Threat Archives on Public Intelligence (1992-2006)

Threats

2004

NO

Threat Bjorgo Root Causes of Terrorism

2004

US

Threat Kaplan The Saudi Connection to Terrorism

2004

US

Threat Knapp Al Qaeda and the Mass Media (PSYOP Briefing)

2004

US

Threat Knapp Al Qaeda and the Mass Media (Reference)

2004

US

Threat Knapp Distortion in Islam and Jihad

2004

US

Threat Knapp Diversity in Islam

2006

US

Threat Daly Al Qaeda Against Saudi Oil

2006

US

Threat Johnson Battle of Algiers and Its Lessons

2006

US

Threat Seagraves Gold Warriors: New Epilogue, Further of US Theft of WWII Gold Loot

2006

US

Threat Seagraves Gold Warriors New Chapter Seventeen

2006

US

Threat Steele Who Is to Blamce?  The Vice President and Us

2006

US

Threat Stern Al Qaeda Approach to US Muslims

2006

UK

Threat Story Crunch Time for CIA, Banks, and Related Thieves of $742 Trillion

2005

US

Threat Ellis Scenarios for Next Generation Crises in Latin America

2005

US

Threat GAO GAO Report: US Not Addressing Islamic Fundamentalism

2005

US

Threat OSS Somalia Piracy Quick Report

2005

US

Threat OSS Report on Remote Detonation of Improvised Explosive Devices

2005

US

Threat OSS PRC Trade in Latin America

2005

US

Threat Ray & Gross The Perfect Storm

2005

US

Threat Steele Worksheet for Book Review on Crossing the Rubicon

2005

US

Threat Steele Mother Nature as Terrorist

2005

US

Threat Steele 9-11: Who’s To Blame?  One Man’s Opinion

2005

US

Threat Thompson Is the Terrorism Threat Over-Rated?

2004

US

Threat Daly Globalization & National Defense (Ecological Economics)

2004

US

Threat Louisiana Pre-Hurricane Katrina Study and Conclusions

2004

US

Threat Palmer The Real Axis of Evil: 44 Dictators

2004

US

Threat Peters Early Warning of Disease From Pattern Analysis

2004

US

Threat Seagrave Transcript of Video on Stolen Gold Held by US Treasury & Citi-Bank

2004

US

Threat Vlahos Attachment to the Muslim Renovatio Memorandum

2004

US

Threat Vlahos The Muslim Renovatio and U.S. Strategy

2004

US

Threat Vlahos The Muslims Are Coming

2004

US

Threat Vlahos Insurgency Within Islam

2003

US

Threat Danzip Countering Traumatic Attacks

2003

PRC

Threat OSS PRC Treaty & Trade Penetration of Latin America

2002

US

Threat Emerson & Steele American Jihad Map

2002

US

Threat Steele ACFR, 19 Cities: 9-11, U.S. Intelligence, & the Real World

2000

US

Threat Steele Georgetown/AWC: Non-Traditional Threats

1998

US

Threat Steele TAKEDOWN: Targets, Tools, & Technocracy

1994

US

Threat Steele 6th National Threat Symposium: New Directions in Information Sharing

2005

NGO

Threat NGO Changing Face of Global Violence

2005

NGO

Threat NGO Human Security Audit

2004

US

Threat Pelton Robert Young Pelton on Dangerous World

2004

US

Threat Steele Three Book Review Relevant to Global War on Terror (GWOT)

2003

US

Threat Copeland Analysis of the New Paradigm for Terrorism

2003

US

Threat Manwaring Street Gangs: New Urban Insurgency

2003

US

Threat Manwaring War & Conflict: Six Generations

2003

US

Threat Pelton Summary of Presentation on World’s Most Dangerous Places

2002

US

Threat Betts The Next Intelligence Failure: The Limits of Prevention

2002

NL

Threat Jongman World Conflict and Human Rights Map 2001-2002

2002

US

Threat Wheaton Transitions from Authoritarian Rule: A Model

2002

US

Threat Wheaton Virtual Afghanistan: Modeling a Transition from Authoritarian Rule

2001

US

Threat Godson Governments and Gangs

2001

US

Threat Heidenrich Early Warning & Complex Monitoring of Ethnic Genocide (Slides)

2001

US

Threat Heidenrich Early Warning & Complex Monitoring of Ethnic Genocide (Text)

1998

US

Threat Transnational Enemies: Threats Without Names

1998

US

Threat Glaebus Metaphors & Modern Threats: Biological, Computer, Cognitive Viruses

1997

US

Threat Fialka War by Other Means: Economic Espionage In (Against) America

1997

US

Threat Schwartau Information Warfare: The Weapons of the Information Age

1997

US

Threat Tenney Cyber-Law and Cyber-Crime: Spamming Methods and Costs

1996

US

Threat Keuhl School of Information Warfare Threat and Strategy: Shifting Paradigms

1996

US

Threat O’Malley Countering the Business Intelligence Threat

1996

US

Threat Strassmann U.S. Knowledge Assets: The Choice Target for Information Crime

1996

US

Threat Winkler Electronic Industrial Espionage: Defining Ground Zero

1994

US

Threat Whitney-Smith Refugees: Weapon of the Post Cold War World–Counter Offensive: IW

2004 Bjorgo (NO) Root Causes of Terrorism

09 Terrorism, Analysis, Historic Contributions, Peace Intelligence
Tore Bjorgo
Tore Bjorgo

GOLDEN CANDLE AWARD: Dr. Tore Bjorgo, Norway

OSS ’04: To Dr. Tore Bjorgo, Senior Research Fellow of the Norwegian Institute of International Affairs (NUPI), for his leadership of research on terrorism and international crime.  His authorship/editorship of ten books in the field represents the best combination of open sources, scholarship, and operationally-useful intelligence.

Below is the presentation made by Dr. Borgo to OSS ’06.

Tore Bjorgo
Tore Bjorgo