Browse and search a list of publications and products both published by NIJ and resulting from NIJ funding. This list includes reports submitted by grantees, NIJ reports and other publications, NIJ Journal issues and articles, products published by grantees, and articles appearing in peer review and other publications.
Palestinian Women in Terrorism: Protectors or Protected?
Phenomenon of Palestinian Suicide Terrorism
Developing and Testing a Method for Using 911 Calls for Identifying Potential Pre-Planning Terrorist Surveillance Activities
Building and Analyzing a Comprehensive Open Source Data Base on Global Terrorist Events
Geospatial Analysis of Terrorist Activities: The Identification of Spatial and Temporal Patterns of Preparatory Behavior of International and Environmental Terrorists
Geospatial and Temporal Patterns of Preparatory Conduct Among American Terrorists
Terrorist Recruitment in American Correctional Institutions: An Exploratory Study of Non-Traditional Faith Groups Final Report
Interagency Coordination in Response to Terrorism: Promising Practices and Barriers Identified in Four Countries
NIJ Journal Issue No. 257
Application of the Social Learning Theory to Domestic Terrorist Recruitment
Creating a Data Archive to Facilitate Research on Understanding and Responding to Terrorism (From Understanding Terrorism: Analysis of Sociological and Psychological Aspects, P 306--317, 2007, Suleyman Ozeren, Ismail Dincer Gunes, et al., -- See NCJ-225410)
Protecting Your Community From Terrorism: Strategies for Local Law Enforcement Volume 6: Partnering for Preparation and Response to Critical Incidents
Securing America's Passenger-Rail Systems
Identifying Remains: Lessons Learned from 9/11
Agroterrorism: Why We're Not Ready: A Look at the Role of Law Enforcement, Repot
Lessons Learned From 9/11: DNA Identification in Mass Fatality Incidents
Their Day in Court: Assessing Guilty Plea Rates Among Terrorists
Setting global CFT standards: a critique and suggestions
Impact of Terrorism on State Law Enforcement: Adjusting to New Roles and Changing Conditions, Final Report June 2006
Groups, Networks, or Movements: A Command-and-Control-Driven Approach to Classifying Terrorist Organizations and Its Application to Al Qaeda
Building a Global Terrorism Database
Research Forensic Library
We invite you to also search the Research Forensic Library, a curated collection of publicly-accessible material relating to every discipline of the forensic sciences.