IWS - The Information Warfare Site
News Watch Make a  donation to IWS - The Information Warfare Site Use it for navigation in case java scripts are disabled


Terrorism Terms

Coming Soon

'Today’s weapon of choice for terrorists remains the AK-47, the car bomb, and the rocket. But terrorists looking for a bigger impact will increasingly turn to weapons of mass destruction and cyberterrorism.'

Ambassador Michael Sheehan, US Coordinator for Counterterrorism

Essential Documents

Patterns of Global Terrorism 2003, Department of State, April 2004

Terrorism: Threat Assessment, Countermeasures and Policy, Electronic Journal of the Department of State - Volume 6, Number 3, November 2001

Statement by Director of Central Intelligence George J. Tenet before the Senate Select Committee on Intelligence on the "Worldwide Threat 2001: National Security in a Changing World" (as prepared for delivery) [07/02/01]

Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy

Perspectives - Trends in Terrorism - Report #2000/01 published on 18.12.99 (© Canadian Security Intelligence Service)


General Articles

Oversight on Eco-terrorism specifically examining the Earth Liberation Front and the Animal Liberation Front, Committee on Environment and Public Works, May 2005

Virtual Threat, Real Terror: Cyberterrorism in the 21st Century, Senate Judiciary Committee Hearing, February 24, 2004

Foreign Terrorist Organizations, Congressional Research Service, February 6, 2004

Bounding the Global War on Terrorism by Dr. Jeffrey Record, Strategic Studies Institute, December 2003

Terrorism Financing: Origination, Organization, and Prevention, Senate Committee on Governmental Affairs, July 31, 2003

Combating Terrorism: Interagency Framework and Agency Programs to Address Overseas Threat [6.7 MB] GAO-03-165, May 23, 2003

Overview of International Terrorist Organizations Hearing , Committee on International Relations U.S. House of Representatives, March 2003

Combating Terrorism: Observations on National Strategies Related to Terrorism, by Raymond J. Decker, director, defense capabilities and management issues, before the Subcommittee on National Security, Emerging Threats, and International Relations, House Committee on Government Reform.GAO-03-519T, March 3, 2003.

Byliner: CIA's Pillar on Counterterrorism, 14. November 2001

State Department Chronology on Terrorist Incidents 1961-2001
November 8, 2001 (Details significant terrorist incidents over past 40 years) (This State Department-produced chronology, based entirely on public sources, was prepared for background information and reference purposes. It is not intended to be a complete or comprehensive account of all terrorist incidents during these years, and it is not an official expression of U.S. policy.)

Special Oversight Panel on Terrorism hearing on terrorist threats to the United States by the US House Armed Services Committee, May 23, 2000

Hearing Transcript 

Opening Statement of Chairman Saxton 

Dr. Kenneth Alibek, Chief Scientist, Hadron, Inc. Former First Deputy Chief, Biopreparat (USSR) 

Mr. Bron Cikotas, Former EMP Division Chief, Defense Nuclear Agency 

Dr. Dorothy E. Denning, Professor of Computer Science, Georgetown University   

The Military Response to Terrorism by Captain Mark E. Kosnik, U.S. Navy published in the Navy War College Review Spring 2000

Perspectives - Doomsday Religious Movements - Report #2000/03
published on 18.12.99 (© Canadian Security Intelligence Service)

Conventional Terrorism

Terrorists and Suicide Attacks, CRS, August 28, 2003

Press Release: Stump, Skelton Release Report on Congressional Investigation into Terrorist Attack on the U.S.S. Cole Report finds numerous contributing causes of vulnerability, recommends reforms to prevent future terrorist attacks, House Armed Services Committee May 2001 The Investigation into the Attack on the U.S.S. Cole (May 2001) - Report [17MB pdf file]

Combating Terrorism: FEMA Continues to Make Progress in Coordinating Preparedness and Response. [1 MB] GAO-01-15, March 19.

Cyberterrorism / Digital Terrorism

Definition of Cyberterrorism:

'Cyber terrorism' means intentional use or threat of use, without legally recognized authority, of violence, disruption, or interference against cyber systems, when it is likely that such use would result in death or injury of a person or persons, substantial damage to physical property, civil disorder, or significant economic harm'

Article 1.2 of the 'Proposal for an International Convention on Cyber Crime and Terrorism' by the Center for International Security and Cooperation

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress, CRS Report, Updated April 1, 2005

Al Qaeda and the Internet: The Danger of ‘Cyberplanning, by Thomas, Timothy L., Parameters, Spring 2003. pp. 112-23.

Revenge of the Nerds Cyber-terrorism poses new threats to national security, and U.S. defense policy must anticipate the menace by Richard J. Vivero, Copyright © 2001 Harvard Political Review

'Cyberterrorism hype' by Johan J Ingles-le Noble October 1999 (article courtesy of Jane's Intelligence Review)

Information Warfare by Yael Shahar an article which looks at IW carried out by terrorists, February 1997

Computer terrorism: What are the risks ? written by Patrick Galley in 1996

NBC Terrorism 

'We must prepare our nation against the dangers of a new era. The grave threat from nuclear, biological and chemical weapons has not gone away with the Cold War. It has evolved into many separate threats, some of them harder to see and harder to answer. And the adversaries seeking these tools of terror are less predictable, more diverse. With advance technology, we must confront the threats that come on a missile. With shared intelligence and enforcement, we must confront the threats that come in a shipping container or in a suitcase. We have no higher priority than the defense of our people against terrorist attack.'

President George W. Bush, Remarks to the Troops and Personnel at Norfolk Naval Air Station, Norfolk, VA (13 February 2001)

Nuclear Terrorism: Identifying and Combating the Risks, IAEA, London March 2005

Ricin: Technical Background and Potential Role in Terrorism -- Updated, Congressional Research Service, February 2004

Bioterrorism: Adequacy of Preparedness Varies Across State and Local Jurisdictions. GAO-03-373, April 7, 2003

IAEA on Threat of Nuclear Terrorism 5-11-2001

Chemical Weapons: FEMA and Army Must Be Proactive in Preparing States for Emergencies [2.6 MB] GAO-01-850, August 13 2001.

U.S. military's capabilities to respond to domestic terrorist attacks involving the use of weapons of mass destruction US Senate Subcommittee on Emerging Threats and Capabilities, May 1, 2001.

Perspectives - Chemical, Biological, Radiological and Nuclear (CBRN) Terrorism - Report #2000/02 published on 18.12.99 (© Canadian Security Intelligence Service)

Combatting Terrorism: Need for Comprehensive Threat and Risk Assessments of Chemical and Biological Attacks, GAO September 1999, GAO/NSIAD-99-163


Terrorism Links

For more links visit our new link directory

How to Link to IWS

Research Institutes

International Policy Institute for Counter-Terrorism in Herzliya, Israel 
'The site provides background information and articles dealing with various aspects of terrorism, daily updates on events worldwide relating to the phenomena of terrorism and counter-terrorism, and a database on terrorist organizations and attacks.'

Centre for the Study of Terrorism and Political Violence (CSTPV), St Andrews
'The primary focus of the centre is the study of terrorism and related forms of political violence.'

Terrorism Research Center, USA 'The Center is dedicated to informing the public of the phenomena of terrorism and information warfare. This useful site provides monthly essays on current issues, as well as links to other terrorism and information warfare related web sites and essays.'

Google Ads

IWS Mailing Lists

Mailing Lists Overview

Affiliates & Supporters


IWS Awards & Reviews


More Awards & Reviews

IWS welcomes suggestions regarding site content and usability. Please use our contact form to submit your comments.

Last modified: 21 February, 2011 by Wanja Eric Naef

IWS Copyright 2000 - 2011