2004
|
NO
|
Threat |
Bjorgo |
Root Causes of Terrorism |
2004
|
US
|
Threat |
Kaplan |
The Saudi Connection to Terrorism |
2004
|
US
|
Threat |
Knapp |
Al Qaeda and the Mass Media (PSYOP Briefing) |
2004
|
US
|
Threat |
Knapp |
Al Qaeda and the Mass Media (Reference) |
2004
|
US
|
Threat |
Knapp |
Distortion in Islam and Jihad |
2004
|
US
|
Threat |
Knapp |
Diversity in Islam |
2006
|
US
|
Threat |
Daly |
Al Qaeda Against Saudi Oil |
2006
|
US
|
Threat |
Johnson |
Battle of Algiers and Its Lessons |
2006
|
US
|
Threat |
Seagraves |
Gold Warriors: New Epilogue, Further of US Theft of WWII Gold Loot |
2006
|
US
|
Threat |
Seagraves |
Gold Warriors New Chapter Seventeen |
2006
|
US
|
Threat |
Steele |
Who Is to Blamce? The Vice President and Us |
2006
|
US
|
Threat |
Stern |
Al Qaeda Approach to US Muslims |
2006
|
UK
|
Threat |
Story |
Crunch Time for CIA, Banks, and Related Thieves of $742 Trillion |
2005
|
US
|
Threat |
Ellis |
Scenarios for Next Generation Crises in Latin America |
2005
|
US
|
Threat |
GAO |
GAO Report: US Not Addressing Islamic Fundamentalism |
2005
|
US
|
Threat |
OSS |
Somalia Piracy Quick Report |
2005
|
US
|
Threat |
OSS |
Report on Remote Detonation of Improvised Explosive Devices |
2005
|
US
|
Threat |
OSS |
PRC Trade in Latin America |
2005
|
US
|
Threat |
Ray & Gross |
The Perfect Storm |
2005
|
US
|
Threat |
Steele |
Worksheet for Book Review on Crossing the Rubicon |
2005
|
US
|
Threat |
Steele |
Mother Nature as Terrorist |
2005
|
US
|
Threat |
Steele |
9-11: Who’s To Blame? One Man’s Opinion |
2005
|
US
|
Threat |
Thompson |
Is the Terrorism Threat Over-Rated? |
2004
|
US
|
Threat |
Daly |
Globalization & National Defense (Ecological Economics) |
2004
|
US
|
Threat |
Louisiana |
Pre-Hurricane Katrina Study and Conclusions |
2004
|
US
|
Threat |
Palmer |
The Real Axis of Evil: 44 Dictators |
2004
|
US
|
Threat |
Peters |
Early Warning of Disease From Pattern Analysis |
2004
|
US
|
Threat |
Seagrave |
Transcript of Video on Stolen Gold Held by US Treasury & Citi-Bank |
2004
|
US
|
Threat |
Vlahos |
Attachment to the Muslim Renovatio Memorandum |
2004
|
US
|
Threat |
Vlahos |
The Muslim Renovatio and U.S. Strategy |
2004
|
US
|
Threat |
Vlahos |
The Muslims Are Coming |
2004
|
US
|
Threat |
Vlahos |
Insurgency Within Islam |
2003
|
US
|
Threat |
Danzip |
Countering Traumatic Attacks |
2003
|
PRC
|
Threat |
OSS |
PRC Treaty & Trade Penetration of Latin America |
2002
|
US
|
Threat |
Emerson & Steele |
American Jihad Map |
2002
|
US
|
Threat |
Steele |
ACFR, 19 Cities: 9-11, U.S. Intelligence, & the Real World |
2000
|
US
|
Threat |
Steele |
Georgetown/AWC: Non-Traditional Threats |
1998
|
US
|
Threat |
Steele |
TAKEDOWN: Targets, Tools, & Technocracy |
1994
|
US
|
Threat |
Steele |
6th National Threat Symposium: New Directions in Information Sharing |
2005
|
NGO
|
Threat |
NGO |
Changing Face of Global Violence |
2005
|
NGO
|
Threat |
NGO |
Human Security Audit |
2004
|
US
|
Threat |
Pelton |
Robert Young Pelton on Dangerous World |
2004
|
US
|
Threat |
Steele |
Three Book Review Relevant to Global War on Terror (GWOT) |
2003
|
US
|
Threat |
Copeland |
Analysis of the New Paradigm for Terrorism |
2003
|
US
|
Threat |
Manwaring |
Street Gangs: New Urban Insurgency |
2003
|
US
|
Threat |
Manwaring |
War & Conflict: Six Generations |
2003
|
US
|
Threat |
Pelton |
Summary of Presentation on World’s Most Dangerous Places |
2002
|
US
|
Threat |
Betts |
The Next Intelligence Failure: The Limits of Prevention |
2002
|
NL
|
Threat |
Jongman |
World Conflict and Human Rights Map 2001-2002 |
2002
|
US
|
Threat |
Wheaton |
Transitions from Authoritarian Rule: A Model |
2002
|
US
|
Threat |
Wheaton |
Virtual Afghanistan: Modeling a Transition from Authoritarian Rule |
2001
|
US
|
Threat |
Godson |
Governments and Gangs |
2001
|
US
|
Threat |
Heidenrich |
Early Warning & Complex Monitoring of Ethnic Genocide (Slides) |
2001
|
US
|
Threat |
Heidenrich |
Early Warning & Complex Monitoring of Ethnic Genocide (Text) |
1998
|
US
|
Threat |
|
Transnational Enemies: Threats Without Names |
1998
|
US
|
Threat |
Glaebus |
Metaphors & Modern Threats: Biological, Computer, Cognitive Viruses |
1997
|
US
|
Threat |
Fialka |
War by Other Means: Economic Espionage In (Against) America |
1997
|
US
|
Threat |
Schwartau |
Information Warfare: The Weapons of the Information Age |
1997
|
US
|
Threat |
Tenney |
Cyber-Law and Cyber-Crime: Spamming Methods and Costs |
1996
|
US
|
Threat |
Keuhl |
School of Information Warfare Threat and Strategy: Shifting Paradigms |
1996
|
US
|
Threat |
O’Malley |
Countering the Business Intelligence Threat |
1996
|
US
|
Threat |
Strassmann |
U.S. Knowledge Assets: The Choice Target for Information Crime |
1996
|
US
|
Threat |
Winkler |
Electronic Industrial Espionage: Defining Ground Zero |
1994
|
US
|
Threat |
Whitney-Smith |
Refugees: Weapon of the Post Cold War World–Counter Offensive: IW |