7, 2007.
"Discusses the use of the Internet by terrorist networks and Islamic jihadist groups."
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24834947&site=ehost-live&custid=airuniv

Laremont, Ricardo and Gregorian, Hrach.  Political Islam in West Africa and the Sahel.  Military Review 86:27-36 January-February 2006.

Lentini, Pete and Bakashmar, Muhammad.  Jihadist Beheading:  A Convergence of Technology, Theology, and Teleology?  Studies in Conflict and Terrorism 30:303-325 April 2007.

Mascini, Peter.  Can the Violent Jihad Do Without Sympathizers?  Studies in Conflict and Terrorism 29:343-357 June 2006.

Mauritania's Fractious Future.   Jane's Islamic Affairs Analyst, pp 12-13, January 2007.
"Mauritania is torn between its Arab and African cultural heritages and between Islam and secularist orientations prevalent in society."

Muslim Radicals Enlisting US Inmates.  Jane's Islamic Affairs Analyst, pp 14-16, January 2007.

Napoleoni, Loretta.  Terrorist Financing:  How the New Generation of Jihadists Funds Its Self.  RUSI Journal 151:60-65 February 2006.

Opall-Rome, Barbara.  Blindsided:  Failure to Foresee Hamas Victory Was "a Grave Lapse in Situational Awareness".  C4ISR 5:48 April 2006.

Pargeter, Alison.  Western Converts to Radical Islam:  The Global Jihad's New Soldiers?  Jane's Intelligence Review 18:20-26 August 2006.

Peters, Ralph.  Lessons from Lebanon:  The New Model Terrorist Army.  Armed Forces Journal 144:38-40+ October 2006.

Peters, Ralph.  Rebels and Religion:  How Fighters Become Fanatics.  Armed Forces Journal 144:28-31 January 2007.

Policing the Undergoverned Spaces.  Economist 383:55-56 June 16, 2007.
Presents an overview of U.S. and collaborative nations' efforts in the northern deserts of Africa in military searches for al-Qaida and Aqim.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25432673&site=ehost-live&custid=airuniv

Polmar, Norman.  Hezbollah Attack:  Lessons for the LCS (Littoral Combat Ship)?  U.S. Naval Institute Proceedings 132:88-89 September 2006.

Sinai, Joshua.  The Evolving Terrorist Threat:  The Convergence of Terrorism, Proliferation of WMD, and Enabling Conditions in Weak and Strong States.  Journal of Counterterrorism & Homeland Security International 13, no.2:10-16 Summer 2007.
Argues that those involved in counterterrorism need to learn to anticipate the evolving threat dimensions.

Smith, Craig R.  Why Iran Holds Us over a Barrel.  Journal of Counterterrorism & Homeland Security International 13, no.2:6-8 Summer 2007.
Makes the point that Iran has the capability to disrupt or halt the flow of oil thru the Strait of Hormuz, and the U.S. has waited too late to do anything about this threat.

Torres, Manuel R.  Analysis and Evolution of the Global Jihadist Movement Propaganda.  Terrorism and Political Violence 18:399-421 Autumn 2006.
Reports on the studies of the evolution of the principal characteristics of Global Jihadist Movemt (GJM) propaganda, analyzing over 2,000 documents issued by the GJM between 1996 and 2005.

Walton, C. Dale.  Not Only Islamism:  Great Power Politics and the Future of Terrorism.  Comparative Strategy 26:21-37 January-February 2007.

Wounded but Still Dangersous.  Economist 383:48-49 June 16, 2007.
Presents a profile of government efforts in Indonesia to prevent terrorism, specifically the group Jemaah Islamiah.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25432652&site=ehost-live&custid=airuniv



Al-Qaida

 

Internet Resources

Blanchard, Christopher M.  Al Qaeda:  Statements and Evolving Ideology.  Washington, Library of Congress, Congressional Research Service, January 24, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA463901

Boudali, Lianne K.  The GSPC:  Newest Franchise in al-Qa'ida's Global Jihad.  West Point, NY, Military Academy, Combating Terrorism Center, April 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA466539

Global Security.org.  Al-Qaida
Available online at:  http://www.globalsecurity.org/military/world/para/al-qaida.htm

Hoag, Lyle.  Give Deterrence a Chance:  A Strategy Against Al Qaeda.  Carlisle Barracks, PA, U.S. Army War College, 28 March 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA468446

Karmon, Ely.  Al-Qa'ida and the War on Terror - after the War in Iraq.  MERIA Middle East Review of International Affairs March 2006.
Available online at:  http://www.ciaonet.org/olj/meria/meria_mar06/meria_10-1a.pdf

Libicki, Martin C.  Exploring Terrorist Targeting Preferences.  Santa Monica, CA, Rand, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA463029


al Qaida -- Books

Al-Qaeda:  An Organization To Be Reckoned with, edited by Lawrence J. Bevy.  New York, Novinka Books, 2006.  102 p.
Book call no.:  303.625 A3161

Atwan, Abdel Bari.  The Secret History of al Qaeda.  Los Angeles, University of California Press, 2006.  256 p.
Book call no.:  363.325 A887s

Bergen, Peter L.  The Osama bin Laden I Know:  An Oral History of al-Qaeda's Leader.  New York, Free Press, 2006.  444 p.
Book call no.:  92 B612ba

Brachman, Jarret M. and McCants, William F.  Stealing Al-Qa'ida's Playbook.  West Point, NY, Combating Terrorism Center, U.S. Military Academy, 2006.  25 p.
Also available online at:  http://www.ctc.usma.edu/Stealing%20Al-Qai'da's%20Playbook%20--%20CTC.pdf
Book call no.:  363.32516 B796s

Doyle, Neil.  Terror Base UK:  Inside a Secret War.  London, Mainstream Publishing, 2006.  240 p.
Book call no.:  363.3250944 D754t

Dunn, Lewis A.  Can al Qaeda Be Deterred from Using Nuclear Weapons?  Washington, National Defense University Press, July 2005.  27 p.
Book call no.:  363.3255 D923c

Fishman, Brian.  Al-Qa'ida's Spymaster Analyzes the U.S. Intelligence Community.  West Point, NY, Combating Terrorism Center, U.S. Military Academy, 2006.  6 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS77357
Book call no.:  303.625 F537q

Harmony and Disharmony:  Exploiting al-Qa'ida's Organizational Vulnerabilities.  West Point, NY, Combating Terrorism Center, Department of Social Sciences, United States Military Academy, 2006.  111 p + 1 CD-ROM.
Also available online at:  http://www.ctc.usma.edu/aq/Harmony%20and%20Disharmony%20--%20CTC.pdf
Book call no.:  363.32516 H288

Kalic, Sean N.  Combating a Modern Hydra Al Qaeda and the Global War on Terrorism.  Fort Leavenworth, KS, Combat Studies Institute Press, 2005.  73 p.
Also available online at:  http://www.loc.gov/catdir/toc/ecip0510/2005008282.html
Book call no.:  363.32516 K14c

Kiser, Stephen D.  Financing Terror:  An Analysis and Simulation for Affecting al Qaeda's Financial Infrastructure.  Santa Monica, CA, Rand, 2005.  243 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA438830
Book call no.:  363.325 K62f

Lance, Peter.  Triple Cross:  How Bin Laden's Master Spy Penetrated the CIA, the Green Berets, and the FBI - and why Patrick Fitzgerald Failed to Stop Him.  Los Angeles, CA, Regan, 2006.  603 p.
Book call no.:  363.3250973 L246t

Mastors, Elena and Deffenbaugh, Alyssa.  The Lesser Jihad:  Recruits and the al-Qaida Network.  New York, Rowman & Littlefield Publishers, 2007.  165 p.
Book call no.:  363.325 M423L

Mohamedou, Mohammad-Mahmoud Ould.  Understanding Al Qaeda:  The Transformation of War.  Ann Arbor, MI, Pluto Press, 2007.  136 p.
Book call no.:  303.625 M697u

Osama Bin Laden, edited by Wim Coleman and Pat Perrin.  Farmington Hills, MI, Greenhaven Press, 2006.  202 p.
Book call no.:  92 B612ob

Rabasa, Angel.  Beyond al-Qaeda.  Santa Monica, CA, Rand, 2006.  2 vols.
Part 1:  The Global Jihadist Movement.
Part 2:  The Outer Rings of the Terrorist Universe.
Book call no.:  363.32516 B573

Scheuer, Michael.  Through Our Enemies' Eyes:  Osama bin Laden, Radical Islam, and the Future of America.  Washington, Potomac Books, 2006.  443 p.
Book call no.:  958.1046 S3218t

Terrorism and Violence in Southeast Asia:  Transnational Challenges to States and Regional Stability.  Armonk, NY, M.E. Sharpe, 2005.  262 p.
Book call no.:  303.6250959 T3281

United States.  Congress.  House.  Permanent Select Committee on Intelligence.  Al-Qaeda:  The Many Faces of an Islamist Extremist Threat.  Report.  109th Congress, 2nd session, September 2006.  Washington, GPO, 2006.  32 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS73580
Book call no.:  303.625091767 U58q

United States.  House.  Permanent Select Committee on Intelligence.  al-Qaeda:  The Many Faces of an Islamist Extremist Threat.  Report.  109th Congress, 2nd session, June 2006.  Washington, GPO, 2006.  32 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS73580
Book call no.:  303.625091767 U589

United States Military Academy.  Combating Terrorism Center.  Al-Qaida's (Mis)Adventures in the Horn of Africa.  West Point, NY, Combating Terrorism Center. U. S. Military Academy, 2006.  222 p.
Also available online at:  http://www.ctc.usma.edu/aqII.asp
Book call no.:  363.32516096 A316

Wright, Lawrence.  The Looming Tower:  Al-Qaeda and the Road to 9/11.  New York, Knopf, 2006.  469 p.
Book call no.:  973.931 W951L


al Qaida -- Documents

Hazdra, Richard J.  Al Qaeda as a System.  Carlisle Barracks, PA, U. S. Army War College, 2006.  20 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA449161
Doc. call no.:  M-U 39080-537 H428a

Pollock, John M.  A War Like No Other:  Al Qaeda and the U.S. Strategy for Combating Terrorism.  Carlisle Barracks, PA, U.S. Army War College, 2006.  20 p.
Proposes that "U.S. strategy, while well crafted to attack terrorist organizations and protect the homeland, does not address some of the underlying causes of terrorism, is too state centric, and lacks a cultural perspective."
Also available online at:  http://handle.dtic.mil/100.2/ADA448690
Doc. call no.:  M-U 39080-537 P776w


al Qaida -- Periodicals

Abrahms, Max.  Al Qaeda's Scorecard:  A Progress Report on Al Qaeda's Objectives.  Studies in Conflict and Terrorism 29:509-529 July-August 2006.

Al-Qaeda Commander Abd al-Hadi al-Iraqi.  Jane's Terrorism & Security Monitor, pp 15-16, May 2007.
Profiles the man.

Al-Qaeda's East Africa Cell.  Jane's Terrorism & Security Monitor, pp 7-8, February 2007.
The East Africa Cell is a group of suspected al-Qaeda terrorists accused of bombing the US embassies in Nairobi and Dar es Salaam in 1998 and Mombassa's Paradise Hotel in 2002.  With the US pursuing the suspects in Somalia, this article profiles the cell's prominent figures.

Algeria's New Jihad.  Jane's Terrorism & Security Monitor, pp 1-3, May 2007.
Examines the evolution of al-Qaeda's new North African branch and its ability to threaten the region.

Algerian Salafists Adopt al-Qaeda Brand.  Jane's Terrorism & Security Monitor, pp 5-6, February 2007.
The Salafist Group for Preaching and Combat is trying to transform itself from an Algerian rebel group into al-Qaeda's regional branch in North Africa.

Algiers Bombings Find Skeptics on Forums.  Jane's Islamic Affairs Analyst, p 13, May 2007.

Aras, Bulent and Tokta, Sule.  Al-Qaida, 'War on Terror' and Turkey.  Third World Quarterly 28:1033-1050 July 2007.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25228168&site=ehost-live&custid=airuniv

Ben-David, Alon.  Al-Qaeda Eyes Options in Lebanon.  Jane's Defense Weekly 43:22 February 1, 2006.

Bleed to Bankruptcy:  Economic Targeting Tactics in the Global Jihad.  Jane's Intelligence Review 19:14-17 January 2007.

Brachman, Jarret M.  High-Tech Terror:  Al-Qaeda's Use of New Technology.  The Fletcher Forum of World Affairs 30:149-164 Summer 2006.

Charters, David A.  Something Old, Something New...?  Al Qaeda, Jihadism and Fascism.  Terrorism and Political Violence 19:65-93 Spring 2007.
Attempts to answer the question:  Is Al Qaida a new fascist movement?  Concludes that Al Qaida's jihadism warrants a new category of analysis.

The Crevice Conspiracy.  Jane's Terrorism & Security Monitor, pp 1-5, June 2007.
"Provides a case study of young British Muslim men who were radicalised at home, then exploited by al Qaida."

Cronin, Audrey Kurth.  How al-Qaida Ends:  The Decline and Demise of Terrorist Groups.  International Security 31:7-48 Summer 2006.

Hellmich, Christina and Redig, Amanda J.  The Question Is When:  The Ideology of Al Qaeda and the Reality of Bioterrorism.  Studies in Conflict & Terrorism 30:375-396 May 2007.
Analysis reveals that the reality of Al Qaida challenges both the ideological and the technical constraints that have prevented a successful bioterrorism attack.

Iraq Insurgent Unity Collapses.  Jane's Terrorism & Security Monitor, pp 4-5, May 2007.
Reports that the Sunni insurgent rift indicates that the nationalist factions are becoming increasingly divided as the al-Qaeda affiliated State of Iraq strives for dominance.

Is Al-Qaeda/GSPC Alliance Spin?  Jane's Terrorism & Security Monitor, pp 15-16, October 2006.

Jackson, Brian A.  Groups, Networks, or Movements:  A Command-and-Control-Driven Approach to Classifying Terrorist Organizations and Its Application to al Qaeda.  Studies in Conflict and Terrorism 29:241-262 April-May 2006.

Jessee, Devin D.  Tactical Means, Strategic Ends:  Al Qaeda's Use of Denial and Deception.  Terrorism and Political Violence 18:367-388 Autumn 2006.
Shows that denial and deception are institutionalized factors that manifest themselves through all aspects of bin Laden's organization and that the traditional conception of D&D - that nonstate actors are incapable of employing deception as an element of grand strategy - is incorrect.

Leiken, Robert S. and Brooke, Steven.  The Quantitative Analysis of Terrorism and Immigration:  An Initial Exploration.  Terrorism and Political Violence 18:503-521 Winter 2006.

Lia, Brynjar.  Al-Qaeda Online:  Understanding Jihadist Internet Infrastructure.  Jane's Intelligence Review 18:14-19 January 2006.

Osama bin Laden Turns 50.  Jane's Terrorism & Security Monitor, pp 1-5, March 2007.
"Re-examines the key questions surrounding the current status and role played by the Al-Qaeda leadership, as well as its overall strategy."

Taylor, Max and Elbushra, Mohamed E.  Research Note:  Hassan al-Tirabi, Osama bin Laden, and Al Qaeda in Sudan.  Terrorism and Political Violence 18:449-464 Autumn 2006.
Explores the events and circumstances surrounding Osama bin Laden's stay in Sudan from 1991 to 1996.

Unravelling the Takfir wa al-Hijra Mystery.  Jane's Terrorism & Security Monitor, pp 13-16, June 2007.
"Examines how a label coined to describe an Eegyptian cult in the 1970s became Al-Qaeda's alter-ego."

Waiting for al-Qaeda's Next Bomb.  Economist 383:29-31 May 5, 2007.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24973612&site=ehost-live&custid=airuniv


al Qaida -- Multimedia

Bergman, Lowell and Lyman, Will.  Al Qaeda's New Front.  Alexandria, VA, PBS Video, 2005.  1 videodisc (56 min.).
Also available online at:  A Frontline production.
Fairchild DVD 303.625088297 A316

Hunt for Osama Bin Laden.  Bethesda, MD, Discovery Channel Video, 2004.  1 videodisc (46 min.).
Fairchild Video 973.931 H939

Rummel, David.  Chasing the Sleeper Cell.  Alexander, VA, PBS Video, 2004.  1 videodisc (60 min.).
Fairchild video 363.32516 C487



Psychology and Causes of Terrorism

 

Books

Canton, James.  The Extreme Future:  The Top Trends That Will Reshape the World for the Next 5, 10, and 20 Years.  New York, Dutton, 2006.  371 p.
Book call no.:  303.49 C232e

Comparative Philosophy and Religion in Times of Terror, edited by Douglas Allen.  New York, Lexington Books, 2006.  257 p.
Book call no.:  303.625 C737

Franks, Jason.  Rethinking the Roots of Terrorism.  New York, Palgrave Macmillan, 2006.  248 p.
A comprehensive survey that investigates the motivations, reasons and causes of terrorism at all levels in society, most specifically in the context of the Middle East.  Reveals the multifarious and multilevel political, social, and economic causes and motivations that generate terrorism.
Book call no.:  363.325 F831r

Hoffman, Bruce.  Inside Terrorism.  New York, Columbia University Press, 2006.  432 p.
Book call no.:  303.625 H699i 2006

Kumar, Satish.  The Buddha and the Terrorist.  Chapel Hill, NC, Algonquin Books of Chapel Hill, 2004.  121 p.
Book call no.:  823.92 S253b

The Making of a Terrorist:  Recruitment, Training, and Root Causes.  Westport, CT, Praeger Security International, 2006.  3 vols.
Book call no.:  303.625 M2351

Moghaddam, Fathali M.  From the Terrorists' Point of View:  What They Experience and Why They Come to Destroy.  Westport, CT, Praeger Security International, 2006.  173 p.
Book call no.:  363.325 M696f

Nacos, Brigitte Lebens.  Terrorism and Counterterrorism:  Understanding Threats and Responses in the Post-9/11 World.  New York, Pearson/Longman, 2006.  325 p.
Book call no.:  363.325 N125t

Richardson, Louise.  What Terrorists Want:  Understanding the Enemy Containing the Threat.  New York, Random House, 2006.  312 p.
Book call no.:  363.325 R523w

The Roots of Terrorism, edited by Louise Richardson.  New York, Routledge, 2006.  203 p.
Book call no.:  363.32511 R783

Solway, David.  The Big Lie:  On Terror, Antisemitism, and Identity.  Toronto, Canada, Lester, Mason & Begg, 2007.  299 p.
Book call no.:  303.625 S691b


Psychology & Causes of Terrorism -- Documents

Brinkley, W. David.  Radical Theology as a Destabilizing Aspect of the 21st Century Strategic Security Continuum.  Carlisle Barracks, PA, U.S. Army War College, 2006.  16 p.
"Reviews the basic definitions and causes of secular terrorism and examines radical religious ideology using contemporary cases to study organizational goals and fundamental beliefs of politically radical religious groups."
Also available online at:  http://handle.dtic.mil/100.2/ADA448500
Doc. call no.:  M-U 39080-537 B8581r

Jefferson, Charlene D.  The Bush African Policy:  Fighting the Global War on Terrorism.  Carlisle Barracks, PA, U. S. Army War College, 2006.  18 p.
"Establishes the link between each pillar of the Bush African policy and the goals of our National Strategy for Combating Terrorism and makes recommendations to strengthen those links."
Also available online at:  http://handle.dtic.mil/100.2/ADA449355
Doc. call no.:  M-U 39080-537 J451b

Pollock, John M.  A War Like No Other:  Al Qaeda and the U.S. Strategy for Combating Terrorism.  Carlisle Barracks, PA, U.S. Army War College, 2006.  20 p.
Proposes that "U.S. strategy, while well crafted to attack terrorist organizations and protect the homeland, does not address some of the underlying causes of terrorism, is too state centric, and lacks a cultural perspective."
Also available online at:  http://handle.dtic.mil/100.2/ADA448690
Doc. call no.:  M-U 39080-537 P776w


Psychology & Causes of Terrorism -- Periodicals

Asal, Victor.  Terrorism as Transnational Advocacy:  An Organizational and Tactical Examination.  Studies in Conflict & Terrorism 30:15-39 January 2007.

Brams, Steven J.  Influence in Terrorist Networks:  From Undirected to Directed Graphs.  Studies in Conflict & Terrorism 29:679-694 October-November 2006.

Flanigan, Shawn Teresa.  Charity as Resistance:  Connections Between Charity, Contentious Politics, and Terror.  Studies in Conflict and Terrorism 29:641-655 October-November 2006.

Florez-Morris, Mauricio.  Joining Guerrilla Groups in Colombia:  Individual Motivations and Processes for Entering a Violent Organization.  Studies in Conflict & Terrorism 30:615-634 July 2007.

Horgan, John.  Disengaging from Terrorism.  Jane's Intelligence Review 18:34-37 December 2006.
Explains the motivations of people who leave terrorist groups or move away from violent roles.

Kuznar, Lawrence A. and Lutz, James M.  Risk Sensitivity and Terrorism.  Political Studies 55:341-361 June 2007.
"An analysis of the situation of Palestinian nationalists, nationalists in Norethern Ireland the the Tamils in Sri Lanka provides support for the idea that sensitivity to risk can be an important factor in explaining the willingness of individuals."
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25065556&site=ehost-live&custid=airuniv

Meisels, Tamar.  The Trouble with Terror:  The Apologetics of Terrorism - a Refutation.  Terrorism and Political Violence 18:465-483 Autumn 2006.
Argues that regardless of its "root cause," terrorism is diametrically opposed to the requirements of liberal morality and can only be defended at the expense of relinquishing the most basic of liberal commitments.

Newman, Edward.  Exploring the "Root Causes" of Terrorism.  Studies in Conflict & Terrorism 29:749-772 December 2006.

Peters, Ralph.  Rebels and Religion:  How Fighters Become Fanatics.  Armed Forces Journal 144:28-31 January 2007.

Simons, Anna and Tucker, David.  The Misleading Problem of Failed States:  A 'Socio-Geography' of Terrorism in the Post-9/11 Era.  Third World Quarterly 28:387-401 2007.
Argues that the generalization can be made that foot soldiers come from disenfranchised populations and terrorists can come from alienated populations.  This produces security problems that are best handled by means other than direct military force.

Sinai, Joshua.  Using the Internet to Uncover Terrorism's Root Causes.  Journal of Counterterrorism and Homeland Security 12:28-33 Autumn 2006.

Stivi, Alon.  Fearless Nation.  Journal of Counterterrorism & Homeland Security International 13, no.2:56-59 Summer 2007.
Explains the results that terrorists expect from their actions.

Taylor, Max and Horgan, John.  A Conceptual Framework for Addressing Psychological Process in the Development of the Terrorist.  Terrorism and Political Violence 18:585-601 Winter 2006.



Methods:  Chemical, Biological, Radiological and Nuclear (CBRN)

 
For response to CBRN threats, see the section in this resource guide on United States -- Anti/Counterrorism Strategy & Policy

Internet Resources

Alexander, D. A. and Klein, S.  The Challenge of Preparation for a Chemical, Biological, Radiological or Nuclear Terrorist Attack.  Journal of Postgraduate Medicine 52:126-131 April-June 2006.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=20809118&site=ehost-live

Central Intelligence Agency:  Terrorist CBRN:  Materials and Effects.  May 2003.
Available online at:  http://www.cia.gov/cia/reports/terrorist_cbrn/CBRN_threat.pdf
This website contains a summary of typical agents and CBRN devices available to al-Qaida and other terrorist groups.

Foxell, Joseph W.  Mass-Casualty Terrorism's Next Phase:  Tool for Hidden State Actors in a Revised Version of Multipolar Covert War Gaming American Foreign Policy Interests 29:143-160 April 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25084936&site=ehost-live

Keeter, Hunter C.  CBRN Defense -- Still Required after the Demise of the East-West Confrontation?  Naval Forces 26, no.3:29-34 2005.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=17593300&site=ehost-live

Weapons of Mass Destruction:  Chemical, Biological, Radiological, and Nuclear (CBRN), compiled by Sandhya Malladi.  Maxwell AFB, AL, Muir S. Fairchild Research Information Center, June 2006.  47 p.
Available online at:  http://www.au.af.mil/au/aul/bibs/cbrn.htm
Subject resource guide listing internet resources, books, documents, and magazine articles about WMD, many available full-text online.  Offers individual sections on chemical, biological, radiological, and nuclear issues.  Includes many items concerning terrorism.


Methods:  CBRN -- Books

Bee, Ronald J.  Seven Minutes to Midnight:  Nuclear Weapons after 9/11.  New York, Foreign Policy Association, 2006.  99 p.
Book call no.:  327.73 F35h no. 328/329

Boyle, Francis A.  Biowarfare and Terrorism, with foreword by Jonathan King.  Atlanta, GA, Clarity Press, 2005.  139 p.
Book call no.:  358.38 B792b

Brown, Chad.  Transcendental Terrorism and Dirty Bombs:  Radiological Weapons Threat Revisited.  Maxwell AFB, AL, Air University, February 2006.  61 p.
Book call no.:  363.32556 B877t

Burke, Robert.  Counter-Terrorism for Emergency Responders.  New York, Taylor & Francis, 2007.  510 p.
Book call no.:  363.32518 B959c 2007

Cohen, Ariel.  Preventing a Nightmare Scenario:  Terrorist Attacks Using Russian Nuclear Weapons and Materials.  Washington, Heritage Foundation, May 20, 2005.  7 p.
Also available online at:  http://www.heritage.org/Research/NationalSecurity/bg1854.cfm
Book call no.:  363.32556 C678p

Countering Terrorism and WMD:  Creating a Global Counter-Terrorism Network, edited by Peter Katona.  New York, Routledge, 2006.  300 p.
Book call no.:  363.32517 K19c

Global Non-Proliferation and Counter-Terrorism:  The Impact of UNSCR 1540, edited by Olivia Bosch and Peter van Ham.  Washington, Brookings Institution Press, 2007.  253 p.
Book call no.:  327.1745 G562

Global Threat Reduction, edited by Sharon A. Squassoni and Amy F. Woolf.  New York, Novinka Books, 2006.  151 p.
Book call no.:  327.1747 S773g

Herron, Kerry G. and Jenkins-Smith, Hank C.  Critical Masses and Critical Choices:  Evolving Public Opinion on Nuclear Weapons, Terrorism, and Security.  Pittsburgh, PA, University of Pittsburgh Press, 2006.  247 p.
Book call no.:  355.033073 H568c

Shulman, Mark R.  The Proliferation Security Initiative as a New Paradigm for Peace and Security.  Carlisle Barracks, PA, Strategic Studies Institute, U.S. Army War College, 2006.  58 p.
Also available online at:  http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB652.pdf
Book call no.:  341.735 S562p

Venter, Al J.  Allah's Bomb:  The Islamic Quest for Nuclear Weapons.  Guilford, CT, Lyons Press, 2007.  312 p.
Book call no.:  355.825119091767 V465a

Weapons of Mass Destruction Committee.  Weapons of Terror:  Freeing the World of Nuclear, Biological and Chemical Arms.  Stockholm, Weapons of Mass Destruction Committee, 2006.  227 p.
Also available online at:  http://www.wmdcommission.org/files/Weapons%5Fof%5FTerror.pdf
Book call no.:  327.1745 W362

Younger, Stephen Michael.  Endangered Species:  How We Can Avoid Mass Destruction and Build a Lasting Peace.  New York, Ecco, 2007.  222 p.
"Discusses the increasing threat of weapons of mass destruction and offers ideas on how to construct the best practical world consistent with our human nature."
Book call no.:  303.6 Y78e


Methods:  CBRN -- Documents

Hodges, Anthony.  America's International Ports and Intermodal Transportation System:  Ill-Prepared for Biological Weapons of Mass Destruction.  Carlisle Barracks, PA, U. S. Army War College, 2006.  22 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA449367
Doc. call no.:  M-U 39080-537 A628a


Methods:  CBRN -- Periodicals

Anthrax Investigation Setbacks.  Jane's Terrorism & Security Monitor, pp 8-9, November 2006.

Arkin, William M.  The Continuing Misuses of Fear.  Bulletin of the Atomic Scientists 62:42-45 September-October 2006.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=22149148&site=ehost-live&custid=airuniv

Atran, Scott.  Commentary:  A Failure of Imagination "Intelligence, WMDs, and "Virtual Jihad."  Studies in Conflict and Terrorism 29:285-300 April-May 2006.

Auerswald, David P.  Deterring Nonstate WMD Attacks.  Political Science Quarterly 121:543-568 Winter 2006-2007.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=23680299&site=ehost-live&custid=airuniv

Ivanova, Kate and Sandler, Todd.  CBRN Incidents:  Political Regimes, Perpetrators, and Targets.  Terrorism and Political Violence 18:423-448 Autumn 2006.
Argues that odds ratios establish that democratic ideals, strong rule of law and honest regimes are associated with more CBRN incidents.

Mauroni, Albert J.  The Future of Chemical, Biological, Radiological, and Nuclear Defense.  JFQ:  Joint Force Quarterly 44:74-78 Winter 2007.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24272847&site=ehost-live&custid=airuniv

Phillips, Matthew.  Uncertain Justice for Nuclear Terror:  Deterrence of Anonymous Attacks through Attribution.  Orbis 51:429-446 June 2007.
Argues that the "U.S. should adopt a broadly scoped operationally ambiguous declaratory policy in the context of a comprehensive strategic doctrine to prevent nuclear terrorism."
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25354341&site=ehost-live&custid=airuniv

Shapira, Shmuel C. and Oren, Meir.  Ethical Issues of Bioterror.  Studies in Conflict and Terrorism 29:395-401 July-August 2006.

Sinai, Joshua.  The Evolving Terrorist Threat:  The Convergence of Terrorism, Proliferation of WMD, and Enabling Conditions in Weak and Strong States.  Journal of Counterterrorism & Homeland Security International 13, no.2:10-16 Summer 2007.
Argues that those involved in counterterrorism need to learn to anticipate the evolving threat dimensions.

Tucker, Jonathan B.  Preventing the Misuse of Biology:  Lessons from the Oversight of Smallpox Virus Research.  International Security 31:116-150 Fall 2006.



Methods:  Cyberterrorism

 

Internet Resource

Lim, Sze Li Harry.  Assessing the Effect of Honeypots on Cyber-Attackers.  Monterey, CA, Naval Postgraduate School, 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA462526


Methods:  Cyberterrorism -- Books

Amoroso, Edward G.  Cyber Security.  Summit, NJ, Silicon Press, 2007.  177 p.
Book call no.:  363.325 A524c

Fighting Terror in Cyberspace, edited by Mark Last and Abraham Kandel.  New Jersey, World Scientific, 2005.  167 p.
Covers several key topics in cyber warfare such as terrorist use of the Internet and the Cyber Jihad.
Book call no.:  006.312 F471

Nacos, Brigitte Lebens.  Terrorism and Counterterrorism:  Understanding Threats and Responses in the Post-9/11 World.  New York, Pearson/Longman, 2006.  325 p.
Book call no.:  363.325 N125t

National Science and Technology Council (U.S.).  Interagency Working Group on Cyber Security and Information Assurance.  Federal Plan for Cyber Security and Information Assurance Research and Development.  Arlington, VA, National Coordination Office for Networking and Information Technology Research and Development, 2006.  122 p.
Also available online at:  http://www.nitrd.gov/pubs/csia/csia_federal_plan.pdf
Book call no.:  005.8 N2771f

United States.  Department of Homeland Security.  Cyber Storm Exercise Report Department of Homeland Security, National Cyber Security Division.  Washington, Dept. of Homeland Security, 2006.  20 p.
Also available online at:  http://www.dhs.gov/xlibrary/assets/prep_cyberstormreport_sep06.pdf
Book call no.:  005.8 C9944

United States.  Department of Homeland Security.  National Infrastructure Protection Plan.  Washington, Dept. of Homeland Security, 2006.  179 p.
Book call no.:  353.30973 U58in


Methods:  Cyberterrorism -- Documents

Megill, Todd A.  The Dark Fruit of Globalization:  Hostile Use of the Internet.  Carlisle Barracks, PA, U.S. Army War College, 2005.  16 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA432655
Doc. call no.:  M-U 39080-537 M497d

Wilson, Clay.  Computer Attack and Cyberterrorism:  Vulnerabilities and Policy Issues for Congress.  Washington, Library of Congress, Congressional Research Service, 2005.  43 p.
Also available online at:  http://fpc.state.gov/documents/organization/45184.pdf
Doc. call no.:  M-U 42953-1 no. 05-RL32114


Methods:  Cyberterrorism -- Periodicals

Atran, Scott.  Commentary:  A Failure of Imagination "Intelligence, WMDs, and "Virtual Jihad."  Studies in Conflict and Terrorism 29:285-300 April-May 2006.

Katz, Rita and Devon, Josh.  Web of Terror.  Forbes 179:184-188 May 7, 2007.
"Discusses the use of the Internet by terrorist networks and Islamic jihadist groups."
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24834947&site=ehost-live&custid=airuniv

Lia, Brynjar.  Al-Qaeda Online:  Understanding Jihadist Internet Infrastructure.  Jane's Intelligence Review 18:14-19 January 2006.



Methods:  Financing Terror

 

Internet Resources

Narco-Terrorism, compiled by Ron Fuller.  Maxwell AFB, AL, Air University Library, July 2003.
Available online at:  http://www.au.af.mil/au/aul/bibs/narco/narco.htm
Subject resource guide listing internet resources, books, documents, and magazine articles about the drug trade and terrorism, many items available full-text online.

Rodriguez-Rey, Patricia.  A Balancing Act:  Anti-Terror Financing Guidelines and Their Effects on Islamic Charities.  Monterey, CA, Naval Postgraduate School, December 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA462637


Methods:  Financing Terror -- Books

American Foreign Policy Council.  Confronting Terrorism Financing.  Lanham, MD, University Press of America, 2005.  67 p.
Book call no.:  303.625 C7481

Brittain-Catlin, William.  Offshore:  The Dark Side of the Global Economy.  New York, Farrar, Straus and Giroux, 2005.  272 p.
Book call no.:  330.972921 B862o

Fighting Terror in Cyberspace, edited by Mark Last and Abraham Kandel.  New Jersey, World Scientific, 2005.  167 p.
Includes information on the analysis and detection of terror financing.
Book call no.:  006.312 F471

Kiser, Stephen D.  Financing Terror:  An Analysis and Simulation for Affecting al Qaeda's Financial Infrastructure.  Santa Monica, CA, Rand, 2005.  243 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA438830
Book call no.:  363.325 K62f

Nacos, Brigitte Lebens.  Terrorism and Counterterrorism:  Understanding Threats and Responses in the Post-9/11 World.  New York, Pearson/Longman, 2006.  325 p.
Part 1 offers a section on "Financing Terrorism".
Book call no.:  363.325 N125t

Taylor, John B.  Global Financial Warriors:  The Untold Story of International Finance in the Post-9/11 World.  New York, W. W. Norton & Company, 2007.  324 p.
Book call no.:  332.042 T243g


Methods:  Financing Terror -- Documents

Maye, Diane Leigh.  Measures of Effectiveness:  Israeli Counterterrorism Strategies and Tactics during the Al-Aqsa Intifada.  Monterey, CA, Naval Postgraduate School, 2006.  79 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA457277
Doc. call no.:  M-U 42525 M467m

Weiss, Martin A.  Terrorist Financing:  The 9/11 Commission Recommendation.  Washington, Library of Congress, Congressional Research Service, 2005.  6 p.
Also available online at:  http://www.fas.org/sgp/crs/terror/RS21902.pdf
Doc. call no.:  M-U 42953-1 no. 05-RS21902


Methods:  Financing Terror -- Periodicals

Hunt, Matthew.  Bleed to Bankruptcy:  Economic Targeting Tactics in the Global Jihad.  Jane's Intelligence Review 19:14-17 January 2007.

McAllister, Brad and Khersonsky, Julia.  Trade, Development, and Nonproliferation:  Multilevel Counterterrorism in Central Asia.  Studies in Conflict & Terrorism 30:445-458 May 2007.
Uses the case study of Uzbekistan and Central Asian insecurity to illustrate the utility of customs, border security, and export control legislation as integral components in counterterror campaigns.

Meldrum, Catherine.  Murky Waters:  Financing Maritime Terrorism and Crime.  Jane's Intelligence Review 19:36-39 June 2007.
"Lack of transparency in the maritime sector means it is vulnerable to exploitation for criminal activities and terrorism related financial operations."

Napoleoni, Loretta.  Terrorist Financing:  How the New Generation of Jihadists Funds Its Self.  RUSI Journal 151:60-65 February 2006.



Methods:  Organized Crime and Terrorism

 

Internet Resources

Narco-Terrorism, compiled by Ron Fuller.  Maxwell AFB, AL, Air University Library, July 2003.
Available online at:  http://www.au.af.mil/au/aul/bibs/narco/narco.htm

Walker, William J.  The Relationship and Threat of Transnational Organized Crime, Drug Traffickers and Terrorist Groups in the Western Hemisphere:  The Hot Spots.  Washington, Inter American Defense College, April 2006.
Available online at:  http://library.jid.org/en/mono45/Walker.pdf
"Since the 1980s the Western Hemisphere has experienced a criminalization syndrome involving several closely related, mutually reinforcing phenomena, transnational organized crime, drug traffickers, and terrorists. The research examines the link and association between the three entities and determines that they have striking similarities in their method and operations."


Methods:  Organized Crime -- Books

American Foreign Policy Council.  Confronting Terrorism Financing.  Lanham, MD, University Press of America, 2005.  67 p.
Book call no.:  303.625 C7481

Brittain-Catlin, William.  Offshore:  The Dark Side of the Global Economy.  New York, Farrar, Straus and Giroux, 2005.  272 p.
Book call no.:  330.972921 B862o

Kenney, Michael.  From Pablo to Osama:  Trafficking and Terrorist Networks, Government Bureaucracies, and Competitive Adaptation.  University Park, PA, Pennsylvania State University Press, 2007.  293 p.
Explores how drug traffickers, terrorists, and government officials gather, analyze, and apply knowledge and experience.
Book call no.:  363.325 K34f

Pinheiro, Alvaro de Souza.  Narcoterrorism in Latin America:  A Brazilian Perspective.  Hurlburt Field, FL, JSOU Press, 2006.  79 p.
“The author reminds us of the imminent threat of terrorism in our Western Hemisphere and suggests that while continuing our counterterrorism initiatives elsewhere, the United States, with its friends, can leverage those capable countries in the region to pursue the terrorism threat at our doorstep.”--Abstract from publication.
Also available online at:  https://jsou.socom.mil/gateway/content/researchPapers/paper374.pdf
Book call no.:  363.450981 P654n

Terrorism and Violence in Southeast Asia:  Transnational Challenges to States and Regional Stability.  Armonk, NY, M.E. Sharpe, 2005.  262 p.
Book call no.:  303.6250959 T3281


Methods:  Organized Crime -- Document

Wagley, John R.  Transnational Organized Crime:  Principal Threats and U.S. Responses.  Washington, Congressional Research Service, 2006.  20 p.
Also available online at:  http://www.fas.org/sgp/crs/natsec/RL33335.pdf
Doc. call no.:  M-U 42953-1 no. 06-RL33335


Methods:  Organized Crime -- Periodicals

Makarendo, Tamara.  Kidnapping Trends:  Examining Patterns from Europe to Asia.  Jane's Intelligence Review 19:48-53 January 2007.
Part 1 in a 2 part series.

Meldrum, Catherine.  Murky Waters:  Financing Maritime Terrorism and Crime.  Jane's Intelligence Review 19:36-39 June 2007.
"Lack of transparency in the maritime sector means it is vulnerable to exploitation for criminal activities and terrorism related financial operations."

Piccinni, Mario Leone and Brunelli, Michele.  Pirate Gold:  Music Counterfeiting in Italy.  Jane's Intelligence Review 19:40-42 June 2007.
Recent crackdown on music counterfeiting in Italy revealed its structure connections to terrorism.

Wright, Joanna.  Afghanistan's Opiate Economy and Terrorist Financing.  Jane's Intelligence Review 18:36-42 March 2006.



Methods:  Suicide and Mass Casualty Bombings

 

Internet Resource

Suicide Terrorism, compiled by Glenda Armstrong.  Maxwell AFB, AL, Muir S. Fairchild Research Information Center, July 2004.  9 p.
Available online at:  http://www.au.af.mil/au/aul/bibs/terrsuic/suite.htm
Subject resource guide listing internet resources, books, documents, and magazine articles about suicide terrorism, many items available full-text online.


Methods:  Suicide & Mass Casualty -- Books

Aman, Michael.  Preventing Terrorist Suicide Attacks.  Sudbury, MA, Jones and Bartlett Publishers, 2007.  98 p.
Book call no.:  363.32517 A484p

Barlow, Hugh.  Dead for Good:  Martyrdom and the Rise of the Suicide Bomber.  Boulder, CO, Paradigm Publishers, 2007.  239 p.
Book call no.:  363.32512 B258d

Charny, I. W.  Fighting Suicide Bombing:  A Worldwide Campaign for Life.  Westport, CT, Praeger Security International, 2007.  283 p.
Book call no.:  363.325 C483f

Davis, Mike.  Buda's Wagon:  A Brief History of the Car Bomb.  New York, Verso, 2007.  228 p.
Book call no.:  364.109 D263b

Root Causes of Suicide Terrorism:  The Globalization of Martyrdom, edited by Ami Pedahzur.  New York, Routledge, 2006.  202 p.
Book call no.:  363.325 R783

Skaine, Rosemarie.  Female Suicide Bombers.  Jefferson, NC, McFarland, 2006.  225 p.
"This work discusses the history of suicide bombing and profiles the female suicide bomber."
Book call no.:  363.325 S626f


Methods:  Suicide & Mass Casualty -- Periodicals

Chalk, Peter.  Tigers Evolve:  The Liberation Tigers of Tamil Eelam's Developing Suicide Attack Methods.  Jane's Intelligence Review 19:14-19 March 2007.
Examines evidence of recent tactical innovations by LTTE and the counter-measures of the Sri Lankan government.

Dingley, James and Mollica, Marcello.  The Human Body as a Terrorist Weapon:  Hunger Strikes and Suicide Bombers.  Studies in Conflict & Terrorism 30:459-492 June 2007.
"Argues that a major factor in terrorist acts is an appeal to the perpetrator's own community at an emotional and symbolic level, through acts of sacrifice, particularly self-sacrifice."

Hafez, Mohammed M.  Suicide Terrorism in Iraq:  A Preliminary Assessment of the Quantitative Data and Documentary Evidence.  Studies in Conflict & Terrorism 29:531-559 September 2006.

Hinds, Alphus.  Mumbai Bombings Signal Sustained Rail Terrorism Trend.  Jane's Intelligence Review 18:12-17 October 2006.
Examines the nature of the threat and its likely future trajectory.

Lewis, Jefferey W.  Precision Terror:  Suicide Bombing as Control Technology.  Terrorism and Political Violence 19:223-245 Summer 2007.

The Liquid Explosives Threat.  Jane's Terrorism & Security Monitor, pp 13-14, October 2006.

Moghadam, Assaf.  Suicide Terrorism, Occupation, and the Globalization of Martyrdom:  A Critique of Dying to Win.  Studies in Conflict & Terrorism 29:707-729 December 2006.

Morgenstern, Henry.  Liquid Explosives:  Can We Detect, Prevent and Respond to This Threat?  Journal of Counterterrorism & Homeland Security International 13, no.2:30-34 Summer 2007.

Plaxe, Jac.  IACSP's Aviation Security Incident Review:  First Quarter 2007.  Journal of Counterterrorism & Homeland Security International 13, no.2:36-40 Summer 2007.
The list was compiled from open source documents and is not comprehensive.

Segell, Glen M.  Terrorism on London Public Transport.  Defense & Security Analysis 22:45-59 March 2006.

Stevenson, Jonathan.  Martyrs, Nationalism and the Jihad:  Review Essay.  Survival 48:199-206 Spring 2006.

White, Stanley L.  The Wolf Strikes Alone.  Journal of Counterterrorism & Homeland Security International 13, no.2:48-51 Summer 2007.
Discusses lone terrorists, their motivations and how they receive their training.

Winkates, Jim.  Suicide Terrorism:  Martyrdom for Organizational Objectives.  Journal of Third World Studies 23:87-115 Spring 2006.
Also available online at:  http://proquest.umi.com/pqdweb?index=30&did=1037519371&SrchMode=3&sid=1&Fmt=6&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1184357894&clientId=417&aid=1


Methods:  Suicide & Mass Casualty -- Multimedia

Cult of the Suicide Bomber.  New York, Disinformation Company, 2006.  1 videodisc (96 min).
Fairchild DVD 303.625 C968

Lechner, Amir.  Suicide Bombings - A Growing Phenomenon.  Alexandria, VA, ASIS International, 2006.  2 sound discs (90 min.).
"Describes the logic and perceptions of suicide bombers, their recruiting efforts, and how an understanding of their modus operandi will help us deal with this growing phenomenon."
Fairchild Audio 363.325 L459



Methods:  Use of Technology

 

Internet Resources

Rodriguez, Carlos A.  Cyberterrorism - A Rising Threat in the Western Hemisphere.  Washington, Inter-American Defense College, May 2006.
Available online at:  http://library.jid.org/en/mono45/Rodriguez,%20Carlos.pdf
"Provides background information and a definition of cyber terror as well as its implications to hemispheric security".

Rollins, John and Wilson, Clay.  Terrorist Capabilities for Cyberattack:  Overview and Policy Issues.  Washington, Library of Congress, Congressional Research Service, January 22, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA463774


Methods:  Use of Technology -- Books

Colarik, Andrew M.  Cyber Terrorism:  Political and Economic Implications.  Hershey, PA, Idea Group Pub, 2006.  172 p.
"Outlines recent terrorist activities, political objectives, and their use of cyberspace.  Illustrates the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilizatiion."
Book call no.:  363.325 C683c

Cragin, Kim.  Sharing the Dragon's Teeth:  Terrorist Groups and the Exchange of New Technologies.  Santa Monica, CA, Rand, 2007.  114 p.
Book call no.:  363.325 S531

Menjivar, Cecilia.  When States Kill:  Latin America, the U.S., and Technologies of Terror.  Austin, TX, University of Texas Press, 2005.  374 p.
Offers two overview essays:  "State Terror in the U.S.-Latin American Interstate Regime" and "New Responses to State Terror".  Also offers separate essays addressing state terror in:  Argentina, Colombia, Costa Rica, El Salvador, Guatemala, Honduras, Mexico, Nicaragua, Peru and Uruguay
Book call no.:  303.625098 W565

Teaching Terror:  Strategic and Tactical Learning in the Terrorist World, edited by James J. F. Forest.  Lanham, MD, Rowman & Littlefield, 2006.  306 p.
Book call no.:  363.325071 T253

Weimann, Gabriel.  Terror on the Internet:  The New Arena, the New Challenges.  Washington, United States Institute of Peace Press, 2006.  309 p.
"Examines how modern terrorist organizations exploit the Internet to raise funds, recruit members, plan and launch attacks, and publicize their results."
Book call no.:  363.325 W422t


Methods:  Use of Technology -- Periodicals

Bailey, Timothy D. and Grimaila, Michael R.  Running the Blockade:  Information Technology, Terrorism and the Transformation of Islamic Mass Culture.  Terrorism and Political Violence 18:523-543 Winter 2006.

Jones, Seth.  Fighting Networked Terrorist Groups:  Lessons from Israel.  Studies in Conflict & Terrorism 30:281-302 April 2007.
Argues that the most effective strategy to defeat networked adversaries is to use networked strategies.

Kirby, Aidan.  The London Bombers as "Self-Starters":  A Case Study in Indigenous Radicalization and the Emergence of Autonomous Cliques.  Studies in Conflict & Terrorism 30:415-428 May 2007.
Argues that "homegrown terrorists" use the Internet as an opertional tool.

Lentini, Pete and Bakashmar, Muhammad.  Jihadist Beheading:  A Convergence of Technology, Theology, and Teleology?  Studies in Conflict and Terrorism 30:303-325 April 2007.

Reid, Edna and Chen, Hsinchun.  Extremist Social Movement Groups and Their Online Digital Libraries.  Information Outlook 10:57-65 June 2006.

Weimann, Gabriel.  Virtual Disputes:  The Use of the Internet for Terrorist Debates.  Studies in Conflict & Terrorism 29:623-639 October-November 2006.
Presents the less noticed facet of terrorism on the Net by providing examples of virtual debates among and within terrorist groups.

White, Stanley L.  The Wolf Strikes Alone.  Journal of Counterterrorism & Homeland Security International 13, no.2:48-51 Summer 2007.
Discusses lone terrorists, their motivations and how they receive their training.



Methods:  Use of Women and Children

 

Internet Resource

Billquist, Daniel L. and Colbert, Jason M.  Pakistan, Madrassas, and Militancy.  Monterey, CA, Naval Postgraduate School, December 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA460444


Methods:  Use of Women and Children -- Books

(En)gendering the War on Terror.  Burlington, VT, Ashgate, 2006.  234 p.
Book call no.:  973.931 E57

Kenney, Michael.  From Pablo to Osama:  Trafficking and Terrorist Networks, Government Bureaucracies, and Competitive Adaptation.  University Park, PA, Pennsylvania State University Press, 2007.  293 p.
Explores how drug traffickers, terrorists, and government officials gather, analyze, and apply knowledge and experience.
Book call no.:  363.325 K34f

Skaine, Rosemarie.  Female Suicide Bombers.  Jefferson, NC, McFarland, 2006.  225 p.
"This work discusses the history of suicide bombing and profiles the female suicide bomber."
Book call no.:  363.325 S626f

What Motivates Suicide Bombers?, edited by Lauri S. Friedman.  Detroit, MI, Greenhaven Press, 2005.  93 p.
Book call no.:  303.625 W555


Methods:  Use of Women and Children -- Periodicals

Achvarina, Vera and Reich, Simon F.  No Place to Hide:  Refugees, Displaced Persons, and the Recruitment of Child Soldiers.  International Security 31:127-164 Summer 2006.

Berko, Anat and Erez, Edna.  Gender, Palestinian Women, and Terrorism:  Women's Liberation or Oppression?  Studies on Conflict & Terrorism 30:493-519 June 2007.
"Examines the hypothesis that Palestinian women's involvement in terrorism indicates women's liberation.

Pargeter, Alison.  North African Immigrants in Europe and Political Violence.  Studies in Conflict and Terrorism 29:731-747 December 2006.

Rashid, Tahmina.  Radical Islamic Movements:  Gender Construction in Jamaat-i-Islami and Tabligh-i-Jamaat in Pakistan.  Strategic Analysis 30:354-376 April-June 2006.
Argues that women are active partners of their subordination within traditionalist and radical religious movements.

Stack-O'Connor, Alisa.  Lions, Tigers, and Freedom Birds:  How and Why the Liberation Tigers of Tamil Eelam Employs Women.  Terrorism and Political Violence 19:43-63 Spring 2007.
Examines the themes common to women's participation in militant groups such as women's unique propaganda value and cultural limits on recruiting women and employing them in political violence.

von Knop, Katharina.  The Female Jihad:  Al Qaeda's Women.  Studies in Conflict & Terrorism 30:397-414 May 2007.
Explores and analyzes the extent to which women are involved in terrorism.


Methods:  Use of Women and Children -- Multimedia

Cult of the Suicide Bomber.  New York, Disinformation Company, 2006.  1 videodisc (96 min.).
Fairchild DVD 303.625 C968



International -- Antiterrorism/Counterterrorism Strategy & Policy

 

Internet Resources

Archick, Kristin.  U.S.-EU Cooperation Against Terrorism.  Washington, Library of Congress, Congressional Research Service, October 16, 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA458428

Boudali, Lianne K.  The Trans-Sahara Counterterrorism Partnership.  West Point, NY, Military Academy, Combating Terrorism Center, April 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA466542
Reports that DOD has collaborated with the Department of State to develop the Trans Sahara Counterterrorism Partnership (TSCTP), which supports African states' efforts to improve border security and counterterrorism capacity while also facilitating regional cooperation, promoting democratic governance, and improving relations with the United States.

Donalds, Thomas J.  Radical Islam in Britain:  Implications for the war on Terrorism.  Carlisle Barracks, PA, U.S. Army War College, March 12, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA467202

Halaburda, Pablo.  Terrorism Base Potential in the Tri-Border Area of Latin America.  Monterey, CA, Naval Postgraduate School, December 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA462564

Kirkwood, Lea T.  The European Union Counter-Terrorism Strategy:  Origins, Problems, and Prospects.  Monterey, CA, Naval Postgraduate School, December 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA462613

Shepard, Scott.  The Rise of Pan-Islamism in Britain.  Monterey, CA, Naval Postgraduate School, December 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA462712

UK - Counter Terrorism Science and Technology Centre
Available online at:  http://www.ctcentre.mod.uk/
Is the hub for UK Mod Counter Terrorism Science and Technology research.


International:  Anti/Counterterrorism Strategy & Policy -- Books

Aman, Michael.  Preventing Terrorist Suicide Attacks.  Sudbury, MA, Jones and Bartlett Publishers, 2007.  98 p.
Book call no.:  363.32517 A484p

Australian Security after 9/11:  New and Old Agendas, edited by Derek McDougall and Peter Shearman.  Burlington VT, Ashgate, 2006.  214 p.
Book call no.:  355.033094 A9372

Bascio, Patrick.  Defeating Islamic Terrorism:  The Wahhabi Factor.  Boston, Branden Publishing Co, 2007.  256 p.
Book call no.:  363.32516 B298d

Blaxland, John.  Revisiting Counterinsurgency:  A Manoeuvrist Response to the 'War on Terror' for the Australian Army.  Duntroon, Australia, Land Warfare Studies Centre, 2006.  91 p.
Book call no.:  355.0218 B6451r

Burleigh, Michael.  Sacred Causes:  The Clash of Religion and Politics, from the Great War to the War on Terror.  New York, Harper, 2007.  556 p.
Book call no.:  322.1094 B961s

Chandler, Michael and Gunaratna, Rohan.  Countering Terrorism:  Can We Meet the Threat of Global Violence?  London, Reaktion Books, 2007.  240 p.
Argues that the global community has missed the opportunity to cooperate against trans-national terrorism.
Book call no.:  363.325 C456c

Charny, I. W.  Fighting Suicide Bombing:  A Worldwide Campaign for Life.  Westport, CT, Praeger Security International, 2007.  283 p.
Book call no.:  363.325 C483f

Countering Terrorism and WMD:  Creating a Global Counter-Terrorism Network, edited by Peter Katona.  New York, Routledge, 2006.  300 p.
Book call no.:  363.32517 K19c

Counterterrorism Strategies:  Successes and Failures of Six Nations, edited by Yonah Alexander and foreword by JoseI Maril a Aznar.  Washington, Potomac Books, 2006.  271 p.
Book call no.:  363.32517 C8551

Dalzell, Stephen R.  Beyond Draining the Swamp:  Urban Development and Counterterrorism in Morocco.  Hurlburt Field, FL, JSOU Press, 2006.  30 p.
This analysis "found that the Moroccan strategy offers an example of integrating socio-economic, ideological, political, and security-sector reforms, particularly in the growing sophistication of Moroccan efforts to eliminate informal housing areas."
Book call no.:  363.325156 D153b

Dempsey, Thomas A.  Counterterrorism in African Failed States:  Challenges and Potential Solutions.  Carlisle Barracks, PA, Strategic Studies Institute, U.S. Army War College, 2006.  36 p.
Calls for a new strategy for counterterrorism efforts in Africa.  Argues for a strategy that combines both military and law enforcement efforts, supported by foreign intelligence.
Also available online at:  http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB649.pdf
Book call no.:  363.32516096 D389c

Global Non-Proliferation and Counter-Terrorism:  The Impact of UNSCR 1540, edited by Olivia Bosch and Peter van Ham.  Washington, Brookings Institution Press, 2007.  253 p.
Book call no.:  327.1745 G562

Global Threat Reduction, edited by Sharon A. Squassoni and Amy F. Woolf.  New York, Novinka Books, 2006.  151 p.
Book call no.:  327.1747 S773g

Gray-Murphy, Sam.  Air Power and Trans-National Terrorism:  The Possibilities, Advantages and Limits to Using Australian Air Power in the "War on Terror".  Tuggeranong, Australia, Air Power Development Centre, 2005.  41 p.
Book call no.:  358.4030994 G781a

Greenberg, Michael D.  Maritime Terrorism:  Risk and Liability.  Santa Monica, CA, Rand, 2006.  167 p.
Focuses on the study of terrorism risk and liability issues in connection with attacks that target passenger vessels and attacks that target containerized shipping.
Book call no.:  363.3259387 M342

Holmes, Jennifer S.  Terrorism and Democratic Stability.  New Brunswick, NJ, Transaction Publishers, 2006.  241 p.
Examines the effects of terrorism and state repression on democratic stability in Uruguay, Peru, and Spain.
Book call no.:  320.011 H751t

How States Fight Terrorism:  Policy Dynamics in the West, edited by Doron Zimmermann and Andreas Wenger.  Boulder, CO, Lynne Rienner Publishers, 2007.  259 p.
Book call no.:  363.32517 H847

Jacobson, Michael.  The West at War:  U.S. and European Counterterrorism Efforts, Post-September 11.  Washington, Washington Institute for Near East Policy, 2006.  139 p.
Book call no.:  363.32517 J17w

Johnstone, R. William.  9/11 and the Future of Transportation Security.  Westport, CT, Praeger Security International, 2006.  218 p.
Book call no.:  363.325936312 J73n

Jones, Alun.  Blackstone's Guide to the Terrorism Act 2006.  New York, Oxford University Press, 2006.  205 p.
Book call no.:  345.4102 J76b

Kriendler, John.  NATO Intelligence and Early Warning.  Camberley, UK, Defence Academy of the United Kingdom, Conflict Studies Research Centre, 2006.  8 p.
Also available online at:  http://www.defac.ac.uk/colleges/csrc/document-listings/special/06%2813%29JK.pdf
Book call no.:  355.3432094 K92n

McDermott, Roger N.  Countering Global Terrorism:  Developing the Antiterrorist Capabilities of the Central Asian Militaries..  Carlisle Barracks, PA, Strategic Studies Institute, U.S. Army War College, 2004.  46 p.
Book call no.:  363.325160958 M134c

McMillan, Joseph.  "In the Same Light as Slavery":  Building a Global Antiterrorist Consensus.  Washington, Institute for National Strategic Studies, National Defense University Press, 2006.  241 p.
Book call no.:  363.32517 I35

Pojman, Louis P.  Terrorism, Human Rights and the Case for World Government.  New York, Rowman & Littlefield Publishers, 2006.  95 p.
Book call no.:  341.21 P759t

Rees, Wyn.  Transatlantic-Counter Terrorism Cooperation:  The New Imperative.  New York, Routledge, 2006.  219 p.
Book call no.:  363.325156 R328t

Responding to Terrorism in South Asia, edited by S. D. Muni.  New Delhi, India, Manohar, 2006.  542 p.
Book call no.:  363.325160954 R434

Rupp, Richard E.  NATO after 9-11:  An Alliance in Continuing Decline.  New York, Palgrave Macmillan, 2006.  282 p.
Book call no.:  355.031091821 R946n

Shulman, Mark R.  The Proliferation Security Initiative as a New Paradigm for Peace and Security.  Carlisle Barracks, PA, Strategic Studies Institute, U.S. Army War College, 2006.  58 p.
Also available online at:  http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB652.pdf
Book call no.:  341.735 S562p

Terrorism and the International Business Environment:  The Security - Business Nexus, edited by Gabriele G. S. Suder.  Northampton, MA, Edward Elgar, 2004.  241 p.
Book call no.:  658.473 T328

Terrorism:  Protection of Witnesses and Collaborators of Justice.  Strasbourg, France, Council of Europe Publishing, March 2006.  403 p.
"Contains a survey of national laws and practice in 27 Council of Europe member states and two observer states together with an analytical report which examines the protection of witnesses and collaborators of justice.  It constitutes a further Council of Europe contribution to the international community's efforts to combat terrorism."
Book call no.:  344.05325 T328

United Nations.  General Assembly.  Uniting against Terrorism:  Recommendations for a Global Counter-Terrorism Strategy.  New York, United Nations, 2006.  32 p.
Also available online at:  http://www.un.org/unitingagainstterrorism/sg-terrorism-2may06.pdf
Book call no.:  363.32516 U586u

United States.  Congress.  Senate.  Committee on Appropriations.  Subcommittee on the Department of Homeland Security.  Catching Terrorists:  The British System Versus the U.S. System.  Hearing.  109th Congress, 2nd session, September 14, 2006.  Washington, GPO, 2006.  49 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS77482
Book call no.:  344.05325 U58c

Valeriano, Napolean D. and Bohannan, Charles T. R.  Counter-Guerrilla Operations:  The Philippine Experience.  Westport, CT, Praeger Security International, 2006.  228 p.
Book call no.:  355.425 V163c 2006

Youngs, Richard.  Europe and the Middle East:  In the Shadow of September 11.  Boulder, CO, Lynne Rienner Publishers, 2006.  255 p.
Book call no.:  327.4056 Y75e


International:  Anti/Counterterrorism Strategy & Policy -- Documents

Amarille, Roland C.  Government of the Republic of the Philippines - Moro Islamic Liberation Front Peace Talks:  A Bold Move to Counter Terrorism.  Carlisle Barracks, PA, U.S. Army War College, 2006.  20 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA449258
Doc. call no.:  M-U 39080-537 A485g

Brinkley, W. David.  Radical Theology as a Destabilizing Aspect of the 21st Century Strategic Security Continuum.  Carlisle Barracks, PA, U.S. Army War College, 2006.  16 p.
"Reviews the basic definitions and causes of secular terrorism and examines radical religious ideology using contemporary cases to study organizational goals and fundamental beliefs of politically radical religious groups."
Also available online at:  http://handle.dtic.mil/100.2/ADA448500
Doc. call no.:  M-U 39080-537 B8581r

Ciuca, Nicolae I.  Roles of Alliances and Coalitions in the War on Terrorism.  Carlisle Barracks, PA, U.S. Army War College, 2006.  24 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA449424
Doc. call no.:  M-U 39080-537 C581r

Haque, M. Mahfuzul.  International Terrorism -- A War Without Boundary:  Ways to Combat.  Carlisle Barracks, PA, U.S. Army War College, 2006.  28 p.
Examines "the nature, types of international terrorism and threat posed by it and focuses on the counter-terrorism approaches and measures needed to combat international terrorism."
Also available online at:  http://handle.dtic.mil/100.2/ADA448672
Doc. call no.:  M-U 39080-537 H253i

Maye, Diane Leigh.  Measures of Effectiveness:  Israeli Counterterrorism Strategies and Tactics During the Al-Aqsa Intifada.  Monterey, CA, Naval Postgraduate School, 2006.  79 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA457277
Doc. call no.:  M-U 42525 M467m

Minta, James L.  Maritime Domain Awareness:  A Western Hemisphere Imperative.  Carlisle Barracks, PA, U.S. Army War College, 2006.  14 p.
"Contends that a Western Hemisphere multinational treaty organization of willing states needs to be established to develop a common operational picture of the maritime domain."
Also available online at:  http://handle.dtic.mil/100.2/ADA449371
Doc. call no.:  M-U 39080-537 M667m


International:  Anti/Counterterrorism Strategy & Policy -- Periodicals

Alimi, Eitan Y.  Contextualizing Political Terrorism:  A Collective Action Perspective for Understanding the Tanzim.  Studies in Conflict and Terrorism 29:263-283 April-May 2006.

Anglim, Simon.  Orde Wingate and the Special Night Squads:  A Feasible Policy for Counter-Terrorism?  Contemporary Security Policy 28:28-41 April 2007.
Analyzes the counter-terrorist operations carried out in Palestine in 1938 and considers how they might contribute to current operations.

Atran, Scott.  Commentary:  A Failure of Imagination "Intelligence, WMDs, and "Virtual Jihad."  Studies in Conflict and Terrorism 29:285-300 April-May 2006.

Bird, Tim.  The European Union and Counter-Insurgency:  Capability, Credibility, and Political Will.  Contemporary Security Policy 28:182-196 April 2007.
Argues that the EU's potential as a credible COIN actor is severely undermined.

Corum, James S.  Rethinking US Army Counter-Insurgency Doctrine.  Contemporary Security Policy 28:127-142 April 2007.
Examines the US Army's approach to counter-insurgency (COIN) doctrine from the Vietnam War to the present.

Croissant, Aurel.  Muslim Insurgency, Political Violence, and Democracy in Thailand.  Terrorism and Political Violence 19:1-18 Spring 2007.
Contends that it is highly unlikely that extremists will reach their separatist goal, that the counterinsurgency contributes to the erosion of liberal democracy in Thailand.

Dutter, Lee E. and Seliktar, Ofira.  To Martyr or Not to Martyr:  Jihad Is the Question, What Policy Is the Answer?  Studies in Conflict & Terrorism 30:429-443 May 2007.
Argues that the focus of debate, discussion, and policy should be on the prospects for containing or reducing terrorist actions via passive defenses and the denial to terrorists of access to potential targets.

Eckert, William.  Defeating the Idea:  Unconventional Warfare in the Southern Philippines.  Special Warfare 19:16-22 November-December 2006.

Ethiopia-Kenya-United United States:  Rendition Confusion.  Africa Confidential 48:10 April 13, 2007.
"The United States' War on Terror is catching many innocent people in its crossfire and hundreds of these are held incommunicado by the Ethiopian and Kenyan authorities on suspicion of terrorism."

Hassan, Muhammad Haniff.  Key Considerations in Counterideological Work Against Terrorist Ideology.  Studies in Conflict and Terrorism 29:561-588 September 2006.

Hillen, John.  Developing a National Counterinsurgency Capability for the War on Terror.  Military Review 87:13-15 January-February 2007.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24333089&site=ehost-live&custid=airuniv

Hinds, Alphus.  Fortress Olympics:  Counting the Cost of Major Event Security.  Jane's Intelligence Review 19:20-25 May 2007.

Hussain, Syed Rifaat.  Responding to Terrorist Threat:  Perspectives from Saudi Arabia and Pakistan.  Journal of South Asian and Middle Eastern Studies 30:38-61 Spring 2007.

Jones, Seth.  Fighting Networked Terrorist Groups:  Lessons from Israel.  Studies in Conflict & Terrorism 30:281-302 April 2007.
Argues that the most effective strategy to defeat networked adversaries is to use networked strategies.

Kay, Sean and Khan, Sahar.  NATO and Counter-Insurgency:  Strategic Liability or Tactical Asset?  Contemporary Security Policy 28:163-181 April 2007.
Argues that NATO's multinational character, reliance on consensus, and limited resources make it an unlikely contributor to effective COIN.

Koschade, Stuart.  A Social Network Analysis of Jemaah Islamiyah:  The Applications to Counterterrorism and Intelligence.  Studies in Conflict & Terrorism 29:589-605 September 2006.

Lafree, Gary and Dugan, Laura.  Introducing the Global Terrorism Database.  Terrorism and Political Violence 19:181-204 Summer 2007.

Marks, Thomas A.  Thailand:  Past COIN Lessons for Today's GWOT.  Journal of Counterterrorism & Homeland Security International 13, no.1:36-43 Spring 2007.

Marks, Thomas A. and Palmer, David Scott.  At the Frontlines of the GWOT:  Lessons from Peru.  Journal of Counterterrorism & Homeland Security International 13, no.2:18-25 Summer 2007.
Contends that the U.S. and its allies in the GWOT need to take some lessons learned from Peru who put down the Shining Path group.

McAllister, Brad and Khersonsky, Julia.  Trade, Development, and Nonproliferation:  Multilevel Counterterrorism in Central Asia.  Studies in Conflict & Terrorism 30:445-458 May 2007.
Uses the case study of Uzbekistan and Central Asian insecurity to illustrate the utility of customs, border security, and export control legislation as integral components in counterterror campaigns.

Parker, Tom.  Fighting an Antaean Enemy:  How Democratic States Unintentionally Sustain the Terrorist Movements They Oppose.  Terrorism and Political Violence 19:155-179 Summer 2007.
Examines the experiences of the democratic states of the United Kingdom, Germany, Canada, Italy, and Israel and concludes that when confronting terrorism the greatest challenge of all is to adopt and maintain a measured response to terrorist outrages.

Phillips, Matthew.  Uncertain Justice for Nuclear Terror:  Deterrence of Anonymous Attacks Through Attribution.  Orbis 51:429-446 June 2007.
Argues that the "U.S. should adopt a broadly scoped operationally ambiguous declaratory policy in the context of a comprehensive strategic doctrine to prevent nuclear terrorism."
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25354341&site=ehost-live&custid=airuniv

Radcliffe, Sarah A.  Latin American Indigenous Geographies of Fear:  Living in the Shadow of Racism, Lack of Development, and Antiterror Measures.  Annals of the Association of American Geographers 97:385-397 June 2007.
Outlines the geographies of fear to which Latin American indigenous populations have been subjected to in nation-building and antiterrorism measures resulting in restricted development opportunities and insecure livelihoods.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25149914&site=ehost-live&custid=airuniv

Simons, Anna and Tucker, David.  The Misleading Problem of Failed States:  A 'Socio-Geography' of Terrorism in the Post-9/11 Era.  Third World Quarterly 28:387-401 2007.
Argues that the generalization can be made that foot soldiers come from disenfranchised populations and terrorists can come from alienated populations.  This produces security problems that are best handled by means other than direct military force.

Sinai, Joshua.  Using the Internet to Uncover Terrorism's Root Causes.  Journal of Counterterrorism and Homeland Security 12:28-33 Autumn 2006.

Teo, Yun Yun.  Target Malacca Straits:  Maritime Terrorism in Southeast Asia.  Studies in Conflict & Terrorism 30:541-561 June 2007.
Looks at how "three neighbors in the same Straits came to have such divergent policies on combating maritime terrorism."

Thornton, Rod.  Countering Arab Insurgencies:  The British Experience.  Contemporary Security Policy 28:7-27 April 2007.
Looks at how British forces dealt with Arab insurgencies during the imperial period.  Stresses the need for service personnel to have a strong knowledge of local languages and understand the culture.

Wittig, Tim.  Not So Legal Tender:  What Next for the Financial War on Terrorism?  Jane's Intelligence Review 19:14-17 February 2007.

Wolfendale, Jessica.  Terrorism, Security, and the Threat of Counterterrorism.  Studies in Conflict & Terrorism 30:75-92 January 2007.
Argues that terrorism does not pose a sufficient enough threat to warrant some of the counterterrorism legislation being enacted.

Zimmermann, Doron.  The European Union and Post-9/11 Counterterrorism:  A Reappraisal.  Studies in Conflict and Terrorism 29:123-145 March 2006.



United States -- Antiterrorism/Counterterrorism Strategy and Policy

 

Internet Resources

Ahrari, Ehsan.  Countering the Ideological Support for HT and the IMU:  The Case of the Ferghana Valley.  Garmisch-Partenkirchen, Germany, George C. Marshall European Center for Security Studies, October 2006. (Occasional paper, no. 3).
Available online at:  http://www.marshallcenter.org/site-graphic/lang-en/page-occpapers-research-1/static/xdocs/research/static/occpapers/occ-paper_3-en.pdf

Archick, Kristin.  U.S.-EU Cooperation Against Terrorism.  Washington, Library of Congress, Congressional Research Service, October 16, 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA458428

Baldauf, Paul D.  Chemical Industry Security:  Voluntary or Mandatory Approach?  Monterey, CA, Naval Postgraduate School, March 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA467105

Carrick, Kenneth.  Weakness Against Terrorism:  Fifteen Years of Failed U.S. Policy.  Carlisle Barracks, PA, U.S. Army War College, March 8, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA467152
Argues that "law enforcement and deterrence fail against terrorism.  Only military strength in combination with effective arms of all elements of national power can defeat terrorism"

Celebi, Erdogan.  Systems Approach to Terrorism:  Countering the Terrorist Training Subsystem.  Monterey, CA, Naval Postgraduate School, December 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA462342

Chan, Wing K.  Defeating the Logic of Islamist Terrorism.  Carlisle Barracks, PA, U.S. Army War College, March 8, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA467234

Jenkins, Brian Michael.  Homegrown Terrorism FDCH Congressional Testimony June 14, 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=32Y0062465903&site=ehost-live

Johnson, Corina.  Roots of Terror.  Carlisle Barracks, PA, U.S. Army War College, Strategic Studies Institute, February 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA468292
Contends that Government agencies must implement strong leadership and management of counterterrorism policies and guidelines, and do so in a way that does not infringe on the legal rights of the individual.

Lim, Sze Li Harry.  Assessing the Effect of Honeypots on Cyber-Attackers.  Monterey, CA, Naval Postgraduate School, 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA462526

Lippin, Tobi Mae.  Chemical Plants Remain Vulnerable to Terrorists:  A Call to Action.   Environmental Health Perspectives.  September 2006.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=22421707&site=ehost-live

Parfomak, Paul W. and Frittelli, John.  Maritime Security:  Potential Terrorist Attacks and Protection Priorities.  Washington, Library of Congress, Congressional Research Service, January 9, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA460683

Peri, Raphael F.  International Terrorism:  Threat, Policy, and Response.  Washington, Library of Congress, Congressional Research Service, January 3, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA462072

Shea, Dana A. and Tatelman, Todd B.  Chemical Facility Security:  Regulation and Issues for Congress.  Washington, Library of Congress, Congressional Research Service, March 26, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA467495

Walsh, Shawn P.  Oil Vulnerabilities and United States Strategy.  Carlisle Barracks, PA, U.S. Army War College, 08 February 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA468533


U.S.:  Anti/Counterterrorism Strategy & Policy -- Books

Abraham, Spencer.  Immigration and America's Future:  A New Chapter:  Report of the Independent Task Force on Immigration and America's Future.  Washington, Migration Policy Institute, 2006.  153 p.
Book call no.:  325.73 I332

Ackerman, Bruce A.  Before the Next Attack:  Preserving Civil Liberties in an Age of Terrorism.  New Haven, CT, Yale University Press, 2007.  227 p.
Book call no.:  342.73062 A182b

Baker, James A.  The Iraq Study Group Report:  The War Forward, A New Approach.  New York, Vintage Books, 2006.  142 p.
Book call no.:  956.70443 I6516i

Becker, Tal.  Terrorism and the State:  Rethinking the Rules of State Responsibility.  Portland, OR, Hart Publishing, 2006.  390 p.
Offers an innovative approach to regulating State responsibility for terrorism.
Book call no.:  344.05325 B376t

Burke, Robert.  Counter-Terrorism for Emergency Responders.  New York, Taylor & Francis, 2007.  510 p.
Book call no.:  363.32518 B959c 2007

Chickering, A. Lawrence.  Strategic Foreign Assistance:  Civil Society in International Security.  Stanford, CA, Hoover Institution Press, 2006.  142 p.
Book call no.:  363.32515 S898

Clarke, Ronald V. and Newman, Graeme R.  Outsmarting the Terrorists.  Westport, CT, Praeger Security International, 2006.  303 p.
"Argues that the government anti-terrorism policy must pay more attention to reducing opportunities for terrorist attacks by protecting vulnerable targets, controlling the tools and weapons used by terrorists, and by removing the conditions of everyday life that make these attacks possible."
Book call no.:  363.32516 C599o

Currie, Stephen.  Terrorism:  An Opposing Viewpoints Guide.  Detroit, MI, Greenhaven Press/Thomson Gale, 2006.  111 p.
Book call no.:  363.325 T3285

Enduring Abuse:  Torture and Cruel Treatment by the United States at Home and Abroad.  New York, American Civil Liberties Union, April 2006.  1 vol.
A shadow report by the American Civil Liberties Union prepared for the United Nations Committee Against Torture on the occasion of its review of the United States of America's Second Periodic Report to the Committee Against Torture.
Also available online at:  http://www.aclu.org/safefree/torture/torture%5Freport.pdf
Book call no.:  323.490973 E56

Geraghty, Jim.  Voting to Kill:  How 9/11 Launched the Era of Republican Leadership.  New York, Touchstone Book, 2006.  366 p.
Argues that more Americans trust the GOP (Republican Party) to be ruthless in killing terrorists.
Book call no.:  973.931 G3541v

Harvey, Frank P.  Smoke and Mirrors:  Globalized Terrorism and the Illusion of Multilateral Security.  Buffalo, NY, University of Toronto Press, 2004.  342 p.
Book call no.:  327.730090511 H341s

Heymann, Philip B. and Kayyem, Juliette N.  Protecting Liberty in an Age of Terror.  Cambridge, MA, MIT Press, 2005.  194 p.
Book call no.:  323.44 H618p

The Imperial Presidency and the Consequences of 9/11:  Lawyers React to the Global War on Terrorism, edited by James R. Silkenat and Mark R. Shulman.  Westport, CT, Praeger Security International, 2007.  2 vols.
Book call no.:  342.73062 I34

Jacobson, Sid and Colon, Ernie.  The 9/11 Report:  A Graphic Adaptation.  New York, Hill and Wang, 2006.  133 p.
With a foreword by the Chair and Vice Chair of the 9/11 Commission, Thomas H. Kean and Lee H. Hamilton.
Book call no.:  973.931 J17n

Kean, Thomas H.  Without Precedent:  The Inside Story of the 9/11 Commission.  New York, Alfred A. Knopf, 2006.  370 p.
Book call no.:  973.931 K24w

Lebovic, James H.  Deterring International Terrorism and Rogue States:  US National Security Policy after 9/11.  New York, Routledge, 2007.  226 p.
Book call no.:  355.0335 L449d

Mueller, John E.  Overblown:  How Politicians and the Terrorism Industry Inflate National Security Threats, and Why We Believe Them.  New York, Free Press, 2006.  259 p.
Book call no.:  363.32516 M946o

National Commission on Terrorist Attacks upon the United States.  The 9/11 Commission Report - Executive Summary.  Washington, National Commission on Terrorist Attacks upon the United States, 2004.  26 p.
Book call no.:  973.931 N277n

National Commission on Terrorist Attacks upon the United States.  The 9/11 Commission Report:  Final Report.  Washington, National Commission on Terrorist Attacks upon the United States, 2004.  567 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS51934
Book call no.:  973.931 N277n

National Commission on Terrorist Attacks upon the United States.  9/11 Commission Report:  Final Report of the National Commission on Terrorist Attacks upon the United States with Interim Reports, Press Releases, and Index of the Final Report.  New York, Barnes & Noble, 2004.  664 p.
Book call no.:  973.931 N277na

National Strategy to Combat Terrorist Travel.  Washington, National Counterterorism Center, May 2, 2006.  45 p.
Book call no.:  363.32516 N277n

Pena, Charles V.  Winning the Un-War:  A New Strategy for the War on Terrorism.  Washington, Potomac Books, 2006.  241 p.
States that "terrorism is simply a tactic, not an enemy." Argues that the U.S. national security strategy should address this fact.
Book call no.:  363.32516 P397w

The Philosophical Challenge of September 11, edited by Tom Rockmore.  Malden, MA, Blackwell Publishing, 2005.  218 p.
A collection of essays looking at changes in the conception of moral and political reasoning, rationality and responsibility, and the repercussions for justice, human rights and international law after the 9/11 attacks.
Book call no.:  320.01 P568

Riley, K. Jack.  State and Local Intelligence in the War on Terrorism.  Santa Monica, CA, Rand, 2005.  68 p.
Book call no.:  363.325163 S797

Scheuer, Michael.  Through Our Enemies' Eyes:  Osama bin Laden, Radical Islam, and the Future of America.  Washington, Potomac Books, 2006.  443 p.
Book call no.:  958.1046 S3218t

Shapiro, Ian.  Containment:  Rebuilding a Strategy Against Global Terror.  Princeton, NJ, Princeton University Press, 2007.  192 p.
Book call no.:  363.32517 S529c

Strategic Challenges for Counterinsurgency and the Global War on Terrorism, edited by Williamson Murray.  Carlisle, PA, Strategic Studies Institute, U.S. Army War College, September 2006.  307 p.
Book call no.:  355.02 S8983

Suskind, Ron.  The One Percent Doctrine:  Deep Inside America's Pursuit of Its Enemies Since 9/11.  New York, Simon & Schuster, 2006.  367 p.
Book call no.:  973.931 S964o

Taylor, John B.  Global Financial Warriors:  The Untold Story of International Finance in the Post-9/11 World.  New York, W. W. Norton & Company, 2007.  324 p.
Book call no.:  332.042 T243g

Terrorism:  An Opposing Viewpoints Guide, edited by Stephen Currie.  Detroit, MI, Greenhaven, 2006.  111 p.
Book call no.:  363.325 T3285

Terrorism and Counterterrorism:  Understanding the New Security Environment:  Readings & Interpretations.  Dubuque, Iowa, McGraw Hill Contemporary Learning Series, 2006.  604 p.
Book call no.:  363/325 T329 2006

United States.  Congress.  House.  Safe Port Act:  Conference Report.  Report.  109th Congress, 2nd session, 2006.  Washington, GPO, 2006.  112 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS74857
Book call no.:  387.10973 U58s

United States.  Congress.  House.  Committee on Armed Services.  Amending Title 10, United States Code, to Authorize Trial by Military Commission for Violations of the Law of War, and for Other Purposes.  Report. 109th Congress, 2nd session, September 15, 2006.  Washington, GPO, 2006.  91 p.
Book call no.:  343.730143 U581a pt.1

United States.  Congress.  House.  Committee on Armed Services.  Detainee Operations at Guantanamo Bay.  Hearing, 109th Congress, 1st session, June 29, 2005.  Washington, GPO, 2007.  45 p.
Book call no.:  973.931 U584d

United States.  Congress.  House.  Committee on Armed Services.  Requesting the President and Directing the Secretary of Defense to Transmit to the House of Representatives All Information in the Possession of the President or the Secretary of Defense Relating to the Collection of Intelligence Information Pertaining to Persons Inside the United States without Obtaining Court-Ordered Warrants Authorizing the Collection of Such Information and Relating to the Policy of the United States with Respect to the Gathering of Counterterrorism Intelligence within the United States.  Report. 109th Congress, 2nd session, March 7, 2006.  Washington, 2006, 58 p.
Book call no.:  345.052 U582r

United States.  Congress.  House.  Committee on Armed Services.  Committee on Homeland Security.  Emergency Preparedness Subcommittee.  Counterterrorism Technology Sharing.  Joint Hearing.  109th Congress, 1st session, July 21, 2005.  Washington, GPO, 2006.  85 p.
Book call no.:  363.32517 U581c

United States.  Congress.  House.  Committee on Armed Services.  Subcommittee on Terrorism, Unconventional Threats and Capabilities.  Committee on Homeland Security.  Subcommittee on Emergency Preparedness Science and Technology.  Counterterrorism Technology Sharing.  Joint Hearing.  109th Congress, 1st session, July 21, 2005.  Washington, GPO, 2006.  85 p.
Book call no.:  363.32517 U581c

United States.  Congress.  House.  Committee on Armed Services.  Subcommittee on Terrorism, Unconventional Threats and Capabilities.  Implementing the Global War on Terror Strategy:  Overcoming Interagency Problems.  Hearing.  109th Congress, 2nd session, March 15, 2006.  Washington, GPO, 2007.  81 p.
Book call no.:  363.3250973 U58i

United States.  Congress.  House.  Committee on Government Reform.  Subcommittee on National Security, Emerging Threats and International Relations.  9/11 Commission's Recommendations:  Balancing Civil Liberties and Security.  Hearing.  109th Congress, 2nd session, June 6, 2006.  Washington, 2007, 166 p.
Book call no.:  323.490973 U58n

United States.  Congress.  House.  Committee on the Judiciary.  Directing the Attorney General To Submit to the House of Representatives All Documents in the Possession of the Attorney General Relating to Warrantless Electronic Surveillance of Telephone Conversations and Electronic Communications of Persons in the United States Conducted by the National Security Agency.  Adverse Report.  109th Congress, 2nd session, March 2, 2006.  Washington, GPO, 2006.  186 p.
Book call no.:  345.052 U582d

United States.  Congress.  House.  Committee on the Judiciary.  Electronic Surveillance Modernization Act.  Report.  109th Congress, 2nd session, September 25, 2006.  Washington, GPO, 2006.  181 p.
Book call no.:  345.052 U582e v.2

United States.  Congress.  House.  Select Committee on Homeland Security.  Security and Accountability for Every Port Act.  Report.  109th Congress, 2nd session, 2006.  Washington, GPO, 2006.  1 vol.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS69442
Book call no.:  363.2860973 U58s

United States.  Congress.  Senate.  Committee on Appropriations.  Subcommittee on the Department of Homeland Security.  Catching Terrorists:  The British System Versus the U.S. System.  Hearing.  109th Congress, 2nd session, September 14, 2006.  Washington, GPO, 2006.  49 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS77482
Book call no.:  344.05325 U58c

United States.  Congress.  Senate.  Committee on Foreign Relations.  Embassies as Command Posts in the Anti-Terror Campaign.  Report.  109th Congress, 2nd session, December 15, 2006.  Washington, GPO, 2006.  25 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS77498
Book call no.:  353.13263 U581e

United States.  Congress.  Senate.  Select Committee on Intelligence.  Nomination of Vice Admiral John Scott Redd to Be Director, National Counterterrorism Center.  Hearing.  109th Congress, 1st session, July 21, 2005.  Washington, GPO, 2006.  196 p.
Book call no.:  353.32293 U58n

United States.  Congress.  Senate.  Select Committee on Intelligence.  USA PATRIOT Act.  Hearing.  109th Congress, 1st session, April 18, 2005; April 25, 2005, May 24, 2005.  Washington, GPO, 2006.  235 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS70977
Book call no.:  345.7302 U58u

United States.  Congress.  Senate.  Subcommittee of the Committee on Appropriations.  United States Entry/Exit Tracking.  Special Hearing.  109th Congress, 2nd session, January 25, 2006.  Washington, GPO, 2006.  65 p.
Also available online at:  http://www.gpoaccess.gov/congress/index.html
Book call no.:  342.73082 U583u

United States.  President.  National Strategy for Combating Terrorism.  September 2006.  26 p.
Also available online at:  http://fpc.state.gov/documents/organization/71898.pdf
Book call no.:  363.32516 U583n 2006

United States.  White House Office.  The National Strategy for Maritime Security.  Washington, White House, 2005.  26 p.
Also available online at:  http://www.whitehouse.gov/homeland/maritime-security.html
Book call no.:  387.10973 N279

Weiss, Martin A.  Terrorist Financing.  New York, Nova Science Publishers, 2006.  77 p.
Book call no.:  364.168 W431t

Wilkinson, Paul.  Terrorism Versus Democracy:  The Liberal State Response.  New York, Routledge, 2006.  254 p.
Book call no.:  363.32516 W687t 2006

Winkler, Carol.  In the Name of Terrorism:  Presidents on Political Violence in the Post-World War II Era.  Albany, NY, State University of New York Press, 2006.  260 p.
"Describes and analyzes the public communication strategies presidents have deployed to discuss terrorism since the end of WWII.
Book call no.:  303.6250973 W775i

With All Our Might:  A Progressive Strategy for Defeating Jihadism and Defending Liberty, edited by Will Marshall.  Lanham, MD, Rowman & Littlefield, 2006.  252 p.
Book call no.:  363.325156 W822


U.S.:  Anti/Counterterrorism Strategy & Policy -- Documents

Ackerman, Todd E.  A Constructive Strategy for Militant Islamic Fundamentalism.  Maxwell AFB, AL, Air Command and Staff College, 2005.  32 p.
Recommends reconstruction of the U.S. foreign policy apparatus and Middle East educational system.
Doc. call no.:  M-U 43122 A1823c

Calabrese, Maurizio D.  Emerging Threats and the War on Terrorism:  The Formation of Radical Islamist Movements in Sub-Saharan Africa.  Monterey, CA, Naval Postgraduate School, 2005.  57 p.
"The goal of the thesis is to try and generate an initial understanding of the underlying conditions that cause radical group formation to help tailor U.S. policy goals toward fighting radical Islamist group emergence through prevention."
Also available online at:  http://handle.dtic.mil/100.2/ADA435589
Doc. call no.:  M-U 42525 C1411e

Combs, Ray A.  Assessing Strategic Effectiveness in the War on Terrorism.  Carlisle Barracks, PA, U.S. Army War College, 2006.  20 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA448536
Doc. call no.:  M-U 39080-537 C731a

Genasci, Andy J.  Overt Indicators of Islamic Extremism in Nigeria.  Fort Leavenworth, KS, U.S. Army Command and General Staff College, 2006.  66 p.
"Makes recommendations to US planners on how to better characterize an Islamic extremist safe haven."
Also available online at:  http://handle.dtic.mil/100.2/ADA451891
Doc. call no.:  M-U 42022 G324o

Jefferson, Charlene D.  The Bush African Policy:  Fighting the Global War on Terrorism.  Carlisle Barracks, PA, U. S. Army War College, 2006.  18 p.
"Establishes the link between each pillar of the Bush African policy and the goals of our National Strategy for Combating Terrorism and makes recommendations to strengthen those links."
Also available online at:  http://handle.dtic.mil/100.2/ADA449355
Doc. call no.:  M-U 39080-537 J451b

Martin, Christopher.  Protecting America's Critical Infrastructure:  Making Our Program More Effective.  Carlisle Barracks, PA, U.S. Army War College, 2006.  24 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA448435
Doc. call no.:  M-U 39080-537 M379p

Pollock, John M.  A War Like No Other:  Al Qaeda and the U.S. Strategy for Combating Terrorism.  Carlisle Barracks, PA, U.S. Army War College, 2006.  20 p.
Proposes that "U.S. strategy, while well crafted to attack terrorist organizations and protect the homeland, does not address some of the underlying causes of terrorism, is too state centric, and lacks a cultural perspective."
Also available online at:  http://handle.dtic.mil/100.2/ADA448690
Doc. call no.:  M-U 39080-537 P776w

Reighard, Robert D.  Security Cooperation:  Integrating Strategies to Secure National Goals.  Carlisle Barracks, PA, U.S. Army War College, 2006.  20 p.
"Assesses our capability and capacity to implement global and Theater Security Cooperation strategies to support national security goals."
Also available online at:  http://handle.dtic.mil/100.2/ADA449543
Doc. call no.:  M-U 39080-537 R361s

Sanders, Michael J.  Using Strategic Communication More Effectively in the Global War on Terror.  Carlisle Barracks, PA, U.S. Army War College, 2006.  22 p.
Contends that planning, coordinating and executing a strategic communiction campaign plan would be an essential first step in countering the ideology of violent radical Islamists.
Also available online at:  http://handle.dtic.mil/100.2/ADA449548
Doc. call no.:  M-U 39080-537 S215u

Wagley, John R.  Transnational Organized Crime:  Principal Threats and U.S. Responses.  Washington, Congressional Research Service, 2006.  20 p.
Also available online at:  http://www.fas.org/sgp/crs/natsec/RL33335.pdf
Doc. call no.:  M-U 42953-1 no. 06-RL33335

Wallace, Mark R.  A Review of America's Strategy:  What It Will Take to Win the Global War on Terror.  Carlisle Barracks, PA, U.S. Army War College, 2006.  17 p.
Argues that we are engaged in fighting a war of ideas with terrorism.  Analyzes al-Qaida's strategy and proposes how the U.S. and its allies should craft an international strategic response to the threat.
Also available online at:  http://handle.dtic.mil/100.2/ADA448728
Doc. call no.:  M-U 39080-537 W192r

Wilson, Clay.  Computer Attack and Cyberterrorism:  Vulnerabilities and Policy Issues for Congress.  Washington, Congressional Research Service, 2005.  43 p.
Also available online at:  http://fpc.state.gov/documents/organization/45184.pdf
Doc. call no.:  M-U 42953-1 no. 05-RL32114

Winter, Peter J.  The Role of the U.S. Navy in Support of the National Strategy for Maritime Security.  Carlisle Barracks, PA, U.S. Army War College, 2006.  17 p.
"Examines the Strategy for Maritime Security, analyzes the current means available, uses current CNO guidance and policies in relation to the mission, and determines a path for the future employment of naval forces."
Also available online at:  http://handle.dtic.mil/100.2/ADA449645
Doc. call no.:  M-U 39080-537 W786r


U.S.:  Anti/Counterterrorism Strategy & Policy -- Periodicals

Berger, Mark T. and Borer, Douglas A.  The Long War:  Insurgency, Counterinsurgency and Collapsing States.  Third World Quarterly 28:197-215 2007.
Argues that the Long War and the Cold War bear many similarities.  The key similarity being the way in which insurgency and counterinsurgency are seen primarily in the context of interstate rivalry.

Buzanelli, Marcio Paulo.  Changing Intelligence.  Jane's Intelligence Review 19:58 February 2007.

Byman, Daniel.  The Decision to Begin Talks with Terrorists:  Lessons for Policymakers.  Studies in Conflict and Terrorism 29:403-414 July-August 2006.

Byman, Daniel L.  Friends Like These:  Counterinsurgency and the War on Terrorism.  International Security 31:79-115 Fall 2006.

Counter-Insurgency Theories Comeback.  Jane's Terrorism & Security Monitor, pp 11-12, April 2007.
Examines the current reappraisal of counter-insurgency theory.  Traditional counter-insurgency concepts are becoming increasingly influential as "warrior scholars" rise to prominence in the U.S. military.

Fridovidh, David P. and Krawchuk, Fred T.  The Special Operations Forces.  JFQ:  Joint Force Quarterly 44:24-27 Winter 2007.
Reports that the U.S. Special Operations Command Pacific (SOCPAC) has been amending ties with regional allies and progressively applying an indirect approach to handle the terrorist threat in the region.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24272834&site=ehost-live&custid=airuniv

Grey, Stephen.  America's Gulag.  New Statesman 133:22-25 May 17, 2004.
"Offers a look at the methods and policies used by the US for the interrrogation and torture of prisoners.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=13101784&site=ehost-live&custid=airuniv

Haider-Markel, Donald P.  Can We Frame the Terrorist Threat?  Issue Frames, the Perception of Threat, and Opinions on Counterterrorism Policies.  Terrorism and Political Violence 18:545-559 Winter 2006.

Kirschner, David J.  The NSA's Terrorist Surveillance Program:  Is It Worth the Risk?  Journal of Counterterrorism and Homeland Security International 12:10-14 Autumn 2006.

Kosal, Margaret E.  Terrorism Targeting Industrial Chemical Facilities:  Strategic Motivations and the Implications for U.S. Security.  Studies in Conflict & Terrorism 30:41-73 January 2007.

Marris, Emma.  Terror Terms for Arsonists.  Nature 447:624-625 June 7, 2007.
Reports on the terrorism enhancements added to the sentences of ten radical environmental activists for arsons committed.  The presiding judge says that the crimes committed by the activists were eligible for the terrorism enhancement.

Mauroni, Albert J.  The Future of Chemical, Biological, Radiological, and Nuclear Defense.  JFQ:  Joint Force Quarterly 44:74-78 Winter 2007.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24272847&site=ehost-live&custid=airuniv

McClay, Wilfred M.  Out of Mortal Threat, an Opportunity.  National Review 59:36-38 May 14, 2007.
"Concludes that being challenged by Islamic terrorism could provide us with an opportunity to redefine."
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24886908&site=ehost-live&custid=airuniv

Michta, Andrew A.  Transatlantic Troubles.  National Interest 86:62-66 November-December 2006.
States that several European allies have basic disagreements with the U.S. about the fight against Islamist Terrorism and Middle East policies.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=23271173&site=ehost-live&custid=airuniv

Taylor, Stuart.  How Not to Make Terrorism Policy.  National Journal 39:16-17 June 2, 2007.
Reports on the pressure faced by the U.S. Department of Justice to fabricate legal rationales for physically tormenting terrorism suspects and for wiretapping without warrants.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25459483&site=ehost-live&custid=airuniv

USA/Africa:  Boots on the Ground.  Africa Confidential 47:3 November 3, 2006.
"The Pentagon wants to raise the cash for a unified Africa command to boost its counter-terror operations and energy security."

Whitaker, Beth Elise.  Exporting the Patriot Act?  Democracy and the 'War on Terror' in the Third World.  Third World Quarterly 28:1017-1032 July 2007.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25228169&site=ehost-live&custid=airuniv


U.S.:  Anti/Counterterrorism Strategy & Policy -- Multimedia

National Commission on Terrorist Attacks upon the United States.  The 9/11 Commission Report.  Falls Church, VA, Sound Room Publishers:  Pocket University, 2004.  22 sound discs.
Unabridged.
Fairchild Audio 973.931 N2772



United States -- Global War on Terrorism (GWOT)

Includes GWOT (General) | GWOT - Technology Systems.


U.S. GWOT (General) -- Internet Resources

Conference Tackles Key Issues in Fight Against Terrorism FDCH Regulatory Intelligence Database  May 15, 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=32W3069884474&site=ehost-live

Dobrot, Laurence A.  The Global War on Terrorism:  A Religious War?  Carlisle Barracks, PA, U.S. Army War College, 13 March 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA468448

Eaneff, Charles.  The Impact of Contextual Background Fusion on Perceived Value and Quality of Unclassified Terrorism Intelligence.  Monterey, CA, Naval Postgraduate School, March 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA467124

Global War on Terrorism:  Reported Obligations for the Department of Defense:  GAO-07-783R GAO Reports  May 18, 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=25127751&site=ehost-live

Hoag, Lyle.  Give Deterrence a Chance:  A Strategy Against Al Qaeda.  Carlisle Barracks, PA, U.S. Army War College, March 28, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA468446

Niksch, Larry.  Abu Sayyaf:  Target of Philippine-U.S. Anti-Terrorism Cooperation.  Washington, Library of Congress, Congressional Research Service, January 24, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA463896

Perl, Raphael.  Combating Terrorism:  The Challenge of Measuring Effectiveness.  Washington, Library of Congress, Congressional Research Service, March 12, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA466584

Pickup, Sharon.  Global War on Terrorism:  Reported Obligations of the Department of Defense.  Washington, Government Accountability Office, May 18, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA468360

Porterfield, Robin L.  The GWOT Evolution:  Has the United States Opened Pandora's Box?  Carlisle Barracks, PA, U.S. Army War College, March 30, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA467248

Rodriguez-Rey, Patricia.  A Balancing Act:  Anti-Terror Financing Guidelines and Their Effects on Islamic Charities.  Monterey, CA, Naval Postgraduate School, December 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA462637

Sunshine, Robert A.  Issues in Budgeting for Operations in Iraq and the War on Terrorism.  Washington, Congressional Budget Office , January 18, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA460542


U.S. GWOT (General) -- Books

9/11 Five Years Later:  Successes and Challenges.  Washington, National Security Council, September 2006.  21 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS74418
Book call no.:  363.32516 N714

Ashford, Mary-Wynne and Dauncey, Guy.  Enough Blood Shed:  101 Solutions to Violence, Terror and War.  Gabriola Island, Canada, New Society Publishers, 2006.  271 p.
Book call no.:  303.6 A825e

Bates, James A.  The War on Terrorism:  Countering Global Insurgency in the 21st Century.  Hurlburt Field, FL , Joint Special Operations University, 2005.  15 p.
Book call no.:  355.0218 B329w

Berntsen, Gary and Pezzullo, Ralph.  Jawbreaker:  The Attack on Bin Laden and Al-Qaeda:  A Personal Account by the CIA's Key Field Commander.  New York, Crown Publishers, 2005.  328 p.
Book call no.:  327.1273 B532j

Bond, Christopher S.  Indonesia and the Changing Front in the War on Terrorism.  Washington, Heritage Foundation, April 28, 2005.  7 p.
Argues that Indonesia is the second front in the war on terrorism.
Also available online at:  http://www.heritage.org/Research/AsiaandthePacific/hl875.cfm
Book call no.:  327.73059 B711i

Bruscino, Thomas A.  Out of Bounds:  Transnational Sanctuary in Irregular Warfare.  Fort Leavenworth, KS, Combat Studies Institute Press, 2006.  109 p.
Book call no.:  958.1045 B912o

Cavaleri, David P.  The Law of War:  Can 20th Century Standards Apply to the Global War on Terrorism?  Ft. Leavenworth, KS, Combat Studies Institute Press, 2005.  111 p.
Also available online at:  http://www.loc.gov/catdir/toc/ecip0510/2005008851.html
Book call no.:  341.6 C376L

Chernus, Ira.  Monsters to Destroy:  The Neoconservative War on Terror and Sin.  Boulder, CO, Paradigm Publishers, 2006.  243 p.
Book call no.:  973.931 C521m

Cole, Alyson M.  The Cult of True Victimhood:  From the War on Welfare to the War on Terror.  Stanford, CA, Stanford University Press, 2007.  240 p.
Book call no.:  306.20973 c689c

Croft, Stuart.  Culture, Crisis and America's War on Terror.  New York, Cambridge University Press, 2006.  301 p.
Book call no.:  363.3251 C941c

Currie, Stephen.  Terrorism:  An Opposing Viewpoints Guide.  Detroit, MI, Greenhaven Press/Thomson Gale, 2006.  111 p.
Book call no.:  363.325 T3285

(En)Gendering the War on Terror:  War Stories and Camouflaged Politics, edited by Krista Hunt and Kim Rygiel.  Burlington, VT, Ashgate Publishing, 2006.  234 p.
Book call no.:  973.931 E57

An Encounter with History:  The 98th Division Institutional Training:  The Global War on Terrorism 2001-2005, edited by Timothy J. Hansen and Jocene D. Preston.  Washington, GPO, 2006.  268 p.
Book call no.:  956.7044342 E56

Five Years after 9/11:  An Assessment of America's War on Terror, edited by Julianne Smith and Thomas Sanderson.  Washington, Center for Strategic and International Studies, 2006.  52 p.
Book call no.:  363.3251560973 F565

Flashpoints in the War on Terrorism, edited by Derek S. Reveron and Jeffrey Stevenson Murer.  New York, Routledge, 2006.  357 p.
Book call no.:  363.32511 F585

Fullerton, Jami and Kendrick, Alice.  Advertising's War on Terrorism:  The Story of the U.S. State Department's Shared Values Initiative.  Spokane, WA, Marquette Books, 2006.  254 p.
Book call no.:  327.140973 F971a

Gardiner, Nile and Phillips, James.  The London Bombings:  How the U.S. and the U.K. Should Respond.  Washington, Heritage Foundation, 2005.  12 p.
Book call no.:  363.32516 G223L

Global Politics in a Changing World:  A Reader, edited by Richard W. Mansbach and Edward Rhodes.  New York, Houghton Mifflin, 2006.  468 p.
Note Part One:  The Changing Nature of War.
Book call no.:  909.829 G5621

Grosscup, Beau.  Strategic Terror:  The Politics and Ethics of Aerial Bombardment.  New York, Zed Books, 2006.  226 p.
Book call no.:  358.424 G878s

Hunt, David.  On the Hunt:  How to Wake Up Washington and Win the War on Terror.  New York, Random House, 2007.  259 p.
Book call no.:  363.325156 H939o

The Imperial Presidency and the Consequences of 9/11:  Lawyers React to the Global War on Terrorism, edited by James R. Silkenat and Mark R. Shulman.  Westport, CT, Praeger Security International, 2007.  2 vols.
Book call no.:  342.73062 I34

"In the Same Light as Slavery":  Building a Global Antiterrorist Consensus, edited by Joseph McMillan.  Washington, Institute for National Strategic Studies, National Defense University Press, 2006.  241 p.
Book call no.:  363.32517 I35

Kashmeri, Sarwar A.  America and Europe after 9/11 and Iraq:  The Great Divide.  Westport, CT, Praeger Security International, 2007.  128 p.
Book call no.:  327.7304 K19a

Keen, David.  Endless War:  Hidden Functions of the 'War onTerror'.  Ann Arbor, MI, Pluto Press, 2006.  296 p.
Book call no.:  973.931 K26e

Kumashiro, David J.  Microsoft, Al-Jazeera, and the Predator:  The Challenge of Effects-Based Operations in the Global War on Terrorism.  Maxwell AFB, AL, Air Univerwsity Press, December 2005.  27 p.
Book call no.:  355.02 K96m

Kuypers, Jim A.  Bush's War:  Media Bias and Justifications for War in a Terrorist Age.  New York, Rowman & Littlefield Publishers, 2006.  197 p.
Book call no.:  973.931 K97b

Lustick, Ian S.  Trapped in the War on Terror.  Philadelphia, PA, University of Pennsylvania Press, 2006.  186 p.
Argues that the War on Terror is more destructive to our national culture than any damage that terrorists may inflict.
Book call no.:  363.3250973 L972t

Millar, Alistair and Rosand, Eric.  Allied Against Terrorism:  What's Needed to Strengthen Worldwide Commitment.  New York, Century Foundation Press, 2006.  134 p.
Book call no.:  363.325156 M645f

Murphy, Dennis.  Information Operations and Winning the Peace:  Wielding the Information Element of Power in the Global War on Terrorism.  Carlisle, PA, Center for Stratetic Leadership, U.S. Army War College, December 2005.  4 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA443115
Book call no.:  355.343 M978i

Orszag, Peter R.  Estimated Funding for Operations in Iraq and the War on Terrorism.  Washington, Congressional Budget Office, February 7, 2007.  8 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS78545
Book call no.:  956.70443 O76ea

Pelton, Robert Young.  Licensed to Kill:  Hired Guns in the War on Terror.  New York, Crown Publishers, 2006.  358 p.
Book call no.:  355.354 P393L

Pena, Charles V.  Winning the Un-War:  A New Strategy for the War on Terrorism.  Washington, Potomac Books, 2006.  241 p.
States that "terrorism is simply a tactic, not an enemy."  Argues that the U.S. national security strategy should address this fact.
Book call no.:  363.32516 P397w

Quist, B. Wayne and Drake, David F.  Winning the War on Terror:  A Triumph of American Values.  New York, iUniverse, Inc., 2005.  230 p.
Book call no.:  363.325610973 Q8w

Schwarz, Frederick A. O. and Huq, Aziz Z.  Unchecked and Unbalanced:  Presidential Power in a Time of Terror.  New York, New Press, 2007.  276 p.
Book call no.:  342.73062 S411u

Terrorism:  An Opposing Viewpoints Guide, edited by Stephen Currie.  Detroit, MI, Greenhaven, 2006.  111 p.
Book call no.:  363.325 T3285

United States.  Congress.  House.  Committee on Armed Services.  Subcommittee on Terrorism, Unconventional Threats and Capabilities.  Implementing the Global War on Terror Strategy:  Overcoming Interagency Problems.  Hearing.  109th Congress, 2nd session, March 15, 2006.  Washington, GPO, 2007.  81 p.
Book call no.:  363.3250973 U58i

United States.  Congress.  House.  Committee on Armed Services. Terrorism, Unconventional Threats and Capabilities Subcommittee.  Special Operations Command:  Transforming for the Long War.  Hearing.  109th Congress, 2nd session, March 8, 2006.  Washington, GPO, 2007.  81 p.
Book call no.:  356.160973 U581s

United States.  Congress.  Senate.  Committee on Armed Services.  Status of the U.S. Army and U.S. Marine Corps in Fighting the Global War on Terrorism.  Hearing.  109th Congress, 1st session, June 30, 2005.  Washington, GPO, 2006.  103 p.
Book call no.:  956.70443 U581s

Yoo, John.  Energy in the Executive:  Re-Examining Presidential Power in the Midst of the War on Terrorism.  Washington, Heritage Foundation, April 24, 2006.  10 p.
Book call no.:  342.73062 Y59e

Yoo, John.  War by Other Means:  An Insider's Account of the War on Terror.  New York, Atlantic Monthly Press, 2006.  292 p.
Book call no.:  363.325156 Y59w


U.S. GWOT (General) -- Documents

Combs, Ray A.  Assessing Strategic Effectiveness in the War on Terrorism.  Carlisle Barracks, PA, U.S. Army War College, 2006.  20 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA448536
Doc. call no.:  M-U 39080-537 C731a

Feickert, Andrew.  U.S. Military Operations in the Global War on Terrorism:  Afghanistan, Africa, the Philippines, and Colombia.  Washington, Library of Congress, Congressional Research Service, 2005.  1 vol.
Also available online at:  http://italy.usembassy.gov/pdf/other/RL32758.pdf
Doc. call no.:  M-U 42953-1 no. SER-RL32758

Ludowese, James P.  Locating, Tracking and Eliminating Global Terrorists:  Why U.S. Special Operations Command (USSOCOM) Is Best Equipped to Serve as the Supported Combatant Command for the Global War on Terrorism (GWOT).  Carlisle Barracks, PA, U.S. Army War College, 2006.  29 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA449234
Doc. call no.:  M-U 39080-537 L946L

Wallace, Mark R.  A Review of America's Strategy:  What It Will Take to Win the Global War on Terror.  Carlisle Barracks, PA, U.S. Army War College, 2006.  17 p.
Argues that we are engaged in fighting a war of ideas with terrorism. Analyzes al-Qaida's strategy and proposes how the U.S. and its allies should craft an international strategic response to the threat.
Also available online at:  http://handle.dtic.mil/100.2/ADA448728
Doc. call no.:  M-U 39080-537 W192r


U.S. GWOT (General) -- Periodicals

Burgess, Mark.  The War on Terrorism --Winning the Un-Winnable.  Defense Monitor 35:4-5 September-October 2006.

Cetron, Marvin J.  Defeating Terrorism:  Is It Possible? Is It Probable?  The Futurist 41:18-24 May-June 2007.
Also available online at:  http://proquest.umi.com/pqdweb?did=1269347551&sid=1&Fmt=3&clientId=417&RQT=309&VName=PQD

Coker, Christopher.  Cultural Ruthlessness and the War Against Terror.  Australian Army Journal 3:145-163 Summer 2005-06.

Everly, George S. and Castellano, Cherie.  The Effects of Fighting the War on Terrorism upon Public Safety, Public Health, and other Emergency Response Professionals.  Journal of Counterterrorism & Homeland Security International 13, no.1:22-25 Spring 2007.

Fish, Tim.  Asia-Pacific Region a 'Major Front' in the War on Terror.  Asia-Pacific Defence Reporter 32:36-37 May 2006.

Friedman, Norman.  The Case for Pre-Emption.  U.S. Naval Institute Proceedings 132:90-91 August 2006.

Hillen, John.  Developing a National Counterinsurgency Capability for the War on Terror.  Military Review 87:13-15 January-February 2007.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24333089&site=ehost-live&custid=airuniv

Lazarus, David.  From a War on Terror to a War of Ideas.  Australian Army Journal 3:165-177 Summer 2005-06.

Paterson, Pat.  Into Africa:  A New Frontier in the War on Terror.  U.S. Naval Institute Proceedings 132:32-36 May 2006.

Rivkin, David B. and Casey, Lee A.  Family Feud:  The Law in War and Peace.  National Interest 89:66-75 May-June 2007.
Argues that "American Law treats terrorism like an act of war, not a crime.  The fact that Europeans don't doesn't make their way better."

Smith, Matthew.  'War on Terror' Pushes up US DoD Spending.  Jane's Defence Weekly 44:19 May 30, 2007.

Stringer, Kevin D.  A Supreme Commander for the War on Terror.  JFQ:  Joint Force Quarterly 44:19-23 Spring 2007.
Promotes a vision for how a supreme command for the war on terror can be structured to provide unity of command for the military component of national power.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24566709&site=ehost-live&custid=airuniv

Wasielewski, Philip G.  Defining the War on Terror.  JFQ:  Joint Force Quarterly 44:13-18 Spring 2007.
"Defines the war on terror and the goal of the US to destruct all terrorist groups on a global scale."
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24566708&site=ehost-live&custid=airuniv


U.S. GWOT (Technology Systems) -- Books

Fighting Terror in Cyberspace, edited by Mark Last and Abraham Kandel.  New Jersey, World Scientific, 2005.  167 p.
Book call no.:  006.312 F471

Gerstein, Daniel M.  Leading at the Speed of Light:  New Strategies for U.S. Security in the Information Age.  Washington, Potomac Books, 2006.  185 p.
Book call no.:  355.033573 G383L

Jackson, Brian A.  Breaching the Fortress Wall:  Understanding Terrorist Efforts to Overcome Defensive Technologies.  Santa Monica, CA, Rand, 2007.  153 p.
Proposes that "fully exploring adversaries' counter-technology behaviors can expose vulnerabilities in U.S. defenses and help the nation make the best choices to protect it from the threat of terrorism."
Also available online at:  http://handle.dtic.mil/100.2/ADA462517
Book call no.:  363.32572 B828

United States.  Congress.  House.  Committee on Armed Services.  Subcommittee on Terrorism, Unconventional Threats and Capabilities.  Committee on Homeland Security.  Subcommittee on Emergency Preparedness Science and Technology.  Counterterrorism Technology Sharing.  Joint Hearing.  109th Congress, 1st session, July 21, 2005.  Washington, GPO, 2006.  85 p.
Book call no.:  363.32517 U581c

United States.  Congress.  House.  Committee on Armed Services.  Terrorism, Unconventional Threats and Capabilities Subcommittee.  Defense Science and Technology:  Investments to Shape the Evolving Terrorist Threat.  Hearing.  109th Congress, 2nd session, March 29, 2006.  Washington, GPO, 2006.  111 p.
Book call no.:  363.3251607 U58d

United States.  Congress.  House.  Committee on the Judiciary.  Electronic Surveillance Modernization Act.  Report.  109th Congress, 2nd session, September 25, 2006.  Washington, GPO, 2006.  181 p.
Book call no.:  345.052 U582e v.2


U.S. GWOT (Technology Systems) -- Document

Wright, Kenneth S.  SOF Enablers:  Enhancing USSOCOM Capabilities with Cutting-Edge Expertise.  Carlisle Barracks, PA, U.S. Army War College, 2006.  19 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA448309
Doc. call no.:  M-U 39080-537 W9511s



United States -- Homeland Security

 

Internet Resources

Department of Homeland Security
Available online at:  http://www.dhs.gov/index.shtm
Information on prevention and protection and preparedness and response among others.

Homeland Security, compiled by Stephen B.T. Chun.  Maxwell AFB, AL, Muir S. Fairchild Research Information Center, July 2002.  6 p.
Available online at:  http://www.au.af.mil/au/aul/bibs/homeland/hmlnd.htm
Subject resource guide listing internet resources, books, documents, and magazine articles on the topic, many items available full-text online.

Ready.gov
Available online at:  http://www.ready.gov/
Information on how to prepare, plan for emergencies.

Transportation Security Administration
Available online at:  http://www.tsa.dhs.gov/who_we_are/index.shtm
Provides information on TSA's mission and travelers' latest rules for airline travel.


U.S.:  Homeland Security -- Books

Bullock, Jane A.  Introduction to Homeland Security.  Boston, Elsevier Butterworth-Heinemann, 2006.  654 p.
Book call no.:  363.32517 I61 2006

Flynn, Stephen E.  The Edge of Disaster:  Rebuilding a Resilient Nation.  New York, Random House, 2007.  240 p.
Makes the argument that national preparedness, whether for acts of terrorism or natural disasters, is taking a back seat to DOD priorities overseas.
Book call no.:  363.345250973 F648e

Homeland Security and Terrorism:  Readings and Interpretations, edited by Russell D. Howard.  New York, McGraw-Hill, 2006.  492 p.
"Collection of essays examining the key challenges in readying the U.S., its infrastructure, and its citizens for the eventuality of another attack."
Book call no.:  363.3250973 H7652

Homeland Security:  Protecting America's Targets, edited by James J. F. Forest.  Westport, CT, Praeger Security International, 2006.  3 vols.
Vol. 1 - Borders and Points of Entry.
Vol. 2 - Public Spaces and Social Institutions.
Vol. 3 - Critical Infrastructure.
Book call no.:  363.3251560973 H765

Lansford, Tom.  To Protect and Defend:  US Homeland Security Policy.  Burlington, VT, Ashgate, 2006.  187 p.
Book call no.:  363.325156 L295t

Meeting the Challenge of 9/11:  Blueprints for More Effective Government, edited by Thomas H. Stanton.  Armonk, NY, M. E. Sharpe, 2006.  352 p.
Foreword by Admiral James Loy.
Book call no.:  352.3750973 M495

Spellman, Frank R.  Water Infrastructure Protection and Homeland Security.  Lanham, MD, Government Institutes, 2007.  287 p.
Book call no.:  363.325936361 S743w

United States.  Congress.  House.  Committee on Homeland Security.  Chemical Facility Anti-Terrorism Act of 2006.  Report.  109th Congress, 2nd session, September 29, 2006.  Washington, GPO, 2006.  68 p.
Book call no.:  363.325966 U581c pt.1

United States.  Congress.  Senate.  Committee on Foreign Relations.  North American Cooperation on the Border.  Hearing.  109th Congress, 1st session, July 12, 2005.  Washington, GPO, 2006.  60 p.
Book call no.:  325.73 U581n

United States.  Congress.  Senate.  Committee on Homeland Security and Governmental Affairs.  Chemical Facility Anti-Terrorism Act of 2006.  Report.  109th Congress, 2nd session, September 11, 2006.  Washington, GPO, 2006.  67 p.
Book call no.:  363.325066 U58c

United States.  Department of Homeland Security.  Cyber Storm Exercise Report Department of Homeland Security, National Cyber Security Division.  Washington, Dept. of Homeland Security, 2006.  20 p.
Also available online at:  http://www.dhs.gov/xlibrary/assets/prep_cyberstormreport_sep06.pdf
Book call no.:  005.8 C9944

White, Jonathan Randall.  Terrorism and Homeland Security.  Belmont, CA, Wadsworth Thomson Learning, 2006.  398 p.
Book call no.:  303.625 W585t


U.S.:  Homeland Security -- Document

Westin, Cary S.  A Flawed National Blueprint to Homeland Intelligence Reform:  Right Idea, Wrong Approach.  Carlisle Barracks, PA, U.S. Army War College, 2006.  17 p.
"Examines current cultural intelligence sharing challenges that are present between the federal and state-local levels of government, followed by policy recommendations."
Also available online at:  http://handle.dtic.mil/100.2/ADA448708
Doc. call no.:  M-U 39080-537 W529f


U.S.:  Homeland Security -- Periodicals

Mueller, John.  Fear Not:  Notes from a Naysayer.  Bulletin of the Atomic Scientists 63:30-37 March-April 2007.
Argues that politicians, the media and bureaucrats all exaggerate the threat of terrorism, and that is exactly what al Qaida wants.

Niza, Abu.  Mirror Image.  Journal of Counterterrorism and Homeland Security International 12, no.4:52-56 Winter 2006.

Stivi, Alon.  Fearless Nation.  Journal of Counterterrorism & Homeland Security International 13, no.2:56-59 Summer 2007.
Explains the results that terrorists expect from their actions.

Terrorism Trends 2007 & the Private Sector.  Journal of Counterterrorism & Homeland Security International 13, no.1:10-15+ Spring 2007.
To understand how to better protect ourselves in the future, it is important to review some important lessons we have learned to date.



United States -- Human Rights, Legal Rights, and Terror Detainees

 

Internet Resources

Elsea, Jennifer K.  Treatment of "Battlefield Detainees" in the War on Terrorism.  Washington, Library of Congress, Congressional Research Service, November 14, 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA458504

Gordon, Jeffrey.  Dismissal of Terror Charges Raises Guantanamo Questions. CongressDaily AM  June 5, 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=25306852&site=ehost-live
Reports that a military judge's rulling dismissing terrorism-related charges against a Guantanamo Bay prisoner is being viewed as a possible blow to the new system for trying detainees in military courts.

Johnson, Corina.  Roots of Terror.  Carlisle Barracks, PA, U.S. Army War College, Strategic Studies Institute, February 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA468292
Contends that Government agencies must implement strong leadership and management of counterterrorism policies and guidelines, and do so in a way that does not infringe on the legal rights of the individual.


U.S.:  Human Rights, Legal Rights, and Terror Detainees -- Books

Ackerman, Bruce A.  Before the Next Attack:  Preserving Civil Liberties in an Age of Terrorism.  New Haven, CT, Yale University Press, 2007.  227 p.
Book call no.:  342.73062 A182b

Begg, Moazzam and Brittain, Victoria.  Enemy Combatant:  My Imprisonment at Guantanamo, Bagram, and Kandahar.  New York, The New Press, 2006.  397 p.
Book call no.:  958.1047 B416e

Contesting Empire Globalizing Dissent:  Cultural Studies after 9/11, edited by Norman K. Denzin and Michael D. Giardina.  Boulder, CO, Paradigm Publishers, 2007.  302 p.
Book call no.:  973.931 C761

Enduring Abuse:  Torture and Cruel Treatment by the United States at Home and Abroad.  New York, American Civil Liberties Union, April 2006.  1 vol.
A shadow report by the American Civil Liberties Union prepared for the United Nations Committee Against Torture on the occasion of its review of the United States of America's Second Periodic Report to the Committee Against Torture.
Also available online at:  http://www.aclu.org/safefree/torture/torture%5Freport.pdf
Book call no.:  323.490973 E56

Intelligence and Human Rights in the Era of Global Terrorism, edited by Steve Tsang.  Westport, CT, Praeger Security International, 2007.  224 p.
Book call no.:  327.12 I615

Mueller, John E.  Overblown:  How Politicians and the Terrorism Industry Inflate National Security Threats, and Why We Believe Them.  New York, Free Press, 2006.  259 p.
Book call no.:  363.32516 M946o

One of the Guys:  Women as Aggressors and Torturers, edited by Tara McKelvey.  Emeryville, CA, Seal Press, 2007.  266 p.
Book call no.:  956.704431 O58

The Philosophical Challenge of September 11, edited by Tom Rockmore.  Malden, MA, Blackwell Publishing, 2005.  218 p.
A collection of essays looking at changes in the conception of moral and political reasoning, rationality and responsibility, and the repercussions for justice, human rights and international law after the 9/11 attacks.
Book call no.:  320.01 P568

Pojman, Louis P.  Terrorism, Human Rights and the Case for World Government.  New York, Rowman & Littlefield Publishers, 2006.  95 p.
Book call no.:  341.21 P759t

United States.  Congress.  House.  Committee on Armed Services.  Amending Title 10, United States Code, to Authorize Trial by Military Commission for Violations of the Law of War, and for Other Purposes.  Report.  109th Congress, 2nd session, September 15, 2006.  Washington, GPO, 2006.  91 p.
Book call no.:  343.730143 U581a pt.1

United States.  Congress.  House.  Committee on Government Reform.  Subcommittee on National Security, Emerging Threats and International Relations.  9/11 Commission's Recommendations:  Balancing Civil Liberties and Security.  Hearing.  109th Congress, 2nd session, June 6, 2006.  Washington, 2007.  166 p.
Book call no.:  323.490973 U58n

United States.  Congress.  Senate.  Committee on Armed Services.  Subcommittee on Personnel.  Review of Department of Defense Detention and Interrogation Policy and Operations in the Global War on Terrorism.  Hearings.  109th Congress, 1st session, March 10, July 13, 14, 2005.  Washington, GPO, 2006.  264 p.
Book call no.:  956.704437 U58ra

Webb, Maureen.  Illusions of Security:  Global Surveillance and Democracy in the Post-9/11 World.  San Francisco, CA, City Lights, 2007.  305 p.
Book call no.:  323.44820973 W367i

Welch, Michael.  Scapegoats of September 11th:  Hate Crimes & State Crimes in the War on Terror.  New Brunswick, NJ, Rutgers University Press, 2006.  222 p.
The attacks of 9/11 have evoked fear and anger against innocent persons not involved in the terrorist attacks.
Book call no.:  973.931 W441s


U.S.:  Human Rights, Legal Rights, and Terror Detainees -- Document

Johnston, Howard A.  The Patriot Act and Civil Liberties:  A Closer Look.  Carlisle Barracks, PA, U.S. Army War College, 2006.  18 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA449681
Doc. call no.:  M-U 39080-537 J72p


U.S.:  Human Rights, Legal Rights, and Terror Detainees -- Periodicals

Cole, David.  Outlaws on Torture.  Nation 278:8-28 June 28, 2004.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=13429046&site=ehost-live&custid=airuniv

Dehghanpisheh, Babak and Liu, Melinda.  Prison Blues.  Newsweek 149:32-33 May 21, 2007.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25058834&site=ehost-live&custid=airuniv

The 'Ghost Detainees' Materialise.  Jane's Terrorism & Security Monitor, pp 2-3, October 2006.

Grey, Stephen.  America's Gulag.  New Statesman 133:22-25 May 17, 2004.
"Offers a look at the methods and policies used by the US for the interrrogation and torture of prisoners.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=13101784&site=ehost-live&custid=airuniv

Lefebvre, Vladimir A. and Darley, Jonathan David.  The Torturer's Dilemma:  A Theoretical Analysis of the Societal Consequences of Torturing Terorist Suspects.  Studies in Conflict & Terrorism 30:635-646 July 2007.

Shannon, Paul J.  Fingerprints and the War on Terror:  An FBI Perspective.  JFQ:  Joint Force Quarterly 43:76-82 Autumn 2006.
"Discusses the relevance of securing fingerprints, photographs, and statements from suspected terrorists under military custody relative to the war on terrorism."
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24326350&site=ehost-live&custid=airuniv

Taylor, Stuart.  How Not to Make Terrorism Policy.  National Journal 39:16-17 June 2, 2007.
Reports on the pressure faced by the U.S. Department of Justice to fabricate legal rationales for physically tormenting terrorism suspects and for wiretapping without warrants.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25459483&site=ehost-live&custid=airuniv




United States -- International Relations and Terrorism

 

Internet Resources

U.S. Military Program Targets Terrorism in North Africa FDCH Regulatory Intelligence Database  March 15, 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=32W2488411664&site=ehost-live


U.S.:  International Relations and Terrorism -- Books

Chickering, A. Lawrence.  Strategic Foreign Assistance:  Civil Society in International Security.  Stanford, CA, Hoover Institution Press, 2006.  142 p.
Book call no.:  363.32515 S898

Chomsky, Noam.  Perilous Power:  The Middle East & U.S. Foreign Policy:  Dialogues on Terror, Democracy, War, and Justice.  Boulder, CO, Paradigm Publishers, 2007.  276 p.
Book call no.:  327.73056 C548p

Forest, James J. F. and Sousa, Matthew V.  Oil and Terrorism in the New Gulf:  Framing U.S. Energy and Security Policies for the Gulf of Guinea.  New York, Lexington Books, 2006.  329 p.
Book call no.:  333.8232 F716o

"In the Same Light as Slavery":  Building a Global Antiterrorist Consensus, edited by Joseph McMillan.  Washington, Institute for National Strategic Studies, National Defense University Press, 2006.  241 p.
Book call no.:  363.32517 I35

Islam, Oil, and Geopolitics:  Central Asia after September 11, edited by Elizabeth Van Wie Davis and Rouben Azizian.  Lanham, MD, Rowman & Littlefield Publishers, 2007.  308 p.
Book call no.:  958.043 I82

Jackson, Robert J. and Towle, Philip.  Temptations of Power:  The United States in Global Politics after 9/11.  New York, Palgrave Macmillan, 2006.  228 p.
Book call no.:  327.730090511 J13t

Johnson, Lena.  Tajikistan in the New Central Asia:  Geopolitics, Great Power Rivalry and Radical Islam.  London, I. B. Tauris, 2006.  252 p.
Discusses the foreign policy of Tajikistan during the first four years after the terrorist attacks of September 11, which led the U.S. to engage not only in Afghanistan but also in Uzbekistan, Kyrgystan, and Tajikistan.
Book call no.:  958.6086 J81t

Kashmeri, Sarwar A.  America and Europe after 9/11 and Iraq:  The Great Divide.  Westport, CT, Praeger Security International, 2007.  128 p.
Book call no.:  327.7304 K19a

Leech, Gary.  Crude Interventions:  The US, Oil and the New World (Dis)order.  New York, Zed Books, 2006.  248 p.
Argues that the US military presence in Central Asia and Washington's support for secular governments marked by repression, corruption and nepotism have increased anti-American sentiments among the region's Muslim population and have fueled terrorism.
Book call no.:  327.73 L483c

Litwak, Robert S.  Regime Change:  U.S. Strategy Through the Prism of 9-11.  Washington, Woodrow Wilson Center Press, 2007.  406 p.
Book call no.:  327.73 L782r

Lord, Carnes.  Losing Hearts and Minds?  Public Diplomacy and Strategic Influence in the Age of Terror.  Westport, CT, Praeger Security International, 2006.  139 p.
Book call no.:  327.73 L866l

The Politics of Empire:  War, Terror and Hegemony, edited by Joseph G. Peschek.  New York, Routledge, 2006.  201 p.
Book call no.:  973.931 P7691

Rees, Wyn.  Transatlantic-Counter Terrorism Cooperation:  The New Imperative.  New York, Routledge, 2006.  219 p.
Book call no.:  363.325156 R328t

Selling US Wars, edited by Achin Vanaik.  Northampton, MA, Olive Branch Press, 2007.  370 p.
See chapters "Political Terrorism & the US Imperial Project" and "The Empire of Fear."
Book call no.:  355.033573 S467

United States.  Congress.  Senate.  Committee on Foreign Relations.  Subcommittee on International Operations and Terrorism.  United Nations Peacekeeping Reform.  Hearing.  109th Congress, 1st session, July 27, 2005.  Washington, GPO, 2006.  24 p.
Book call no.:  341.584 U58ub


U.S.:  International Relations and Terrorism -- Document

Ford, Jess T.  Olympic Security:  U.S. Support to Athens Games Provides Lessons for Future Olympics.  Washington, U. S. Government Accountability Office, 2005.  30 p.
Also available online at:  http://www.gao.gov/new.items/d05547.pdf
Doc. call no.:  M-U 41026-173 no. 05-547


U.S.:  International Relations and Terrorism -- Periodicals

Abuzza, Zachary.  On the Defensive:  Rebels Lose Ground in Southern Philippines.  Jane's Intelligence Review 19:12-16 April 2007.
Discusses Abu Sayyaf's current capabilities and how the efforts of the Philippine military, with the assistance of the U.S., have kept it in check.

Brenner, William J.  In Search of Monsters:  Realism and Progress in International Relations Theory after September 11.  Security Studies 15:496-528 July-September 2006.

Machain, Andrea.  US Focuses on Central Sahara.  Jane's Intelligence Review 18:10-11 November 2006.
The US security agenda in the Sahel/Sahara is to prevent contagion from the Algerian Salafi insurgency spreading to areas of northern Mali and Niger.

Michta, Andrew A.  Transatlantic Troubles.  National Interest 86:62-66 November-December 2006.
States that several European allies have basic disagreements with the U.S. about the fight against Islamist Terrorism and Middle East policies.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=23271173&site=ehost-live&custid=airuniv

Rivkin, David B. and Casey, Lee A.  Family Feud:  The Law in War and Peace.  National Interest 89:66-75 May-June 2007.
Argues that "American Law treats terrorism like an act of war, not a crime. The fact that Europeans don't doesn't make their way better."

Schmidt, John R.  Last Alliance Standing?  NATO after 9/11.  The Washington Quarterly 30:93-106 Winter 2006-07.



United States -- Military Issues

 

Internet Resources

Asymmetric Warfare, compiled by Joan Phillips.  Maxwell AFB, AL, Muir S. Fairchild Research Information Center, July 2006.  25 p.
Available online at:  http://www.au.af.mil/au/aul/bibs/asw.htm
Subject resource guide listing internet resources, books, documents, and magazine articles, many items available full-text online.  Offers numerous items addressing terrorism.

National Military Strategic Plan for the War on Terrorism.  Washington, Joint Chiefs of Staff, February 2006.  40 p.
Available online at:  http://www.au.af.mil/au/awc/awcgate/dod/gwot_stratplan.pdf

National Military Strategy of the United States of America.  Washington, Joint Chiefs of Staff, 2004.
Available online at:  http://www.defenselink.mil/news/Mar2005/d20050318nms.pdf
There are references to terrorism and counterterrorism throughout the report.


U.S.:  Military Issues -- Books

Austin, Maggie Catherine.  Military Recruitment and the War on Terrorism.  Austin, TX, University of Texas at Austin, August 2006.  43 p.
Argues that the number of high quality recruits, especially for the U.S. Army has been adversely affected because of the ongoing GWOT.
Book call no.:  355.223 A937m

An Encounter with History:  The 98th Division Institutional Training:  The Global War on Terrorism 2001-2005, edited by Timothy J. Hansen and Jocene D. Preston.  Washington, GPO, 2006.  268 p.
Book call no.:  956.7044342 E56

Gompert, David C.  Heads We Win:  The Cognitive Side of Counterinsurgency (COIN).  Santa Monica, CA, National Defense Research Institute, Rand, 2007.  62 p.
Contends that what the US COIN strategy needs are "stronger cognitive capabilities that will enable more effective COIN against Islamist insurgents."
Also available online at:  http://www.rand.org/pubs/occasional_papers/2007/RAND_OP168.pdf
Book call no.:  355.0218 G634h

Mansoor, Peter R.  Irregular Warfare:  Counterinsurgency Challenges and Perspectives.  Fort Leavenworth, KS, U.S. Army/Marine Corps Counterinsurgency Center, 2006.  26 p.
Book call no.:  355.425 I71

One of the Guys:  Women as Aggressors and Torturers, edited by Tara McKelvey.  Emeryville, CA, Seal Press, 2007.  266 p.
Book call no.:  956.704431 O58

United States.  Congress.  House.  Committee on Armed Services.  Terrorism, Unconventional Threats and Capabilities Subcommittee.  Special Operations Command:  Transforming for the Long War.  Hearing.  109th Congress, 2nd session, March 8, 2006.  Washington, GPO, 2007.  81 p.
Book call no.:  356.160973 U581s


U.S.:  Military Issues -- Documents

Reighard, Robert D.  Security Cooperation:  Integrating Strategies to Secure National Goals.  Carlisle Barracks, PA, U.S. Army War College, 2006.  20 p.
"Assesses our capability and capacity to implement global and Theater Security Cooperation strategies to support national security goals."
Also available online at:  http://handle.dtic.mil/100.2/ADA449543
Doc. call no.:  M-U 39080-537 R361s

Wright, Kenneth S.  SOF Enablers:  Enhancing USSOCOM Capabilities with Cutting-Edge Expertise.  Carlisle Barracks, PA, U.S. Army War College, 2006.  19 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA448309
Doc. call no.:  M-U 39080-537 W9511s


U.S.:  Military Issues -- Periodicals

Counter-Insurgency Theories Comeback.  Jane's Terrorism & Security Monitor, pp 11-12 , April 2007.
Examines the current reappraisal of counter-insurgency theory. Traditional counter-insurgency concepts are becoming increasingly influential as "warrior scholars" rise to prominence in the U.S. military.

Stringer, Kevin D.  A Supreme Commander for the War on Terror.  JFQ:  Joint Force Quarterly 44:19-23 Spring 2007.
Promotes a vision for how a supreme command for the war on terror can be structured to provide unity of command for the military component of national power.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24566709&site=ehost-live&custid=airuniv




Vulnerabilities:  Borders and Immigration

 

Internet Resources

Illegal Immigration and U.S. Border Security, compiled by Stephen B. T. Chun.  Maxwell AFB, AL, Muir S. Fairchild Research Information Center, May 2006.  21 p.
Available online at:  http://www.au.af.mil/au/aul/bibs/illegalim.htm
Subject resource guide listing internet resources, books, documents, and magazine articles on the topic, many items available full-text online.

Wermuth, Michael.  Border Security FDCH Congressional Testimony  March 8, 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=32Y4212285090&site=ehost-live


Vulnerabilities:  Borders & Immigration -- Books

Abraham, Spencer.  Immigration and America's Future:  A New Chapter:  Report of the Independent Task Force on Immigration and America's Future.  Washington, Migration Policy Institute, 2006.  153 p.
Book call no.:  325.73 I332

Homeland Security:  Protecting America's Targets, edited by James J. F. Forest.  Westport, CT, Praeger Security International, 2006.  3 vols.
Vol. 1 - Borders and Points of Entry.
Vol. 2 - Public Spaces and Social Institutions.
Vol. 3 - Critical Infrastructure.
Book call no.:  363.3251560973 H765

Maril, Robert Lee.  Patrolling Chaos:  The U.S. Border Patrol in Deep South Texas.  Lubbock, TX, Texas Tech University Press, 2004.  368 p.
Book call no.:  363.2850973 M336p

United States.  Congress.  Senate.  Committee on Foreign Relations.  North American Cooperation on the Border.  Hearing.  109th Congress, 1st session, July 12, 2005.  Washington, GPO, 2006.  60 p.
Book call no.:  325.73 U581n

United States.  Congress.  Senate.  Subcommittee of the Committee on Appropriations.  United States Entry/Exit Tracking.  Special Hearing.  109th Congress, 2nd session, January 25, 2006.  Washington, GPO, 2006.  65 p.
Also available online at:  http://www.gpoaccess.gov/congress/index.html
Book call no.:  342.73082 U583u


Vulnerabilities:  Borders & Immigration -- Documents

Ford, Jess T.  Border Security:  Additional Actions Needed to Eliminate Weaknesses in the Visa Revocation Process.  Washington, U.S. General Accounting Office, 2004.  14 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS53912
Doc. call no.:  M-U 41026-173 no. 04-899T

Ford, Jess T.  Border Security:  Reassessment of Consular Resource Requirements Could Help Address Visa Delays.  Washington, U.S. Government Accountability Office, 2006.  17 p.
Also available online at:  http://www.gao.gov/new.items/d06542t.pdf
Doc. call no.:  M-U 41026-173 no. 06-542T

Ford, Jess T.  Border Security:  Streamlined Visas Mantis Program Has Lowered Burden on Foreign Science Students and Scholars, but Further Refinements Needed.  Washington, U.S. Government Accountability Office, 2005.  34 p.
Also available online at:  http://frwebgate.access.gpo.gov/cgi-bin/useftp.cgi?IPaddress=162.140.64.21&filename=d05198.pdf&directory=/diskb/wais/data/gao
Doc. call no.:  M-U 41026-173 no. 05-198

Ford, Jess T.  Border Security:  Stronger Actions Needed to Assess and Mitigate Risks of the Visa Waiver Program.  Washington, U.S. Government Accountability Office, 2006.  19 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS76628
Doc. call no.:  M-U 41026-173 no. 1090T

Hite, Randolph C. and Ford, Jess T.  Homeland Security:  Performance of Foreign Student and Exchange Visitor Information System Continues to Improve, but Issues Remain.  Washington, U.S. Government Accountability Office, 2005.  23 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS59164
Doc. call no.:  M-U 41026-173 no. 05-440T

Kutz, Gregory D.  Border Security:  Investigators Transported Radioactive Sources Across Our Nation's Borders at Two Locations.  Washington, U.S. Government Accountability Office, 2006.  8 p.
Also available online at:  http://www.gao.gov/new.items/d06545r.pdf
Doc. call no.:  M-U 41026-173 no. 06-583T

Stana, Richard M.  Border Security:  US-VISIT Program Faces Strategic, Operational, and Technological Challenges at Land Ports of Entry.  Washington, U.S. Government Accountability Office, 2007.  29 p.
Also available online at:  http://www.gao.gov/new.items/d07378t.pdf
Doc. call no.:  M-U 41026-173 no. 07-378T

United States.  General Accounting Office.  Homeland Security:  Some Progress Made, but Many Challenges Remain on U.S. Visitor and Immigrant Status Indicator Technology Program.  Washington, GAO, 2005.  137 p.
Also available online at:  http://frwebgate.access.gpo.gov/cgi-bin/useftp.cgi?IPaddress=162.140.64.88&filename=d05202.pdf&directory=/diskb/wais/data/gao
Doc. call no.:  M-U 41026-173 no. 05-202

United States.  Government Accountability Office.  Terrorist Watch List Screening:  Efforts to Help Reduce Adverse Effects on the Public.  Washington, U.S. Government Accountability Office, 2006.  73 p.
Doc. call no.:  M-U 41026-173 no. 06-1031


Vulnerabilities:  Borders & Immigration -- Periodicals

Leiken, Robert S. and Brooke, Steven.  The Quantitative Analysis of Terrorism and Immigration:  An Initial Exploration.  Terrorism and Political Violence 18:503-521 Winter 2006.

Ting, Jan C.  Immigration and National SecurityOrbis 50:41-52 Winter 2006



Vulnerabilities:  Cyber Security

 

Internet Resources

Rollins, John and Wilson, Clay.  Terrorist Capabilities for Cyberattack:  Overview and Policy Issues.  Washington, Library of Congress, Congressional Research Service, January 22, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA463774


Vulnerabilities:  Cyber Security -- Books

Amoroso, Edward G.  Cyber Security.  Summit, NJ, Silicon Press, 2007.  177 p.
Book call no.:  363.325 A524c

National Science and Technology Council (U.S.).  Interagency Working Group on Cyber Security and Information Assurance.  Federal Plan for Cyber Security and Information Assurance Research and Development.  Arlington, VA, National Coordination Office for Networking and Information Technology Research and Development, 2006.  122 p.
Also available online at:  http://www.nitrd.gov/pubs/csia/csia_federal_plan.pdf
Book call no.:  005.8 N2771f

United States.  Department of Homeland Security.  Cyber Storm Exercise Report Department of Homeland Security, National Cyber Security Division.  Washington, Dept. of Homeland Security, 2006.  20 p.
Also available online at:  http://www.dhs.gov/xlibrary/assets/prep_cyberstormreport_sep06.pdf
Book call no.:  005.8 C9944

United States.  Department of Homeland Security.  National Infrastructure Protection Plan.  Washington, Dept. of Homeland Security, 2006.  179 p.
Book call no.:  353.30973 U58in


Vulnerabilities:  Cyber Security -- Document

Wilson, Clay.  Computer Attack and Cyberterrorism:  Vulnerabilities and Policy Issues for Congress.  Washington, Congressional Research Service, 2005.  43 p.
Also available online at:  http://fpc.state.gov/documents/organization/45184.pdf
Doc. call no.:  M-U 42953-1 no. 05-RL32114




Vulnerabilities:  "Home Grown Terror"

 

Internet Resources

Cilluffo, Frank J.  Homegrown Terrorism.  FDCH Congressional Testimony June 14, 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=32Y3517741159&site=ehost-live

Collins, Susan.  Senator Collins Releases Statement on Terror Plot to Blow up JFK AirportFDCH Press Releases June 3, 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=32X3065798332&site=ehost-live
Statement released describing the foiled plot by Muslim extremists to blow up jet fuel arteries of John F. Kennedy airport.

Harman, Jane.  Harman, Reichert Introduce Legislation to Address Threat of "Homegrown" TerrorismFDCH Press Releases April 20, 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=32X1406788104&site=ehost-live

Jenkins, Brian M.  Building an Army of Believers:  Jihadist Radicalization Recruitment.  Santa Monica, CA, Rand, April 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA465567
Reports on testimony before Congress on how jihadists recruit "home grown" terrorists in the U.S.

Jenkins, Brian Michael.  Homegrown TerrorismFDCH Congressional Testimony June 14, 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=32Y0062465903&site=ehost-live

Journo, Elan.  The Mounting Threat of Homegrown TerrorismBusiness Journal  October 3, 2003.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=11277978&site=ehost-live
"Focuses on the threat from homegrown terrorism in the US and the dangers of environmental terrorism."

Thompson, Bennie G.  Homegrown TerrorismFDCH Congressional Testimony June 14, 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=32Y0719926206&site=ehost-live

Tyrangiel, Josh.  The Jihadi Next Door?  Time South Pacific (Australia/New Zealand edition) July 3, 2006.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=21716644&site=ehost-live
Looks at the cases of several men indicted on conspiracy charges for plotting terrorism in the US.


Vulnerabilities:  "Home Grown Terror" -- Books

Emerson, Steven.  Jihad Incorporated:  A Guide to Militant Islam in the US.  Amherst, NY, Prometheus Books, 2006.  535 p.
Book call no.:  363.3250973 E53j

Kushner, Harvey and Davis, Bart.  Holy War on the Home Front:  The Secret Islamic Terror Network in the United States.  New York, Sentinel, 2004.  229 p.
Book call no.:  303.6250973 K97h


Vulnerabilities:  "Home Grown Terror" -- Periodicals

Mueller, Robert S.  Homegrown Terrorism and the Radicalization Process.  Vital Speeches of the Day 72:562-565 August 2006.
Discusses several plots in Canada and the threat to attack the Sears Tower in Chicago.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=22731712&site=ehost-live&custid=airuniv

Pargeter, Alison.  Western Converts to Radical Islam:  The Global Jihad's New Soldiers?  Jane's Intelligence Review 18:20-26 August 2006.

White, Stanley L.  The Wolf Strikes Alone.  Journal of Counterterrorism & Homeland Security International 13, no.2:48-51 Summer 2007.
Discusses lone terrorists, their motivations and how they receive their training.


Vulnerabilities:  "Home Grown Terror" -- Multimedia

Chasing the Sleeper Cell.  Alexandria, VA, PBS Video, 2004.  1 videodisc (60 min).
Fairchild DVD 363.32516 C487



Vulnerabilities:  Infrastructure

 

Internet Resources

Baldauf, Paul D.  Chemical Industry Security:  Voluntary or Mandatory Approach?  Monterey, CA, Naval Postgraduate School, March 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA467105

Shea, Dana A. and Tatelman, Todd B.  Chemical Facility Security:  Regulation and Issues for Congress.  Washington, Library of Congress, Congressional Research Service, March 26, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA467495

Strohm, Chris.  GPO Objects as Rail, Transit Security Bill Heads to FloorCongressDaily March 26, 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24508646&site=ehost-live

Walsh, Shawn P.  Oil Vulnerabilities and United States Strategy.  Carlisle Barracks, PA, U.S. Army War College, February 8, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA468533


Vulnerabilities:  Infrastructure -- Books

Flynn, Stephen E.  The Edge of Disaster:  Rebuilding a Resilient Nation.  New York, Random House, 2007.  240 p.
Makes the argument that national preparedness, whether for acts of terrorism or natural disasters, is taking a back seat to DOD priorities overseas.
Book call no.:  363.345250973 F648e

Homeland Security:  Protecting America's Targets, edited by James J. F. Forest.  Westport, CT, Praeger Security International, 2006.  3 vols.
Vol. 1 - Borders and Points of Entry.
Vol. 2 - Public Spaces and Social Institutions.
Vol. 3 - Critical Infrastructure.
Book call no.:  363.3251560973 H765

Lewis, Ted G.  Critical Infrastructure Protection in Homeland Security:  Defending a Networked Nation.  Hoboken, NJ, Wiley-Interscience, 2006.  474 p.
Book call no.:  005.80973 L676c

National Research Council (U.S.). Committee on Assessing Vulnerabilities Related to the Nation's Chemical Infrastructure.  Terrorism and the Chemical Infrastructure:  Protecting People and Reducing Vulnerabilities.  Washington, National Academies Press, 2006.  136 p.
Book call no.:  660.2804 N277t

Spellman, Frank R.  Water Infrastructure Protection and Homeland Security.  Lanham, MD, Government Institutes, 2007.  287 p.
Book call no.:  363.325936361 S743w


Vulnerabilities:  Infrastructure -- Documents

Martin, Christopher.  Protecting America's Critical Infrastructure:  Making Our Program More Effective.  Carlisle Barracks, PA, U.S. Army War College, 2006.  24 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA448435
Doc. call no.:  M-U 39080-537 M379p

United States.  Government Accountability Office.  Homeland Security:  Progress Has Been Made to Address the Vulnerabilities Exposed by 9/11, but Continued Federal Action Is Needed to Further Mitigate Security Risks.  Washington, U.S. Government Accountability Office, 2007.  114 p.
Also available online at:  http://www.gao.gov/new.items/d07375.pdf
Doc. call no.:  M-U 41026-173 no. 07-375


Vulnerabilities:  Infrastructure -- Periodicals

Buckley, Bruce.  Feds Offer New Guidelines for Protecting Critical Infrastructure from Terrorism.  ENR:  Engineering News-Record 258, no.21:12 June 11, 2007.

Expert Sitings.  Foreign Policy 161:93 July-August 2007.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25523876&site=ehost-live&custid=airuniv

Kosal, Margaret E.  Terrorism Targeting Industrial Chemical Facilities:  Strategic Motivations and Implications for U.S. Security.  Studies in Conflict and Terrorism 30:41-73 January 2007.




Vulnerabilities:  Ports and Transportation

 

Internet Resources

Parfomak, Paul W. and Frittelli, John.  Maritime Security:  Potential Terrorist Attacks and Protection Priorities.  Washington, Library of Congress, Congressional Research Service, January 9, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA460683

Rabkin, Norman J.  Passenger Rail Security:  Federal Strategy and Enhanced Coordination Needed to Prioritize and Guide Security EffortsGAO Reports March 7, 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=24272581&site=ehost-live

Transportation Security Administration
Available online at:  http://www.tsa.dhs.gov/who_we_are/index.shtm
Provides information on TSA's mission and travelers' latest rules for airline travel.


Vulnerabilities:  Ports & Transportation -- Books

Protecting the Nation's Seaports:  Balancing Security and Cost, edited by Jon D. Haveman and Howard J. Shatz.  San Francisco, Public Policy Institute of California, 2006.  271 p.
Book call no.:  363.32593871 P967

United States.  Congress.  House.  Safe Port Act:  Conference Report.  Report.  109th Congress, 2nd session, 2006.  Washington, GPO, 2006.  112 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS74857
Book call no.:  387.10973 U58s

United States.  Congress.  House.  Select Committee on Homeland Security.  Security and Accountability for Every Port Act.  Report.  109th Congress, 2nd session, 2006.  Washington, GPO, 2006.  1 vol.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS69442
Book call no.:  363.2860973 U58s

United States.  White House Office.  The National Strategy for Maritime Security.  Washington, White House, 2005.  26 p.
Also available online at:  http://www.whitehouse.gov/homeland/maritime-security.html
Book call no.:  387.10973 N279


Vulnerabilities:  Ports & Transportation -- Documents

Babul, Michael J.  "No Silver Bullet":  Managing the Ways and Means of Container Security.  Carlisle Barracks, PA, U. S. Army War College, 2004.  23 p.
"Recommends ways to best utilize the available means to maximize container security and minimize our seaport vulnerability to acts of cargo container-borne terrorism."
Also available online at:  http://handle.dtic.mil/100.2/ADA423690
Doc. call no.:  M-U 39080-537 B115n

Frittelli, John.  Port and Maritime Security:  Background and Issues for Congress.  Washington, Library of Congress. Congressional Research Service, 2005.  21 p.
Also available online at:  http://www.fas.org/sgp/crs/homesec/RL31733.pdf
Doc. call no.:  M-U 42953-1 no. 05-RL31733

Hodges, Anthony.  America's International Ports and Intermodal Transportation System:  Ill-Prepared for Biological Weapons of Mass Destruction.  Carlisle Barracks, PA, U. S. Army War College, 2006.  22 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA449367
Doc. call no.:  M-U 39080-537 A628a

Richardt, Timothy P.  The Security and Defense of America's Ports:  An Assessment of Coast Guard and Navy Roles, Capabilities, and Synchronization.  Carlisle Barracks, PA, U.S. Army War College, 2006.  24 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA448833
Doc. call no.:  M-U 39080-537 R526s

Sparks, Michael C.  A Critical Vulnerability, a Valid Threat:  U.S. Ports and Terrorist Mining.  Norfolk, VA, Joint Forces Staff College, Joint Advanced Warfighting School, 2005.  1 vol.
Outlines the economic and strategic significance of the U.S. Maritime Transportation System (MTS) and identifies the shortfalls in current capabilities to defend the MTS from terrorist mining.
Also available online at:  http://handle.dtic.mil/100.2/ADA436598
Doc. call no.:  M-U 36185-37 S736c

United States.  General Accounting Office.  Maritime Security:  Substantial Work Remains to Translate New Planning Requirements into Effective Port Security.  Washington, GAO, 2004.  52 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS51305
Doc. call no.:  M-U 41026-173 no. 04-838

United States.  Government Accountability Office.  Maritime Security:  New Structures Have Improved Information Sharing, but Security Clearance Processing Requires Further Attention.  Washington, GAO, 2005.  49 p.
Also available online at:  http://www.gao.gov/new.items/d05394.pdf
Doc. call no.:  M-U 41026-173 no. 05-394

Winter, Peter J.  The Role of the U.S. Navy in Support of the National Strategy for Maritime Security.  Carlisle Barracks, PA, U.S. Army War College, 2006.  17 p.
"Examines the Strategy for Maritime Security, analyzes the current means available, uses current CNO guidance and policies in relation to the mission, and determines a path for the future employment of naval forces."
Also available online at:  http://handle.dtic.mil/100.2/ADA449645
Doc. call no.:  M-U 39080-537 W786r



Regional Issues:  Africa

 

Internet Resources

Boudali, Lianne K.  The GSPC:  Newest Franchise in al-Qa'ida's Global Jihad.  West Point, NY, Military Academy, Combating Terrorism Center, April 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA466539

U.S. Military Program Targets Terrorism in North AfricaFDCH Regulatory Intelligence Database March 15, 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=32W2488411664&site=ehost-live


Africa -- Books

Allen, Tim.  Trial Justice:  The International Court and the Lord's Resistance Army.  New York, Zed Books, 2006.  230 p.
Book call no.:  967.61044 A431t

Dalzell, Stephen R.  Beyond Draining the Swamp:  Urban Development and Counterterrorism in Morocco.  Hurlburt Field, FL, JSOU Press, 2006.  30 p.
This analysis "found that the Moroccan strategy offers an example of integrating socio-economic, ideological, political, and security-sector reforms, particularly in the growing sophistication of Moroccan efforts to eliminate informal housing areas."
Book call no.:  363.325156 D153b

Dempsey, Thomas A.  Counterterrorism in African Failed States:  Challenges and Potential Solutions.  Carlisle Barracks, PA, Strategic Studies Institute, U.S. Army War College, 2006.  36 p.
Calls for a new strategy for counterterrorism efforts in Africa.  Argues for a strategy that combines both military and law enforcement efforts, supported by foreign intelligence.
Also available online at:  http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB649.pdf
Book call no.:  363.32516096 D389c

Forest, James J. F. and Sousa, Matthew V.  Oil and Terrorism in the New Gulf:  Framing U.S. Energy and Security Policies for the Gulf of Guinea.  New York, Lexington Books, 2006.  329 p.
Book call no.:  333.8232 F716o

Globalization, Violent Conflict and Self-Determination, edited by Valpy FitzGerald.  New York, Palgrave Macmillan, 2006.  270 p.
Multiple Causes of Conflict in Algeria:  National Identity, Inequality and Political Islam, by Cathie Lloyd, pp 179-202.
Book call no.:  303.6091724 G562

Mentan, Tatah.  Dilemmas of Weak States:  Africa and Transnational Terrorism in the Twenty-First Century.  Burlington, VT, Ashgate, 2004.  380 p.
"Examines the weak state-terrorism nexus with emphasis on Africa."
Book call no.:  303.625096 M549d

Rotberg, Robert I.  Battling Terrorism in the Horn of Africa.  Cambridge, MA, World Peace Foundation, 2005.  210 p.
Book call no.:  363.3250963 B336

United States Institute of Peace.  Terrorism in the Horn of Africa.  Washington, United States Institute of Peace, 2004.  16 p.
Also available online at:  http://www.usip.org/pubs/specialreports/sr113/pdf
Book call no.:  303.6250963 T328


Africa -- Documents

Calabrese, Maurizio D.  Emerging Threats and the War on Terrorism:  The Formation of Radical Islamist Movements in Sub-Saharan Africa.  Monterey, CA, Naval Postgraduate School, 2005.  57 p.
"The goal of the thesis is to try and generate an initial understanding of the underlying conditions that cause radical group formation to help tailor U.S. policy goals toward fighting radical Islamist group emergence through prevention."
Also available online at:  http://handle.dtic.mil/100.2/ADA435589
Doc. call no.:  M-U 42525 C1411e

Feickert, Andrew.  U.S. Military Operations in the Global War on Terrorism:  Afghanistan, Africa, the Philippines, and Colombia.  Washington, Library of Congress, Congressional Research Service, 2005.  1 vol.
Also available online at:  http://italy.usembassy.gov/pdf/other/RL32758.pdf
Doc. call no.:  M-U 42953-1 no. SER-RL32758

Genasci, Andy J.  Overt Indicators of Islamic Extremism in Nigeria.  Fort Leavenworth, KS, U.S. Army Command and General Staff College, 2006.  66 p.
"Makes recommendations to US planners on how to better characterize an Islamic extremist safe haven."
Also available online at:  http://handle.dtic.mil/100.2/ADA451891
Doc. call no.:  M-U 42022 G324o

Jefferson, Charlene D.  The Bush African Policy:  Fighting the Global War on Terrorism.  Carlisle Barracks, PA, U. S. Army War College, 2006.  18 p.
"Establishes the link between each pillar of the Bush African policy and the goals of our National Strategy for Combating Terrorism and makes recommendations to strengthen those links."
Also available online at:  http://handle.dtic.mil/100.2/ADA449355
Doc. call no.:  M-U 39080-537 J451b


Africa -- Periodicals

Becker, Felicitas.  Rural Islamism During the 'War on Terror':  A Tanzanian Case Study.  African Affairs 105:583-603 October 2006.
"In the Tanzania and country town of Rwangwa, a bitter confrontation has developed between Sufi Muslims and Islamist reformers."

Ethiopia-Kenya-United United States:  Rendition Confusion.  Africa Confidential 48:10 April 13, 2007.
"The United States' War on Terror is catching many innocent people in its crossfire and hundreds of these are held incommunicado by the Ethiopian and Kenyan authorities on suspicion of terrorism."

Gutta, Olivier.  The New Battle of Algeria.  Weekly Standard 11:19-20 July 31, 2006.
"Comments on the implications of terrorism in Algeria."

Hunt, Emily.  Counter-Terrorism Successes Force Algerian Militants to Evolve.  Jane's Intelligence Review 18:11-16 June 2006.
"Focuses on the threat posed by the Salafish Group for Preaching and Combat to the Algerian regime."

Jihad in Somalia.  Jane's Terrorism & Security Monitor, pp 2-3, November 2006.
Analyzes the threat of a wider conflict in Somalia because the Union of Islamic Courts declared a jihad against Ethiopia.

Kidnapping Trends:  Examining Patterns in Africa and the Americas.  Jane's Intelligence Review 19:50-54 January 2007.

Laremont, Ricardo and Gregorian, Hrach.  Political Islam in West Africa and the Sahel.  Military Review 86:27-36 January-February 2006.

Machain, Andrea.  US Focuses on Central Sahara.  Jane's Intelligence Review 18:10-11 November 2006.
The US security agenda in the Sahel/Sahara is to prevent contagion from the Algerian Salafi insurgency spreading to areas of northern Mali and Niger.

Makarendo, Tamara.  Kidnapping Trends:  Examining Patterns from Europe to Asia.  Jane's Intelligence Review 19:48-53 January 2007.
Part 1 in a 2 part series.

Mauritania's Fractious Future.   Jane's Islamic Affairs Analyst, pp 12-13, January 2007.
"Mauritania is torn between its Arab and African cultural heritages and between Islam and secularist orientations prevalent in society."

Paterson, Pat.  Into Africa:  A New Frontier in the War on Terror.  U.S. Naval Institute Proceedings 132:32-36 May 2006.

Policing the Undergoverned Spaces.  Economist 383:55-56 June 16, 2007.
Presents an overview of U.S. and collaborative nations' efforts in the northern deserts of Africa in military searches for al-Qaida and Aqim.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25432673&site=ehost-live&custid=airuniv

Schaefer, Todd M.  When Terrorism Hits Home:  Domestic Newspaper Coverage of the 1998 and 2002 Terror Attacks in Kenya.  Studies in Conflict & Terrorism 29:607-619 September 2006.

US Focuses on Central Sahara.  Jane's Intelligence Review 18:10-11 November 2006.

USA/Africa:  Boots on the Ground.  Africa Confidential 47:3 November 3, 2006.
"The Pentagon wants to raise the cash for a unified Africa command to boost its counter-terror operations and energy security."



Regional Issues:  Asia and Australia

 

Internet Resources

Ahrari, Ehsan.  Countering the Ideological Support for HT and the IMU:  The Case of the Ferghana Valley.  Garmisch-Partenkirchen, Germany, George C. Marshall European Center for Security Studies, October 2006. (Occasional paper, no. 3).
Available online at:  http://www.marshallcenter.org/site-graphic/lang-en/page-occpapers-research-1/static/xdocs/research/static/occpapers/occ-paper_3-en.pdf

Baran, Zeyno.  Islamic Radicalism in Central Asia and the Caucasus:  Implications for the EU.  Washington, Central Asia-Caucasus Institute & Silk Road Studies Program, Johns Hopkins University, July 2006.
Available online at:  http://www.silkroadstudies.org/new/docs/Silkroadpapers/0607Islam.pdf

Bell, Paul M.  Pakistan's Madrassas -- Weapons of Mass Instruction?  Monterey, CA, Naval Postgraduate School, March 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA467143

Billquist, Daniel L. and Colbert, Jason M.  Pakistan, Madrassas, and Militancy.  Monterey, CA, Naval Postgraduate School, December 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA460444

Iqbal, Brigadier J. and Filiberti, Edward J.  Effects of International Terrorism on the Security of Pakistan.  Carlisle Barracks, PA, U.S. Army War College, 13 March 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA468379

Karagiannis, Emmanuel.  The Challenge of Radical Islam in Tajikistan:  Hizb ut-Tahrir al-IslamiNationalities Papers March 2006.
Available online at:  http://web.ebscohost.com/ehost/detail?vid=1&hid=15&sid=9b732333-872c-49bd-a839-84257d5f561c%40SRCSM2

Niksch, Larry.  Abu Sayyaf:  Target of Philippine-U.S. Anti-Terrorism Cooperation.  Washington, Library of Congress, Congressional Research Service, January 24, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA463896

Ray, Rebecca S.  Pakistan Education Systems and the Radical Islamic Jihadist Ideology.  Fort Leavenworth, KS, Army Command and General Staff College, 15 December 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA464137

Schneider, Frank.  Hizb ut-Tahrir:  A Threat Behind a Legal Facade?  Monterey, CA, Naval Postgraduate School, June 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA457669

Vaughn, Bruce.  Islamist Extremism in Bangladesh.  Washington, Library of Congress, Congressional Research Service, January 31, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA464832


Asia and Australia -- Books

Australian Security after 9/11:  New and Old Agendas, edited by Derek McDougall and Peter Shearman.  Burlington VT, Ashgate, 2006.  214 p.
Book call no.:  355.033094 A9372

Blaxland, John.  Revisiting Counterinsurgency:  A Manoeuvrist Response to the 'War on Terror' for the Australian Army.  Duntroon, Australia, Land Warfare Studies Centre, 2006.  91 p.
Book call no.:  355.0218 B6451r

Bond, Christopher S.  Indonesia and the Changing Front in the War on Terrorism.  Washington, Heritage Foundation, April 28, 2005.  7 p.
Argues that Indonesia is the second front in the war on terrorism.
Also available online at:  http://www.heritage.org/Research/AsiaandthePacific/hl875.cfm
Book call no.:  327.73059 B711i

Crosston, Matthew.  Fostering Fundamentalism:  Terrorism, Democracy, and American Engagement in Central Asia.  Aldershot, UK, Ashgate, 2006.  186 p.
Book call no.:  327.73058 C951f

Fredholm, Michael.  Uzbekisten & the Threat from Islamic Extremism.  Camberley, UK, Conflict Studies Research Centre, Royal Military Academy Sandhurst, 2003.  19 p.
Book call no.:  320.55709587 F852u

Gauging U.S.-Indian Strategic Cooperation, edited by Henry D. Sokolski.  Carlisle Barracks, PA, Strategic Studies Institute, U.S. Army War College, 2007.  423 p.
Note part II "Terrorism, Missiles, and Arms Control."
Book call no.:  327.73054 G268

Global Threat Reduction, edited by Sharon A. Squassoni and Amy F. Woolf.  New York, Novinka Books, 2006.  151 p.
Book call no.:  327.1747 S773g

Gray-Murphy, Sam.  Air Power and Trans-National Terrorism:  The Possibilities, Advantages and Limits to Using Australian Air Power in the "War on Terror".  Tuggeranong, Australia, Air Power Development Centre, 2005.  41 p.
Book call no.:  358.4030994 G781a

In the Tracks of Tamerlane:  Central Asia's Path to the 21st Century, edited by Daniel L. Burghart.  Washington, Center for Technology and National Security Policy, National Defense University, 2004.  478 p.
Book call no.:  958.4086 I35

Islam, Oil, and Geopolitics:  Central Asia after September 11, edited by Elizabeth Van Wie Davis and Rouben Azizian.  Lanham, MD, Rowman & Littlefield Publishers, 2007.  308 p.
Book call no.:  958.043 I82

Johnson, Lena.  Tajikistan in the New Central Asia:  Geopolitics, Great Power Rivalry and Radical Islam.  London, I. B. Tauris, 2006.  252 p.
Discusses the foreign policy of Tajikistan during the first four years after the terrorist attacks of September 11, which led the U.S. to engage not only in Afghanistan but also in Uzbekistan, Kyrgystan, and Tajikistan.
Book call no.:  958.6086 J81t

Leech, Gary.  Crude Interventions:  The US, Oil and the New World (Dis)order.  New York, Zed Books, 2006.  248 p.
Argues that the US military presence in Central Asia and Washington's support for secular governments marked by repression, corruption and nepotism have increased anti-American sentiments among the region's Muslim population and have fueled terrorism.
Book call no.:  327.73 L483c

Masters of Terror:  Indonesia's Military and Violence in East Timor, edited by Richard Tanter.  New York, Rowman & Littlefield Publishers, 2006.  218 p.
Book call no.:  363.32509598 M4231

McDermott, Roger N.  Countering Global Terrorism:  Developing the Antiterrorist Capabilities of the Central Asian Militaries.  Carlisle Barracks, PA, Strategic Studies Institute, U.S. Army War College, 2004.  46 p.
Book call no.:  363.325160958 M134c

Naumkin, Vitaly V.  Radical Islam in Central Asia:  Between Pen and Rifle.  Lanham, MD, Rowman & Littlefield Publiswhers, 2005.  285 p.
Book call no.:  320.5570958 N299r

Olcott, Martha Brill.  Roots of Radical Islam in Central Asia.  Washington, Carnegie Endowment for International Peace, January 2007.  39 p. (Carnegie Papers, no. 77)
Also available online at:  http://www.carnegieendowment.org/files/cp%5F77%5Folcott%5Froots%5Ffinal.pdf
Book call no.:  320.5570958 O43r

Takeyh, Ray and Gvosdev, Nikolas K.  The Receding Shadow of the Prophet:  The Rise and Fall of Radical Political Islam.  Westport, CT, Praeger, 2004.  186 p.
Book call no.:  320.557 T136r

Terrorism and Violence in Southeast Asia:  Transnational Challenges to States and Regional Stability.  Armonk, NY, M.E. Sharpe, 2005.  262 p.
Book call no.:  303.6250959 T3281

Understanding Terrorism in South Asia:  Beyond Statist Discourses, edited by Imtiaz Ahmed.  New Dehli, India, Manohar, 2006.  418 p.
Book call no.:  363.3250954 U55


Asia and Australia -- Documents

Amarille, Roland C.  Government of the Republic of the Philippines - Moro Islamic Liberation Front Peace Talks:  A Bold Move to Counter Terrorism.  Carlisle Barracks, PA, U.S. Army War College, 2006.  20 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA449258
Doc. call no.:  M-U 39080-537 A485g

Charamut, William J.  Policing the Silk Road:  Do the Central Asian States Need the United States and Russia to Create and Maintain Stability?  Monterey, CA, Naval Postgraduate School, 2005.  75 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA443244
Doc. call no.:  M-U 42525 C4691p

Feickert, Andrew.  U.S. Military Operations in the Global War on Terrorism:  Afghanistan, Africa, the Philippines, and Colombia.  Washington, Library of Congress, Congressional Research Service, 2005.  1 vol.
Also available online at:  http://italy.usembassy.gov/pdf/other/RL32758.pdf
Doc. call no.:  M-U 42953-1 no. SER-RL32758

Klempp, Tonya M.  Contemporary Radical Islam as a Consequence of Traditional Legacies and Globalization:  A Case Study of the Southern Philippines.  Monterey, CA, Naval Postgraduate School, 2006.  93 p.
"Concludes that contemporary radical Islam in the southern Philippines a fusion of both traditionalism and globalization.
Also available online at:  http://handle.dtic.mil/100.2/ADA445416
Doc. call no.:  M-U 42525 K644c

Ruder, Daniel J.  The Long War in Central Asia:  Hizb-ut-Tahrir's Caliphate.  Fort Leavenworth, KS, School of Advanced Military Studies, Army Command General Staff College, 2006.  59 p.
Hizb-ut-Tahrir is a transnational radical Islamist political movement that aims to overthrow a Central Asian government and restore the Islamic Caliphate.
Also available online at:  http://handle.dtic.mil/100.2/ADA450614
Doc. call no.:  M-U 42022-2 R913L


Asia and Australia -- Periodicals

Abuza, Zachary.  Pace of Southern Philippine Peace Process Angers Rebels.  Jane's Intelligence Review 18:28-33 December 2006.
Initial optimism about the progress of peace talks between the Philippine government and the Moro Islamic Liberation Front is fading. Article examines what went wrong and if a resumption of hostilities is likely.

Abuzza, Zachary.  On the Defensive:  Rebels Lose Ground in Southern Philippines.  Jane's Intelligence Review 19:12-16 April 2007.
Discusses Abu Sayyaf's current capabilities and how the efforts of the Philippine military, with the assistance of the U.S., have kept it in check.

Chalk, Peter.  Australia's Mass Transport Network Remains Vulnerable.  Jane's Intelligence Review 18:17-20 June 2006.

Davis, Anthony.  Militant Moves:  Indian Terrorists' Targeting Moves South.  Jane's Intelligence Review 19:16-19 April 2007.
Reports on the shift of the terrorist threat to India's southern high-tech centers.

Fish, Tim.  Asia-Pacific Region a 'Major Front' in the War on Terror.  Asia-Pacific Defence Reporter 32:36-37 May 2006.

Flis, Eric.  Thailand's Time-Bomb.  Journal of Counterterrorism and Homeland Security International 12:16-18 Autumn 2006.

Flying Tigers Strike at Night.  Jane's Terrorism & Security Monitor, pp 5-6 , April 2007.
The Tamil Tigers demonstrated the capabilities of their air wing with a bombing raid on Sri Lanka's main air base.

Fuller, Graham E.  The Hizballah-Iran Connection:  Model for Sunni Resistance.  The Washington Quarterly 30:139-150 Winter 2006-07.

Hinds, Alphus.  Mumbai Bombings Signal Sustained Rail Terrorism Trend.  Jane's Intelligence Review 18:12-17 October 2006.
Examines the nature of the threat and its likely future trajectory.

Islamist Cleric Targets Moderate Indonesia.  Jane's Islamic Affairs Analyst, pp 10-11, March 2007.
Examines the impact of the rhetoric of Islamist cleric Abu Bakar Bashir on those disillusioned with the Indonesian government.

Khokhar, Moniza.  Reforming Militant Madaris in Pakistan.  Studies in Conflict & Terrorism 30:353-365 April 2007.
Argues that for the Pakistani goverment to reform the madaris it will have to strictly implement policies that will demilitarize the madaris.

Kurdistan Freedom Falcons (TAK).  Jane's Terrorism & Security Monitor, pp 8-9, October 2006.

Machain, Andrea.  Southeast Asia:  Drive to Reduce Terrorism in the Tri-Border Area.  Jane's Intelligence Review 18:12-14 November 2006.
There is no evidence that the region is either a source or arena for significant transnational jihadist terrorism.

Nasir Abbas, Jemaah Islamiyah Defector.  Jane's Terrorism & Security Monitor, pp 7-8, April 2007.
Argues that there is a growing rift within the movement over strategy, objectives and tactics.

Noordin Muhammad Top.  Jane's Terrorism & Security Monitor, pp 15-16, November 2006.
Top is the target of what may be the biggest manhunt in Indonesian history.  Article examines the life and influences of the rebel Jemaah Islamiya militant.

Pakistan:  Anchor of Regional Stability?  Jane's Islamic Affairs Analyst, pp 1-3, January 2007.
Examines how the Pakistani national identity has been shaped.

Rashid, Tahmina.  Radical Islamic Movements:  Gender Construction in Jamaat-i-Islami and Tabligh-i-Jamaat in Pakistan.  Strategic Analysis 30:354-376 April-June 2006.
Argues that women are active partners of their subordination within traditionalist and radical religious movements.

Smith, Chris.  Sri Lanka Returns to War.  Jane's Intelligence Review 18:28-33 November 2006.
There is little chance for diplomacy to resolve the Tamil separatist conflict in Sri Lanka.  Article explains that the Tamil rebels are far from being decisively beaten.

Southeast Asia:  Drive to Reduce Terrorism in the Tri-Border Area.  Jane's Intelligence Review 18:12-14 November 2006.

Southeast Asia's Tri-Border Black Spot.  Jane's Terrorism & Security Monitor, pp 10-11 , May 2007.
Reports that the Malaysian state of Sabah is used as a hub for Islamist militants traveling between Malaysia, Indonesia and the southern Philippines.

Sri Lanka Slides Back into Civil War.  Jane's Terrorism & Security Monitor, pp 14-16, January 2007.
The ceasefire between the Sri Lanken government and the LTTE broke down in 2006 as a series of retaliatory attacks by both sides evolved into a concerted government offensive against rebel positions in the east.

Stack-O'Connor, Alisa.  Lions, Tigers, and Freedom Birds:  How and Why the Liberation Tigers of Tamil Eelam Employs Women.  Terrorism and Political Violence 19:43-63 Spring 2007.
Examines the themes common to women's participation in militant groups such as women's unique propaganda value and cultural limits on recruiting women and employing them in political violence.

The Taliban Return to Afghanistan.  Jane's Terrorism & Security Monitor, pp 10-11, January 2007.
While the Wesern forces can beat the Taliban in battle, they do not have the numbers to secure the towns and villages cleared of insurgents.

Teo, Yun Yun.  Target Malacca Straits:  Maritime Terrorism in Southeast Asia.  Studies in Conflict & Terrorism 30:541-561 June 2007.
Looks at how "three neighbors in the same Straits came to have such divergent policies on combating maritime terrorism."

Thailand's Rocky Future.  Jane's Terrorism & Security Monitor, pp 12-13, January 2007.
Examines the volatile separatist insurgency in southern Thailand during 2006 and looks ahead to the possibilities in 2007.

The Tigers' Defeat in the East.  Jane's Terrorism & Security Monitor, pp 11-12, February 2007.
Article examines the prospects for Sri Lanka's civil war since the defeat of LTTE in 2006.

Training the Tigers:  The Strategy of Separatist Success in Sri Lanka.  Jane's Intelligence Review 19:24-28 January 2007.

Ultimatum to Jolo Island Insurgents.  Jane's Terrorism & Security Monitor, pp 4-5, October 2006.

Ungerer, Carl and Rogers, Dallas.  The Threat of Agroterrorism to Australia:  A Preliminary Assessment.  Studies in Conflict and Terrorism 29:147-163 March 2006.

Wounded but Still Dangersous.  Economist 383:48-49 June 16, 2007.
Presents a profile of government efforts in Indonesia to prevent terrorism, specifically the group Jemaah Islamiah.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25432652&site=ehost-live&custid=airuniv



Regional Issues:  Europe and Russia

 

Internet Resources

Donalds, Thomas J.  Radical Islam in Britain:  Implications for the War on Terrorism.  Carlisle Barracks, PA, U.S. Army War College, 12 March 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA467202

Kirkwood, Lea T.  The European Union Counter-Terrorism Strategy:  Origins, Problems, and Prospects.  Monterey, CA, Naval Postgraduate School, December 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA462613

Shepard, Scott.  The Rise of Pan-Islamism in Britain.  Monterey, CA, Naval Postgraduate School, December 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA462712


Europe and Russia -- Books

AEI Briefing on the London Terrorist Attacks.  Washington, American Enterprise Institute for Public Policy Research, July 11, 2005.  18 p.
Unedited transcript prepared from a tape recording.
Also available online at:  http://www.aei.org/events/filter.all,eventID.1105/transcript.asp
Book call no.:  363.3250941 A512

Countering Urban Terrorism in Russia and the United States:  Proceedings of a Workshop, edited by Glenn E. Schweitzer and A. Chelsea Sharber.  Washington, National Academies Press, 2006.  241 p.
Book call no.:  363.32516 C8551

Dolnik, Adam.  Negotiating the Impossible?:  The Beslan Hostage Crisis.  London, RUSI, 2007.  45 p.
Book call no.:  364.1540947 D665n

Doyle, Neil.  Terror Base UK:  Inside a Secret War.  London, Mainstream Publishing, 2006.  240 p.
Book call no.:  363.3250944 D754t

Farrington, Christopher.  Ulster Unionism and the Peace Process in Northern Ireland.  New York, Palgrave Macmillan, 2006.  214 p.
Book call no.:  941.60824 F246u

Gardiner, Nile and Phillips, James.  The London Bombings:  How the U.S. and the U.K. Should Respond.  Washington, Heritage Foundation, 2005.  12 p.
Book call no.:  363.32516 G223L

Jones, Alun.  Blackstone's Guide to the Terrorism Act 2006.  New York, Oxford University Press, 2006.  205 p.
Book call no.:  345.4102 J76b

Phillips, Melanie.  Londonistan.  New York, Encounter Books, 2006.  213 p.
Book call no.:  363.3250941 P562L

Rai, Milan.  7/7 The London Bombings:  Islam & the Iraq War.  Ann Arbor, MI, Pluto Press, 2006.  196 p.
Book call no.:  942.1086 R149s

Shai, Shaul.  Islamic Terror and the Balkans.  New Brunswick, NJ, Transaction Publishers, 2007.  218 p.
Book call no.:  363.325 s526i

Shore, Zachary.  Breeding bin Ladens:  America, Islam, and the Future of Europe.  Baltimore, MD, Johns Hopkins University Press, 2006.  223 p.
Book call no.:  305.697 S559b

The State We Are in:  Identity, Terror and the Law of Jihad, edited by Aftab Ahmad Malik.  Bristol, UK, Amal Press, 2006.  140 p.
Contains essays that "address the crucial contemporary issues and challenges facing Muslims in the West."
Book call no.:  297.72 S797

Terrorism:  Protection of Witnesses and Collaborators of Justice.  Strasbourg, France, Council of Europe Publishing, March 2006.  403 p.
"Contains a survey of national laws and practice in 27 Council of Europe member states and two observer states together with an analytical report which examines the protection of witnesses and collaborators of justice.  It constitutes a further Council of Europe contribution to the international community's efforts to combat terrorism."
Book call no.:  344.05325 T328

United States.  Congress.  Senate.  Committee on Appropriations.  Subcommittee on the Department of Homeland Security.  Catching Terrorists:  The British System Versus the U.S. System.  Hearing.  109th Congress, 2nd session, September 14, 2006.  Washington, GPO, 2006.  49 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS77482
Book call no.:  344.05325 U58c


Europe and Russia -- Periodicals

Aras, Bulent and Tokta, Sule.  Al-Qaida, 'War on Terror' and Turkey.  Third World Quarterly 28:1033-1050 July 2007.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25228168&site=ehost-live&custid=airuniv

Britain's Growing Jihadist Movement.  Jane's Terrorism & Security Monitor, pp 2-3, January 2007.
The US-UK involvement in Iraq and Afghanistan has been used by extremists to validate the jihadist narrative of a "war on Islam," and continues to act as a powerful recruiting tool for jihadists in the UK.

Callaway, Rhonda L. and Harrelson-Stephens, Julie.  Toward a Theory of Terrorism:  Human Security as a Determinant of Terrorism.  Studies in Conflict & Terrorism 29:773-796 December 2006.

The Crevice Conspiracy.  Jane's Terrorism & Security Monitor, pp 1-5, June 2007.
"Provides a case study of young British Muslim men who were radicalised at home, then exploited by al Qaida."

ETA Bomb Ends Peace Process.  Jane's Terrorism & Security Monitor, pp 9-10, February 2007.
Article examines the implications of the 2006 Madrid airport bombing.

ETA Threat Dismissed as Propaganda.  Jane's Terrorism & Security Monitor, pp 12, November 2006.
Examines whether the latest statements signal a new direction in ETA's struggle for independence.

Evans, Richard.  This Is No Video Game.  Jane's Terrorism & Security Monitor, pp 1, November 2006.
Gives a brief symposis of the nature and scope of the terrorist threat to the UK.

Jonsson, Michael.  Money Problems:  Tackling Terrorist Financiers in Sweden.  Jane's Intelligence Review 19:18-21 February 2007.

Kirby, Aidan.  The London Bombers as "Self-Starters":  A Case Study in Indigenous Radicalization and the Emergence of Autonomous Cliques.  Studies in Conflict & Terrorism 30:415-428 May 2007.
Argues that "homegrown terrorists" use the Internet as an opertional tool.

New Wave of Retro-Terrorism.  Jane's Terrorism & Security Monitor, pp 9-10, March 2007.
Investigates the growing anti-Americanism that has re-invigorated a brand of terrorism dismissed in recent years as anachronistic.

Pargeter, Alison.  North African Immigrants in Europe and Political Violence.  Studies in Conflict and Terrorism 29:731-747 December 2006.

Piccinni, Mario Leone and Brunelli, Michele.  Pirate Gold:  Music Counterfeiting in Italy.  Jane's Intelligence Review 19:40-42 June 2007.
Recent crackdown on music counterfeiting in Italy revealed its structure connections to terrorism.

Schmidt, John R.  Last Alliance Standing?  NATO after 9/11.  The Washington Quarterly 30:93-106 Winter 2006-07.

Segell, Glen M.  Terrorism on London Public Transport.  Defense & Security Analysis 22:45-59 March 2006.

Vidino, Lorenzo.  The Hofstad Group:  The New Face of Terrorist Networks in Europe.  Studies in Conflict & Terrorism 30:579-592 June 2007.
Explains that "its amorphous structure and lack of ties with international networks make Hofstad the quintessential example of the homegrown terrorism that is worrying European intelligence agencies."

Zimmermann, Doron.  The European Union and Post-9/11 Counterterrorism:  A Reappraisal.  Studies in Conflict and Terrorism 29:123-145 March 2006.



Regional Issues:  Latin America

 

Internet Resources

Halaburda, Pablo.  Terrorism Base Potential in the Tri-Border Area of Latin America.  Monterey, CA, Naval Postgraduate School, December 2006.
Available online at:  http://handle.dtic.mil/100.2/ADA462564

Radcliffe, Sarah A.  Latin American Indigenous Geographies of Fear:  Living in the Shadow of Racism, Lack of Development, and Antiterror Measures.  Annals of the Association of American Geographers 97:385-397 June 2007.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25149914&site=ehost-live&custid=airuniv
Outlines the geographies of fear to which Latin American indigenous populations have been subjected to in nation-building and antiterrorism measures resulting in restricted development opportunities and insecure livelihoods.

Rodriguez, Carlos A.  Cyberterrorism - A Rising Threat in the Western Hemisphere.  Washington, Inter-American Defense College, May 2006.
Available online at:  http://library.jid.org/en/mono45/Rodriguez,%20Carlos.pdf
"Provides background information and a definition of cyber terror as well as its implications to hemispheric security".

Smith, Hugh.  Terrorism in the Iguazu Falls Region:  $100 Bills, a DIME at a Time.  Fort Leavenworth, KS, Army Command and General Staff College, May 26, 2005.
Available online at:  http://handle.dtic.mil/100.2/ADA436461
Explains how certain conditions have created an environment in which terrorist groups operate in the region, and how their activities pose a threat to hemispheric security.”

Sullivan, Mark P.  Latin America:  Terrorism Issues.  Washington, Library of Congress, Congressional Research Service, January 22, 2007.
Available online at:  http://handle.dtic.mil/100.2/ADA463773

Walker, William J.  The Relationship and Threat of Transnational Organized Crime, Drug Traffickers and Terrorist Groups in the Western Hemisphere:  The Hot Spots.  Washington, Inter American Defense College, April 2006.
Available online at:  http://library.jid.org/en/mono45/Walker.pdf
"Since the 1980s the Western Hemisphere has experienced a criminalization syndrome involving several closely related, mutually reinforcing phenomena, transnational organized crime, drug traffickers, and terrorists.  The research examines the link and association between the three entities and determines that they have striking similarities in their method and operations."


Latin America -- Books

Meara, William R.  Contra Cross:  Insurgency and Tyranny in Central America, 1979-1989.  Annapolic, MD, Naval Institute Press, 2006.  168 p.
Book call no.:  972.8 M483c

Menjivar, Cecilia.  When States Kill:  Latin America, the U.S., and Technologies of Terror.  Austin, TX, University of Texas Press, 2005.  374 p.
Offers two overview essays:  "State Terror in the U.S.-Latin American Interstate Regime" and "New Responses to State Terror".  Also offers separate essays addressing state terror in:  Argentina, Colombia, Costa Rica, El Salvador, Guatemala, Honduras, Mexico, Nicaragua, Peru and Uruguay
Book call no.:  303.625098 W565

Pinheiro, Alvaro de Souza.  Narcoterrorism in Latin America:  A Brazilian Perspective.  Hurlburt Field, FL, JSOU Press, 2006.  79 p.
“The author reminds us of the imminent threat of terrorism in our Western Hemisphere and suggests that while continuing our counterterrorism initiatives elsewhere, the United States, with its friends, can leverage those capable countries in the region to pursue the terrorism threat at our doorstep.”--Abstract from publication.
Also available online at:  https://jsou.socom.mil/gateway/content/researchPapers/paper374.pdf
Book call no.:  363.450981 P654n


Latin America -- Documents

Castillo Arias, Jaime O.  Information Sharing about International Terrorism in Latin America.  Monterey, CA, Naval Postgraduate School, 2005.  65 p.
"Analyzes the importance of sharing information when dealing with activities related to international terrorism in Latin America, especially in the aftermath of the terrorist events against the United States on September 11, 2001."
Also available online at:  http://handle.dtic.mil/100.2/ADA435495
Doc. call no.:  M-U 42525 A696i

Feickert, Andrew.  U.S. Military Operations in the Global War on Terrorism:  Afghanistan, Africa, the Philippines, and Colombia.  Washington, Library of Congress, Congressional Research Service, 2005.  1 vol.
Also available online at:  http://italy.usembassy.gov/pdf/other/RL32758.pdf
Doc. call no.:  M-U 42953-1 no. SER-RL32758

Sullivan, Mark P.  Latin America:  Terrorism Issues.  Washington, Library of Congress. Congressional Research Service, 2005.  1 vol.
Updated January 18, 2006, http://leahy.senate.gov/issues/foreign policy/PDFS/LatinAmericaTerrorism.pdf.
Doc. call no.:  M-U 42953-1 no.05-RS21049


Latin America -- Periodicals

Briscoe, Charles H.  ELN Mines and FARC Mortars:  IEDs in Colombia.  Veritas 2:107-112 2006.

Colombia's Inter-Rebel War.  Jane's Terrorism & Security Monitor, pp 10-12, June 2007.
Reports that the "head of FARC ordered an offensive to destroy the ELN, accusing it of betraying the revolution by opening talks with the government."

Colombia's Plan Victory.  Jane's Terrorism & Security Monitor, pp 8-9, January 2007.
Bogata hopes Plan Victory in 2007 will finally bring the FARC to the negotiating table. Article examines the government's peformance and the likely course of the conflict.

Florez-Morris, Mauricio.  Joining Guerrilla Groups in Colombia:  Individual Motivations and Processes for Entering a Violent Organization.  Studies in Conflict & Terrorism 30:615-634 July 2007.

Garrastazu, Antonio and Haar, Jerry.  International Terrorism:  The Western Hemisphere Connection.  Dialogo:  Forum of the Americas, pp 21-24, Fall 2004.
"In this article published in 2001 by the Dante B. Fascell North-South Center of the University of Miami, the authors calls attention to terrorism within our own region and what should be done internationally to deal with this threat."

Machain, Andrea.  Securing Tri-Border Areas.  Jane's Intelligence Review 18:6 November 2006.

Machain, Andrea.  South America's Regional Centre for Illegal Activities.  Jane's Intelligence Review 18:7-9 November 2006.

Makarendo, Tamara.  Kidnapping Trends:  Examining Patterns from Europe to Asia.  Jane's Intelligence Review 19:48-53 January 2007.
Part 1 in a 2 part series.

Marks, Thomas A. and Palmer, David Scott.  At the Frontlines of the GWOT:  Lessons from Peru.  Journal of Counterterrorism & Homeland Security International 13, no.2:18-25 Summer 2007.
Contends that the U.S. and its allies in the GWOT need to take some lessons learned from Peru who put down the Shining Path group.

Osborn, Ronald.  On the Path of Perpetual Revolution:  From Marx's Millenarianism to Sendero Luminoso.  Totalitarian Movements and Political Religions 8:115-135 March 2007.
Argues that the Shining Path insurgency in Peru represented a coherent development of Peruvian Left political culture and orthodox Marxist concepts of violent struggle in the name of 'progress'.

Sacquety, Troy J.  Forty Years of Insurgency:  Colombia's Main Opposition Groups.  Veritas 2:47-51 2006.



Regional Issues:  Middle East

 

Books

Alagha, Joseph.  The Shifts in Hizbullah's Ideology:  Religious Ideology, Political Ideology, and Political Program.  Amsterdam, Amsterdam University Press, 2006.  380 p.
Book call no.:  324.25692 A316s

Chomsky, Noam.  Perilous Power:  The Middle East & U.S. Foreign Policy:  Dialogues on Terror, Democracy, War, and Justice.  Boulder, CO, Paradigm Publishers, 2007.  276 p.
Book call no.:  327.73056 C548p

Hafez, Mohammed M.  Manufacturing Human Bombs:  The Making of Palestinian Suicide Bombers.  Washington, United States Institute of Peace Press, 2006.  125 p.
Book call no.:  363.325 H138m

Jordan's 9/11:  Dealing with Jihadi Islamism.  Brussels, International Crisis Group, November 23, 2005.  28 p.
Also available online at:  http://www.crisisgroup.org/library/documents/middle_east___north_africa/iraq_iran_gulf/47_jordan_s_9_11_dealing_with_jihadi_islamism.pdf
Book call no.:  363.3250956954 J82

Kenney, Jeffrey T.  Muslim Rebels:  Kharijites and the Politics of Extremism in Egypt.  New York, Oxford University Press, 2006.  221 p.
A study of the discourse surrounding Islamist violence in Egypt from the 1950s to the 1990s.  Its focus is the emergence and evolution of the Kharijites, a seventh-century militant Muslim sect.
Book call no.:  297.83 K35m

Mishal, Shaul and Sela, Avraham.  The Palestinian Hamas:  Vision, Violence, and Coexistence.  New York, Columbia University Press, 2006.  244 p.
Book call no.:  956.053 M678p 2006

Smith, Mark A.  The Russia-Hamas Dialogue, and the Israeli Parliamentary Elections.  Swindon, UK, Defence Academy of the United Kingdom, Conflict Studies Research Centre, June 2006.  7 p.
Book call no.:  327.4705694 C655r

United States.  Congress.  Senate.  Committee on Foreign Relations.  Palestinian Legislative Council Elections - Challenges of Hamas' Victory.  Staff trip report.  109th Congress, 2nd session, January 2006.  Washington, GPO, 2006.  25 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS67925
Book call no.:  324.95694 P157


Middle East -- Document

Maye, Diane Leigh.  Measures of Effectiveness:  Israeli Counterterrorism Strategies and Tactics During the Al-Aqsa Intifada.  Monterey, CA, Naval Postgraduate School, 2006.  79 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA457277
Doc. call no.:  M-U 42525 M467m


Middle East -- Periodicals

Alimi, Eitan Y.  Contextualizing Political Terrorism:  A Collective Action Perspective for Understanding the Tanzim.  Studies in Conflict and Terrorism 29:263-283 April-May 2006.

Barnea, Nahum.  Israel vs Hezbollah.  Foreign Policy 157:22-28 November-December 2006.
Argues that the Bush administration accomplished its goals by allowing Israel to weaken Hizbollah yet still support Lebanese Prime Minister Fouad Siniora.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=22995299&site=ehost-live&custid=airuniv

Ben-David, Alon.  Al-Qaeda Eyes Options in Lebanon.  Jane's Defense Weekly 43:22 February 1, 2006.

Berko, Anat and Erez, Edna.  Gender, Palestinian Women, and Terrorism:  Women's Liberation or Oppression?  Studies on Conflict & Terrorism 30:493-519 June 2007.
"Examines the hypothesis that Palestinian women's involvement in terrorism indicates women's liberation.

Blanford, Nicholas.  Call to Arms:  Hizbullah's Efforts to Renew Weapons Supplies.  Jane's Intelligence Review 19:26-30 May 2007.

Cromer, Gerald.  Analogies to Terror:  The Construction of Social Problems in Israel During the Intifada Al Aqsa.  Terrorism and Political Violence 18:389-398 Autumn 2006.

Harb, Mona.  Deconstructing Hizballah and Its Suburb.  Middle East Report 37:12-17 Spring 2007.
Provides an in-depth look at Hizballah's stronghold in southern Beirut.

Henry, Terrence.  Get Out of Jihad Free.  Atlantic Monthly 299:39-40 June 2007.
Reports on how the Saudi Arabian government offered amnesty and rehabilitation to anyone willing to turn themselves in and renounce Islamic terrorism.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25007079&site=ehost-live&custid=airuniv

Hilburn, Matt.  Hezbollah's Surprise:  Terror Group's Strike with an Advanced Cruise Missile Catches Israel Ship's Crew and U.S. Experts Off Guard.  Seapower 49:10-12 September 2006.

Jamshaid, Amina.  Hamas' Electoral Victory:  Reactions of the Arab Media (January - July 2006).  Strategic Studies 26:91-118 Winter 2006.

Knights, Michael.  Internal Politics Complicate Counterterrorism in Yemen.  Jane's Intelligence Review 18:14-18 February 2006.

Knights, Michael.  Yemen Oil Attacks Display Intent but Little Capability.  Jane's Intelligence Review 18:16-19 November 2006.
Two suicide bombings launched on Yemen's oil industry on 15 September bore similarities to the February attack on the Saudi oil processing facility at Abqaiq.  Article assesses the implications of the attacks.

Moqtada al-Sadr's Ties to Hizbullah.  Jane's Islamic Affairs Analyst, pp 10-11, October 2006.

Opall-Rome, Barbara.  Blindsided:  Failure to Foresee Hamas Victory Was "a Grave Lapse in Situational Awareness".  C4ISR 5:48 April 2006.

Peters, Ralph.  Lessons from Lebanon:  The New Model Terrorist Army.  Armed Forces Journal 144:38-40+ October 2006.

Pizaaz, James A.  Draining the Swamp:  Democracy Promotion, State Failure, and Terrorism in 19 Middle Eastern Countries.  Studies in Conflict & Terrorism 30:521-539 June 2007.
Reports on a study that "empirically evaluates the question of whether or not the promotion of democracy in the Middle East will reduce terrorism, both in terms of terrorist attacks sustained by Middle Eastern countries and in terms of attacks perpetrated by terrorist groups based in Middle Eastern countries."

Saudi Counter-Terrorism Arrests.  Jane's Terrorism & Security Monitor, pp 8-9, June 2007.
Reports on the investigation of the Saudi announcement that over 170 suspected militants have been arested.

Smith, Craig R.  Why Iran Holds Us over a Barrel.  Journal of Counterterrorism & Homeland Security International 13, no.2:6-8 Summer 2007.
Makes the point that Iran has the capability to disrupt or halt the flow of oil thru the Strait of Hormuz, and the U.S. has waited too late to do anything about this threat.

Takeyh, Ray.  Iran, Israel and the Politics of Terrorism.  Survival 48:83-96 Winter 2006.

Visser, Reidar.  Basra, the Reluctant Seat of "Shiastan."  Middle East Report 37:223-28 Spring 2007.

Voice of Jihad Returns.  Jane's Terrorism & Security Monitor, pp 11-12, March 2007.
The online Saudi jihadist publication Sawt al-Jihad (voice of jihad) has resumed publication.

Waxman, Dov.  Between Victory and Defeat:  Israel after the War with Hizballah.  Washington Quarterly 30:27-43 winter 2006-07.

You Call That a War?  National Review 58:17-18 September 11, 2006.
Argues that the attacks by Hezbollah against Israel represent a symbolic attack against the Western hegemony of the world.  Also debates that the 37 days of fighting showed the world that Israel does not have the necessary military capacity.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=22122046&site=ehost-live&custid=airuniv



Regional Issues:  United States

 

Books

Carroll, Stephen J.  Distribution of Losses from Large Terrorist Attacks under the Terrorism Risk Insurance Act.  Santa Monica, CA, Rand, Center for Terrorism Risk Management Policy, 2005.  116 p.
Also available online at:  http://www.rand.org/pubs/monographs/2005/RAND%5FMG427.pdf
Book call no.:  368.48 D614

Countering Urban Terrorism in Russia and the United States:  Proceedings of a Workshop, edited by Glenn E. Schweitzer and A. Chelsea Sharber.  Washington, National Academies Press, 2006.  241 p.
Book call no.:  363.32516 C8551

McCann, Joseph T.  Terrorism on American Soil:  A Concise History of Plots and Perpetrators from the Famous to the Forgotten.  Boulder, CO, Sentient Publications, 2006.  336 p.
Book call no.:  363.3250973 M122t

Medoff, Rafael.  Militant Zionism in America:  The Rise and Impact of the Jabotinsky Movement in the United States, 1926-1948.  Tuscaloosa, AL, University of Alabama Press, 2002.  290 p.
Book call no.:  320.54095694 M492m

National Science and Technology Council (U.S.).  Interagency Working Group on Cyber Security and Information Assurance.  Federal Plan for Cyber Security and Information Assurance Research and Development.  Arlington, VA, National Coordination Office for Networking and Information Technology Research and Development, 2006.  122 p.
Also available online at:  http://www.nitrd.gov/pubs/csia/csia_federal_plan.pdf
Book call no.:  005.8 N2771f


United States -- Periodicals

Ethiopia-Kenya-United United States:  Rendition Confusion.  Africa Confidential 48:10 April 13, 2007.
"The United States' War on Terror is catching many innocent people in its crossfire and hundreds of these are held incommunicado by the Ethiopian and Kenyan authorities on suspicion of terrorism."

Michael, George.  RAHOWA! A History of the World Church of the Creator.  Terrorism and Political Violence 18:561-583 Winter 2006.

Muslim Radicals Enlisting US Inmates.  Jane's Islamic Affairs Analyst, pp 14-16, January 2007.

Zichermann, Sandra.  SUV Advertising:  The Detroit Project.  Studies in Conflict & Terrorism 29:695-705 October-November 2006.


This page was last updated on 03/05/2014 10:56 AM

Back Arrow Return to Bibliography List

Back Arrow Return to Fairchild Research Information Center Homepage