Skip to main content Accessibility help
×
Hostname: page-component-77f85d65b8-2tv5m Total loading time: 0 Render date: 2026-04-12T18:32:55.396Z Has data issue: false hasContentIssue false

32 - Evaluating the Effectiveness of Measures to Counter Domestic Terrorism

from Part IV - Counter-Terrorism

Published online by Cambridge University Press:  08 March 2026

Atin Basuchoudary
Affiliation:
Virginia Military Institute
Günther Schulze
Affiliation:
Albert-Ludwigs-Universität Freiburg, Germany
Get access

Summary

Over the years since 9/11, there have been many calls for systematic analysis of domestic counterterrorism expenditures—indeed, in the United States, it is required by current regulations. The paper lays out and explains the standard cost/benefit and risk-analytic approaches that might be applied to evaluate such expenditures. However, such research has been quite limited so far. While systematic analysis can make the counterterrorism enterprise more coherent and efficient, domestic terrorism in most countries (particularly those outside of war zones) scarcely presents enough of a hazard to justify the enormous efforts and expenditures that have been made to counter it. It is an area of research that should be more fully developed.

Information

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Book purchase

Temporarily unavailable

References

Aaronson, Trevor. 2013. The Terror Factory: Inside the FBI’s Manufactured War on Terrorism. New York: Ig Publishing.Google Scholar
Bergen, Peter L. 2016. United States of Jihad: Investigating America’s Homegrown Terrorists. New York: Crown Publishers.Google Scholar
Bogan, Kenneth T., and Jones, Edwin D.. 2006. “Risks of Mortality and Morbidity from Worldwide Terrorism: 1968–2004.” Risk Analysis 26 (1): 4559.CrossRefGoogle Scholar
Brooks, Rosa A. 2011. “Muslim ‘Homegrown’ Terrorism in the United States: How Serious Is the Threat?International Security 36 (2): 747.CrossRefGoogle Scholar
Brooks, Rosa. 2015a. “The Threat Is Already Inside: And Nine Other Truths about Terrorism that Nobody Wants to Hear.” Foreign Policy, November 20.Google Scholar
Brooks, Rosa. 2015b. “The United States of Spinelessness.” Foreign Policy, December 15.Google Scholar
Clarke, Richard A., Morell, Michael J., Stone, Geoffrey R., Sunstein, Cass R., and Swire, Peter. 2013. Liberty and Security in a Changing World: The President’s Review Group on Intelligence and Communications Technologies. Princeton, NJ: Princeton University Press.Google Scholar
Cohen, Michael A., and Zenko, Micah. 2019. Clear and Present Safety: The World Has Never Been Better and Why That Matters to Americans. New Haven, CT: Yale University Press.Google Scholar
Cordesman, Anthony H. 2015a. “Fear versus Fact: Getting the Facts on Terrorism.” Center for Strategic and International Studies, December 17.Google Scholar
Cordesman, Anthony H. 2015b. “New Year’s Resolutions on Terrorism: Panic, Politics, and the Prospects for Honesty in 2016.” Center for Strategic and International Studies, December 28.Google Scholar
DHS. 2009. National Infrastructure Protection Plan: Partnering to Enhance Protection and Resiliency. Washington, DC: Department of Homeland Security.Google Scholar
DHS. 2013. “Homeland Security Budget-in-Brief Fiscal Year 2013.” Washington, DC: Department of Homeland Security.Google Scholar
Ervin, Clark Kent. 2006. Open Target: Where America Is Vulnerable to Attack. New York: Palgrave Macmillan.Google Scholar
Farrow, Scott, and Shapiro, Stuart. 2009. “The Benefit–Cost Analysis of Security Focused Regulations.” Journal of Homeland Security and Emergency Management 6 (1). DOI: 10.2202/1547-7355.1482.CrossRefGoogle Scholar
Friedman, Benjamin H., Harper, Jim, and Preble, Christopher A., eds. 2010. Terrorizing Ourselves: Why US Counterterrorism Policy Is Failing and How to Fix It. Washington, DC: Cato Institute.Google Scholar
GAO. 2011. “Progress Made and Work Remaining in Implementing Homeland Security Missions 10 Years after 9/11,” GAO-11-940T. Washington, DC: Government Accountability Office.Google Scholar
Gardner, Daniel. 2008. The Science of Fear: Why We Fear the Things We Shouldn’t – and Put Ourselves in Greater Danger. New York: Dutton.Google Scholar
Gardner, Daniel. 2010. Future Babble: Why Expert Predictions Fail – and Why We Believe Them Anyway. Toronto: McClelland & Stewart.Google Scholar
Gerges, Fawaz A. 2011. The Rise and Fall of Al-Qaeda. New York: Oxford University Press.CrossRefGoogle Scholar
Grand View Research. 2023. Homeland Security Market Size, Share and Trends Analysis Report by Types (Aviation, Maritime, Border, Critical Infrastructure Security, Cybersecurity, CBRN Security and Mass Transit Security), by Region, and Segment Forecasts, 2023–2030. San Francisco: Grand View Research.Google Scholar
Harris, Shane. 2010. The Watchers: The Rise of America’s Surveillance State. New York: Penguin Books.Google Scholar
Jacobson, Sheldon H., Karnani, Tamana, Kobza, John E., and Ritchie, Lynsey. 2006. “A Cost–Benefit Analysis of Alternative Device Configurations for Aviation-Checked Baggage Security Screening.” Risk Analysis 26 (2): 297310.CrossRefGoogle ScholarPubMed
Jenkins, Brian Michael. 2008. Will Terrorists Go Nuclear? Amherst, NY: Prometheus.Google Scholar
Jenkins, Brian Michael. 2011. “Stray Dogs and Virtual Armies: Radicalization and Recruitment to Jihadist Terrorism in the United States since 9/11,” Occasional Paper no. 343. Santa Monica, CA: RAND Corporation.Google Scholar
Jenkins, Brian Michael. 2016. “Fifteen Years on, Where Are We in the ‘War on Terror’?CTC Sentinel 9 (9): 712.Google Scholar
Kean, Thomas H., and Hamilton, Lee H.. 2005. “Final Report on 9/11 Commission Recommendations.” Washington, DC: US Government Printing Office.Google Scholar
Kean, Thomas H., and Hamilton, Lee H.. 2014. “Today’s Rising Terrorist Threat and the Danger to the United States: Reflections on the Tenth Anniversary of the 9/11 Commission Report.” Washington, DC: Bipartisan Policy Center.Google Scholar
Kenney, Michael. 2010. “‘Dumb’ yet Deadly: Local Knowledge and Poor Tradecraft among Islamist Militants in Britain and Spain.” Studies in Conflict & Terrorism 33 (10): 911922.CrossRefGoogle Scholar
Little, Richard G. 2007. “Cost-Effective Strategies to Address Urban Terrorism: A Risk Management Approach.” In The Economic Costs and Consequences of Terrorism, edited by Richardson, Harry W., Gordon, Peter, and Moore, James E. II: 98115. Cheltenham: Edward Elgar.Google Scholar
Lomborg, Bjørn, ed. 2009. Global Crises, Global Solutions, 2nd edn. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Lustick, Ian S. 2006. Trapped in the War on Terror. Philadelphia: University of Pennsylvania Press.CrossRefGoogle Scholar
Masse, Todd, O’Neil, Siobhan, and Rollins, John. 2007. “The Department of Homeland Security’s Risk Assessment Methodology: Evolution, Issues, and Options for Congress.” Washington, DC: Congressional Research Service.Google Scholar
Morral, Andrew R., et al. 2012. Modeling Terrorism Risk to the Air Transportation System: An Independent Assessment of TSA’s Risk Management Analysis Tool and Associated Methods. Santa Monica, CA: RAND Corporation.Google Scholar
Mueller, John. 2002. “Harbinger or Aberration? A 9/11 Provocation.” The National Interest 69: 4550.Google Scholar
Mueller, John. 2003. “Blip or Step Function?” Paper presented at the annual convention of the International Studies Association, Portland, OR, February 27. politicalscience.osu.edu/faculty/jmueller/ISA2003.PDF.Google Scholar
Mueller, John. 2006. Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats, and Why We Believe Them. New York: Free Press.Google Scholar
Mueller, John. 2010. Atomic Obsession: Nuclear Alarmism from Hiroshima to Al-Qaeda. New York: Oxford University Press.Google Scholar
Mueller, John. 2016. “Why Obama Won’t Tell the Truth about Terrorism.” The National Interest, December 13. https://nationalinterest.org/feature/why-obama-wont-tell-the-truth-about-terrorism-18722.Google Scholar
Mueller, John, ed. 2020. Terrorism since 9/11: The American Cases. Columbus, OH: Mershon Center, Ohio State University. politicalscience.osu.edu/faculty/jmueller/since.html.Google Scholar
Mueller, John, and Schricker, Ezra. 2012. “Terror Predictions.” Ohio State University, May 2. politicalscience.osu.edu/faculty/jmueller/PREDICT.PDF.Google Scholar
Mueller, John, and Stewart, Mark G.. 2011. Terror, Security, and Money: Balancing the Benefits, Risks, and Costs of Homeland Security. New York: Oxford University Press.CrossRefGoogle Scholar
Mueller, John, and Stewart, Mark G.. 2012. “The Terrorism Delusion: America’s Overwrought Response to September 11.” International Security 37 (1): 81110.CrossRefGoogle Scholar
Mueller, John, and Stewart, Mark G.. 2014. “Responsible Counterterrorism Policy,” Policy Analysis no. 755. Washington, DC: Cato Institute.Google Scholar
Mueller, John, and Stewart, Mark G.. 2016. Chasing Ghosts: The Policing of Terrorism. New York: Oxford University Press.Google Scholar
Mueller, John, and Stewart, Mark G.. 2017. “Misoverestimating Terrorism.” In Constructions of Terrorism: An Interdisciplinary Approach to Research and Policy, edited by Stohl, Michael S., Burchill, Richard, and Englund, Scott : 2137. Oakland, CA: University of California Press.Google Scholar
Mueller, John, and Stewart, Mark G.. 2018. Public Opinion and Counterterrorism Policy. Washington, DC: Cato Institute.Google Scholar
Mueller, John, and Stewart, Mark G.. 2021. “Terrorism and Bathtubs: Comparing and Assessing the Risks.” Terrorism and Political Violence 33 (1): 138163.CrossRefGoogle Scholar
Mueller, John, Stewart, Mark G., and Friedman, Benjamin H.. 2013. “Finally Talking Terror Sensibly.” The National Interest, May 24.Google Scholar
Nacos, Brigette L., Block-Elkon, Yaeli, and Shapiro, Robert Y.. 2011. Selling Fear: Counterterrorism, the Media, and Public Opinion. Chicago: University of Chicago Press.CrossRefGoogle Scholar
NRC. 2010. Review of the Department of Homeland Security’s Approach to Risk Analysis. Washington, DC: National Academies Press.Google Scholar
Office of Best Practice Regulation. 2007. Best Practice Regulation Handbook. Canberra: Productivity Commission.Google Scholar
Office of Management and Budget. 1992. “Guidelines and Discount Rates for Benefit–Cost Analysis of Federal Programs (Revised),” Circular no. A-94. Washington, DC: Office of Management and Budget.Google Scholar
Paté-Cornell, M. Elisabeth. 1994. “Quantitative Safety Goals for Risk Management of Industrial Facilities.” Structural Safety 13: 145157.CrossRefGoogle Scholar
PCLOB. 2014. Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act. Washington, DC: US Government Printing Office.Google Scholar
Robinson, Lisa A. 2008. “Valuing Mortality Risk Reductions in Homeland Security Regulatory Analysis: Final Report.” Washington, DC: Customs and Border Protection, Department of Homeland Security.Google Scholar
Robinson, Lisa A., Hammitt, James K., Aldy, Joseph E., Krupnick, Alan, and Baxter, Jennifer. 2010. “Valuing the Risk of Death from Terrorist Attacks.” Journal of Homeland Security and Emergency Management 7 (1). DOI: 10.2202/1547-7355.1626.CrossRefGoogle Scholar
Rogers, Mike. 2012. “Rebuilding TSA into a Smarter, Leaner Organization,” majority staff report. Washington, DC: US Government Printing Office.Google Scholar
Sandler, Todd, Arce, Daniel G., and Enders, Walter. 2009. “Transnational Terrorism.” In Global Crises, Global Solutions, 2nd edn, edited by Lomborg, Bjørn : 516562. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Schneier, Bruce. 2003. Beyond Fear: Thinking Sensibly about Security in an Uncertain World. New York: Copernicus.Google Scholar
Schneier, Bruce. 2007. “Portrait of the Modern Terrorist as an Idiot.” Schneier.com, June 14.Google Scholar
Schneier, Bruce. 2010. “Worst-Case Thinking.” Schneier.com, May 13.Google Scholar
Schneier, Bruce. 2015. “Why Are We Spending $7 Billion on TSA?” CNN, June 5.Google Scholar
Seitz, Russell. 2004. “Weaker Than We Think.” American Conservative, December 6.Google Scholar
Slovic, Paul, Fischhoff, Baruch, and Lichtenstein, Sarah. 1980. “Facts and Fears: Understanding Perceived Risk.” In Societal Risk Assessment: How Safe Is Safe Enough?, edited by Schwing, Richard C. and Albers, Walter A. : 181216. New York: Plenum.CrossRefGoogle Scholar
Stewart, Mark G. 2017. “Risk of Progressive Collapse of Buildings from Terrorist Attacks: Are the Benefits of Protection Worth the Cost?Journal of Performance of Constructed Facilities 31 (2). DOI: 10.1061/(ASCE)CF.1943-5509.0000954.CrossRefGoogle Scholar
Stewart, Mark G., Ellingwood, Bruce R., and Mueller, John. 2011. “Homeland Security: A Case Study in Risk Aversion for Public Decision-Making.” International Journal of Risk Assessment and Management 15 (5/6): 367386.CrossRefGoogle Scholar
Stewart, Mark G., and Melchers, Robert E.. 1997. Probabilistic Risk Assessment of Engineering Systems. London: Chapman & Hall.Google Scholar
Stewart, Mark G., and Mueller, John. 2013. “Terrorism Risks and Cost–Benefit Analysis of Aviation Security.” Risk Analysis 33 (5): 893908.CrossRefGoogle ScholarPubMed
Stewart, Mark G., and Mueller, John. 2018. Are We Safe Enough? Measuring and Assessing Aviation Security. Amsterdam: Elsevier.Google Scholar
Stewart, Mark G., and Mueller, John. 2019. “Security Risk and Cost–Benefit Assessment of Secondary Flight Deck Barriers,” Briefing Note Report no. 285. Callaghan, NSW: Centre for Infrastructure Performance and Reliability, University of Newcastle.Google Scholar
Sunstein, Cass R. 2003. “Terrorism and Probability Neglect.” Journal of Risk and Uncertainty 26 (2/3): 121136.CrossRefGoogle Scholar
Sunstein, Cass R. 2018. The Cost–Benefit Revolution. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Thrall, A. Trevor, and Cramer, Jane K., eds. 2009. American Foreign Policy and the Politics of Fear: Threat Inflation since 9/11. Abingdon: Routledge.CrossRefGoogle Scholar
Travis, Curtis C., Richter, Samantha A., Crouch, Edmund A. C., Wilson, Richard, and Klema, Ernest D.. 1987. “Cancer Risk Management: A Review of 132 Federal Regulatory Decisions.” Environmental Science and Technology 21 (5): 415420.CrossRefGoogle ScholarPubMed
Zenko, Micah. 2014. “Exaggeration Nation.” Foreign Policy, November 12.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×