Geospatial Archives on Public Intelligence (1992-2006)

Geospatial
CD  Needs for PKI
CD Needs for PKI

2005

US

Geospatial East View Sudan Tactical Map Availability

2005

US

Geospatial East View Liberia Tactical Map Availability

2005

US

Geospatial East View Ivory Coast Tactical Map Availability

2005

US

Geospatial East View DRC Congo Russian Map Availability

2005

US

Geospatial East View DRC Congo Large Scale Map Availability

2005

US

Geospatial East View DRC Congo NIMA 250K Map Availability

2005

US

Geospatial East View DRC Congo National 200K Map Availability

2005

US

Geospatial East View Burundi Tactical Map Availability

2005

US

Geospatial East View Afghanistan Military Maps

2005

US

Geospatial East View Eastern Congo Priority Tactical Map Deficiencies

2004

US

Geospatial East View Aceh Indonesia 1:50,000 Tactical Map Availability

2004

US

Geospatial East View Aceh Indonesia 1:250,000 Large Scale Map Availabiility

2003

US

Geospatial East View Iraq Post-Conflict Map Availability

2003

US

Geospatial NAPA Geographic Information for the 21st Century

1999

US

Geospatial Steele Real-World Mapping Shortfalls (Two Slides)

Vendor Pitch Archives on Public Intelligence (1992-2006)

Commerce

2006

US

Vendor Fleming Icosystem

2006

US

Vendor Lederman Deep Web Technologies

2006

US

Vendor Proctor IBM’s Text Analytic OS Architecture

2006

US

Vendor Ruh CISCO’s Application Oriented Network

2004

US

Vendor Dietz LEXIS-NEXIS Open Sources on North Korea

2004

US

Vendor Dietz Top Ten Stories on North Korea

2001

US

Vendor NA Bright Planet White Paper on the Deep Web

2001

UK

Vendor Rotheray BBC Views on New Risks of Crisis Seen From Open Sources (Slides)

2001

UK

Vendor Rotheray BBC Views on New Risks of Crisis Seen From Open Sources (Text)

1999

US

Vendor Boyer AUTOMETRIC (Now Boeing): High Resolution Imagery

1999

NL

Vendor DataExpert DateExpert

1999

US

Vendor Powerize Powerize Overview

1998

UK

Vendor Brenton MEMEX Software

1998

UK

Vendor Hunter I2: Creating Intelligence Automatically

1998

US

Vendor Retrieval Tech. Real Time News Meets Knowledge Management

1997

US

Vendor Blejer SRA: Intelligence Information Systems

1997

US

Vendor CORE CORE SW: Business Plan Summary

1997

US

Vendor Jacobs ISOQUEST: Software for Managing Information Overload

1997

US

Vendor Rodriguez DIALOG: Targetted Decisions Support versus Generic Internet

1997

US

Vendor Weigand Forecast International: Reducing Risk Via Practical OSINT (Slides)

1997

US

Vendor Weigand Forecast International: Reducing Risk Via Practical OSINT (Text)

1996

US

Vendor Dixon LEXIS-NEXIS, Online Public Records and Criminal Investigations

1996

UK

Vendor Hutchinson Jane’s: The Role of Sources in Open Intelligence

1996

US

Vendor Krattenmaker LEXIS-NEXIS, LEXMAP Demonstration and Discussion

1996

US

Vendor Nachmanoff Oxford Analytica: Economic Intelligence Services for the Private Sector

1996

US

Vendor Nanz SPOT Image: Remarks on Commercial Imagery

1995

US

Vendor McLagan NewsEdge, Tailored News Alerts for a Competitive Edge

1995

US

Vendor Nanz Commercial Imagery and National Defense (Slides)

1995

US

Vendor Nanz Commercial Imagery and National Defense (Text)

1995

UK

Vendor Rolington Jane’s: A Theory of Open Source Information

1994

US`

Vendor Vajta-Williams Space Imaging, Commercial Imagery, and You

1993

UK

Vendor Hall Jane’s Approach to the New Threat Environment

1992

US

Vendor Driver N-STAR: An Automated Analyst Tool for Open Source Data

1992

US

Vendor Hutchinson Jane’s RUMOR OF WAR: An Information Vendor's View

1992

US

Vendor Kovaly Unique Wire Service Provides Early Intelligence

1992

US

Vendor Pincus METAMORPH: Theoretical Background and Operational Functionality

1992

US

Vendor Vendor PERISCOPE, Commercial Open Source

Whole Earth Review Archives on Public Intelligence (Historical)

Whole Earth Review

1992

US

Whole Earth R Brand Army Green

1992

US

Whole Earth R Kapor et al We Need a National Public Network

1992

US

Whole Earth R Kleiner The Co-Evolution of Governance

1992

US

Whole Earth R Petersen Will the Military Miss the Market

1992

US

Whole Earth R Staple & Dixon Telegeography: Mapping the New World Order

1992

US

Whole Earth R Steele E3i: Ethics, Ecology, Evolution, and Intelligence

1992

US

Whole Earth R Tibbs Industrial Ecology: An Environmental Agenda for Industry

1991

US

Whole Earth R Brilliant Computer Conferencing: The Global Connection

1991

US

Whole Earth R Clay Genes, Genius, and Genocide

1991

US

Whole Earth R Elgin Conscious Democracy Through Electronic Town Meetings

1991

US

Whole Earth R Garcia Assessing the Impacts of Technology

1991

US

Whole Earth R Godwin The Electronic Frontier Foundation and Virtual Communities

1991

US

Whole Earth R Karraker Highways of the Mind

1991

US

Whole Earth R Lovins & Lovins Winning the Peace

1991

US

Whole Earth R Marx Privacy & Technology

1991

US

Whole Earth R Meeks The Global Commons

1991

US

Whole Earth R Rheingold Electronic Democracy: The Great Equalizer

1991

US

Whole Earth R Schuman Reclaiming our Technological Future

1991

US

Whole Earth R Warren & Rheingold Access to Political Tools: Effective Citizen Action

1991

US

Whole Earth R White Earthtrust: Electronic Mail and Ecological Activism

1991

US

Whole Earth R Whitney-Smith Information Doesn't Want

1991

US

Whole Earth R Wittig Electronic City Hall

1990

US

Whole Earth R Barlow Crime and Puzzlement: The Advance of the Law on the Electronic Frontier

1990

US

Whole Earth R Brand Outlaws, Musicians, Lovers, and Spies: The Future of Control

1990

US

Whole Earth R Dodge Life Work

1990

JP

Whole Earth R Ishii Cross-Cultural Communications & Computer-Supported Cooperative Work

1990

US

Whole Earth R Jordon III Restoration: Shaping the Land, Transforming the Spirit

1990

JP

Whole Earth R Kumon Toward Co-Emulation: Japan and the United States in the Information Age

1990

US

Whole Earth R Monschke How to Heal the Land

1990

US

Whole Earth R Shapard Observations on Cross-Cultural Electronic Networking

1990

US

Whole Earth R Vidal Founding Father Knows Best

1989

US

Whole Earth R Berman The Gesture of Balance

1989

US

Whole Earth R Garfinkle Social Security Numbers: And Other Telling Information

1989

US

Whole Earth R Haight Living in the Office

1989

US

Whole Earth R Horvitz The USENET Underground

1989

US

Whole Earth R Jaffe Hello, Central: Phone Conferencing Tips

1989

US

Whole Earth R Johnson` The Portable Office

1989

US

Whole Earth R Rheingold Ethnobotany: The Search for Vanishing Knowledge

1988

US

Whole Earth R Baker, S. Gossip

1988

US

Whole Earth R Baker, W. Gossip

1988

US

Whole Earth R Brand The Information Wants to Be Free Strategy

1988

US

Whole Earth R Coate Tales from Two Communities: The Well and the Farm

1988

US

Whole Earth R Ferguson Gossip

1988

US

Whole Earth R Fields Gossip

1988

US

Whole Earth R Hardin Gossip

1988

US

Whole Earth R Hawkins Computer Parasites & Remedies–A Catalog of First Sightings

1988

US

Whole Earth R Keen Gossip

1988

US

Whole Earth R Kleiner Gossip

1988

US

Whole Earth R Leary Gossip

1988

US

Whole Earth R Nelson Gossip

1988

US

Whole Earth R Newroe Distance Learning

1988

US

Whole Earth R Pert The Material Basis of Emotions with Inset, Mind as Information

1988

US

Whole Earth R Rappaport Gossip

1988

US

Whole Earth R Thurow & Walsh Getting Over the Information Economy

1987

US

Whole Earth R Donaldson An Incomplete History of Microcomputing

1987

US

Whole Earth R Henson MEMETICS: The Science of Information Viruses

1987

US

Whole Earth R Horvitz An Intelligent Guide to Intelligence

1987

US

Whole Earth R Krause Bio-Acoustics: Habitat Ambience & Ecological Balance

1987

US

Whole Earth R Roberts Electronic Cottage on Wheels

1986

US

Whole Earth R Fend & Gunther What Have You Got to Hide: Iraq Iran Basra Abadan

1986

US

Whole Earth R Minsky Society of Mind

1986

US

Whole Earth R Sanders Etiquette for the Age of Transparency

1986

US

Whole Earth R Scxhwartz & Brand The World Information Economy

1986

US

Whole Earth R Thompson A Gaian Politics

1985

US

Whole Earth R Brand, Kelly, Kinney Digital Retouching: The End of Photography as Evidence of Anything

1985

US

Whole Earth R Hunter Public Image

1985

US

Whole Earth R Kleiner The Health Hazards of Computers: A Guide to Worrying Intelligently

1985

US

Whole Earth R Mander Six Grave Doubts About Computers

1983

US

Whole Earth R Illich Silence is a Commons: Computers Are Doing to Communication What …

1982

US

Whole Earth R Brand Uncommon Courtesy: A School of Compassionate Skills

1982

US

Whole Earth R Kayes Force Without Power: A Doctrine of Unarmed Military Service

1982

US

Whole Earth R Meadows Whole Earth Models & Systems

Threat Archives on Public Intelligence (1992-2006)

Threats

2004

NO

Threat Bjorgo Root Causes of Terrorism

2004

US

Threat Kaplan The Saudi Connection to Terrorism

2004

US

Threat Knapp Al Qaeda and the Mass Media (PSYOP Briefing)

2004

US

Threat Knapp Al Qaeda and the Mass Media (Reference)

2004

US

Threat Knapp Distortion in Islam and Jihad

2004

US

Threat Knapp Diversity in Islam

2006

US

Threat Daly Al Qaeda Against Saudi Oil

2006

US

Threat Johnson Battle of Algiers and Its Lessons

2006

US

Threat Seagraves Gold Warriors: New Epilogue, Further of US Theft of WWII Gold Loot

2006

US

Threat Seagraves Gold Warriors New Chapter Seventeen

2006

US

Threat Steele Who Is to Blamce?  The Vice President and Us

2006

US

Threat Stern Al Qaeda Approach to US Muslims

2006

UK

Threat Story Crunch Time for CIA, Banks, and Related Thieves of $742 Trillion

2005

US

Threat Ellis Scenarios for Next Generation Crises in Latin America

2005

US

Threat GAO GAO Report: US Not Addressing Islamic Fundamentalism

2005

US

Threat OSS Somalia Piracy Quick Report

2005

US

Threat OSS Report on Remote Detonation of Improvised Explosive Devices

2005

US

Threat OSS PRC Trade in Latin America

2005

US

Threat Ray & Gross The Perfect Storm

2005

US

Threat Steele Worksheet for Book Review on Crossing the Rubicon

2005

US

Threat Steele Mother Nature as Terrorist

2005

US

Threat Steele 9-11: Who’s To Blame?  One Man’s Opinion

2005

US

Threat Thompson Is the Terrorism Threat Over-Rated?

2004

US

Threat Daly Globalization & National Defense (Ecological Economics)

2004

US

Threat Louisiana Pre-Hurricane Katrina Study and Conclusions

2004

US

Threat Palmer The Real Axis of Evil: 44 Dictators

2004

US

Threat Peters Early Warning of Disease From Pattern Analysis

2004

US

Threat Seagrave Transcript of Video on Stolen Gold Held by US Treasury & Citi-Bank

2004

US

Threat Vlahos Attachment to the Muslim Renovatio Memorandum

2004

US

Threat Vlahos The Muslim Renovatio and U.S. Strategy

2004

US

Threat Vlahos The Muslims Are Coming

2004

US

Threat Vlahos Insurgency Within Islam

2003

US

Threat Danzip Countering Traumatic Attacks

2003

PRC

Threat OSS PRC Treaty & Trade Penetration of Latin America

2002

US

Threat Emerson & Steele American Jihad Map

2002

US

Threat Steele ACFR, 19 Cities: 9-11, U.S. Intelligence, & the Real World

2000

US

Threat Steele Georgetown/AWC: Non-Traditional Threats

1998

US

Threat Steele TAKEDOWN: Targets, Tools, & Technocracy

1994

US

Threat Steele 6th National Threat Symposium: New Directions in Information Sharing

2005

NGO

Threat NGO Changing Face of Global Violence

2005

NGO

Threat NGO Human Security Audit

2004

US

Threat Pelton Robert Young Pelton on Dangerous World

2004

US

Threat Steele Three Book Review Relevant to Global War on Terror (GWOT)

2003

US

Threat Copeland Analysis of the New Paradigm for Terrorism

2003

US

Threat Manwaring Street Gangs: New Urban Insurgency

2003

US

Threat Manwaring War & Conflict: Six Generations

2003

US

Threat Pelton Summary of Presentation on World’s Most Dangerous Places

2002

US

Threat Betts The Next Intelligence Failure: The Limits of Prevention

2002

NL

Threat Jongman World Conflict and Human Rights Map 2001-2002

2002

US

Threat Wheaton Transitions from Authoritarian Rule: A Model

2002

US

Threat Wheaton Virtual Afghanistan: Modeling a Transition from Authoritarian Rule

2001

US

Threat Godson Governments and Gangs

2001

US

Threat Heidenrich Early Warning & Complex Monitoring of Ethnic Genocide (Slides)

2001

US

Threat Heidenrich Early Warning & Complex Monitoring of Ethnic Genocide (Text)

1998

US

Threat Transnational Enemies: Threats Without Names

1998

US

Threat Glaebus Metaphors & Modern Threats: Biological, Computer, Cognitive Viruses

1997

US

Threat Fialka War by Other Means: Economic Espionage In (Against) America

1997

US

Threat Schwartau Information Warfare: The Weapons of the Information Age

1997

US

Threat Tenney Cyber-Law and Cyber-Crime: Spamming Methods and Costs

1996

US

Threat Keuhl School of Information Warfare Threat and Strategy: Shifting Paradigms

1996

US

Threat O’Malley Countering the Business Intelligence Threat

1996

US

Threat Strassmann U.S. Knowledge Assets: The Choice Target for Information Crime

1996

US

Threat Winkler Electronic Industrial Espionage: Defining Ground Zero

1994

US

Threat Whitney-Smith Refugees: Weapon of the Post Cold War World–Counter Offensive: IW

Technologies Archive on Public Intelligence (1992-2006)

Technologies

2006

US

Technology Arnold The Google Legacy

2005

US

Technology CISCO CISCO Application Oriented Network One-Pager

2005

US

Technology CISCO CISCO Application Oriented Network Executive IT Overview

2005

US

Technology Steele GSA Roundtable on IT Innovation

2004

US

Technology Anonymous Semantic Web Presentation

2004

US

Technology Anonymous Semantic Web Architecture and Applications

2004

US

Technology Anonymous Semantic Web Non-Memo

2004

US

Technology Arnold The Information Technology Marketplace

2004

US

Technology Arnold Table of Contents for Enterprise Search Book

2004

US

Technology GAO Report on the Global Information Grid and DoD

2004

US

Technology Gill Open Spectrum as the Third Open

2004

US

Technology Gill Wireless Grid: The Possibilities

2004

US

Technology Guest Commentary on GAO Report on DoD Global Information Grid

2004

US

Technology Steele Commentary of GAO Report on DoD Global Information Grid

2003

US

Technology Arnold One Machine…One View

2003

US

Technology Hock The Open-ness of the Internet

2002

US

Technology Arnold Nomadic Computing

2002

US

Technology Steele NSA in Las Vegas: New Craft: What Should the T Be Doing to the I in IT?

2002

US

Technology Steele NSA in Las Vegas: New Craft (Alternative Copy)

2002

US

Technology Stratton In-Q-Tel

1999

US

Technology Arnold Intelligence Management and the Bottom Line

1998

US

Technology Arnold The Changing Intelligence Environment

1998

US

Technology Arnold The Future of Online

1997

US

Technology Arnold Technology Vectors: 1998 and Beyond

1997

US

Technology Mani MITRE: Search Engine Technologies

1997

US

Technology Maybury MITRE: Knowledge Management

1996

US

Technology Ruh Optimizing Corporate Capital Through Information Technology

1994

US

Technology Englebart Toward High-Performance Organizations: A Strategic Role for Groupware

1992

US

Technology McConnell The Future Federal Information Infrastructure

1992

US

Technology Rheingold Tools for Thinking & Virtual Reality: Our Info EcoSystem

1988

US

Technology Steele Generic Intelligence Center Production Requirements

Handbook Archives on Public Intelligence (1992-2006)

Handbook Elements
Archives 1992-2006
Archives 1992-2006

1997

US

Handbook Admin Cover, Appreciation, Foreword, Contents

1997

US

Handbook Horowitz Appendix G: Open Source OPSEC: Selected References and Information

1997

US

Handbook Horowitz Chapter 6. Open Sources and Operational Security–The Dark Side

1997

US

Handbook OSS Appendices (List of)

1997

US

Handbook OSS Appendix B-3: Glossary of Open Source Acronyms

1997

US

Handbook OSS Appendix E-2: Internet: Intelligence-Oriented List of Useful Internet Sites

1997

US

Handbook PC Magazine Appendix E-3: Internet: Intel Sites from PC Magazine's Top 100 Web Sites

1997

US

Handbook Stapleton-Gray Appendix E-1 Internet: Self-Guided Tour

1997

US

Handbook Stapleton-Gray Chapter 4. The Internet as a Tool for All-Source Analysis

1997

US

Handbook Steele Appendix A: White Paper on Open Source Intelligence & the Military

1997

US

Handbook Steele Appendix B-1: Talking Points on Private Enterprise Intelligence

1997

US

Handbook Steele Appendix B-2: Complete Paper on Private Enterprise Intelligence

1997

US

Handbook Steele Appendix B-4: Core Open Source References

1997

US

Handbook Steele Appendix C: Access: Theory and Practice of Intel in the Age of Information

1997

US

Handbook Steele Appendix D: Concise Directory of Selected Int’l Open Sources & Services

1997

US

Handbook Steele Chapter 1. Overview of Open Sources & Services

1997

US

Handbook Steele Chapter 2. Access: Intelligence in the Age of Information

1997

US

Handbook Steele Chapter 3. International Open Sources and Services

1997

US

Handbook Steele Chapter 5. Open Sources and Military Capabilities

1997

US

Handbook Steele Chapter 7. Conclusion: Collection and Processing Open Source

1997

US

Handbook USMC & Steele Appendix F-1: Expeditionary Environment R&A Framework & Model

1997

US

Handbook USMC & Steele Appendix F-2: Mission Area Factors Summary

1997

US

Handbook USMC & Steele Appendix H: Expeditionary Factors Study: List of Countries

1997

US

Handbook Wouters Appendix E-4: Internet: How to Find an Interesting Mailinglist