Freedom

"Freedom is never more than one generation away from extinction. We didn't pass it to our children in the bloodstream. It must be fought for, protected, and handed on for them to do the same, or one day we will spend our sunset years telling our children and our children's children what it was once like in the United States where men were free." Ronald Reagan, 40th President of the United States of America

Analysis and Research

SITE Intelligence Group

"Research and analysis of terrorist networks, including monitoring of jihadist propaganda, studying trends within the online jihadist community, and understanding how jihadist groups utilize the Internet."

https://www.siteintelgroup.com/

Center for Risk and Economic Analysis of Terrorism Events

"CREATE's mission is to improve our Nation's security through the development of advanced models and tools for the evaluation of the risks, costs and consequences of terrorism to guide economically viable investments in homeland security."

http://create.usc.edu/


The Homeland Security Digital Library (HSDL)

The Homeland Security Digital Library (HSDL) is the nation's premier research collection of open-source resources related to homeland security policy, strategy and organizational management. The HSDL is sponsored by the Naval Postgraduate School Center for Homeland Defense and Security and the U.S. Department of Homeland Security’s National Preparedness Directorate, FEMA.

http://www.hsdl.org/


The Joint Chiefs of Staff - The Guardian Anti-Terrorism Journal

The Guardian Antiterrorism Journal is published for the Chairman of the Joint Chiefs of Staff by J-34, Deputy Directorate for Antiterrorism/Homeland Defense.

http://www.jcs.mil/page.aspx?id=18

Implementing 9/11 Commission Report

Progress report on the implementation of the Commission's findings, ten years after 9/11.http://www.dhs.gov/xlibrary/assets/implementing-9-11-commission-report-progress-2011.pdf

Homeland Security Institute (HSI)

The Homeland Security Act of 2002 (Section 305 of PL 107-296, as codified in 6 U.S.C. 185) authorizes the Secretary of the Department of Homeland Security (DHS) acting through the Under Secretary for Science and Technology, to establish one or more federally funded research and development centers or FFRDCs to provide independent analysis of homeland security issues. Analytic Services Inc. operates the Homeland Security studies and analysis Institute (HSsaI) (formerly the Homeland Security Institute or HSI) as an FFRDC for DHS under contract HSHQDC-09-D-00003.

http://www.homelandsecurity.org/Default.aspx

CTC

"The Combating Terrorism Center at West Point contributes relevant scholarly perspectives through education, research and policy analysis to combat terrorist threats to the United States. We maintain expertise in four primary areas: terrorism, counterterrorism, homeland security, and weapons of mass destruction. By developing a curriculum of the highest quality, producing theoretically informed studies, and crafting relevant policy recommendations, we remain an internationally recognized center of excellence dedicated to the advancement of terrorism knowledge and expertise."

http://www.ctc.usma.edu/

RAND

"For over 30 years, RAND has been a world leader in terrorism research and analysis. As a public service, RAND disseminates all unclassified research as printed documents or online. Much of this research is managed by the Homeland Security program of RAND Infrastructure, Safety, and Environment. View all Terrorism and Homeland Security Documents Available Online or find general information atReports and Bookstore."

http://www.rand.org/research_areas/terrorism/

Center for Strategic & International Studies

"CSIS experts conduct research and analysis and develop policy initiatives that are organized around more than 25 programs grouped under three themes:"

http://www.csis.org/researchfocus/#DefenseSecurityPolicy

Perspectives on Terrorism (PT)

Perspectives on Terrorism (PT) seeks to provide a unique platform for established and emerging scholars to present their perspectives on the developing field of terrorism research and scholarship; to present original research and analysis; and to provide a forum for discourse and commentary on related issues."

http://www.terrorismanalysts.com/pt/

The Center for Defense Information (CDI)

"The Center for Defense Information (CDI) provides expert analysis on various components of U.S. national security, international security and defense policy. CDI promotes wide-ranging discussion and debate on security issues such as nuclear weapons, space security, missile defense, small arms and military transformation.

Since 1972, CDI has produced research and publications such as the acclaimed Defense Monitor, numerous books and monographs, and engaging conferences.

To ensure the ability to provide objective analysis, CDI accepts no U.S. government or defense industry funding. To encourage the intellectual freedom of the staff, CDI does not hold policy positions. CDI is part of the World Security Institute, whose divisions include the Center for Defense Information, International Media, the Pulitzer Center on Crisis Reporting, Azimuth Media and International Programs with offices in Brussels, Cairo and Moscow, and projects in China."

http://www.cdi.org/index.cfm

The Clarion Project

Founded in 2006, the Clarion Project (formerly Clarion Fund Inc) is an independently funded, non-profit organization dedicated to exposing the dangers of Islamic extremism while providing a platform for the voices of moderation and promoting grassroots activism.

http://www.clarionproject.org/news-analysis

The Investigative Project on Terrorism (IPT)

The Investigative Project on Terrorism (IPT) is a non-profit research group founded by Steven Emerson in 1995. It is recognized as the world's most comprehensive data center on radical Islamic terrorist groups. For more than a decade, the IPT has investigated the operations, funding, activities and front groups of Islamic terrorist and extremist groups in the United States and around the world. It has become a principal source of critical evidence to a wide variety of government offices and law enforcement agencies, as well as the U.S. Congress and numerous public policy forums. Research carried out by the IPT team has formed the basis for thousands of articles and television specials on the subject of radical Islamic involvement in terrorism, and has even led to successful government action against terrorists and financiers based in the United States.

http://www.investigativeproject.org/

DHS Lexicon

See the link below for the DHS Lexicon. This is a very useful document that provides a single common language for DHS Risk Management.

http://www.dhs.gov/xlibrary/assets/dhs_risk_lexicon.pdf

Homeland Security Institute (HSI)

The Homeland Security Institute (HSI) is a Studies and Analysis Federally Funded Research and Development Center established pursuant to Section 312 of the Homeland Security Act of 20021. HSI delivers independent and objective analyses and advises in core areas important to its sponsor in support of policy development, decision-making, analysis of alternative approaches, and evaluation of new ideas on issues of significance. The need for HSI was documented in the National Research Council's 2002 report, Making the Nation Safer.

http://www.homelandsecurity.org/

The International Association for Counterterrorism and Security Professionals (IACSP)

"Our goals include creating a center of information and educational services for those concerned about the challenges now facing all free societies, and promoting professional ethics in the counterterrorism field."

http://www.iacsp.com/main.php

Terrorism Research Center

Founded in 1996, the Terrorism Research Center, Inc. (TRC) is an independent institute dedicated to the research of terrorism, information warfare and security, critical infrastructure protection and other issues of low-intensity political violence and gray-area phenomena. The TRC represents a new generation of terrorism and security analysis, combining expertise with technology to maximize the scope, depth and impact of our research for practical implementation.

http://www.terrorism.com/modules.php?op=modload&name=About&file=index

International Terrorism and Security Research

There is no indication on the site as to who or what organization sponsors the site. The site does contain useful information in a simple layout. However a user is cautioned in citing this resource as you cannot determine the source of this information for proper attribution.

http://www.terrorism-research.com/

Society for Terrorism Research (STR)

The Society for Terrorism Research (STR) is an international, multi-disciplinary organization of theoretical and empirical researchers in such behavioral sciences as anthropology, biology, economics, political science, psychology, psychiatry, sociology, and others. Its mission is to enhance knowledge and understanding of terrorism and political violence.

http://www.societyforterrorismresearch.org/

Terrorism Research and Analysis Consortium (TRAC)

Created by The Beacham Group, LLC, Terrorism Research & Analysis Consortium (TRAC) is a uniquely comprehensive resource for the study of political violence of all kinds. In cooperation with a team of 2800 experts, TRAC gathers the best information for exploration of this topic by faculty, scholars, students, government and defense professionals, as well as the general public. for the study of political violence of all kinds.

http://www.trackingterrorism.org/

Purdue Homeland Security Institute

The Purdue Homeland Security Institute was established in response to the events of September 11, 2001 with the charter to help our nation prevent, protect, respond and recover from any threat or action taken against our homeland. Today, we fully embrace the principles outlined in the National Response Framework as we work daily to identify and confront the myriad of homeland security challenges our nation faces. We then pursue solutions using the power of inter-disciplinary discovery, learning, and engagement here at Purdue University and apply that knowledge across the State of Indiana and the nation.

http://www.purduehomelandsecurity.org/

George Washington University Homeland Security Policy Institute (HSPI)

Founded in 2003, The George Washington University Homeland Security Policy Institute (HSPI) is a nonpartisan “think and do” tank whose mission is to build bridges between theory and practice to advance homeland security through an interdisciplinary approach. By convening domestic and international policymakers and practitioners at all levels of government, the private and non-profit sectors, and academia, HSPI creates innovative strategies and solutions to current and future threats to the nation.

http://www.gwumc.edu/hspi/

CIA Library

The Library contains a wealth of information, from unclassified current publications to basic references, reports and maps. The Library features our most popular publication, The World Factbook, and our online directory of Chiefs of State and Cabinet Members of Foreign Governments. It also features numerous documents and articles of historical significance, including those found in Studies in Intelligence.

https://www.cia.gov/library/index.html

Federation of American Scientists

The Federation of American Scientists (FAS) provides science-based analysis of and solutions to protect against catastrophic threats to national and international security. Specifically, FAS works to reduce the spread and number of nuclear weapons, prevent nuclear and radiological terrorism, promote high standards for nuclear energy’s safety and security, illuminate government secrecy practices, as well as prevent the use of biological and chemical weapons.

https://fas.org/

Agencies and Organizations

National Counterterrorism Center


"Lead our nation's effort to combat terrorism at home and abroad by analyzing the threat, sharing that information with our partners, and integrating all instruments of national power to ensure unity of effort.


http://www.nctc.gov/


FBI Joint Terrorism Task Forces


They are our nation's front line on terrorism: small cells of highly trained, locally based, passionately committed investigators, analysts, linguists, SWAT experts, and other specialists from dozens of U.S. law enforcement and intelligence agencies.


http://www.fbi.gov/page2/may09/jttfs_052809.html


Center for Domestic Preparedness


The CDP develops and delivers training for emergency response providers from state, local, and tribal governments and, when appropriate, the federal government, foreign governments, and private entities.


https://cdp.dhs.gov/index.html


Foundation for Defense of Democracies (FDD)


The Foundation for Defense of Democracies (FDD) is the only nonpartisan policy institute dedicated exclusively to promoting pluralism, defending democratic values, and fighting the ideologies that threaten democracy.


http://www.defenddemocracy.org/index.php?option=com_content&view=frontpage&Itemid=317


The Lawfare Project


Lawfare denotes "the use of the law as a weapon of war"** or, more specifically, the abuse of the law and judicial systems to achieve strategic military or political ends.


http://www.thelawfareproject.org/


Economic Warfare Institute


Economic Warfare Institute (EWI) is dedicated to tracking and analyzing economic threats directed against the United States and other Western democracies.


http://www.acdemocracy.org/economic-warfare-institute.cfm


CBRNE and WMD


Center for National Response (CNR)

"The Center for National Response (CNR) is uniquely suited as a multipurpose exercise facility. This facility is designed to meet a wide range of Weapons of Mass Destruction Consequence Management and CounterTerrorism requirements for the Department of Defense, Federal, State, and Local organizations. The tunnel's physical configuration enhances experience at the individual, unit, and multi-organization/agency level. It serves as a valuable asset in preparing both military and civilian response teams to meet future threats and challenges. The tunnel is ideal for consequence and crisis management emergency response exercises and provides a realistic environment where emergency response teams can readily practice their techniques in mitigating the effects of a WMD incident."

http://www.centerfornationalresponse.com/about/about.html


National Counterproliferation Center (NCPC)

The National Counterproliferation Center (NCPC) was founded on November 21, 2005 in the Office of the Director of National Intelligence to help the United States counter the threats caused by the proliferation of chemical, biological, radiological and nuclear weapons.

http://www.counterwmd.gov/


Center for Nonproliferation Studies (CNS)

CNS combats the spread of weapons of mass destruction (WMD) by training the next generation of nonproliferation specialists and disseminating timely information and analysis.

http://cns.miis.edu/


Chemical, Biological, Radiological & Nuclear Defense Information Analysis Center
This site offers very detailed technical information. Check out the newsletter.

https://www.cbrniac.apgea.army.mil/Pages/default.aspx


Nuclear Terrorism

This site offers blast maps for any community.

http://www.nuclearterror.org/blastmaps.html


Dirty Bombs

FAQs on "dirty bombs" from the CDC.

http://www.bt.cdc.gov/radiation/dirtybombs.asp


NUKEMAP3D

A nuclear weapon effects simulator for Goggle Earth (by Alex Wellerstein).

http://nuclearsecrecy.com/nukemap3d/

Counterterrorism

Most Wanted CounterIntelligence - FBI

http://www.fbi.gov/wanted/counterintelligence


Counter Terrorism Guide

The US National Counterterrorism Center is pleased to present the Terrorism Guide Website. This site contains many features across the full range of issues pertaining to international terrorism: terrorist groups, wanted terrorists, technical pages on various threat-related topics, and a historic timeline that marks dates that terrorists may believe are important if planning attacks to commemorate particular events.

http://www.nctc.gov/site/index.html


Novel Fingerprinting Technique

An innovative product that uses fluorescence to detect fingerprints has been developed by a team from the Laboratoire de Photophysique et Photochimie Supramoléculaire et Macromoléculaire (CNRS/ENS Cachan) in collaboration with the specialized French firm Crime Scene Technology.

http://www2.cnrs.fr/en/2287.htm


Weapons and Tactics

These pages provide information on how to deal with different types of terrorist attacks or activity. Click on the below links for advice on how to recognize attacks using chemical or biological weapons, what steps you should take to take to protect yourself in an imminent bomb or Improvised Explosive Device attack, and how you can recognize suspicious financial activity or fake travel documents.

http://www.nctc.gov/site/technical/index.html


Counterterrorism Blog

"Welcome to the Counterterrorism Blog, a unique, multi-expert blog dedicated to providing a one-stop gateway to the counterterrorism community. To our knowledge, there has been no such blog on the internet. We envision the blog’s audience to be the policymakers in Congress and the Executive Branch, as well as serious students elsewhere, who want to visit a single site to access (1) overnight and breaking news, with realtime intel and commentary by operational experts ("Contributing Experts"); (2) discussions of long-term trends in counterterrorism; (3) summaries of and discussions about US and international law; and (4) a calendar of upcoming events, hearings, and seminars featuring the Contributing Experts. We want to highlight those experts who are or have been deeply involved in counterterrorism cases, and thus enable them to expand their opportunities to bring their expertise to the attention of policymakers."

http://counterterrorismblog.org/


International Policy Institute for Counter-Terrorism (ICT)

This is a site based in Israel. They offer some interesting training. Some very valid insight, tempered by years of experience in directly combatting terrorism.


"Founded in 1996, the International Policy Institute for Counter-Terrorism (ICT) is the leading academic institute for counter-terrorism in the world, facilitating international cooperation in the global struggle against terrorism. ICT is an independent think tank providing expertise in terrorism, counter-terrorism, homeland security, threat vulnerability and risk assessment, intelligence analysis and national security and defense policy."

http://www.ict.org.il/


The United Kingdom Home Office

The Home Office is responsible for keeping the UK safe from the threat posed by terrorism.

http://www.homeoffice.gov.uk/counter-terrorism/


The Criminal Justice System as a Counter-Terrorism Tool

"The Obama administration is committed to using every instrument of national power to fight terrorism – including intelligence and military operations as well as the criminal justice system. As a counter-terrorism tool, the criminal justice system has proven incredibly effective in both incapacitating terrorists and gathering valuable intelligence from and about terrorists. In every instance, the administration will use the tool that is most effective for fighting terrorism, and will make those decisions based on pragmatism, not ideology."

http://www.justice.gov/cjs/

Cyber Crimes and Terrorism

Cybers Most Wanted - FBI





















The U.S. Cyber Consequences Unit

The U.S. Cyber Consequences Unit (US-CCU) is an independent, non-profit (501c3) research institute. It provides assessments of the strategic and economic consequences of possible cyber-attacks and cyber-assisted physical attacks. It also investigates the likelihood of such attacks and examines the cost-effectiveness of possible counter-measures.

http://www.usccu.us


Visualizations - Cyber Breaches (information is beautiful)

David McCandless and "...the rest if the crack team here at Information is Beautiful, are dedicated to distilling the world's data, information and knowledge into beautiful, interesting and, above all, useful visualizations, infographics and diagrams." Links below are for two powerful examples of their visualization work.

http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/


http://infobeautiful3.s3.amazonaws.com/2014/10/1276_how-much-is-your-data-worth1.png


Real Time Cyber Attack Map

Real-time visibility into global cyber attacks from Norse.

http://map.ipviking.com/


Financial Services Information and Sharing Analysis Center (FS-IAC)

The only industry forum for collaboration on critical security threats facing the global financial services sector.

http://www.fsisac.com/


Cyberwar in the Underworld

Fascinating article by Paul Kan, published in the Yale Journal of International Affairs on non-state actors conducting cyberwar.

http://yalejournal.org/2013/02/cyberwar-in-the-underworld-anonymous-versus-los-zetas-in-mexico/


Krebs on Security

In-depth security news and investigation.

http://krebsonsecurity.com/


Cybersecurity - DHS

Official website from DHS.

http://www.dhs.gov/topic/cybersecurity


National Security Cyber Specialists (NSCS)

The NSCS network, which consists of nearly 100 prosecutors from U.S. Attorney’s Offices nationwide and cyber experts from NSD and CCIPS, is a new tool in the government’s cyber tool kit and a critical part of the department’s efforts to better address cyber intrusions and attacks carried out by nation states or terrorist organizations.

http://blogs.justice.gov/main/archives/2558


National Cybersecurity and Communications Integration Center (NCCIC)

The National Cybersecurity and Communications Integration Center (NCCIC) is a 24x7 center responsible for the production of a common operating picture for cyber and communications across federal government, military, and private sector centers – the operational arm of DHS’ Office of Cybersecurity and Communications (CS&C), within the National Protection & Programs Directorate (NPPD).

http://www.dhs.gov/xabout/structure/gc_1306334251555.shtm


National Institute of Standards and Technology (NIST) - The Computer Security Division (CSD) - (893)

The Computer Security Division Responds to the Federal Information Security Management Act of 2002. The E-Government Act [Public Law 107-347] passed by the 107th Congress and signed into law by the President in December 2002 recognized the importance of information security to the economic and national security interests of the United States. Title III of the E-Government Act, entitled the Federal Information Security Management Act of 2002 (FISMA), included duties and responsibilities for the Computer Security Division in Section 303 “National Institute of Standards and Technology.”

http://csrc.nist.gov/index.html


Internet Security Infographiscs - from Kasperksy Lab

Excellent Infographics from Kaspersky Lab.

http://usa.kaspersky.com/internet-security-center/infographics/#.VPx8JIHF_XK


Internet Security - from Symantec

Reports and white papers on internet security and cyber crime.

http://www.symantec.com/security_response/


Cyber Security - Raytheon

Corporate solutions website.

http://www.raytheoncyber.com


Top 100 Network Security Tools

http://sectools.org/


Nmap ("Network Mapper")

is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and both console and graphical versions are available.

http://nmap.org/

Domestic Terrorism

Most Wanted Domestic Terrorism - FBI

http://www.fbi.gov/wanted/dt


Terrorism: Major Cases Past and Present

Terrorism is nothing new in the United States; we’ve been investigating and helping to prevent terrorist attacks since the 1920s. Below are some of our most significant cases; you can find more described in the various Terrorism publications covering from 1996 to 2005 posted on our Reports and Publications webpage. More recent information on terrorist incidents can be found in the National Counterterrorism Center's Worldwide Incidents Tracking System. You can also search for terrorism incidents and significant dates in a database maintained by the Memorial Institute for the Prevention of Terrorism.


Counter Violent Extremist Working Group (CVEW)

Established by the Department of Homeland Security in January 2009 to coordinate counter-violent extremism efforts across all DHS departments.


Critical Infrastructure Resources

The Department of Homeland Security offers a wide array of tools and resources to government and private sector planners to enable the critical infrastructure security and resilience mission.

Drug Cartels and Pathways Into The United States

Map provided the National Post newspaper. Where cartel routes are identified in the map, one can assume these may also be used to infiltrate people.




International Terrorism

Most Wanted Terrorists - FBI

http://www.fbi.gov/wanted/wanted_terrorists














ISIS

A well written article in the Atlantic Magazine by Graeme Wood

http://www.theatlantic.com/features/archive/2015/02/what-isis-really-wants/384980/

The Clarion Project has all of the issues of Islamic State's propaganda magazine

http://www.clarionproject.org/news/islamic-state-isis-isil-propaganda-magazine-dabiq


The BBC produced the documentary "Kill the Christians" regarding the plight of Christians in the Middle East. Since the BBC does not share outside the UK other sources have provided access to the documentary.

http://shoebat.com/2015/04/20/kill-the-christians-random-act-of-journalism-by-the-bbc-every-one-who-cares-should-watch-then-act/


The Isis papers: a masterplan for consolidating power

24-page document, translated here, outlines principles for governing territory under the group’s control and strategy for becoming a viable state

http://www.theguardian.com/world/2015/dec/07/islamic-state-document-masterplan-for-power


Terrorist Group Symbols

To find out what group this symbol belongs to, follow the link below to the Anti-Defamation League webpage.

http://www.adl.org/terrorism/symbols/default.asp


US Department of State List of Foreign Terrorist Organizations (FTO)

To find out what group this symbol belongs to, follow the link below to the Anti-Defamation League webpage.

http://www.state.gov/j/ct/rls/other/des/123085.htm

The Project

A MUST READ! The Muslim Brotherhood blueprint for cultural jihad.

http://www.militantislammonitor.org/article/id/2671

The Third Jihad

This video provides a very interesting perspective on the threats we face from Islamic Fundamentalists. It is about 30 minutes long, but well worth the time.

http://blip.tv/file/1382254


Global Incident Map

This is a subscription service. However the link below will bring you to the free version and can provide a start point for further investigation of newly reported incidents.

Al Qaida's Reach

An interactive map of Al Qaeda operations over the last 20 years. Provided by MSNBC. Very basic but an interesting method for a quick overview.


Maritime Terrorism

Maritime terrorism has emerged as a formidable threat in the world, targeting both civilian and naval vessels. The Maritime Terrorism Research Center is your gateway to Maritime Terrorism, Maritime Security and Maritime Transport Security information.

http://www.maritimeterrorism.com/


Economic Warfare

Original report from 2009 published by the Department of Defense Irregular Warfare Support Program (IWSP) describing manipulation of global financial systems.


"Hard pressed on my right. My center is yielding. Impossible to maneuver. Situation excellent. I attack." French Gen. Ferdinand Foch

Must Have Latin Quotes!

Libertas inaestimabilis res est -
"Liberty is a thing beyond all price." (Corpus Iuris Civilis)

De inimico non loquaris sed cogites -
"Don't wish ill on your enemy; plan it."

Search

Blog Archive