Site Map - Terrorism

When is a Crime Just a Crime?

- Distinguishing common crime from acts of terror.

Terrorism data

- From 1968 through November 15, 2004, international terrorists most frequently targeted private citizens, businesses, and property. Of the 19,383 total incidents of terrorism around the world in that period, 3,192 hit private citizens and property. Business targets were a close second, with 3,065 incidents. Among targets hit, transportation was victimized 821 times, utilities 554 times, and airports and airlines 798 times. After al Qaeda, the most lethal group during these years was Hezbollah, causing more than 800 deaths. These statistics come from the Terrorism Knowledge Base of the National Memorial Institute for the Prevention of Terrorism, a nonprofit organization funded by the U.S. Department of Homeland Security with the mission of preventing or minimizing terrorist attacks on U.S. soil. Among other things, the Knowledge Base is a repository of incidents arranged by type, perpetrator, date, location, and other factors. It also contains overviews of terrorist groups, legal cases involving terrorism, information resources, and other valuable materials for terrorism researchers. Users can create graphs of incidents by group, incident, and other factors, and they can search terrorist organizations by ideology, such as antiglobalization, environmental, and right-wing reactionary. Link to the database via SM Online.

Islamist Cleric Can be Extradited to the U.S.

- Abu Hamza al-Masri, if extradited, will face 11 charges, including the establishment of a terrorist training camp in Oregon.


- A new Maryland law (formerly H.B. 666) will require the state to issue regulations governing the release of the location and specified nature of biological agents. This information will be made available to specific law enforcement jurisdictions that are located near the agents. However, such information will be kept confidential from the general public and unauthorized persons.

Cargo security

- After reviewing comments made to its interim rule, the Transportation Security Administration (TSA) has issued an interim final rule regarding security threat assessments of commercial truck drivers who transport hazardous material. The rule will take effect May 31, 2005. @ To read the entire interim final rule, visit SM Online.


- Some mathematicians believe that virtually everything can be boiled down to numbers and equations. True or not, researchers are currently drawing on statistics and formulas to better identify the causes of terrorism. Read the paper by linking at SM Online.

Predicting Terror Attacks

- Ancient civilizations, such as the Chaldeans, tried to predict the future by studying the movement of the planets and stars. Today's intelligence analysts face a similarly daunting task as they try to predict future terrorist movements by sifting through thousands of reports, data bits, tips, records, and electronic transmissions. Creating a methodology for detecting constellations of evidence is a top priority for the intelligence community. The RAND Corporation may have found a way to do just that. A monograph by RAND explains the approach in detail. @ Out of the Ordinary: Finding Hidden Threats by Analyzing Unusual Behavior .

Did You Know That?

- BioShield is a U.S. government initiative that finances the stockpiling of drugs and vaccines against bioterror agents. A survey of 30 experts in biomedical research or drug and vaccine development, however, indicates that BioShield doesn't do enough to engage the private sector.

Transportation security.

- Bus drivers and highway construction crews get a terrorism-awareness guide.

Fighting the War on Terror in Cyberspace

- Researchers at the University of Arizona have a new tool to identify the Web's most notorious cyberjihadists.


- Three bills introduced in Congress would give immunity from civil liability to those who report threats of terrorism against transportation systems. S. 1369 introduced by Sen. Susan Collins (R-ME) and H.R. 2291 introduced by Rep. Stevan Pearce (R-NM) are identical. The bills would limit liability for anyone making good faith reports about threats of terrorism against transportation systems or passengers and taking reasonable actions to mitigate the threat. The third bill (S. 1891) introduced by Sen. Ken Salazar (D-CO) is broader and would extend immunity to those who report their reasonable suspicions regarding any threats to transportation systems or passengers including threats of terrorism.

Terrorism: Strategies for Intervention

- Scholarly books are dry--it's almost inevitable. Luckily, this book, a compilation of articles on terrorism intervention strategies, is an exception. Though erudite, the book is captivating and easy to read, offering something for almost anyone with an interest in terrorism or in preparing for mitigation and emergency response. By placing problems, issues, and incidents in a highly relational situational context, it promotes reader understanding.

Strike One for Trilogy

- If you're planning to roll out a large-scale IT project, you might want to pay heed to some lessons learned from the FBI's troubled Virtual Case File (VCF) software project. @ The testimony before Congress by Fine, Mueller, and Punaro, and the IG's report on Trilogy, are at SM Online.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.