Counterterrorism

Discover the wide array of official publications  to include topical areas of homeland security,  military readiness, combatting terrorism from actors, such as ISIS/ISIL, or Al-Qaeda, and U.S. military policies that were shaped after America's 9/11 historical terrorism tragedy.  

118 items
Page 1 of 3
Nonstate Actors And Anti-access/area Denial Strategies: The Coming Challenge
Title:
Nonstate Actors And Anti-Access/Area Denial Strategies: The Coming Challenge

Nonstate Actors And Anti-access/area Denial Strategies: The Coming Challenge

Complex Terrain: Megacities and the Changing Character of Urban Operations
Title:
Complex Terrain: Megacities and the Changing Character of Urban Operations

Complex Terrain: Megacities and the Changing Character of Urban Operations

Recommendations For Success In Afghanistan
Title:
Recommendations for Success in Afghanistan

Recommendations For Success In Afghanistan

The Al-Qaeda Accelerant in Boko Haram\'s Rise
Title:
The Al-Qaeda Accelerant in Boko Haram's Rise

The Al-Qaeda Accelerant in Boko Haram\'s Rise

FBI Story 2018
Title:
FBI Story 2018

FBI Story 2018

On Wargaming: How Wargames Have Shaped History and How They May Shape the Future
Title:
On Wargaming: How Wargames Have Shaped History and How They May Shape the Future

On Wargaming: How Wargames Have Shaped History and How They May Shape the Future

Silent Partners: Organized Crime, Irregular Groups, And Nation-states
Title:
Silent Partners: Organized Crime, Irregular Groups, and Nation-States

Silent Partners: Organized Crime, Irregular Groups, And Nation-states

Maintaining Information Dominance In Complex Environments
Title:
Maintaining Information Dominance in Complex Environments

Maintaining Information Dominance In Complex Environments

The Rapid Evolution of the MS-13 in El Salvador & Honduras From Gang to Tier-One Threat to Central America and U.S. Security Interests
Title:
The Rapid Evolution of the MS-13 in El Salvador & Honduras From Gang to Tier-One Threat to Central America and U.S. Security Interests

The Rapid Evolution of the MS-13 in El Salvador & Honduras From Gang to Tier-One Threat to Central America and U.S. Security Interests

Critical Infrastructure in Latin America: Connected, Dependent and Vulnerable
Title:
Critical Infrastructure in Latin America: Connected, Dependent and Vulnerable

Critical Infrastructure in Latin America: Connected, Dependent and Vulnerable

"Following the Money Trail" To Combat Terrorism, Crime, and Corruption in The Americas
Title:
"Following the Money Trail" To Combat Terrorism, Crime, and Corruption in The Americas

"Following the Money Trail" To Combat Terrorism, Crime, and Corruption in The Americas

The Land, Space, And Cyberspace Nexus: Evolution Of The Oldest Military Operations In The Newest Military Domains
Title:
The Land, Space, and Cyberspace Nexus: Evolution of the Oldest Military Operations in the Newest Military Domains

The Land, Space, And Cyberspace Nexus: Evolution Of The Oldest Military Operations In The Newest Military Domains

Friendly Force Dilemmas In Europe: Challenges Within And Among Intergovernmental Organizations And The Implications For The U.S. Army
Title:
Friendly Force Dilemmas in Europe: Challenges Within and Among Intergovernmental Organizations and the Implications for the U.S. Army

Friendly Force Dilemmas In Europe: Challenges Within And Among Intergovernmental Organizations And The Implications For The U.S. Army

The FBI Story 2017
Title:
The FBI Story 2017

The FBI Story 2017

Impunity: Countering Illicit Power In War And Transition
Title:
Impunity: Countering Illicit Power in War and Transition

Impunity: Countering Illicit Power In War And Transition

Toward A Nato Of The Gulf: The Challenges Of Collective Defense Within The Gcc
Title:
Toward a NATO of the Gulf: The Challenges of Collective Defense Within the GCC

Toward A Nato Of The Gulf: The Challenges Of Collective Defense Within The Gcc

Evaluation Of The 2015 Dod Cyber Strategy: Mild Progess In A Complex And Dynamic Military Domain
Title:
Evaluation of the 2015 DOD Cyber Strategy: Mild Progress in a Complex and Dynamic Military Domain

Evaluation Of The 2015 Dod Cyber Strategy: Mild Progess In A Complex And Dynamic Military Domain

Terrorist Sanctuary In The Sahara: A Case Study
Title:
Terrorist Sanctuary in the Sahara: A Case Study

Terrorist Sanctuary In The Sahara: A Case Study

Out of the Crucible: How the US Military Transformed Combat Casualty Care in Iraq and Afghanistan
Title:
Out of the Crucible: How the US Military Transformed Combat Casualty Care in Iraq and Afghanistan

Out of the Crucible: How the US Military Transformed Combat Casualty Care in Iraq and Afghanistan

Beyond Convergence: World Without Order
Title:
Beyond Convergence: World Without Order

Beyond Convergence: World Without Order

A Short History of Biological Warfare: From Pre-History to the 21st Century
Title:
A Short History of Biological Warfare: From Pre-History to the 21st Century

A Short History of Biological Warfare: From Pre-History to the 21st Century

Pentagon Pivot: How Lead Users Are Transforming Defense Product Developent
Title:
The Pentagon's Pivot: How Lead Users Are Transforming Defense Product Development

Pentagon Pivot: How Lead Users Are Transforming Defense Product Developent

Reconstructing the Afghan National Defense and Security Forces: Lessons From the U.S. Experience in Afghanistan
Title:
Reconstructing the Afghan National Defense and Security Forces: Lessons From the U.S. Experience in Afghanistan

Reconstructing the Afghan National Defense and Security Forces: Lessons From the U.S. Experience in Afghanistan

Chinese Military Diplomacy: 2003-2016, Trends and Implications
Title:
Chinese Military Diplomacy: 2003-2016, Trends and Implications

Chinese Military Diplomacy: 2003-2016, Trends and Implications

U.S. Marines in Afghanistan, 2010-2014: Anthology and Annonated Bibliography
Title:
U.S. Marines in Afghanistan, 2010-2014: Anthology and Annotated Bibliography

U.S. Marines in Afghanistan, 2010-2014: Anthology and Annonated Bibliography

Putin\'s Syrian Gambit: Sharper Elbows, Bigger Footprint, Stickier Wicket
Title:
Putin's Syrian Gambit: Sharper Elbows, Bigger Footprint, Stickier Wicket

Putin\'s Syrian Gambit: Sharper Elbows, Bigger Footprint, Stickier Wicket

Cyber Infrastructure Protection: Volume Iii
Title:
Cyber Infrastructure Protection: Volume III

Cyber Infrastructure Protection: Volume Iii

Advancing Stability and Reconciliation in Guinea-Bissau: Lessons From Africa's First Narco-State
Title:
Advancing Stability and Reconciliation in Guinea-Bissau: Lessons From Africa's First Narco-State

Advancing Stability and Reconciliation in Guinea-Bissau: Lessons From Africa's First Narco-State

Rethinking the Drone War: National Security, Legitamacy and Civilian Casualties in U.S. Counterterrorism Operations
Title:
Rethinking the Drone War: National Security, Legitimacy and Civilian Casualties in U.S. Counterterrorism Operations

Rethinking the Drone War: National Security, Legitamacy and Civilian Casualties in U.S. Counterterrorism Operations

Charting a Course: Strategic Choices for a New Administration
Title:
Charting a Course: Strategic Choices for a New Administration

Charting a Course: Strategic Choices for a New Administration

Antiquities Destruction and Illicit Sales as Sources of ISIS Funding and Propaganda
Title:
Antiquities Destruction and Illicit Sales as Sources of ISIS Funding and Propaganda

Antiquities Destruction and Illicit Sales as Sources of ISIS Funding and Propaganda

The North Caucasus Insurgency: Dead or Alive?
Title:
The North Caucasus Insurgency: Dead or Alive?

The North Caucasus Insurgency: Dead or Alive?

The Al-Qaeda Organization and the Islamic State Organization: History, Doctrine, Modus Operandi, and U.S. Policy To Degrade and Defeat Terrorism Conducted in the Name of Sunni Islam
Title:
The Al-Qaeda Organization and the Islamic State Organization: History, Doctrine, Modus Operandi, and U.S. Policy To Degrade and Defeat Terrorism Conducted in the Name of Sunni Islam

The Al-Qaeda Organization and the Islamic State Organization: History, Doctrine, Modus Operandi, and U.S. Policy To Degrade and Defeat Terrorism Conducted in the Name of Sunni Islam

The COIN Conundrum: The Future of U.S. Counterinsurgency and U.S. Land Power
Title:
The COIN Conundrum: The Future of U.S. Counterinsurgency and U.S. Land Power

The COIN Conundrum: The Future of U.S. Counterinsurgency and U.S. Land Power

Deterring Cybertrespass and Securing Cyberspace: Lessons From United States Border Control Strategies
Title:
Deterring Cybertrespass and Securing Cyberspace: Lessons From United States Border Control Strategies

Deterring Cybertrespass and Securing Cyberspace: Lessons From United States Border Control Strategies

Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition
Title:
Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition

Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition

Gestion de Inteligencia en las Americas (Spanish Language)
Title:
Gestion de Inteligencia en las Americas (Spanish Language)

Gestion de Inteligencia en las Americas (Spanish Language)

Indicators and Warnings for Home Made Explosives (HME Guide), March 2008 (Package of 5) (TSWG Restricted Controlled Item)
Title:
Indicators and Warnings for Home Made Explosives (HME Guide), March 2008 (Package of 5) (TSWG Restricted Controlled Item)

Indicators and Warnings for Home Made Explosives (HME Guide), March 2008 (Package of 5) (TSWG Restricted Controlled Item)

Critical Infrastructure Database Catalog Version 2.0 (November 2008) CD (TSWG Controlled Item)
Title:
Critical Infrastructure Database Catalog Version 2.0 (November 2008) CD (TSWG Controlled Item)

Critical Infrastructure Database Catalog Version 2.0 (November 2008) CD (TSWG Controlled Item)

IED Evidence Collection Guide (TSWG Controlled Item)
Title:
IED Evidence Collection Guide (TSWG Controlled Item)

IED Evidence Collection Guide (TSWG Controlled Item)

Pages

Back to Top