TERRORISM AND THE UNITED STATES


March 2010

Compiled by Bibliography Branch
Muir S. Fairchild Research Information Center
Maxwell AFB, AL


Contents

The appearance of hyperlinks does not constitute endorsement by the U.S. Air Force of this web site or the information, products, or services contained therein.  For other than authorized activities such as military exchanges and morale, welfare and recreation sites, the U.S. Air Force does not exercise any editorial control over the information you may find at these locations.  Such links are provided consistent with the stated purpose of this DoD web site.

Some materials listed below require access to subscription databases.  If you cannot gain access, contact your local library for availability.  AU students and faculty can contact the Center's Web Maintainer for a password.

If a file does not open by clicking on the link, copy the link into your browser address bar.

All sites listed were last accessed on March 17, 2010.


General Information


Internet Resources

Federation of American Scientists.  Congressional Research Service Reports on Terrorism
Available online at:  http://www.fas.org/sgp/crs/terror/index.html

NEFA Foundation
Available online at:  http://www1.nefafoundation.org/index.html
Nine Eleven Finding Answers (NEFA) Foundation webpage includes publications, reports, multimedia, legal cases, and NEFA Series "Target: America" pertaining to past and current terrorist activities.

Terrorism 2008, compiled by Bibliography Branch.  Maxwell AFB, AL, Muir S. Fairchild Research Information Center, 2008.
Available online at:  http://www.au.af.mil/au/aul/bibs/terrorism08.htm

Terrorism:  Groups and Methods, compiled by Bibliography Branch.  Maxwell AFB, AL, Muir S. Fairchild Research Information Center, 2010.
Available online at:  http://www.au.af.mil/au/aul/bibs/terrorgroups2010.htm

Terrorism Research Initiative.  Perspectives on Terrorism:  A Journal of the Terrorism Research Initiative.
Available online at:  http://www.terrorismanalysts.com/pt/
Articles covering many aspects of terrorism, full text starting with v. 1, 2007.

U.S. Army War College.  Strategic Studies Institute of the US Army War College
Available online at:  http://www.StrategicStudiesInstitute.army.mil
Publishes security and strategic reports and publications covering terrorism.


Books

Anderson, Sean K. and Sloan, Stephen.  Historical Dictionary of Terrorism.  3rd ed.  Lanham, MD, Scarecrow Press, 2009.  800 p.
Book call no.:  R 303.62503 A594h 2009

Bobbitt, Philip.  Terror and Consent:  The Wars for the Twenty-First Century.  New York, Alfred A. Knopf, 2008.  672 p.
Divided into three parts:  1) The Idea of a War Against Terror, 2) Law and Strategy in the Domestic Theater of Terror, and 3) Strategy and Law in the International Theater of Terror.
Book call no.:  363.320973 B663t

Bolton, M. Kent.  U.S. National Security and Foreign Policymaking after 9/11:  Present at the Re-Creation.  Lanham, MD, Rowman & Littlefield Publishers, 2008.  433 p.
Discusses the Intelligence Reform and Terrorism Prevention Act (IRTPA) signed in December 2004.
Book call no.:  355.033073 B694u

The Canons of Jihad:  Terrorists' Strategy for Defeating America, edited by Jim Lacey.  Annapolis, MD, Naval Institute Press, 2008.  187 p.
Offers essays defining the jihad movement from the terrorist's perspective.
Book call no.:  363.325 C227

Center for American Progress.  Terrorism Index.  Washington, Center for American Progress, February 13, 2007.  8 p.
Nonscientific survey of experts in terrorism and foreign policy assessing how the United States is fighting the war on terror.
Also available online at:  http://www.americanprogress.org/issues/2007/08/terrorism_index.html
Book call no.:  973.931 T328 2nd index 2007 Feb

Democratic Responses to Terrorism, edited by Leonard Weinberg.  New York, Routledge, 2008.  180 p.
Book call no.:  363.32517 D383

Finlan, Alastair.  Special Forces, Strategy and the War on Terror:  Warfare by Other Means.  New York, Routledge, 2008.  184 p.
Covers theory, command and control, culture and technology, Operation Enduring Freedom, Operation Iraqi Freedom, and the future of special forces.
Book call no.:  363.325170973 F511s

Focus on Terrorism, edited by Edward V. Linden.  New York, Nova Science Publishers, 2002-.  7 vols.
New volumes published irregularly.
Book call no.:  363.320973 F652

Furedi, Frank.  Invitation to Terror:  The Expanding Empire of the Unknown.  New York, Continuum U.S., 2007.  203 p.
Author's examination of terrorism.
Book call no.:  363.325 F983i

Harmon, Christopher C.  Terrorism Today.  New York, Routledge, 2008.  231 p.
Offers chapters on:  Politics and Policies, Strategies of Terrorist Groups, Operations--Funding Terror, Technologies and Tactics, Counterterrorism, and How Terror Groups End.
Book call no.:  303.625 H288t 2008

Hill, Andrew.  Re-Imagining the War on Terror:  Seeing, Waiting, Traveling.  New York, Palgrave Macmillan, 2009.  173 p.   (New Security Challenges)
"Transcends disciplines and covers the processes that do not belong to any discreet academic discipline by raising new questions and ways of reimagining and reconceptualising the nature of this conflict."
Book call no.:  363.325 H645r

Jane's World Insurgency and Terrorism.  Alexandria, VA, Jane's, 2009.  695 p.
See section on United States Revolutionary Cells and Right Wing Militia Groups, pp 171-176.
Book call no.:  R 364.1 J33 iss.30 2009

Mahan, Sue and Griset, Pamala L.  Terrorism in Perspective.  Thousand Oaks, CA, Sage Publications, 2008.  425 p.
Book call no.:  303.625 G869t 2008

Martin, Gus.  Understanding Terrorism:  Challenges, Perspectives, and Issues.  Thousand Oaks, CA, Sage Publications, 2010.  540 p.
Book call no.:  303.625 M381u

Martinage, Robert C.  Global War on Terrorism:  An Assessment.  Washington, Center for Strategic and Budgetary Assessments, 2008.  280 p.
Covers Islamic radicalism, Salafi-Jihadi threat, Shi'a extremists, and regional assessments.
Also available online at:  http://www.csbaonline.org/4Publications/PubLibrary/R.20080223.The%5FGlobal%5FWar%5Fon%5F/R.20080223.The%5FGlobal%5FWar%5Fon%5F.pdf
Book call no.:  973.931 M383g

Morgan, Matthew J.  The American Military after 9/11:  Society, State, and Empire.  New York, Palgrave Macmillan, 2008.  211 p.
Book call no.:  322.50973 M849a

National Counterterrorism Center (U.S.).  Report on Terrorism 2008.  Washington, National Counterterrorism Center, 2009.  1 vol.
Statistical information reported to the Department of State as required by U.S. Code.
Also available online at:  http://wits.nctc.gov/Reports.do
Book call no.:  363.32512 N277r 2008

Peace Not Terror:  Leaders of the Antiwar Movement Speak Out Against U.S. Foreign Policy Post 9/11, edited by Mary Susannah Robbins.  Lanham, MD, Rowman & Littlefield, 2008.  260 p.
Compilation of essays by members of the peace movement on war, violence, terrorism, and military response to the events of 9/11.
Book call no.:  973.93 P355

Playing Politics with Terrorism:  A User's Guide, edited by George Kassimeris.  New York, Columbia University Press, 2008.  334 p.
Offers fourteen chapters by various authors.  These include case studies such as the Aldo Moro murder case, the case of Fujimori's Peru, the Madrid case, and Britain and the IRA.  Also offers chapters on the use and abuse of terror, Australia's counterterrorism law since 9/11, the terrorism industry, and terrorism and politics in the United States.
Book call no.:  363.325 P722

Redfield, Marc.  The Rhetoric of Terror:  Reflections on 9/11 and the War on Terror.  New York, Fordham University Press, 2009.  136 p.
Book call no.:  363.325 R315r

Rogers, Paul.  Why We're Losing the War on Terror.  Malden, MA, Polity, 2008.  177 p.
Book call no.:  363.320973 R728w

Rubin, Barry and Rubin, Judith Colp.  Chronologies of Modern Terrorism.  Armonk, NY, M.E. Sharpe, 2008.  405 p.
Book call no.:  363.3250202 R896c

Security and the War on Terror, edited by Alex J. Bellamy.  New York, Routledge, 2008.  235 p.
Book call no.:  909.831 S446

Spencer, Lynn.  Touching History:  The Untold Story of the Drama That Unfolded in the Skies over America on 9/11.  New York, Free Press, 2008.  309 p.
Book call no.:  973.931 S745t

United States.  Central Intelligence Agency.  Inspector General.  OIG Report on CIA Accountability with Respect to the 9/11 Attacks.  McLean, VA, Central Intelligence Agency, August 2007.  1 vol.
Book call no.:  353.170973 U584o

United States.  Congress.  House.  Implementing Recommendations of the 9/11 Commission Act of 2007.  Conference Report.  110th Congress, 1st session, July 25, 2007.  Washington, GPO, 2007.  406 p.  (Rept. 110-259)
Also available online at:  http://purl.access.gpo.gov/GPO/LPS85036
Book call no.:  363.32516 U581ia

United States.  Congress.  House.  Committee on Government Reform.  Subcommittee on National Security, Emerging Threats and International Relations - Committee on Reform.  Global War on Terrorism (GWOT):  Accuracy and Reliability of Cost Estimates.  Hearing.  109th Congress, 2nd session, July 18, 2006.  Washington, GPO, 2007.  213 p.  (Serial no. 109-232)
Also available online at:  http://purl.access.gpo.gov/GPO/LPS82386
Book call no.:  973.931 U584g

Van Engeland, Anisseh and Rudolph, Rachael M.  From Terrorism to Politics.  Burlington, VT, Ashgate, 2008.  217 p.  (Ethics and Global Politics)
Case studies examining important issues regarding the relationship between terrorism and political processes along with the terrorist-politician transition.
Book call no.:  322.42 E57f

'War on Terror':  The Oxford Amnesty Lectures 2006, edited by Chris Miller.  New York, Manchester University Press, 2009.  292 p.
Essays covering ethical, political, legal, economic, and historical perspectives of the 'War on Terror' (WOT) including human rights and international law.
Book call no.:  363.325 W253

Wolfe, Wojtek Mackiewicz.  Winning the War of Words:  Selling the War on Terror from Afghanistan to Iraq.  Westport, CT, Praeger Security International, 2008.  137 p.
Book call no.:  973.931 M158w


Document

United States.  Government Accountability Office.  Global War on Terrorism:  Reported Obligations for the Department of Defense.  Washington, U.S. GAO, 2009.  11 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS113410
Doc. call no.:  M-U 41026-173 no.09-449R


Document (Student Research)

Davis, Mike.  Who Cares about the Global War on Terror?  A Study of Compulsory Service and America's Attitude Toward War.  Maxwell AFB, AL, Air Command and Staff College, 2008.  31 p.
Also available online at:  https://www.afresearch.org
Doc. call no.:  M-U 43122 D2634w


Periodicals

Ganor, Boaz.  An Objective Definition of Terrorism:  As a Crucial Tool for a New International Counterterrorism Architecture.  Journal of Counterterrorism and Homeland Security International 14:18-20 Summer 2008.
Argues that terrorism still cannot be defined.

Jihadist Threat to West Undimmed.  Jane's Terrorism and Security Monitor, pp 2-4, January 2008.
Reports that Western intelligence agencies alerted the media to al-Qaida's use of the internet to spread its doctrine, and what it will mean for the future.

Kassel, Whitney.  Terrorism and the International Anarchist Movement of the Late Nineteenth and Early Twentieth Centuries.  Studies in Conflict and Terrorism 32:237-252 March 2009.
Argues the international anarchist movement of the late nineteenth and early twentieth centuries resembles modern nationalist and separatist terrorist groups in its approaches to violence and technology.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=36677707&site=ehost-live

Simon, Jeffrey D.  The Forgotten Terrorists:  Lessons from the History of Terrorism.  Terrorism and Political Violence 20:195-214 April-June 2008.
Examines the Galleanist, a militant Italian anarchist group which was active in the United States in the early twentieth century, includes lessons learned which may be useful understanding today's global terrorists.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0954%2d6553&volume=20&issue=2&spage=195


Counterinsurgency & Counterterrorism


Internet Resources

Combating Terrorism Center.  CTC Sentinel.  West Point, NY, Combating Terrorism Center, December 2007-current.
Available online at:  http://www.ctc.usma.edu/sentinel/
The CTC "Contributes relevant scholarly perspectives through education, research and policy analysis to combat terrorist threats to the U.S. It maintains expertise in four primary areas:  terrorism, counterterrorism, homeland security, and weapons of mass destruction"

Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism
Available online at:  http://www.preventwmd.gov/home/
Includes hearing testimonies, publications, events, and news.

Federal Bureau of Investigation.  Counterterrorism
Available online at:  http://www.fbi.gov/terrorinfo/counterrorism/waronterrorhome.htm
Information includes Protecting the U.S.; Taking Precautions; Major Cases; Most Wanted Terrorists; and other resources.

Frey, Brunos S. and Luechinger, Simon.  Three Strategies to Deal with Terrorism.  Economic Papers 27:107-114 June 2008.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=32123142&site=ehost-live

Gompert, David C. and Gordon, John.  War by Other Means:  Building Complete and Balanced Capabilities for Counterinsurgency.  Santa Monica, CA, RAND, 2008.  453 p.
Available online at:  http://handle.dtic.mil/100.2/ADA476612

National Counterterrorism Center (NCTC)
Available online at:  http://www.nctc.gov/
Serves as the primary organization in the U.S. Government for integrating and analyzing all intelligence pertaining to terrorism and counterterrorism.  Has links to a Worldwide Incidents Tracking System & FBI's Most Wanted Terrorists.

Tucker, David.  Terrorism, Networks, and Strategy:  Why the Conventional Wisdom Is Wrong.  Homeland Security Affairs 4, no. 2 June 2008.
Available online at:  http://www.hsaj.org/?article=4.2.5

Argues the need to understand the strengths and weaknesses of networks.

United Nations.  UN Action to Counter Terrorism
Available online at:  http://www.un.org/terrorism/
Tracks all UN actions related to terrorism and counterterrorism.

United States.  Department of State.  Office of the Coordinator for Counterterrorism.
Available online at:  http://www.state.gov/s/ct/
Mission is to forge partnerships with non-state actors, multilateral organizations, and foreign governments to advance the counterterrorism objectives and national security of the U.S.  Office serves as a primary coordinator for the Executive Branch in dealing with international terrorism.


Internet Resource (Student Research)

Pugh, Randolph G.  Refocusing Intelligence Support to Counterintelligence Operations.  Quantico, VA, Marine Corps Command and Staff College, 2008.  22 p.  (Thesis, Master of Military Studies).
Available online at:  http://handle.dtic.mil/100.2/ADA491196
 

Books

Anderson, Wesley J. L.  Disrupting Threat Finances:  Using Financial Information to Disrupt Terrorist Organizations.  Hurlburt Field, FL, Joint Special Operations University Press, 2008.  126 p.
Also available online at:  https://jsoupublic.socom.mil/publications/jsou/JSOU08-3andersonDisruptingThreatFinances_final.pdf
Book call no.:  363.3250681 A552d

Armed Groups:  Studies in National Security, Counterterrorism, and Counterinsurgency, edited by Jeffrey H. Norwitz.  Newport, RI, U.S. Naval War College, 2008.  475 p.
Book call no.:  355.0218 A728

Banks, William C. and others.  Combating Terrorism:  Strategies and Approaches.  Washington, CQ Press, 2008.  356 p.
Using an interdisciplinary approach describes strategies, policy options, and approaches the United States uses or could use to counter terrorism.
Book call no.:  363.3251560973 B218c

Berntsen, Gary.  Human Intelligence, Counterterrorism & National Leadership:  A Practical Guide.  Washington, Potomac Books, 2008.  136 p.
Book call no.:  327.1273 B531h

Burton, Fred.  Ghost:  Confessions of a Counterterrorism Agent.  New York, Random House, 2008.  276 p.
Authors' account of his career as a counterterrorism agent discussing how terrorists plot, stalk, and kill; and how counterterrorism agents try to bring these terrorists to justice.
Book call no.:  363.28 B974g

Byman, Daniel.  The Five Front War:  The Better Way to Fight Global Jihad.  Hoboken, NJ, John Wiley & Sons, 2008.  304 p.
Book call no.:  363.32517 B993f

Celeski, Joseph D.  Hunter-Killer Teams:  Attacking Enemy Safe Havens.  Hurlburt Field, FL, JSOU Press, 2010.  68 p.
Discusses the future of Special Operations Forces counterterrorism security operations finding, disrupting, and destroying the enemy.
Also available online at:  https://jsoupublic.socom.mil/publications/jsou/JSOU10-1celeskiH-K_final.pdf
Book call no.:  363.320973 C392h

Chau, Donovan C.  U.S. Counterterrorism in Sub-Saharan Africa:  Understanding Costs, Cultures, and Conflicts.  Carlisle, PA, Strategic Studies Institute, U.S. Army War College, September 2008.  73 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS101655
Book call no.:  303.6250967 C496u

Cordesman, Anthony H. and others.  Winning in Afghanistan:  Creating Effective Afghan Security Forces.  Washington, Center for Strategic and International Studies, 2009.  159 p.
Book call no.:  958.1047 C794w

Countering the Financing of Terrorism, edited by Thomas J. Biersteker and Sue E. Eckert.  New York, Routledge, 2008.  344 p.
Book call no.:  363.32517 C8553

Counterproliferation Program Review Committee.  Report on Activities and Programs for Countering Proliferation and NBC Terrorism:  Volume 1 Executive Summary.  Washington, Counterproliferation Program Review Committee, July 2009.  43 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA505260
Book call no.:  327.1740973 R425 2009 July

Cronin, Audrey Kurth.  Ending Terrorism:  Lessons for Defeating al-Qaeda.  New York, Routledge, 2008.  86 p.
Book call no.:  909.82 I61a no. 394

Davis, Lynn E. and Sisson, Melanie W.  A Strategic Planning Approach:  Defining Alternative Counterterrorism Strategies as an Illustration.  Santa Monica, CA, RAND, 2009.  31 p.
Also available online at:  http://www.rand.org/pubs/occasional_papers/OP242/
Book call no.:  363.32517 D262s

Dobrot, Laurence Andrew.  Global War on Terrorism:  A Religious War?  Carlisle, PA, Strategic Studies Institute, U.S. Army War College, November 2007.  19 p.
Also available online at:  http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB822.pdf
Book call no.:  363.32516 D634g

Don, Bruce W. and others.  Network Technologies for Networked Terrorists:  Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations.  Santa Monica, CA, RAND, 2007.  80 p.
Analyzes terrorist groups' use of advanced information and communication technologies in efforts to plan, coordinate, and command their operations; understanding their use of these newer technologies can be used by security forces in combating terrorism.
Also available online at: 
http://www.rand.org/pubs/technical_reports/2007/RAND_TR454.pdf
Book call no.:  363.3250285 N476

Donohue, Laura K.  The Cost of Counterterrorism:  Power, Politics, and Liberty.  New York, Cambridge University Press, 2008.  500 p.
Analysis and impacts of counterterrorism law in the United States and United Kingdom.
Book call no.:  343.7301 D687c

Drinkwine, Brian M.  The Serpent in Our Garden:  Al-Qaida and the Long War.  Carlisle, PA, Strategic Studies Institute, U.S. Army War College, 2009.  75 p.
Recommends new approaches for fighting the war on terror and Al-Qaida.
Also available online at:  http://strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=877
Book call no.:  320.557 D781s

English Richard.  Terrorism:  How to Respond.  New York, Oxford University Press, 2009.  178 p.
Discusses counterterrorism, the use of military intelligence not force, and learning to live with terrorism.
Book call no.:  363.325 E58t

Fishman, Brian.  Dysfunction and decline:  Lessons Learned from Inside Al Qa'ida in Iraq.  West Point, NY, U.S. Military Academy, Combating Terrorism Center, 2009.  30 p.
Also available online at:  http://www.ctc.usma.edu/harmony/pdf/DD_FINAL_FINAL.pdf
Book call no.:  363.32509567 F537d

Global Insurgency and the Future of Armed Conflict:  Debating Fourth-Generation Warfare, edited by Terry Terriff.  New York, Routledge, 2008.  303 p.
Book call no.:  355.0218 G562

Graham, Bob and others.  The World at Risk:  The Report of the Commission on the Prevention of WMD Proliferation and Terrorism.  New York, Vintage Books, 2008.  132 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS106135
Book call no.:  363.32537 C734w

International Institute for Strategic Studies.  Strategic Survey 2009:  The Annual Review of World Affairs.  London, Routledge, 2009.  402 p.
Countering Modern Terrorist Threats, pp 35-53.
Book call no.:  327 L8471s 2009

Jackson, Brian A. and Frelinger, Dave.  Understanding Why Terrorist Operations Succeed or Fail.  Monterey, CA, RAND, 2009.  29 p.
Also available online at:  http://www.rand.org/pubs/occasional_papers/OP257
Book call no.:  363.325 J12u

Jenkins, Brian Michael.  Terrorists Can Think Strategically:  Lessons Learned from the Mumbai Attacks.  Santa Monica, CA, RAND, 2009.  6 p.
Testimony presented before the Senate Homeland Security and Governmental Affairs Committees on January 28, 2009.
Also available online at:  http://handle.dtic.mil/100.2/ADA493674
Book call no.:  363.325101 J52t

Jihadists and Weapons of Mass Destruction, edited by Gary Ackerman and Jeremy Tamsett.  Boca Raton, FL, CRC Press, 2009.  489 p.
Covers jihadist ideology, strategy, psychology, tactics, capabilities; jihadist and specific weapons such as biological and chemical; discussion of countering or defending against this threat; concluding with future developments concerning jihadists and weapons of mass destruction.
Book call no.:  363.3253 J61

Johnson, Thomas A.  The War on Terrorism:  A Collision of Values, Strategies, and Societies.  Boca Raton, FL, CRC Press, 2009.  369 p.
Describes terrorist group methods and the roles and responsibilities of U.S. counterterrorism challenges.
Book call no.:  363.325 J69w

Jones, Seth G. and Libicki, Martin C.  How Terrorist Groups End:  Lessons for Countering al Qa'ida.  Santa Monica, CA, RAND, 2008.  225 p.
Also available online at:  http://www.rand.org/pubs/monographs/2008/RAND_MG741-1.pdf
Book call no.:  363.32516 J79h

Long, Austin.  Doctrine of Eternal Recurrence:  The U.S. Military and Counterinsurgency Doctrine, 1960-1970 and 2003-2006.  Santa Monica, CA, RAND, 2008.  34 p.
Compares COIN doctrine and operations in the 1960's to the more recent operations in Iraq and Afghanistan demonstrating the need for change and adaptation for current and future COIN operations.
Also available online at:  www.rand.org/pubs/occasional_papers/2008/RAND_OP200.pdf
Book call no.:  355.0218 L848d

Manwaring, Max G.  Insurgency, Terrorism, and Crime:  Shadows from the Past and Portents for the Future.  Norman, OK, University of Oklahoma Press, 2008.  290 p.
Using seven case studies analyzes the context, conduct, and outcome of irregular wars and applies proven methods of effective response.
Book call no.:  355.0213 M295i

Mayer, Jane.  The Dark Side:  The Inside Story of How the War on Terror Turned into a War on American Ideals.  New York, Doubleday, 2008.  392 p.
Provides an account of how immediately following September 11th, the "United States made terrible decisions in the pursuit of terrorists around the world - decisions that not only violated the Constitution, but also hampered the pursuit of Al Qaeda" -- Book jacket.
Book call no.:  973.931 M468d

Meisels, Tamar.  The Trouble with Terror:  Liberty, Security, and the Response to Terrorism.  New York, Cambridge University Press, 2008.  239 p.
Issues of terrorism from the definition to proposals for contending with and combating terrorism and addressing tensions between liberty and security.
Book call no.:  323.325 M515t

Montgomery, Evan Braden.  Nuclear Terrorism:  Assessing the Threat, Developing a Response.  Washington, Center for Strategic and Budgetary Assessments, 2009.  96 p.  (Strategy for the Long Haul)
Also available online at:  http://www.csbaonline.org/4Publications/PubLibrary/R.20090422.Nuclear_Terrorism/R.20090422.Nuclear_Terrorism.pdf
Book call no.:  355.0217 M787n

National Security Council.  National Strategy for Countering Biological Threats.  Washington, National Security Council, 2009.  23 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS117736
Book call no.:  358.380973 N277

Neumann, Ronald E.  The Other War:  Winning and Losing in Afghanistan.  Washington, Potomac Books, 2009.  243 p.
Discusses operations, tensions, and policies of the war in Afghanistan.
Book call no.:  958.1047 N492o

Orszag, Peter.  Estimated Costs of U.S. Operations in Iraq and Afghanistan and of Other Activities Related to the War on Terrorism.  CBO testimony before the Committee on the Budget, U.S. House of Representatives.  Washington, Congressional Budget Office, October 24, 2007.  14 p.
Book call no.:  973.931 O76e

Perry, Mark.  Talking to Terrorists:  Why America Must Engage with Its Enemies.  New York, Basic Books, 2010.  253 p.
Examines the fact that the United States has in the past and continues to have dialogue with terrorists demonstrating that such diplomacy with extremists is necessary in an effort to end terrorism.
Book call no.:  363.325 P464t

Perry, Walt L. and Gordon, John.  Analytic Support to Intelligence in Counterinsurgencies.  Santa Monica, CA, RAND, 2008.  57 p.
Also available online at:  http://www.rand.org/pubs/monographs/2008/RAND_MG682.pdf
Book call no.:  355.34320973 P465a

Plaw, Avery.  Targeting Terrorists:  A License to Kill?  Burlington, VT, Ashgate, 2008.  294 p.  (Ethics and Global Politics)
Examines the political history and ethics of targeted killing.
Book call no.:  363.32517 P721t

Poole, H. J.  Tequila Junction:  Fourth Generation Counterinsurgency.  Emerald Isle, NC, Posterity Press, 2008.  330 p.
Contains advanced counterinsurgency techniques.
Book call no.:  355.0218 P882t

Risk and the War on Terror, edited by Louise Amoore and Marieke de Goede.  New York, Routledge, 2008.  279 p.
Comprehensive and critical investigation of risk management and measurement as practices of governing in the contemporary war on terror.
Book call no.:  363.32512 R595

Sageman, Marc.  Leaderless Jihad:  Terror Networks in the Twenty-First Century.  Philadelphia, PA, University of Pennsylvania Press, 2008.  200 p.
Challenges conventional wisdom about terrorism, observing that the key to mounting an effective defense against future attacks is a thorough understanding of the networks that allow these new terrorists to proliferate.
Book call no.:  363.325 S129L

Sheehan, Michael A.  Crush the Cell:  How to Defeat Terrorism without Terrorizing Ourselves.  New York, Crown, 2008.  309 p.
A veteran special operations officer argues offensive operational intelligence, not defense alone is necessary to combat terrorism.
Book call no.:  363.32516 S541c

Social Science for Counterterrorism:  Putting the Pieces Together, edited by Paul K. Davis and Kim Cragin.  Santa Monica, CA, RAND, 2009.  486 p.
Survey of social-science literature relating to counterterrorism.
Book call no.:  303.625 S678

Special Operations Forces Interagency Counterterrorism Reference Manual.  Hurlburt Field, FL, Joint Special Operations University Press, 2009.  1 v.
Also available online at:  https://jsoupublic.socom.mil/publications/jsou/SOFIACTRefMan_Apr29.pdf
Book call no.:  363.32517 S741

Sunshine, Robert A.  Estimated Costs of U.S. Operations in Iraq and Afghanistan and of Other Activities Related to the War on Terrorism.  Washington, Congressional Budget Office, July 31, 2007.  16 p.
Book call no.:  973.931 S958e

Terrorism and Counterterrorism:  Understanding the New Security Environment - Readings and Interpretations, edited by Russell D. Howard and others.  Boston, McGraw Hill Higher Education, 2009.  674 p.
Book call no.:  363.325 T328 2009

Terrorism Issues:  Threat Assessment, Consequences and Prevention, edited by Albert W. Merkidze.  New York, Nova Science Publishers, 2007.  235 p.
Book call no.:  363.325 T32811

Treverton, Gregory F.  Intelligence for an Age of Terror.  New York, Cambridge University Press, 2009.  306 p.  (Crisis in World Politics)
Outlines both foreign and domestic challenges faced in gathering and analyzing intelligence information.
Book call no.:  363.325163 T812i

United States.  Congress.  House.  Committee on Armed Services.  Terrorism, Unconventional Threats and Capabilities Subcommittee.  Challenges for the Special Operations Command (SOCOM) Posed by the Global Terrorist Threat.  Hearing.  110th Congress, 1st session, February 14, 2007.  Washington, GPO, 2008.  120 p.  (H.A.S.C. no. 110-19)
Discussion of where and how al-Qaeda has spread; the critical role U.S. Special Forces play directly hitting al-Qaeda, and their work with local communities to prevent them from getting a foothold.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS100497
Book call no.:  363.325 U583c

United States.  Congress.  House.  Committee on Government Reform.  Subcommittee on National Security, Emerging Threats, and International Relations.  Combating Terrorism:  Lessons Learned from London.  Hearing.  109th Congress, 2nd session, September 19, 2006.  Washington, U.S. GPO, 2008.  114 p.  (Serial no. 109-259)
Book call no.:  363.2876 U581c

United States.  Congress.  Permanent Select Committee on Intelligence.  Assessing the Fight Against Al Qaeda.  Hearing.  110th Congress, 2nd session, April 9, 2008.  Washington, U.S. GPO, 2008.  124 p.
Hearing focusing on the threat from al Qaeda in Afghanistan and Pakistan.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS109818
Book call no.:  363.325 U583a

United States.  Department of State.  Bureau of Political-Military Affairs.  U.S. Government Counterinsurgency Guide.  Washington, United States Department of State, 2009.  60 p.
Also available online at:  http://www.dtic.mil/doctrine/new_pubs/jp3_24.pdf
Book call no.:  355.02180973 U581

United States.  Executive Office of the President.  National Strategy for Information Sharing:  Successes and Challenges in Improving Terrorism-Related Information Sharing.  Washington, Executive Office of the President, October 2007.  1 vol.
Also available online at:  http://handle.dtic.mil/100.2/ADA473664
Book call no.:  363.24 N277
 

Documents

Belasco, Amy.  The Cost of Iraq, Afghanistan and Other Global War on Terror Operations since 9/11.  Washington, Congressional Research Service, Library of Congress, September 28, 2009.  63 p.
Also available online at:  http://opencrs.com/document/RL33110/
Doc. call no.:  M-U 42953-1 no.RL33110

Best, Richard A.  The National Counterterrorism Center (NCTC)-Responsibilities and Potential Congressional Concerns.  Washington, Congressional Research Service, Library of Congress, January 15, 2010.  10 p.
Also available online at:  http://opencrs.com/document/R41022/
Doc. call no.:  M-U 42953-1 no.R41022

Dodaro, Gene L.  Combating Terrorism:  U.S. Efforts to Address the Terrorist Threat in Pakistan's Federally Administered Tribal Areas Require a Comprehensive Plan and Continued Oversight.  Washington, U.S. GAO, 2008.  19 p.
Testimony before the Subcommittee on Near Eastern and South and Central Asian Affairs, Committee on Foreign Relations, U.S.  Senate.
Also available online at:  http://www.gao.gov/new.items/d08820t.pdf
Doc. call no.:  M-U 41026-173 no.08-820T

Johnson, Charles Michael.  Combating Terrorism:  U.S. Oversight of Pakistan Reimbursement Claims for Coalition Support Funds.  Washington, U.S. GAO, 2008.  20 p.
Testimony before the Subcommittee on National Security and Foreign Affairs, Committee on Oversight and Government Reform, House of Representatives.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS96608
Doc. call no.:  M-U 41026-173 no.08-932T

O'Rourke, Ronald.  Navy Irregular Warfare and Counterterrorism Operations:  Background and Issues for Congress.  Washington, Congressional Research Service, Library of Congress, December 23, 2009.  24 p.
Also available online at:  http://opencrs.com/document/RS22373/
Doc. call no.:  M-U 42953-1 no.RS22373

Rollins, John.  Al Qaeda and Affiliates:  Historical Perspective, Global Presence, and Implications for U.S. Policy.  Washington, Congressional Research Service, Library of Congress, February 5, 2010.  29 p.
Also available online at:  http://opencrs.com/document/R41070/
Doc. call no.:  M-U 42953-1 no.RL41070

United States.  Department of the Army.  FM 3-24.2 Tactics in Counterinsurgency.  Washington, Headquarters Department of the Army, 2009.  1 vol.
Also available online at:  http://www.fas.org/irp/doddir/army/fm3-24-2.pdf
Doc. call no.:  M-U 35062-78 no.3024.2

United States.  Government Accountability Office.  Combating Terrorism:  Increased Oversight and Accountability Needed over Pakistan Reimbursement Claims for Coalition Support Funds.  Washington, U.S. GAO, 2008.  41 p.
Report to Congressional requestors.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS96610
Doc. call no.:  M-U 41026-173 no.08-806

United States.  Government Accountability Office.  Combating Terrorism:  The United States Lacks Comprehensive Plan to Destroy the Terrorist Threat and Close the Safe Haven in Pakistan's Federally Administered Tribal Areas.  Washington, U.S. GAO, 2008.  32 p.
Report to Congressional Requestors.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS93848
Doc. call no.:  M-U 41026-173 no.08-622

United States.  Joint Chiefs of Staff.  JP 3-24 Counterinsurgency Operations.  Washington, Joint Chiefs of Staff, 2009.  1 vol.
Also available online at:  http://www.dtic.mil/doctrine/new_pubs/jp3_24.pdf
Doc. call no.:  M-U 40592 no.3024
 

Documents (Student Research)

Anderson, Todd A.  The Role of Framing in Counterinsurgency/Counterterrorism Operations:  The Status of Hearts and Minds.  Monterey, CA, Naval Postgraduate School, 2008.  73 p.  (Thesis, M.A. in Security Studies)
Examines how terrorist and insurgent movements frame their actions, delineating how these groups communicate with their public and shape their information operations battlefield against the U.S. and Coalition Forces.
Also available online at:  http://handle.dtic.mil/100.2/ADA479662
Doc. call no.:  M-U 42525 A5512r

Deputy, Samuel N.  Counterinsurgency and Robots:  Will the Means Undermine the Ends?  Newport, RI, Naval War College, 2009.  24 p.
Discusses the use and impact of robotic systems in counterinsurgency operations.
Also available online at:  http://handle.dtic.mil/100.2/ADA503005
Doc. call no.:  M-U 41662 D425c

Greer, Andy J.  Negotiating with Pre-Terrorists:  Police Tactics with Gangs Applied to Current Operations in Iraq.  Maxwell AFB, AL, Air Command and Staff College, 2008.  30 p.
Also available online at:  https://www.afresearch.org
Doc. call no.:  M-U 43122 G8161n

Kozelka, Glenn E.  Boots on the Ground:  A Historical and Contemporary Analysis of Force Levels for Counterinsurgency Operations.  Fort Leavenworth, KS, School of Advanced Military Studies, Army Command and General Staff College, 2009.  81 p.
Using case studies examines force levels needed for counterinsurgency (COIN) operations.
Also available online at:  http://handle.dtic.mil/100.2/ADA505239
Doc. call no.:  M-U 42022-2 K881b

Lee, Michael J.  Global Counterinsurgency:  A Way Out of the Global War on Terrorism Quagmire?  Fort Leavenworth, KS, School of Advanced Military Studies, Army Command and General Staff College, 2008.  61 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA485700
Doc. call no.:  M-U 42022-2 L4791g

Miller, Mark D.  Feeding the Peasant:  The Impact of Economics on Modern Insurgencies.  Fort Leavenworth, KS, School of Advanced Military Studies, Army Command and General Staff College, 2008.  45 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA499699
Doc. call no.:  M-U 42022-2 M6491f

Miranda, Robert.  Suggestions for Improving the Recruitment of Al-Qaeda Sources:  Lessons Derived from Counter-Ideological Programs and the Targeting of Type B Terrorists.  Monterey, CA, Naval Postgraduate School, 2009.  129 p.
Using case studies to determine the type of individuals, argues recruiting a certain type of individual should be more beneficial to use as sources within al-Qaeda.
Also available online at:  http://handle.dtic.mil/100.2/ADA497200
Doc. call no.:  M-U 42525 M6721s

Sutten, Marne L.  The Rising Importance of Women in Terrorism and the Need to Reform Counterterrorism Strategy.  Fort Leavenworth, KS, School of Advanced Military Studies, Army Command and General Staff College, 2009.  54 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA506225
Doc. call no.:  M-U 42022-2 S9671r

Uribe, Rick.  Defeating Al-Qa'ida's Global Insurgency.  Carlisle Barracks, PA, U.S. Army War College, 2009.  34 p.
Doc. call no.:  M-U 39080-537 U76d
 

Periodicals

Al-Qaeda Contained.  Jane's Terrorism and Security Monitor, pp 14-17, July 2008.
Discusses Al-Qaeda defeats and setbacks.

Al-Qaeda VS Predator.  Jane's Terrorism and Security Monitor, pp 6-9, January 2009.
"A number of senior Al-Qaeda figures have been killed in 2008, particularly in U.S. air strikes, examines the repercussions of this - both for the group and its enemies."

AQI's Last Stronghold.  Jane's Terrorism and Security Monitor, pp 6-9, February 2009.
Discusses United States and Iraqi forces successes against Al-Qaeda in Iraq in the northern province of Ninawa.

Binnie, Jeremy.  War on Terrorism Shifts Focus.  Jane's Terrorism and Security Monitor, p 1, January 2008.
Reports that Sunni Arab leaders in Iraq are beginning to see the U.S. as an ally.

Blatt, John J.  Taming the Tagab Valley:  Planning and Executing a Full Spectrum Operation in the Afghan Theater.  Special Warfare 20:18-27 July-August 2007.

Boyle, Michael J.  The War on Terror in American Grand Strategy.  International Affairs 94:191-209 March 2008.
Discusses U.S. foreign policy choices and cooperation in the war on terror.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=30068849&site=ehost-live&custid=airuniv

Brown, James B.  Detention Operations, Behavior Modification, and Counterinsurgency.  Military Review 89:40-47 May-June 2009.
Discusses detention facility operations as a part of U.S. overall counterinsurgency strategy.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=43247728&site=ehost-live&custid=airuniv

Christia, Fotini and Semple, Michael.  Flipping the Taliban:  How to Win in Afghanistan.  Foreign Affairs 88:34-45 July-August 2009.
Discusses the U.S. war in Afghanistan with suggestions for peace in the region.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=42117547&site=ehost-live&custid=airuniv

Cragin, Kim.  Al Qaeda Confronts Hamas:  Divisions in the Sunni Jihadist Movement and Its Implications for U.S. Policy.  Studies in Conflict and Terrorism 32:576-590 July 2009.
Discusses the importance to the U.S. counterterrorism strategy of examining the different historical trajectories and current arguments between the two most well-known Sunni jihadists:  Al Qaeda and Hamas.
Also available online at: 
http://www.informaworld.com/openurl?genre=article&issn=1057-610X&volume=32&issue=7&spage=576

Falk, Sayce W.  Teamwork in Counterinsurgency:  Why the Departments of State and Defense Need Each Other to Succeed.  Marine Corps Gazette 92:47-49 August 2008.
Also available online at:  http://proquest.umi.com/pqdlink?did=1525806251&sid=2&Fmt=4&clientId=417&RQT=309&VName=PQD

Gewirtz, David.  Using Online Social Networks in Counterterrorism and Law Enforcement.  Journal of Counterterrorism and Homeland Security International 15:8-10 Fall 2009.
Explores using online social networks such as Facebook and Twitter for counterterrorism and homeland security purposes.

Gregg, Heather S.  Fighting Cosmic Warriors:  Lessons from the First Seven Years of the Global War on Terror.  Studies in Conflict and Terrorism 32:188-208 March 2009.
Focuses on Al Qaeda's ideology with emphasis on its religious underpinnings, arguing that a successful strategy for fighting this ideology requires actions aimed to delegitimize Al Qaeda's theological message.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=36677709&site=ehost-live

Hafez, Mohammed M.  Jihad after Iraq:  Lessons from the Arab Afghans.  Studies in Conflict and Terrorism 32:73-94 February 2009.
Discusses the dispersal of Iraq's al-Qaeda fighters around the world with recommendations for counterterrorism measures.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=36161137&site=ehost-live

Haines, David R.  COIN in the Real World.  Parameters 38:43-59 Winter 2008-09.
Discusses counterinsurgency (COIN) strategies.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=36911706&site=ehost-live&custid=airuniv

Halafoff, Anna and Wright-Neville, David.  A Missing Peace?  The Role of Religious Actors in Countering Terrorism.  Studies in Conflict and Terrorism 32:921-932 November 2009.
http://www.informaworld.com/openurl?genre=article&issn=1057-610X&volume=32&issue=11&spage=921

Hoffman, Bruce.  A Counterterrorism Strategy for the Obama Administration.  Terrorism and Political Violence 21:359-377 July-September 2009.
"Assesses the scope and nature of the current terrorist threat to the United States and suggests a strategy to counter it." - Abstract
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0954%2d6553&volume=21&issue=3&spage=359

Hughbank, Richard J.  Understanding the Al-Qaeda Organization:  What Every Law Enforcement and Security Professional Should Know about Terrorism.  Journal of Counterterrorism and Homeland Security International 14:22-25 Summer 2008.
Argues that law enforcement and security personnel need to understand the motivation and willingness of terrorists to become martyrs to effectively identify and defeat the next terrorist.

Innes, Michael A.  Deconstructing Political Orthodoxies on Insurgent and Terrorist Sanctuaries.  Studies in Conflict and Terrorism 31:251-267 March 2008.
Explores the tactic of denying sanctuary or safe havens to terrorists explaining that sanctuary is complex and consists of material, human, and cognitive dimensions.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=30009279&site=ehost-live

Is Barack Obama Tough Enough?  Economist 394:40 February 27, 2010.
Opinions on President Obama's national security and terrorism prevention policies.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=48348256&site=ehost-live

Kraft, Michael B.  Helping Other Countries Counter Terrorism.  Journal of Counterterrorism and Homeland Security International 14:30-34 Summer 2008.

Lewis, Julian.  Double-I, Double-N:  A Framework for Counter-Insurgency.  RUSI Journal 153:36-40 February 2008.
"Examines techniques being used by Muslim insurgents against Western civilization."
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=33299280&site=ehost-live&custid=airuniv

Long, Austin.  The Anbar Awakening.  Survival 50:67-94 Summer 2008.
"The United States and it allies in Iraq use a tribal strategy to provide security and fight al-Qaeda in Mesopotamia.  Saddam Hussein also sought to use tribal alliances to provide internal security.  His experience, and that of the present-day Coalition, demonstrates the prospects and perils of using tribes to provide security." - Abstract
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0039-6338&volume=50&issue=2&spage=67

Lubin, Andrew.  Booster Shot:  The U.S. Increases Its Forces in Afghanistan.  Jane's Intelligence Review 21:26-29 July 2009.
Assesses increased troop levels and changing military leadership on insurgents and stability of Afghanistan.

Maddrell, Paul.  Failing Intelligence:  U.S. Intelligence in the Age of Transnational Threats.  International Journal of Intelligence and CounterIntelligence 22:195-220 Summer 2009.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0885%2d0607&volume=22&issue=2&spage=195

Magouirk, Justin.  Connecting Terrorist Networks.  Studies in Conflict and Terrorism 31:1-16 January 2008.
Explains the findings of the Global Transnational Terrorism (GTT) Project.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=28111310&site=ehost-live

Maller, Tara.  The Dangers of Diplomatic Disengagement in Counterterrorism.  Studies in Conflict and Terrorism 32:511-536 June 2009.
"Assesses diplomatic sanctions in U.S. counterterrorism efforts arguing that diplomatic disengagement runs the danger of being more costly than beneficial.  Discusses general benefits to diplomatic engagement and recommendations to enhance the role of diplomacy in both counterterrorism and non-proliferation foreign policies." - Abstract
Also available online at:   http://www.informaworld.com/openurl?genre=article&issn=1057-610X&volume=32&issue=6&spage=511

Nax, Heinrich Harald.  Modeling Hostage-Taking:  On Reputation and Strategic Rationality of Terrorists.  Studies in Conflict and Terrorism 31:158-168 February 2008.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=29411125&site=ehost-live

Pakistani Taliban Alliance.  Jane's Terrorism and Security Monitor, pp 10-12, April 2009.
"Rival Pakistani Taliban factions have formed a new group to lead the fight against the U.S. in Afghanistan."

Pelto, Carey.  The Oncology of Jihad:  A Medical Perspective on Counter-Terrorism Strategy.  Journal of Counterterrorism and Homeland Security International 14:26-29 Winter 2008.
Explores the semantic similarities between medicine and terrorism, lessons learned from fighting cancer could be applied to fighting terrorism.

Perry, Walter L.  Analytic Support to Intelligence in Counterinsurgencies.  Special Warfare 21:12-17 September-October 2008.
Also available online at:  http://proquest.umi.com/pqdlink?did=1564068171&sid=1&Fmt=3&clientId=417&RQT=309&VName=PQD

Peters, Katherine McIntire.  Following the Money:  Understanding How Terrorists Finance Their Operations Is Key to Predicting and Thwarting Attacks.  Government Executive 40:28-38 June 2008.

Reed, Dane T.  Fighting the Battle of the Air-Waves:  An Analysis of the Role of Mass Media in the War on Terror.  Journal of Counterterrorism and Homeland Security International 14:14-20 Spring 2008.
Discusses terrorist strategies using television media and argues the U.S. should reform their current policies of communicating with the moderate Muslim community.

Reed, Donald J.  Beyond the War on Terror:  Into the Fifth Generation of War and Conflict.  Studies in Conflict and Terrorism 31:684-722 August 2008.
Discusses U.S. strategies for future conflicts.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=33372276&site=ehost-live

Renfer, Marc A. and Haas, Henriette S.  Systematic Analysis in Counterterrorism:  Messages on an Islamist Internet-Forum.  International Journal of Intelligence and CounterIntelligence 21:314-336 Summer 2008.
Also available online at:  http://www.informaworld.com/smpp/section?content=a791090255&fulltext=713240928

Reyes, Jersey Y.  Sustaining COIN:  Capabilities Requirements to Support Operations.  Marine Corps Gazette 93:28-32 February 2009.
Also available online at:  http://proquest.umi.com/pqdlink?did=1637641131&sid=3&Fmt=4&clientId=417&RQT=309&VName=PQD

Rogers, Paul.  Reconsidering the War on Terror:  Based on a Paper Delivered at the RUSI Air Power Conference, May 2007.  RUSI Journal 152:32-35 August 2007.
Discusses the war on terror, the U.S. in Iraq and Afghanistan, and international changes in policy, intelligence, and counterterrorism tactics.

Siebeneck, Laura K. and others.  Spatial and Temporal Analyses of Terrorist Incidents in Iraq, 2004-2006.  Studies in Conflict and Terrorism 32:591-610 July 2009.
Focuses on terrorist incidents in Iraq, both successful and unsuccessful, detecting patterns in the establishment of terrorist activity spaces to better understand the current spatial and temporal patterns as well as predicting future trends.
Also available online at:  
http://www.informaworld.com/openurl?genre=article&issn=1057-610X&volume=32&issue=7&spage=591

Silke, Andrew.  Target Hardening & Terrorism:  Challenges & Risks.  Journal of Counterterrorism and Homeland Security International 14:26-28 Summer 2008.
Discusses measures to prevent terrorist activities.

Stevens, Tim.  Regulating the 'Dark Web':  How a Two-Fold Approach Can Tackle Peer-to-Peer Radicalisation.  RUSI Journal 154:28-33 April 2009.
Argues that adopting a social approach of educating and empowering online Internet communities could be more successful than regulations in deterring recruits to global jihad.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=39253806&site=ehost-live&custid=airuniv

Stivi, Alon.  Training Counterterrorism Responders:  Progressive Violent Intrusions Intervention.  Journal of Counterterrorism and Homeland Security International 13:46-49 Autumn 2007.

Stout, Mark.  In Search of Salafi Jihadist Strategic Thought:  Mining the Words of the Terrorists.  Studies in Conflict and Terrorism 32:876-892 October 2009.
Discusses the existence of written works by intellectual members of Al Qaeda and its affiliates and how these documents are important to the United States and the study of terrorist groups.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=1057%2d610X&volume=32&issue=10&spage=876

Tellis, Ashley J.  Pakistan's Record on Terrorism:  Conflicted Goals, Compromised Performance.  Washington Quarterly 31:7-32 Spring 2008.
Discusses dissatisfaction in the U.S. about Pakistani performance in counterterrorism with recommendations and U.S. policy options.

Terry, James P.  Terrorist Violence in the New Millennium:  New Legal Solutions for an Old Nemesis.  JFQ:  Joint Force Quarterly No. 51:137-144 October 2008.
Discusses future threats against the U.S. government and President Bush's National Security Strategies.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=34410318&site=ehost-live&custid=airuniv

Vinci, Anthony.  Becoming the Enemy:  Convergence in the American and Al Qaeda Ways of Warfare.  Journal of Strategic Studies 31:69-88 February 2008.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0140%2d2390&volume=31&issue=1&spage=69

Walker, Lydia.  Forging a Key, Turning a Lock:  Counterinsurgency Theory in Iraq 2006-2008.  Studies in Conflict and Terrorism 32:909-918 October 2009.
Discusses Counterinsurgency (COIN) in Iraq, its changing roles including nation-building.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=1057%2d610X&volume=32&issue=10&spage=909

Wasfy, Ayman.  How to Destroy Al-Qaeda.  Journal of Counterterrorism and Homeland Security International 15:26-30 Fall 2009.
Examines the meanings of Arabic words and ideology of the Quran, useful information because we need to "know thy enemy".

White, Stanley I.  The Art of Elicitation.  Journal of Counterterrorism and Homeland Security International 15:50-53 Spring 2009.
Obtaining intelligence from a party without their knowing can be useful in counterterrorism.

Withington, Thomas and Jennings, Gareth.  Counterinsurgency Requirements Could See the Return of Turboprops to Combat.  Jane's International Defence Review 41:47-48 October 2008.
Discusses the advantages turboprops offer in counterinsurgency operations.


Homeland Security


Internet Resources

Bach, Robert.  A Social Infrastructure for Hometown Security:  Advancing the Hometown Security Paradigm.  Homeland Security Affairs 5, no. 2  May 2009.
Available online at:  http://www.hsaj.org/?article=5.2.2

Discusses a social infrastructure that will help make Americans participate more in their own preparedness.

Bellavita, Christopher.  Changing Homeland Security:  What Is Homeland Security?  Homeland Security Affairs 4, no. 2  June 2008.
Available online at:  http://www.hsaj.org/?article=4.2.1
Discusses the definition of homeland security and its evolution.

Cam, Marie-Anne.  The Impact of Terrorism on United States Industries.   Economic Papers 27:115-134, June 2008.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=32123143&site=ehost-live&custid=airuniv
Research results show that industries react unevenly to terrorism attacks.

Caudle, Sharon.  The Balanced Scorecard:  A Strategic Tool for Implementing Homeland Security Strategies.  Homeland Security Affairs 4, no. 3  October 2008.
Available online at:  http://www.hsaj.org/?article=4.3.2

Clovis, Samuel.  Promises Unfulfilled:  The Suboptimization of Homeland Security National Preparedness.  Homeland Security Affairs 4, no. 3  October 2008.
Available online at:  http://www.hsaj.org/?article=4.3.3

Argues the policy failures of homeland security national preparedness.

Combating Terrorism Center.  CTC Sentinel.  West Point, NY, Combating Terrorism Center, December 2007-December 2009.
Available online at:  http://www.ctc.usma.edu/sentinel/
The CTC "Contributes relevant scholarly perspectives through education, research and policy analysis to combat terrorist threats to the U.S.  It maintains expertise in four primary areas:  terrorism, counterterrorism, homeland security, and weapons of mass destruction"

Department of Health and Human Services.  Centers for Disease Control and Prevention.  Public Health Preparedness:  Strengthening CDC's Emergency Response - A CDC Report on Terrorism Preparedness and Emergency Response (TPER)-Funded Activities
Available online at:  http://emergency.cdc.gov/publications/jan09phprep/pdf/jan09phprep-508.pdf

Fainberg, Anthony.  The Terrorist Threat to Inbound U.S. Passenger Flights:  Inadequate Government Response.  Homeland Security Affairs 5, no. 1 January 2009.
Available online at:  http://www.hsaj.org/?article=5.1.5

Argues standards for inbound flights should match those applied to domestic flights.

Harney, Robert.  Inaccurate Prediction of Nuclear Weapons Effects and Possible Adverse Influences on Nuclear Terrorism Preparedness.  Homeland Security Affairs 5, no. 3 September 2009.
Available online at:  http://www.hsaj.org/?article=5.3.3
"Argues that the traditional nuclear weapons effects analyses dramatically overestimate the damage that a terrorist nuclear weapon is likely to produce in a metropolitan area."

Jackson, Brian.  Technology Strategies for Homeland Security:  Adaptation and Coevolution of Offense and Defense.  Homeland Security Affairs 5, no. 1  January 2009.
Available online at:  http://www.hsaj.org/?article=5.1.4

Argues homeland security should employ a defense against terrorists by understanding their technology and tactics change along with the defenses against them.

Naval Postgraduate School.  Center for Contemporary Conflict (CCC)
Available online at:  http://www.ccc.nps.navy.mil/
Analyzes current and emerging threats to U.S. national security.

RAND Terrorism and Homeland Security.
Available online at:  http://www.rand.org/research_areas/terrorism/
Provides documents, programs, reports, and news.

United States.  Department of Homeland Security.  Counterterrorism
Available online at:  http://www.dhs.gov/files/counterterrorism.shtm
Includes information on current counterterrorism efforts, daily open source infrastructure reports, activities and programs, aviation security, cybersecurity, protecting infrastructure, laws and regulations, and links to other resources.


Internet Resource (Student Research)

Clarke, William M.  Rethinking the REAL ID Act and National Identification Cards as a Counterterrorism Tool.  Monterey, CA, Naval Postgraduate School, 2009.  97 p.
Available online at:  http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec_Clarke.pdf

Truhlar, Steve.  Implementing Recommendations of the 9/11 Commission Act:  Coast Guard Impact.  Carlisle Barracks, PA, U.S. Army War College, 2008.  24 p.
Available online at:  http://handle.dtic.mil/100.2/ADA479088
 

Books

Adams, Bianka J. and Harahan, Joseph P.  Responding to War, Terrorism, and WMD Proliferation:  History of DTRA, 1998-2008.  Fort Belvoir, VA, U.S. Department of Defense, Defense Threat Reduction Agency, 2008.  152 p.
History of the Defense Threat Reduction Agency (DTRA) explaining why the Secretary of Defense established a new defense agency to counter a new threat to the nation: international terrorist groups with the capacity to acquire and use weapons of mass destruction.
Book call no.:  358.30973 A211r

Are We Prepared?  Four WMD Crises That Could Transform U.S. Security, by the Center for the Study of Weapons of Mass Destruction.  Washington, National Defense University, 2009.  147 p.
Describes four weapons of mass destruction scenarios that could occur which the United States is under prepared.
Also available online at:  http://www.ndu.edu/WMDCenter/docUploaded/Are%20We%20Prepared.pdf
Book call no.:  358.30973 A678

Collins, Pamela A. and Baggett, Ryan K.  Homeland Security and Critical Infrastructure Protection.  Westport, CT, Praeger Security International, 2009.  267 p.
Book call no.:  363.340973 C712h

Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism.  The Clock Is Ticking:  A Progress Report on America's Preparedness to Prevent Weapons of Mass Destruction Proliferation and Terrorism.  Washington, Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism, 2009.  27 p.
Also available online at:  http://www.preventwmd.gov/static/docs/report/WMDRpt10-20Final.pdf
Book call no.:  363.32537 C734c

Defending the Homeland:  Historical Perspectives on Radicalism, Terrorism, and State Responses, edited by Melinda M. Hicks and C. Belmont Keeney.  Morgantown, WV, West Virginia University Press, 2007.  233 p.
Book call no.:  303.625 D313

Dyson, William E.  Terrorism:  An Investigator's Handbook.  Newark, NJ, Matthew Bender & Company, 2008.  519 p.
Focuses on U.S. domestic terrorism exploring the development of terrorism as a concept and why the problem is growing.
Book call no.:  363.259 D998t

The Economic Impacts of Terrorist Attacks, edited by Harry W. Richardson and others.  Northampton, MA, Edward Elgar Publishing, 2007.  315 p.
Book call no.:  338.4 E192 2007

Evaluating Novel Threats to the Homeland:  Unmanned Aerial Vehicles and Cruise Missiles, by Brian A. Jackson and others.  Santa Monica, CA, RAND, 2008.  106 p.
Also available online at:  http://www.rand.org/pubs/monographs/2008/RAND_MG626.pdf
Book call no.:  363.325 E92

Mayer, Matt A.  Homeland Security and Federalism:  Protecting America from Outside the Beltway.  Santa Barbara, CA, ABC-CLIO, 2009.  214 p.
Author provides a federalist strategy to deal with homeland security, transferring power from Washington to local and state governments.
Book call no.:  363.350973 M468h

McEntire, David A.  Introduction to Homeland Security:  Understanding Terrorism with an Emergency Management Perspective.  Hoboken, NJ, John Wiley & Sons, 2009.  336 p.
Book call no.:  363.32517 M141i

Merolla, Jennifer L. and Zechmeister, Elizabeth J.  Democracy at Risk:  How Terrorist Threats Affect the Public.  Chicago, University of Chicago Press, 2009.  262 p.
Book call no.:  363.32512 M567d

Pastor, James F.  Terrorism and Public Safety Policing:  Implications for the Obama Presidency.  Boca Raton, FL, CRC Press, 2010.  458 p.
Book call no.:  363.325 P293t

Public Response to Terrorism:  Findings from the National Survey of Disaster Experiences and Preparedness, prepared by Megumi Kano and others.  Los Angeles, Regents of the University of California, 2008.  100 p.
"Findings of a national survey (includes survey questionnaire) supported by the U.S. Department of Homeland Security through the National Consortium for the Study of Terrorism and Responses to Terrorism (START) conducted to study people's experiences with, preparedness and mitigation actions for, and perceptions related to terrorism and other disasters." - Executive Summary
Also available online at:  http://www.ph.ucla.edu/sciprc/pdf/NC+START+Descriptive+Report.pdf
Book call no.:  363.340973 P976

Ridge, Tom with Bloom, Lary.  The Test of Our Times:  America under Siege...and How We Can Be Safe Again.  New York, St. Martin's Press, 2009.  288 p.
Memoir by Tom Ridge, the first secretary of Homeland Security.  He recalls the creation of the Department of Homeland Security and some recommendations for his successors.
Book call no.:  363.325170973 R544t

Terrorism and Homeland Security:  Thinking Strategically about Policy, edited by Paul R. Viotti and others.  Boca Raton, FL, CRC Press, 2008.  325 p.
Book call no.:  363.32515610973 T328

United States.  Congress.  House.  Committee on Armed Services.  Border Security - Mission of the National Guard.  Hearing.  109th Congress, 2nd session, May 24, 2006.  Washington, GPO, 2007.  64 p.  (H.A.S.C. no. 109-108)
Book call no.:  363.2850973 U58ba

United States.  Congress.  House.  Committee on Homeland Security.  Chemical Facility Anti-Terrorism Act of 2008.  Report.  110th Congress, 2nd session, March 14, 2008.  Washington, GPO, 2008.  66 p.  (Rept. 110-550 pt. 1)
Also available online at:  http://purl.access.gpo.gov/GPO/LPS92605
Book call no.:  363.325966 U581c 2008

United States.  Congress.  House.  Committees on Homeland Security and Foreign Affairs.  Wasted Lessons of 9/11:  How the Bush Administration Has Ignored the Law and Squandered Its Opportunities to Make Our Country Safe.  Washington, GPO, September 2008.  52 p.
Also available online at:  http://homeland.house.gov/SiteDocuments/HR1AnniversaryReport.pdf
Book call no.:  973.931 U584w

United States.  Office of the Director of National Intelligence.  Terrorist Threat to the US Homeland.  Washington, National Intelligence Council, 2007.  6 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA470324
Book call no.:  363.325 U581t
 

Documents

Copeland, Claudia.  Terrorism and Security Issues Facing the Water Infrastructure Sector.  Washington, Congressional Research Service, Library of Congress, May 26, 2009.  17 p.
Also available online at:  http://opencrs.com/document/RL32189/
Doc. call no.:  M-U 42953-1 no.RL32189

Garcia, Michael John and Wasem, Ruth Ellen.  Immigration:  Terrorist Grounds for Exclusion and Removal of Aliens.  Washington, Congressional Research Service, Library of Congress, January 12, 2010.  21 p.
Also available online at:  http://opencrs.com/document/RL32564/
Doc. call no.:  M-U 42953-1 no.RL32564

Randol, Mark A.  Terrorism Information Sharing and the Nationwide Suspicious Activity Report Initiative:  Background and Issues for Congress.  Washington, Congressional Research Service, Library of Congress, November 5, 2009.  23 p.
Also available online at:  http://opencrs.com/document/R40901/
Doc. call no.:  M-U 42953-1 no.R40901

Seifert, Jeffrey W.  Data Mining and Homeland Security:  An Overview.  Washington, Congressional Research Service, Library of Congress, August 27, 2008.  38 p.
Also available online at:  http://opencrs.com/document/RL31798/
Doc. call no.:  M-U 42953-1 no.RL31798

Stana, Richard M.  Border Security:  Despite Progress, Weaknesses in Traveler Inspections Exist at Our Nation's Ports of Entry:  Testimony Before the Committee on Homeland Security, House of Representatives.  Washington, U.S. GAO, 2008.  13 p.
Also available online at:  http://www.gao.gov/new.items/d08329t.pdf
Doc. call no.:  M-U 41026-173 no.08-329T

United States. Government Accountability Office.  Securing Wastewater Facilities:  Costs of Vulnerability Assessments, Risk Management Plans, and Alternative Disinfection Methods Vary Widely.  Washington, U.S. GAO, 2007.  25 p.
Also available online at:  http://www.gao.gov/new.items/d07480.pdf
Doc. call no.:  M-U 41026-173 no.07-480
 

Documents (Student Research)

Covert, Anthony J.  Water:  Vital to Life, Vulnerable to Terrorism.  Maxwell AFB, AL, Air Command and Staff College, 2008.  34 p.
Discusses the vulnerabilities of the United States' water supply and infrastructure.
Also available online at:  https://www.afresearch.org
Doc. call no.:  M-U 43122 C873w

Each, Kevin D.  Securing Nuclear and Radiological Material in the Homeland.  Monterey, CA, Naval Postgraduate School, 2007.  83 p.  (Thesis, M.S. in Security Studies)
Also available online at:  http://handle.dtic.mil/100.2/ADA467101
Doc. call no.:  M-U 42525 E11s

Hill, Brian Patrick.  Maritime Terrorism and the Small Boat Attack Threat to the United States.  Monterey, CA, Naval Postgraduate School, 2009.  125 p.  (Thesis, M.A. in Security Studies)
Also available online at:  http://handle.dtic.mil/100.2/ADA496821
Doc. call no.:  M-U 42525 H645m

Maples, L. D. M.  Terrorism 101:  Knowledge about the "What and Why" of Terrorism as a State and Local Law Enforcement Competency.  Monterey, CA, Naval Postgraduate School, 2008.  81 p.  (Thesis, M.A. in Security Studies)
Assesses current terrorism training for state and local law enforcement officials.
Also available online at:  http://handle.dtic.mil/100.2/ADA488714
Doc. call no.:  M-U 42525 M297t

Perry, Donnie.  Protecting Small Communities Through Domestic Policing:  Adopting an Information Analysis System to Recognize Potential Terrorist Activity.  Monterey, CA, Naval Postgraduate School, 2009.  79 p.  (Thesis, M.A. in Security Studies)
"Examines the challenge small communities have in combating threats of terrorism through shared intelligence."
Also available online at:  http://handle.dtic.mil/100.2/ADA509963
Doc. call no.:  M-U 42525 P4622p

Peterson, Kelsey C.  Attacking the U.S. Port System:  A Terrorist's Perspective.  Monterey, CA, Naval Postgraduate School, 2009.  104 p.  (Thesis, M.S. in Defense Analysis)
Doc. call no.:  M-U 42525 P4857a

Squires, Keith D.  Critical Accountability:  Preventing and Interdicting Terrorist Activity in the U.S. by Effectively Utilizing State and Local Law Enforcement.  Monterey, CA, Naval Postgraduate School, 2009.  93 p.  (Thesis, M.A. in Security Studies)
Also available online at:  http://handle.dtic.mil/100.2/ADA497185
Doc. call no.:  M-U 42525 S774c
 

Periodicals

Ackerman, Robert K.  Homeland Security Threats, Solutions Become More Diverse.  Signal 63:19-22 January 2009.
Interview with Michael Chertoff, the second United States Secretary of Homeland Security on his views of threats to homeland security.
Also available online at:  http://proquest.umi.com/pqdlink?did=1632125561&sid=1&Fmt=3&clientId=417&RQT=309&VName=PQD

American Civil Defence Association.  Protective Actions Against Terrorist Attack.  Journal of Civil Defense 41:15-17 Fall-Winter 2008.
Discusses what citizens can do before, during, and after a terrorist nuclear attack.

Brown, Corrie and King, Lonnie.  Agrosecurity:  In Animal Health, as in Human Health, Early Detection and Diagnosis Are Keys to Protecting Our Food Supply.  Homeland Defense Journal 6, no. 2:10-11 2008.
Special edition:  Agrosecurity.

Bumgarner, John.  Cyber Reconnaissance, an Expanding Threat to Homeland Security.  Homeland Defense Journal 6:14-15 February 2008.
Examines terrorists using Internet resources such at Google Earth, Microsoft Virtual Earth, etc.

Campbell, James R.  BioChem Detection and Prevention Technologies Improved Infectious Devices:  The Next Generation Terrorist Threat.  Homeland Defense Journal 6, no. 4:26-30 2008.
Issue 4 Special Systems Integration Issue.  Discusses Improvised Infectious Devices (IID) suicide attacks using biological weapons, what they are, countermeasures, and prevention.

Chalk, Peter.  Trends in Transnational Terrorism and Implications for U.S. National Security and U.S. Terrorism Risk Insurance.  Studies in Conflict and Terrorism 30:767-776 September 2007.
Discusses the Terrorism Risk Insurance Act (TRA).
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=1057-610X&volume=30&issue=9&spage=767

Courtney, Brooke.  CDC Releases First Report on Terrorism Preparedness and Emergency Response Funded Activities.  Biosecurity and Bioterrorism:  Biodefense Strategy, Practice, and Science 7:11-13 March 2009.

Cullen, Stephen C.  Muslim Extremism in the Caribbean Basin:  The Threat to the United States.  Journal of Counterterrorism and Homeland Security International 14:20-23 Fall 2008.
Discusses the potential for terrorists to infiltrate the U.S. through Caribbean Base countries.

Danger Over Detroit:  After Al-Qaeda in the Arabian Peninsula Attempted to Bomb an Airliner Flying into the United States.  Jane's Terrorism and Security Monitor, pp 6-9, January 2010.
Discusses the attempted bombing of Northwest Airlines flight 253 heading to Detroit, MI on December 25, 2009.

Dewitt, Tracy G.  Maritime, Ports and Critical Infrastructure Security:  Waterborne Improvised Explosive Devices:  How to Detect and Defeat in a Domestic Environment.  Homeland Defense Journal 6:6-9 February 2008.

Franco, Crystal.  Billions for Biodefense:  Federal Agency Biodefense Funding, FY2009-FY2010.  Biosecurity and Bioterrorism:  Biodefense Strategy, Practice, and Science 7:291-309 September 2009.

Franco, Crystal.  Biosecurity Memos to the Obama Administration.  Biosecurity and Bioterrorism:  Biodefense Strategy, Practice, and Science 7:25-30 March 2009.
Memos from the Center for Biosecurity of the University of Pittsburgh Medical Center (UPMC) covering biosecurity challenges for the Obama Administration.

Freilich, Joshua D. and others.  Surveying American State Police Agencies about Terrorism Threats, Terrorism Sources, and Terrorism Definitions.  Terrorism and Political Violence 21:450-475 July-September 2009.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0954%2d6553&volume=21&issue=3&spage=450

Green, J. J.  Fragile Web:  Interview with John Michael McConnell, Former US Director of National Intelligence.  Jane's Intelligence Review 22:58 February 2010.
McConnell "thinks a targeted cyber attack on the US could have a greater impact, both domestically and globally, than the 11 September 2001 terrorist attacks."

Gronvall, Gigi Kwik.  Preventing the Development and Use of Biological Weapons.  Biosecurity and Bioterrorism:  Biodefense Strategy, Practice, and Science 7:31-32 March 2009.
Recommendations for the U.S. government to increase prevention for biological attacks.

Helfstein, Scott and others.  White Paper Prepared for the Secretary of Defense Task Force on DOD Nuclear Weapons Management:  Tradeoffs and Paradoxes:  Terrorism, Deterrence and Nuclear Weapons.  Studies in Conflict and Terrorism 32:776-801 September 2009.
Addresses two types of terrorist groups with a "global reach" that pose a serious threat to the United States; non-state actors and state-sponsored groups.
Also available online at: 
http://www.informaworld.com/openurl?genre=article&issn=1057-610X&volume=32&issue=9&spage=776

Kahaner, Larry.  Maritime Security:  A Status Report.  Homeland Defense Journal 6, no. 3:26-29 2008.
Issue 3 Special edition:  Unmanned Vehicles.  Discusses security at U.S. ports.

King, Michael D.  Applying Israeli Security Methods to U.S. Air Transportation.  Homeland Defense Journal 6:34-35 February 2008.

Matheson, Angus George.  Terrorism and the Oil and Gas Industry (Time for a Wake Up Call).  Journal of Counterterrorism and Homeland Security International 14:10-13 Spring 2008.
Argues that most small and medium sized oil and gas industry companies are not adequately prepared for a terrorist attack.

Nacos, Brigitte L.  Prevention of Terrorism in Post-9/11 America:  News Coverage, Public Perceptions, and the Politics of Homeland Security.  Terrorism and Political Violence 20:1-25 January-March 2008.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0954-6553&volume=20&issue=1&spage=1

Nuzzo, Jennifer B.  Developing a National Biosurveillance Program.  Biosecurity and Bioterrorism:  Biodefense Strategy, Practice, and Science 7:37-38 March 2009.
Addresses problems and gives recommendations for national biosurveillance objectives and implementation plans.

Obama Homeland Security and Terrorism Policy:  5 Probable Homeland Security and Terrorism Policy Moves.  Counterterrorism and Homeland Security Reports 15, no. 1:2+ 2009.

Panel Discussion:  How Do We Protect the Critical Infrastructure within the United States?  Journal of Counterterrorism and Homeland Security International 15:30-36 Spring 2009.
Several homeland security experts address the impact on national safety and security of a natural disaster or terrorist attack.

Philpott, Don.  The Threat from Chemical, Biological and Radioactive Weapons.  Homeland Defense Journal 6, no. 2:28-34 2008.
Special edition:  Agrosecurity. Discusses threats, countermeasures, and emergency response training.

Philpott, Don.  WMD Prevention Technologies.  Homeland Defense Journal 6, no. 3:24-25 2008.
Issue 3 Special edition:  Unmanned Vehicles.

Ready or Not?  Protecting the Public's Health from Diseases, Disasters, and Bioterrorism.  Biosecurity and Bioterrorism:  Biodefense Strategy, Practice, and Science 7:113-115 March 2009.

Rhodes, Douglas.  Food Safety.  Homeland Defense Journal 6, no. 2:12-15 2008.
Special edition:  Agrosecurity.  Discusses measures to prevent, respond to, and recover from acts of agroterrorism.

Russell, David L.  Are We Really Prepared for an Attack?  Challenge to Protecting Municipal Utilities.  Homeland Defense Journal 6, no. 2:18-20 2008.
Special edition:  Agrosecurity.

Traina, Dominic J.  The Container Revolution:  Increasing Security Challenges.  Journal of Counterterrorism and Homeland Security International 14:58-61 Summer 2008.
Discusses the potential for terrorist groups to use freight containers as a way to bring weapons of mass destruction into the country.

Traina, Dominic J.  Protecting the Homeland Through Soft Power.  Journal of Counterterrorism and Homeland Security International 15:50-52 Summer 2009.
Discusses using "soft power" such as organizations and countries working together and negotiations to try to prevent terrorist from attacking.

Van Aken, Jan and Hunger, Iris.  Biosecurity Policies at International Life Science Journals.  Biosecurity and Bioterrorism:  Biodefense Strategy, Practice, and Science 7:61-71 March 2009.
Results of a survey of life science journals with regard to their biosecurity policies and procedures due to concerns about the potential use of information for weapons of mass destruction.

White, Stanley I.  Here or There:  Do You Know Who's in Your Backyard?  Journal of Counterterrorism and Homeland Security International 13:50-53 Autumn 2007.
Six questions and answers pointing out terrorists are here in the U.S. living among us.


Human Rights & Legal Issues


Internet Resources

Blum, Stephanie.  Preventive Detention in the War on Terror:  A Comparison of How the United States, Britain, and Israel Detain and Incapacitate Terrorist Suspects.  Homeland Security Affairs 4, no. 3  October 2008.
Available online at:  http://www.hsaj.org/?article=4.3.1

Henning, Anna C.  Analysis of the Selected Legislative Proposals Addressing Guantanamo Detainees.  Washington, Congressional Research Service, Library of Congress, May 11, 2009.  9 p.
Available online at:  http://opencrs.com/document/R40419/

Henning, Anna C.  Guantanamo Detention Center:  Legislative Activity in the 111th Congress.  Washington, Congressional Research Service, Library of Congress, December 30, 2009.  13 p.
Available online at:  http://opencrs.com/document/R40754/

Lieberman, Joe.  Bipartisan Senators Urge AG to Try Detainees in Military Commissions.  FDCH Press Releases January 26, 2010.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=32X1290222499&site=ehost-live

Zwanenburg, Marten.  "I'm Just Talking about the Law":  Guantanamo and the Lawyers.  Human Rights & Human Welfare 7:9-24 2007.
Available online at:  http://www.doaj.org/doaj?func=abstract&id=206756&q1=guantanamo&f1=all&b1=and&q2=&f2=all&recNo=7

 

Internet Resource (Student Research)

Fairweather, Patty Allison.  Judicial Review:  State Supreme Judicial Views on Balancing Civil Liberties and Public Safety/Security Measures During the Global War on Terror.  Monterey, CA, Naval Postgraduate School, 2009.  107 p.  (Thesis, M.A. in Security Studies).
Available online at:  http://edocs.nps.edu/npspubs/scholarly/theses/2009/Mar/09Mar_Fairweather.pdf

 

Books

Anti-Terrorism:  Security and Insecurity after 9/11, edited by Sandra Rolings-Magnusson.  Black Point, Nova Scotia, Canada, Fernwood Publishing, 2009.  221 p.
Analyzes the concept of terrorism, Canadian and U.S. government responses to terrorist activities, and the problem of government policies infringing on basic human rights and freedoms.
Book call no.:  363.32517 A629

Blum, Stephanie Cooper.  The Necessary Evil of Preventive Detention in the War on Terror.  Amherst, NY, Cambria Press, 2008.  260 p.
Book call no.:  345.7302 B658n

Cole, David.  Justice at War:  The Men and Ideas That Shaped America's War on Terror.  New York, New York Review of Books, 2008.  145 p.
Explores the mindset and motivations that led America into the war on terror taking a critical look at the men whose decisions shaped America's response to the attacks on September 11, 2001.
Book call no.:  973.931 C689j

Cucullu, Gordon.  Inside Gitmo:  The True Story Behind the Myths of Guantanamo Bay.  New York, Collins, 2009.  267 p.
Book call no.:  355.129609729 C963i

Democracies at War Against Terrorism:  A Comparative Perspective, edited by Samy Cohen.  New York, Palgrave Macmillan, 2008.  269 p.  (Series in International Relations and Political Economy)
Deals with the difficulties democracies face in conducting war on terrorism without violating international humanitarian law.
Book call no.:  172.42 D383

The Enemy Combatant Papers:  American Justice, the Courts, and the War on Terror, edited by Karen J. Greenberg and others.  New York, Cambridge University Press, 2008.  1008 p.
Examines five major enemy combatant cases illustrating the struggle between national security and rights of individuals.
Book call no.:  345.7302 E56

Enemy Combatants, Terrorism, and Armed Conflict Law:  A Guide to the Issues, edited by David K. Linnan.  Westport, CT, Praeger Security International, 2008.  400 p.
Book call no.:  343.7301 E56

Fletcher, Laurel E. and others.  The Guantanamo Effect:  Exposing the Consequences of U.S. Detention and Interrogation Practices.  Berkeley, CA, University of California Press, 2009.  210 p.
Book call no.:  355.71 G913

Greenberg, Karen.  The Least Worst Place:  Guantanamo's First 100 Days.  New York, Oxford University Press, 2009.  260 p.
"Account of the first one hundred days of Guantanamo after the Bush administration chose it as the primary site to house detainees."
Book call no.:  355.1296 G795L

The Guantanamo Lawyers:  Inside a Prison Outside the Law, edited by Mark P. Denbeaux and Jonathan Hafetz.  New York, New York University Press, 2009.  420 p.
"Contains over 100 personal narratives from attorneys who have represented detainees held at Guantanamo."
Book call no.:  343.730143 G913

Hardy, Colleen E.  The Detention of Unlawful Enemy Combatants During the War on Terror.  El Paso, TX, LFB Scholarly Publishing, 2009.  240 p.
Book call no.:  345.7302 H268d

Honigsberg, Peter Jan.  Our Nation Unhinged:  The Human Consequences of the War on Terror.  Berkeley, CA, University of California Press, 2009.  311 p.
Chronicles the American judicial system from 2001 examining the development and misuse of "enemy combatant" category, including the treatment of detainees.
Book call no.:  345.73056 H773o

Imre, Robert and others.  Responding to Terrorism:  Political, Philosophical and Legal Perspectives.  Burlington, VT, Ashgate, 2008.  239 p.
Focuses on Australian perspectives on terrorism in four main areas:  responses to uses of torture, legal approaches, terrorism as a consequence of globalization, and counter-terrorism.
Book call no.:  363.325 I34r

Meisels, Tamar.  The Trouble with Terror:  Liberty, Security, and the Response to Terrorism.  New York, Cambridge University Press, 2008.  239 p.
Issues of terrorism from the definition to proposals for contending with and combating terrorism and addressing tensions between liberty and security.
Book call no.:  323.325 M515t

Miller, Seumas.  Terrorism and Counter-Terrorism:  Ethics and Liberal Democracy.  Malden, MA, Blackwell, 2009.  222 p.
Analyzes the morality of terrorism and counter-terrorist pursuits which is crucial for establishing enduring peace between nations.
Book call no.:  363.325 M651t

Moeckli, Daniel.  Human Rights and Non-Discrimination in the 'War on Terror'.  New York, Oxford University Press, 2008.  271 p.
Book call no.:  341.48 M693h

The Obama Administration and the Americas:  Agenda for Change, edited by Abraham F. Lowenthal and others.  Washington, Brookings Institution Press, 2009.  235 p.
Chapter 9, Turning the Symbol Around:  Returning Guantanamo Bay to Cuba, pp 136-144.
Book call no.:  327.7308 O12

Osiel, Mark.  The End of Reciprocity:  Terror, Torture, and the Law of War.  New York, Cambridge University Press, 2009.  667 p.
Book call no.:  341.67 O82e

Proceedings from the 7th Canadian Conference on Ethical Leadership:  Volume 1, The War on Terror - Ethical Considerations, edited by Daniel Lagace-Roy and Bernd Horn.  Kingston, Ontario, Canadian Defence Academy Press, 2008.  168 p.
Discusses the complexities of operating in a contemporary security environment in regards to terrorism and suggests requirements for nations to counter this threat with democratic values, ideals, and ethical considerations.
Book call no.:  174.9355 C212p v.1

Pyle, Christopher H.  Getting Away with Torture:  Secret Government, War Crimes, and the Rule of Law.  Washington, Potomac Books, 2009.  339 p.
Book call no.:  973.931 P996g

Rotunda, Kyndra Miller.  Honor Bound:  Inside Guantanamo Trials.  Durham, NC, Carolina Academic Press, 2008.  264 p.
Story of a JAG officer including time spent at the detention facility at Guantanamo Bay.  Examines investigators tracking terrorists, gathering of evidence, life inside the prison blocks, and inside the Guantanamo trials.
Book call no.:  341.6 R851h

Sands, Philippe.  Torture Team:  Rumsfeld's Memo and the Betrayal of American Values.  New York, Palgrave Macmillan, 2008.  254 p.
Book call no.:  341.48 S221t

Terrorism and Human Rights, edited by Magnus Fanstorp and Paul Wilkinson.  New York, Routledge, 2008.  283 p.
Book call no.:  341.48 T328

United States.  Congress.  Senate.  Committee on Armed Services.  Inquiry into the Treatment of Detainees in U.S. Custody.  Report of the Committee on Armed Services, 110th Congress, 2nd session, November 20, 2008.  Washington, U.S. GPO, 2009.  232 p.  (S. prt. 110-54)
Also available online at:  http://purl.access.gpo.gov/GPO/LPS112554
Book call no.:  341.48 U58i

United States.  Congress.  Senate.  Committee on Armed Services.  The Treatment of Detainees in U.S. Custody.  Hearing before the Committee on Armed Services.  110th Congress, 2nd session, June 17 and September 25, 2008.  Washington, U.S. GPO, 2009.  308 p.  (S. hrg. 110-720)
Also available online at: 
http://purl.access.gpo.gov/GPO/LPS110590
Book call no.:  341.48 U58t

United States.  Congress.  Senate.  Committee on Foreign Relations.  Extraordinary Rendition, Extraterritorial Detention and Treatment of Detainees:  Restoring Our Moral Credibility and Strengthening Our Diplomatic Standing.  Hearing.  110th Congress, 1st session, July 26, 2007.  Washington, U.S. GPO, 2008.  63 p.  (S. hrg. 110-257)
Also available online at:  http://purl.access.gpo.gov/GPO/LPS90626
Book call no.:  341.48 U58e

United States.  Department of Defense.  Review of Department Compliance with President's Executive Order on Detainee Conditions of Confinement.  Washington, Department of Defense, 2009.  81 p.
Report on the review of conditions of confinement at Guantanamo Bay Naval Base.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS110791
Book call no.:  341.48 U581r

United States.  Department of Justice.  Office of the Inspector General.  A Review of the FBI's Involvement in and Observations of Detainee Interrogations in Guantanamo Bay, Afghanistan and Iraq.  Washington, Department of Justice, Office of the Inspector General, Oversight and Review Division, 2008.  370 p.
Also available online at:  http://www.usdoj.gov/oig/special/s0805/final.pdf
Book call no.:  973.931 R454

The War on Terror and the Laws of War:  A Military Perspective, by Geoffrey S. Corn and others.  New York, Oxford University Press, 2009.  248 p.
Six legal scholars with experience as military officers provide advice on applying international law to the battlefield.
Book call no.:  341.6 W2531

War, Torture and Terrorism:  Rethinking the Rules of International Security, edited by Anthony F. Lang and Amanda R. Beattie.  New York, Routledge, 2009.  213 p.  (Contemporary Security Studies)
Explores the challenges of rules in the current international security order.
Book call no.:  341.6 W253

Wax, Steven T.  Kafka Comes to America:  Fighting for Justice in the War on Terror:  A Public Defender's Inside Account.  New York, Other Press, 2008.  380 p.
The author "addresses the extrajudicial detention powers the Bush administration has claimed in the name of the "Global War on Terror" by weaving together the stories of two men he has represented". - Book summary
Book call no.:  345.73056 W357k

White, James E.  Contemporary Moral Problems:  War, Terrorism, and Torture.  Belmont, CA, Thomson Wadsworth, 2009.  101 p.
Book call no.:  303.625 C7611 2009

Williamson, Myra.  Terrorism, War and International Law:  The Legality of the Use of Force Against Afghanistan in 2001.  Burlington, VT, Ashgate, 2009.  277 p.
Book call no.:  958.1047 W731t

Wittes, Benjamin.  Law and the Long War:  The Future of Justice in the Age of Terror.  New York, Penguin Press, 2008.  305 p.
Book call no.:  345.7302 W829L


Documents

Elsea, Jennifer and others.  Enemy Combatant Detainees:  Habeas Corpus Challenges in Federal Court.  Washington, Congressional Research Service, Library of Congress, September 15, 2009.  60 p.
Also available online at:  http://opencrs.com/document/RL33180/
Doc. call no.:  M-U 42953-1 no.RL33180

Garcia, Michael John.  Boumediene V. Bush:  Guantanamo Detainees' Right to Habeas Corpus.  Washington, Congressional Research Service, Library of Congress, September 8, 2008.  11 p.
Also available online at:  http://opencrs.com/document/Rl34536/
Doc. call no.:  M-U 42953-1 no.RL34536

Garcia, Michael John and others.  Closing the Guantanamo Detention Center:  Legal Issues.  Washington, Congressional Research Service, Library of Congress, November 17, 2009.  45 p.
Also available online at:  http://opencrs.com/document/R40139/
Doc. call no.:  M-U 42953-1 no.R40139

Garcia, Michael John.  Interrogation of Detainees:  Requirements of the Detainee Treatment Act.  Washington, Congressional Research Service, Library of Congress, August 26, 2009.  16 p.
Also available online at:  http://opencrs.com/document/RL33655/
Doc. call no.:  M-U 42953-1 no.RL33655

Garcia, Michael John.  The War Crimes Act:  Current Issues.  Washington, Congressional Research Service, Library of Congress, January 22, 2009.  11 p.
Also available online at:  http://opencrs.com/document/RL33662/
Doc. call no.:  M-U 42953-1 no.RL33662


Documents (Student Research)

Dennis, Wade F.  Strategic Detention and Intelligence Operations:  GTMO Is the Answer.  Carlisle, PA, U.S. Army War College, 2008.  24 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA480142
Doc. call no.:  M-U 39080-537 D411s

Pierce, Stephen L.  Operational Command and Control Considerations for Joint Detainee Operations.  Newport, RI, U.S. Naval War College, 2009.  21 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA503074
Doc. call no.:  M-U 41662 P618o

Ryan, Laura M.  Combatant Determination in the Asymmetric Environment.  Carlisle Barracks, PA, U.S. Army War College, 2009.  28 p.
"Analysis of current United States and international policy on combatant determination and treatment, provides recommendations to prosecute the War on Terror adversaries."
Also available online at: 
http://handle.dtic.mil/100.2/ADA501092
Doc. call no.:  M-U 39080-537 R988c

Stahl, Pamela M.  Crisis in the Courtroom:  Detention of Enemy Combatants.  Carlisle, PA, U.S. Army War College, 2008.  42 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA493804
Doc. call no.:  M-U 39080-607 S781c
 

Periodicals

Abu Zubaydah.  Jane's Terrorism and Security Monitor, pp 19-20, May 2009.
Discusses information learned from the interrogation of Abu Zubaydah who claims to be a major Al-Qaeda figure and the controversy surrounding the interrogation.

Barker, Brig.  Criminal Justice and the Prevention of Terrorism.  Journal of Counterterrorism and Homeland Security International 14:22-27 Spring 2008.
Looking at international terrorism cases the author argues the U.S. can rely on the current prosecutorial system or integrate the use of military tribunals as part of the ongoing war on terror.

Collins, Joseph.  A New Gitmo:  Don't Close Guantanamo; Transform It.  Armed Forces Journal 147:46-47 July-August 2009.

Inkster, Nigel and others.  Europe, Guantanamo and the 'War on Terror':  An Exchange.  Survival 51:55-61 June-July 2009.
Experts comment on Sibylle Scheipers 'Closing Guantanamo:  Is Europe Ready?' article in February-March 2009 issue of Survival discussing international aspects of the closing of Guantanamo.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0039%2d6338&volume=51&issue=3&spage=55

Johnsen, Gregory D. and Nash, Andrew.  The Long Goodbye:  Closing Time at Guantanamo Bay.  Jane's Intelligence Review 21:8-11 April 2009.
Discusses what will happen to the detainees at Guantanamo when it closes.

Kittrie, Nicholas.  The International Law of War and America's War on Terrorism.  International Journal on World Peace 25:85-106 September 2008.
"Examines military rationale of the international law of war and the challenges to it by human rights organizations and the U.S. judicial system."
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=34308431&site=ehost-live&custid=airuniv

McMichael, William H.  Closing Guantanamo Likely to Prove More Easily Ordered than Done:  Main Challenge:  What to Do with 250 Detainees.  Air Force Times 69:15-16 January 26, 2009.
Also available online at:  http://docs.newsbank.com

Mowbray, David L.  Joint Task Force Guantanamo Bay:  The Perception of Deception.  Marine Corps Gazette 93:47-53 February 2009.
Using resources available including personal interviews with people working at Guantanamo detention facility, examines some of the reasons about allegations of detainee mistreatment at the Joint Task Force facilities.
Also available online at:  http://proquest.umi.com/pqdlink?did=1637641161&sid=2&Fmt=4&clientId=417&RQT=309&VName=PQD

Robison, Kristopher K.  Terror's True Nightmare?  Reevaluating the Consequences of Terrorism on Democratic Governance.  Terrorism and Political Violence 22:62-86 January-March 2010.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0954%2d6553&volume=22&issue=1&spage=62

Scheipers, Sibylle.  Closing Guantanamo:  Is Europe Ready?  Survival 51:5-12 February-March 2009.
Commentary about how European governments will look into their own approaches to detention with President Obama's announcement of closing Guantanamo.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0039%2d6338&volume=51&issue=1&spage=5

Schuber, William and Calissi, Ronald E.  National Security & Liberty:  A Delicate Balance.  Journal of Counterterrorism and Homeland Security International 15:22-27 Winter 2009.
Examines the balance between national security and liberty with examples throughout history.

Weinberg, Leonard B. and others.  The Cost of Terrorism:  The Relationship Between International Terrorism and Democratic Governance.  Terrorism and Political Violence 20:257-270 April-June 2008.
Argues that democracies don't have significant justification to reduce normal constitutional protections for citizens due to international terrorist acts.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0954-6553&volume=20&issue=2&spage=257

Whitaker, Beth Elise.  Exporting the Patriot Act?  Democracy and the 'War on Terror' in the Third World.  Third World Quarterly 28:1017-1032 July 2007.
Discusses anti-terrorism laws and democratization in the Third World.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25228169&site=ehost-live&custid=airuniv


International Aspects


Internet Resources

Boucek, Christopher.  Yemen and U.S. Foreign Policy.  FDCH Congressional Testimony February 3, 2010.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=32Y3471277467&site=ehost-live
Discusses problems in Yemen including international terrorism, violent extremism, and regional security.

Kronstadt, K. Alan.  Islamist Militancy in the Pakistan-Afghanistan Border Region and U.S. Policy.  Washington, Congressional Research Service, Library of Congress, November 21, 2008.  17 p.
Available online at:  http://opencrs.com/document/Rl34763/

Onay, Yasar.  Global Terrorism and Its Impact on National Security.  Journal of International Social Research 1, no. 5:547-533
Available online at:  http://www.doaj.org
Challenges that global terrorism now thought to be the "new terrorism" remains the same as the "classical old" terrorism, it remains political and mainly local.

U.S. Department of State.  Office of the Coordinator for Counterterrorism
Available online at:  http://www.state.gov/s/ct/
Mission is to forge partnerships with non-state actors, multilateral organizations, and foreign governments to advance the counterterrorism objectives and national security of the U.S.  Serves as a primary coordinator for the Executive Branch in dealing with international terrorism.  Offers country reports and other publications.

 

Books

Chau, Donovan C.  U.S. Counterterrorism in Sub-Saharan Africa:  Understanding Costs, Cultures, and Conflicts.  Carlisle, PA, Strategic Studies Institute, U.S. Army War College, September 2008.  73 p.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS101655
Book call no.:  303.6250967 C496u

Feith, Douglas J.  War and Decision:  Inside the Pentagon at the Dawn of the War on Terrorism.  New York, HarperCollins, 2008.  674 p.
Book call no.:  973.931 F311w

Jarvis, Lee.  Times of Terror:  Discourse, Temporality and the War on Terror.  New York, Palgrave Macmillan, 2009.  201 p.
"Since 11 September 2001, the War on Terror has dominated global political life; the author takes a critical look at different ways in which the George W. Bush administration created and justified this far-reaching conflict through their use of language and other discursive practices."
Book call no.:  363.325 J38t

Kaye, Dalia Dassa and others.  More Freedom, Less Terror?  Liberalization and Political Violence in the Arab World.  Santa Monica, CA, RAND, 2008.  195 p.
A tenet of the U.S. foreign policy promotes democracy as a means of reducing terrorism. "This study explores the relationship between the two by examining processes on political violence in six Arab cases." - Book jacket.
Also available online at:  http://www.rand.org/pubs/monographs/2008/RAND_MG772.pdf
Book call no.:  363.32509 M835

Lutz, James M. and Lutz, Brenda J.  Global Terrorism.  2nd ed.  New York, Routledge, 2008.  346 p.
Comprehensive introduction to terrorism as a global phenomenon; introduces the history, politics, ideologies, and strategies of both contemporary and older terrorist groups.
Book call no.:  363.325 L975g

Robertson, Ann E.  Terrorism and Global Security.  New York, Facts on File, 2007.  408 p.
Book call no.:  363.3250973 R649t

Rogers, Paul.  Global Security and the War on Terror:  Elite Power and the Illusion of Control.  New York, Routledge, 2008.  230 p.
"Argues that the post Cold War security paradigm is fundamentally misguided and unsustainable."
Book call no.:  355.033073 R728g

Sekulich, Daniel.  Terror on the Seas:  True Tales of Modern-Day Pirates.  New York, St. Martin's Press, 2009.  308 p.
Book call no.:  910.45 S463t

Smith, Paul J.  The Terrorism Ahead:  Confronting Transnational Violence in the Twenty-First Century.  Armonk, NY, M.E. Sharpe, 2008.  258 p.
Book call no.:  363.31516 S656t

Turbiville, Graham H.  Private Security Infrastructure Abroad:  Criminal-Terrorist Agendas and the Operational Environment.  Hurlburt Field, FL, Joint Special Operations University, November 2007.  52 p.
Also available online at:  https://jsoupublic.socom.mil/publications/jsou/JSOU07-9turbivillePrivateSecurityAbroad_final30Nov.pdf
Book call no.:  363.389 T931p

United States.  Department of State.  Country Reports on Terrorism 2008.  Washington, U.S. Department of State, 2009.  332 p. 
Covers developments in countries in which acts of terrorism occurred, countries that are state sponsors of terrorism, and countries determined to be of particular interest in the GWOT.  Provides information on terrorist groups, their umbrella groups and state sponsors of terror.
Also available online at:  http://www.state.gov/s/ct/rls/crt/2008/index.htm
Book call no.:  R 363.325 P316 2008

War, Torture and Terrorism:  Rethinking the Rules of International Security, edited by Anthony F. Lang and Amanda R. Beattie.  New York, Routledge, 2009.  213 p.  (Contemporary Security Studies)
Explores the challenges of rules in the current international security order.
Book call no.:  341.6 W253
 

Documents

Kan, Shirley A.  U.S.-China Counterterrorism Cooperation:  Issues for U.S. Policy.  Washington, Congressional Research Service, Library of Congress, January 6, 2010.  33 p.
Also available online at:  http://opencrs.com/document/RL33001/
Doc. call no.:  M-U 42953-1 no.RL33001

Kronstadt, K. Alan.  Pakistan-U.S. Relations.  Washington, Congressional Research Service, Library of Congress, February 6, 2009.  97 p.
Also available online at:  http://opencrs.com/document/RL33498/
Doc. call no.:  M-U 42953-1 no.RL33498

Niksch, Larry A.  North Korea:  Terrorism List Removal.  Washington, Congressional Research Service, Library of Congress, January 6, 2010.  29 p.
Also available online at:  http://opencrs.com/document/Rl30613/
Doc. call no.:  M-U 42953-1 no.RL30613

Perl, Raphael F.  International Terrorism:  Threat, Policy, and Response.  Washington, Congressional Research Service, Library of Congress, January 3, 2007.  1 vol.
Also available online at:  http://opencrs.com/document/RL33600/
Doc. call no.:  M-U 42953-1 no. 07-RL33600

Rollins, John and others.  International Terrorism and Transnational Crime:  Security Threats, U.S. Policy, and Considerations for Congress.  Washington, Congressional Research Service, Library of Congress, January 5, 2010.  52 p.
Also available online at:  http://opencrs.com/document/R41004/
Doc. call no.:  M-U 42953-1 no.R41004

Sharp, Jeremy M.  Yemen:  Background and U.S. Relations.  Washington, Congressional Research Service, Library of Congress, January 13, 2010.  29 p.
Also available online at:  http://opencrs.com/document/RL34170/2010-01-13/
Doc. call no.:  M-U 42953-1 no.RL34170

Sullivan, Mark P.  Latin America:  Terrorism Issues.  Washington, Congressional Research Service, Library of Congress, September 2, 2009.  11 p.
Also available online at:  http://opencrs.com/document/Rs21049/
Doc. call no.:  M-U 42953-1 no.RS21049
 

Document (Student Research)

Wicker, Christopher.  International Lessons Learned and Recommendations for Combating Domestic Islamic Terrorism.  Carlisle Barracks, PA, U.S. Army War College, 2007.  40 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA469645
Doc. call no.:  M-U 39080-537 W636i
 

Periodicals

Ahrari, Ehsan M.  Why the Long War Can and Cannot Be Compared to the Cold War.  Comparative Strategy 26:275-284 July-September 2007.
Discusses U.S. ongoing struggle with global jihadists, how this "long war" is different from the "Cold War" and the difficulties for a winning strategy.
Also available online at:  http://dx.doi.org/10.1080/01495930701598581

Al-Qaeda's Oil War Falters.  Jane's Terrorism and Security Monitor, pp 5-6, January 2008.
"Reviews Al-Qaida's failure to prosecute an effective campaign against energy supplies."

Byman, Daniel.  Iran, Terrorism, and Weapons of Mass Destruction.  Studies in Conflict and Terrorism 31:169-181 March 2008.
"Reviews Iran's past and current use of terrorism and assesses why U.S. attempts to halt Iran's efforts have met with little success" - Abstract
Also available online at: 
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=30009283&site=ehost-live

Chalk, Peter.  Trends in Transnational Terrorism and Implications for U.S. National Security and U.S. Terrorism Risk Insurance.  Studies in Conflict and Terrorism 30:767-776 September 2007.
Discusses the Terrorism Risk Insurance Act (TRA).
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=26210138&site=ehost-live

Christian, Patrick J.  Guerrillas in the Midst:  U.S. Planning, Advisory and Training Team Helps Colombian Army Build Skills.  Special Warfare 20:16-22 May-June 2007.
Also available online at:  http://proquest.umi.com/pqdweb?did=1295280541&sid=2&Fmt=3&clientId=417&RQT=309&VName=PQD

Cline, Lawrence.  Counterterrorism Strategy in the Sahel.  Studies in Conflict and Terrorism 30:889-899 October 2007.
Also available online at: 
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=26447304&site=ehost-live

Emerson, R. Guy.  Radical Neglect?  The "War on Terror" and Latin America.  Latin American Politics & Society 22:33-62 Spring 2010.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=48452980&site=ehost-live&custid=airuniv

Gerber, Theodore P. and Mendelson, Sarah E.  Security Through Sociology:  The North Caucasus and the Global Counterinsurgency Paradigm.  Studies in Conflict and Terrorism 32:831-851 September 2009.
Discusses how economic conditions and poor governance are primary concerns for the global counterinsurgency to combat terrorism by looking at Russia's North Caucasus.
Also available online at: 
http://www.informaworld.com/openurl?genre=article&issn=1057-610X&volume=32&issue=9&spage=831

Inkster, Nigel and others.  Europe, Guantanamo and the 'War on Terror':  An Exchange.  Survival 51:55-61 June-July 2009.
Experts comment on Sibylle Scheipers 'Closing Guantanamo:  Is Europe Ready?' article in February-March 2009 issue of Survival discussing international aspects of the closing of Guantanamo.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0039%2d6338&volume=51&issue=3&spage=55

Kilcullen, David.  Subversion and Countersubversion in the Campaign Against Terrorism in Europe.  Studies in Conflict and Terrorism 30:647-666 August 2007.
"Examines how Europe fits into the broader international campaign against terrorism."
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=25728533&site=ehost-live

Knoble, Ronald K.  Are We Prepared?  Military Technology 33, no. 11:116-122 2009.
Discusses the need for law enforcement worldwide to be prepared against the threat of international terrorism.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=45648152&site=ehost-live&custid=airuniv

Kraft, Michael B.  Helping Other Countries Counter Terrorism.  Journal of Counterterrorism and Homeland Security International 14:30-34 Summer 2008.

Kraska, James and Wilson, Brian.  The Co-Operative Strategy and the Pirates of the Gulf of Aden.  RUSI Journal 154:74-81 April 2009.
Explores the response to the increase in maritime piracy with the formation of a broad, informal coalition of states and international organizations to send forces into the Horn of Africa.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=39253817&site=ehost-live&custid=airuniv

Pressman, Jeremy.  Rethinking Transnational Counterterrorism:  Beyond a National Framework.  Washington Quarterly 30:63-73 Autumn 2007.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=26280247&site=ehost-live&custid=airuniv

Saini, S. K.  Problems and Prospects of Combating Terrorist Financing in India.  Strategic Analysis 33:85-100 January 2009.
Discusses challenges and the importance of strong domestic measures along with strengthened international cooperation in combating terrorism by attacking terrorist financing.

Savun, Burcu and Phillips Brian J.  Democracy, Foreign Policy, and Terrorism.  Journal of Conflict Resolution 53:878-904 December 2009.
Investigates the relationship between democracy and transnational terrorism, arguing that states actively involved in international politics are more likely targets of transnational terrorism.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=45244251&site=ehost-live&custid=airuniv

Scheipers, Sibylle.  Closing Guantanamo:  Is Europe Ready?  Survival 51:5-12 February-March 2009.
Commentary about how European governments will look into their own approaches to detention with President Obama's announcement of closing Guantanamo.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0039%2d6338&volume=51&issue=1&spage=5

Sheehan, Ivan Sascha.  Has the Global War on Terror Changed the Terrorist Threat?  A Time-Series Intervention Analysis.  Studies in Conflict and Terrorism 32:743-761 August 2009.
Study using transnational terrorism events data from 1993 through 2004; using a time-series approach investigates the extent to which the onset of the global war on terrorism is associated with the changes in transnational terrorist activity.
Also available online at: 
http://www.informaworld.com/openurl?genre=article&issn=1057-610X&volume=32&issue=8&spage=743

Smith, Paul J.  China's Economic and Political Rise:  Implications for Global Terrorism and U.S.-China Cooperation.  Studies in Conflict and Terrorism 32:627-645 July 2009.
Suggests that terrorism risks for China are increasing and the need for counterterrorism cooperation between the U.S. and China.
Also available online at: 
http://www.informaworld.com/openurl?genre=article&issn=1057-610X&volume=32&issue=7&spage=627

Williams Brian Glyn.  US Urges Yemen to Take on Al-Qaeda.  Jane's Islamic Affairs Analyst, pp 4-5, February 2010.
United States encourages Yemeni government to rein in Al-Qaeda after the attempted bombing of a U.S. airliner over Detroit in December 2009.


Psychology & Causes of Terror


Internet Resource

Al-Thagafi, Ahmad.  Causes and Possible Solutions to the Middle East Terrorism.  Carlisle Barracks, PA, U.S. Army War College, 2008.  22 p.
Available online at:  http://handle.dtic.mil/100.2/ADA481469

 

Books

Al-Muqrin, 'Abd Al-'Aziz.  Al-Qa'ida's Doctrine for Insurgency:  A Practical Course for Guerrilla War, translated and analyzed by Norman Cigar.  Washington, Potomac Books, 2009.  193 p.
Manual providing a window into Al-Qa'ida's strategic thinking and into how these terrorists operate with analysis of key ideas in the jihadist's doctrine.
Book call no.:  355.425 A452a

Barker, Jonathan.  The No-Nonsense Guide to Global Terrorism.  Oxford, UK, New Internationalist, 2008.  144 p.
"Analyzes the dynamics of terror including a moral analysis of the causes and contexts of terror."
Book call no.:  303.625 B255na

Betts, Richard K.  Conflict after the Cold War:  Arguments on Causes of War and Peace.  New York, Pearson Longman, 2008.  654 p.
See Part IX Strategy II:  Terrorism and Unconventional Warfare, pp 463-575.
Book call no.:  909.82 C7481 2008

Brachman, Jarret M.  Global Jihadism:  Theory and Practice.  New York, Routledge, 2009.  212 p.
Explores the ideas and concepts of Jihad, al-Wala Wal-Bara, Takfir, and Tawhid; also explores the thinking and activities explaining the intricacies and idiosyncrasies of al-Qaida's propaganda machine.
Book call no.:  320.556 B796g

Contemporary Security and Strategy, edited by Craig A. Snyder.  2nd ed.  New York, Palgrave Macmillan, 2008.  285 p.
Chapter 10 Terrorism and Insurgency, pp 170-189.
Book call no.:  327.116 C761

Falk, Avner.  Islamic Terror:  Conscious and Unconscious Motives.  Westport, CT, Praeger Security International, 2008.  267 p.
Book call no.:  363.325 F191i

Held, Virginia.  How Terrorism Is Wrong:  Morality and Political Violence.  New York, Oxford, 2008.  205 p.
Offers moral assessments of some forms of political violence focusing and comparing terrorism with other kinds of violence.
Book call no.:  172.1 H474h

Horgan, John.  Walking Away from Terrorism:  Accounts of Disengagement from Radical and Extremist Movements.  New York, Routledge, 2009.  186 p.
Using interviews the author analyzes the psychology of terrorists, becoming terrorists and what made them leave it behind.
Book call no.:  363.325 H811w

Jihadists and Weapons of Mass Destruction, edited by Gary Ackerman and Jeremy Tamsett.  Boca Raton, FL, CRC Press, 2009.  489 p.
Covers jihadist ideology, strategy, psychology, tactics, capabilities; jihadists and specific weapons such as biological and chemical; discussion of countering or defending against this threat; concluding with future developments concerning jihadists and weapons of mass destruction.
Book call no.:  363.3253 J61

Krueger, Alan B.  What Makes a Terrorist:  Economics and the Roots of Terrorism.  Princeton, NJ, Princeton University Press, 2007.  194 p.  (Lionel Robbins memorial lecture series at the London School of Economics and Political Science)
Book call no.:  363.32511 K94w 2008

Moghaddam, Fathali M.  How Globalization Spurs Terrorism:  The Lopsided Benefits of "One World" and Why That Fuels Violence.  Westport, CT, Praeger Security International, 2008.  194 p.
Explores twenty-first-century Islamic terrorism, its reliance on electronic communications systems and other modern technologies also the threat to the collective identity of Muslims as a product of fractured globalization.
Book call no.:  363.32511 M696h

Murawiec, Laurent.  The Mind of Jihad.  New York, Cambridge University Press, 2008.  341 p.
Examines contemporary jihad as a cult of violence and power drawing from history, anthropology, and theology to better understand the mind of jihad that has declared war on the West and the world.
Book call no.:  322.42088297 M972m

Nance, Malcolm W.  Terrorist Recognition Handbook:  A Practitioner's Manual for Predicting and Identifying Terrorist Activities.  New York, CRC Press, 2008.  463 p.
Book call no.:  363.325 N176t

Olsson, Peter Alan.  The Cult of Osama:  Psychoanalyzing Bin Laden and His Magnetism for Muslim Youths.  Westport, CT, Praeger Security International, 2008.  171 p.
Book call no.:  363.325019 O52c

Psychology of Terrorism:  Classic and Contemporary Insights, edited by Jeff Victoroff and Arie W. Kruglanski.  New York, Psychology Press, 2009.  496 p.
Compilation of articles by recognized authorities on the psychology of terrorism.
Book call no.:  363.325019 P974

Suicide Terror:  Understanding and Confronting the Threat, edited by Ophir Falk and Henry Morgenstern.  Hoboken, NJ, John Wiley & Sons, 2009.  407 p.
Book call no.:  363.325 S948

The Theory and Practice of Islamic Terrorism:  An Anthology, edited by Marvin Perry and Howard E. Negrin.  New York, Palgrave Macmillan, 2008.  255 p.
Collection of works exploring the multiple dimensions of Islamic terrorism.
Book call no.:  363.325 T396

United States.  Congress.  Senate.  Select Committee on Intelligence.  Terrorist Ideology.  Hearing.  110th Congress, 1st session, June 12, 2007.  Washington, GPO, 2008.  49 p.  (S. hrg. 110-348)
Also available online at:  http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=110_senate_hearings&docid=f:40579.pdf
Book call no.:  363.25 U582t

Vedantam, Shankar.  The Hidden Brain:  How Our Unconscious Minds Elect Presidents, Control Markets, Wage Wars, and Save Our Lives.  New York, Spiegel & Grau, 2010.  270 p.
Chapter 7, The Tunnel:  Terrorism, Extremism and the Hidden Brain, pp 168-187.
Book call no.:  154.2 V414h

Vertigans, Stephen.  Militant Islam:  A Sociology of Characteristics, Causes and Consequences.  New York, Routledge, 2009.  211 p.
Book call no.:  303.625 V567m

Zuhur, Sherifa.  Precision in the Global War on Terror:  Inciting Muslims Through the War of Ideas.  Carlisle, PA, Strategic Studies Institute, U.S. Army War College, April 2008.  142 p.
Covers history and ideology of Muslims along with assumptions, views, and attacks on basic precepts.
Also available online at:  http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB843.pdf
Book call no.:  327.7301767 Z94p
 

Documents (Student Research)

Frappier, John.  The Path to a Culturally Relevant National Security Strategy.  Fort Leavenworth, KS, School of Advanced Military Studies, Army Command and General Staff College, 2008.  42 p.
Argues knowing and understanding the threat is necessary to win the Global War on Terror.
Also available online at:  http://handle.dtic.mil/100.2/ADA485604
Doc. call no.:  M-U 42022-2 F838p

Ludwick, Keith W.  Closing the Gap:  Measuring the Social Identity of Terrorists.  Monterey, CA, Naval Postgraduate School, 2008.  63 p.  (Thesis, M.A. in Security Studies)
Also available online at:  http://handle.dtic.mil/100.2/ADA488713
Doc. call no.:  M-U 42525 L948c
 

Periodicals

Freeman, Michael.  Democracy, al Qaeda, and the Causes of Terrorism:  A Strategic Analysis of U.S. Policy.  Studies in Conflict and Terrorism 31:40-59 January 2008.
"Argues that the widespread belief in the power of democracy is likely misplaced because democracy will be unlikely to change perceptions of occupation, will threaten Islamic identity and culture, will be unlikely to mitigate economic grievances, and will be unlikely to provide a more legitimate government than one based on religious law."
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=28111308&site=ehost-live

Ganor, Boaz.  Terrorist Organization Typologies and the Probability of a Boomerang Effect.  Studies in Conflict and Terrorism 31:269-283 April 2008.
Surveys major typologies of terror and proposes a new typology that sorts terror organizations by the variables that limit their activities.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=1057-610X&volume=31&issue=4&spage=269

Hellmich, Christina.  Creating the Ideology of Al Qaeda:  From Hypocrites to Salafi-Jihadists.  Studies in Conflict and Terrorism 31:111-124 February 2008.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=29411128&site=ehost-live

Hoffman, Bruce.  The 'Cult of the Insurgent':  Its Tactical and Strategic Implications.  Australian Journal of International Affairs 61:312-329 September 2007.
Argues that insurgents "will likely conclude that the best and most cost-effective means to confront either a superpower or the superior, conventional military forces of an established nation-state is through a campaign reliant on terrorist and insurgent tactics involving stand-off attacks."
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=26369904&site=ehost-live&custid=airuniv

Locicero, Alice and Sinclair, Samuel J.  Terrorism and Terrorist Leaders:  Insights from Developmental and Ecological Psychology.  Studies in Conflict and Terrorism 31:227-250 March 2008.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=30009280&site=ehost-live

McCauley, Clark and Moskalenko, Sophia.  Mechanisms of Political Radicalization:  Pathways Toward Terrorism.  Terrorism and Political Violence 20:415-533 July-September 2008.
Discusses political radicalization as a mechanism to the origins of terrorism and influencing beliefs and behaviors of intergroup conflict and violence.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0954%2d6553&volume=20&issue=3&spage=415

Miller, Gregory D.  Confronting Terrorisms:  Group Motivation and Successful State Policies.  Terrorism and Political Violence 19:331-350 Fall 2007.
"Examines group motivation - national-separatism, revolution, reaction, or religion - as one key trait and finds that these different 'terrorisms' do affect the success of counterterrorist policies." - Abstract
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0954-6553&volume=19&issue=3&spage=331

Moskalenko, Sophia and McCauley, Clark.  Measuring Political Mobilization:  The Distinction Between Activism and Radicalism.  Terrorism and Political Violence 21:239-260 April-June 2009.
Studies political radicalization, the psychology of individuals, and why they transition to political violence including terrorist violence.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0954%2d6553&volume=21&issue=2&spage=239

Payne, Kenneth.  Winning the Battle of Ideas:  Propaganda, Ideology, and Terror.  Studies in Conflict and Terrorism 32:109-128 February 2009.
Explores key elements of Al Qaeda's propaganda including the means it is disseminated; also assesses the U.S. and U.K. governments' response to this ideological struggle.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=36161135&site=ehost-live

Sagemen, Marc.  Next Generation of Terror.  Foreign Policy 165:37-42 March-April 2008.
The next generation of jihadists are a lot of self-recruited "wannabes".
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=31296911&site=ehost-live&custid=airuniv

Schwartz, Seth J.  Terrorism:  An Identity Theory Perspective.  Studies in Conflict and Terrorism 32:537-559 June 2009.
Outlines the role of personal, social, and cultural identity in religious and ethnically motivated terrorism.
Also available online at: 
http://www.informaworld.com/openurl?genre=article&issn=1057-610X&volume=32&issue=6&spage=537

Wiedenhaefer, Robert M.  Ethno-Psychological Characteristics and Terror-Producing Countries:  Linking Uncertainty Avoidance to Terrorist Acts in the 1970s.  Studies in Conflict and Terrorism 30:801-823 September 2007.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=26210136&site=ehost-live


Radical Groups & Homegrown Terrorists


Internet Resource

Thachuk, Kimberley L. and others.  Homegrown Terrorism:  The Threat Within.  Washington, National Defense University, 2008.  42 p.
Available online at:  http://handle.dtic.mil/100.2/ADA482139
Discusses the difficulty finding root causes of domestic terrorism.
 

Internet Resource (Student Research)

Bryant, Reginald E.  Ignoring the Obvious:  The Influence of Islamism in America.  Norfolk, VA, Joint Forces Staff School, 2008.  86 p.
Available online at:  http://handle.dtic.mil/100.2/ADA487205
"Thesis proposes that the United States Government (USG) acknowledges and acts to mitigate the potential domestic threat of Islamism to national security." - Abstract
 

Books

Churchill, Robert H.  To Shake Their Guns in the Tyrant's Face:  Libertarian Political Violence and the Origins of the Militia Movement.  Ann Arbor, MI, The University of Michigan Press, 2009.  370 p.
Using three case studies the author identifies origins of the militia movement in the United States.
Book call no.:  322.420973 C563t

D'Souza, Dinesh.  The Enemy at Home:  The Cultural Left and Its Responsibility for 9/11.  New York, Doubleday, 2007.  333 p.
Book call no.:  973.931 D811e

Jenkins, Brian Michael.  Defining the Role of a National Commission on the Prevention of Violent Radicalization and Homegrown Terrorism.  Santa Monica, CA, RAND, 2007.  7 p.
Testimony presented on June 14, 2007 to the House Committee on Homeland Security, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment.
Also available online at:  http://handle.dtic.mil/100.2/ADA473500
Book call no.:  363.32516 J52d

Temple-Raston, Dina.  Jihad Next Door:  The Lackawanna Six and Rough Justice in the Age of Terror.  New York, Public Affairs Perseus Books Group, 2007.  288 p.
Book call no.:  363.325170973 T287j

Turchie, Terry D. and Puckett, Kathleen M.  Hunting the American Terrorist:  The FBI's War on Homegrown Terror, foreword by Louis J. Freeh.  Palisades, NY, History Publishing Company, LLC, 2007.  294 p.
Book call no.:  363.325 T932h

United States.  Congress.  House of Representatives.  Committee on Homeland Security.  Violent Radicalization and Homegrown Terrorism Prevention Act of 2007.  Report.  110th Congress, 1st session, October 16, 2007.  Washington, GPO, 2007.  23 p.  (Rept. 110-384 pt. 1)
Also available online at:  http://purl.access.gpo.gov/GPO/LPS87881
Book call no.:  344.7305325 U58v Pt.1

United States.  Congress.  Senate.  Committee on Homeland Security and Governmental Affairs.  Violent Islamist Extremism, the Internet and the Homegrown Terrorist Threat:  Minority and Majority Staff Report.  Washington, GPO, 2008.  23 p.
Also available online at:  http://hsgac.senate.gov/public/_files/IslamistReport.pdf
Book call no.:  363.325 V7951


Documents (Student Research)

Coffin, McKinley D.  Prison Radicalization:  The New Extremist Training Grounds?  Monterey, CA, Naval Postgraduate School.  83 p.  (Thesis, M.A. in Security Studies)
Using surveys and interviews assesses that prisons are fertile recruiting grounds producing homegrown terrorists.
Also available online at:  http://handle.dtic.mil/100.2/ADA473872
Doc. call no.:  M-U 42525 C6751p

Demko, John M.  The Ongoing War Between the United States National Counter-Terrorism Structure and Militant Islamists:  Is the Next 9/11 Preventable?  Fort Leavenworth, KS, School of Advanced Military Studies, Army Command and General Staff College , 2008.  74 p.
Investigates the militant Islamist threat within the United States, determines the possibility of another major attack, and gives preventive recommendations.
Also available online at:  http://handle.dtic.mil/100.2/ADA485626
Doc. call no.:  M-U 42022-2 D381o
 

Periodicals

Dalrymple, Theodore.  PC Unto Death:  The Fort Hood Massacre and the Failure of Courage That Permitted It.  National Review 61:18+ December 7, 2009.
"Using the example of the massacre at Fort Hood, TX the author presents his thoughts regarding the need for the U.S. military to heed the warning signs of homegrown terrorism which were ignored due to political correctness." - Abstract
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=46837716&site=ehost-live&custid=airuniv

Dawson, Lorne L.  The Study of New Religious Movements and the Radicalization of Home-Grown Terrorists:  Opening a Dialogue.  Terrorism and Political Violence 22:1-21 January-March 2010.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0954%2d6553&volume=22&issue=1&spage=1

Flis, Eric.  Evolution of Terrorist Groups and Networks:  Effects of Successful Undercover Operations on Methods of Operation.  Journal of Counterterrorism and Homeland Security International 15:20-24 Fall 2009.
Explores the shrinking of terrorist groups, networks, and cells resulting in individuals with no ties to larger terrorist groups.

Homegrown Terrorist Cases Bring Focus to Debates on Radicalization.  National Defense 24:11 February 2010.
Examines a homegrown terrorist case focusing on 20 known Somali-Americans in Minneapolis.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=47966766&site=ehost-live&custid=airuniv

Jordan, Javier and Horsburgh, Nicola.  Strengths and Weaknesses of Grassroot Jihadist Networks:  The Madrid Bombings.  Studies in Conflict and Terrorism 31:17-39 January 2008.
Explores the concept of a grass-roots jihadist networks in Europe and the United States, member profiles, and what influence the network may have on key elements within the Global Jihad Movement.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=28111309&site=ehost-live

Kirchick, James.  The Homegrown-Terrorist Threat.  Commentary 129:16-20 February 2010.
Discusses increased terrorist activities within the United States by U.S. citizens.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=47879294&site=ehost-live&custid=airuniv

Miller, Sean J.  American Terrorists in Somalia.  National Journal 41:17 August 1, 2009.
Reports on one of the FBI's major priorities, Somali-Americans increasing in numbers.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=43623108&site=ehost-live&custid=airuniv

MS-13 Threat:  A National Assessment.  Counterterrorism and Homeland Security Reports 14, no. 3:12 2008.
Discusses the Mara Salvatrucha (MS-13) group, mostly Salvadoran nationals with members in at least 42 states.

Sweet, Michael.  Homegrown Threat:  America's Achilles' Heel in Fighting Terrorism.  Homeland Defense Journal 6, no. 4:32-33 2008.
Issue 4 Special Systems Integration Issue.

Webb, Jennifer J. and Cutter, Susan L.  The Geography of U.S. Terrorist Incidents, 1970-2004.  Terrorism and Political Violence 21:428-449 July-September 2009.
Also available online at:  http://www.informaworld.com/openurl?genre=article&issn=0954%2d6553&volume=21&issue=3&spage=428


This page was last updated on 03/26/2010 02:51 PM

Back Arrow Return to Bibliography List

Back Arrow
Return to the Fairchild Research Information Center Homepage