Threat Archives on Public Intelligence (1992-2006)

Threats

2004

NO

ThreatBjorgoRoot Causes of Terrorism

2004

US

ThreatKaplanThe Saudi Connection to Terrorism

2004

US

ThreatKnappAl Qaeda and the Mass Media (PSYOP Briefing)

2004

US

ThreatKnappAl Qaeda and the Mass Media (Reference)

2004

US

ThreatKnappDistortion in Islam and Jihad

2004

US

ThreatKnappDiversity in Islam

2006

US

ThreatDalyAl Qaeda Against Saudi Oil

2006

US

ThreatJohnsonBattle of Algiers and Its Lessons

2006

US

ThreatSeagravesGold Warriors: New Epilogue, Further of US Theft of WWII Gold Loot

2006

US

ThreatSeagravesGold Warriors New Chapter Seventeen

2006

US

ThreatSteeleWho Is to Blamce?  The Vice President and Us

2006

US

ThreatSternAl Qaeda Approach to US Muslims

2006

UK

ThreatStoryCrunch Time for CIA, Banks, and Related Thieves of $742 Trillion

2005

US

ThreatEllisScenarios for Next Generation Crises in Latin America

2005

US

ThreatGAOGAO Report: US Not Addressing Islamic Fundamentalism

2005

US

ThreatOSSSomalia Piracy Quick Report

2005

US

ThreatOSSReport on Remote Detonation of Improvised Explosive Devices

2005

US

ThreatOSSPRC Trade in Latin America

2005

US

ThreatRay & GrossThe Perfect Storm

2005

US

ThreatSteeleWorksheet for Book Review on Crossing the Rubicon

2005

US

ThreatSteeleMother Nature as Terrorist

2005

US

ThreatSteele9-11: Who’s To Blame?  One Man’s Opinion

2005

US

ThreatThompsonIs the Terrorism Threat Over-Rated?

2004

US

ThreatDalyGlobalization & National Defense (Ecological Economics)

2004

US

ThreatLouisianaPre-Hurricane Katrina Study and Conclusions

2004

US

ThreatPalmerThe Real Axis of Evil: 44 Dictators

2004

US

ThreatPetersEarly Warning of Disease From Pattern Analysis

2004

US

ThreatSeagraveTranscript of Video on Stolen Gold Held by US Treasury & Citi-Bank

2004

US

ThreatVlahosAttachment to the Muslim Renovatio Memorandum

2004

US

ThreatVlahosThe Muslim Renovatio and U.S. Strategy

2004

US

ThreatVlahosThe Muslims Are Coming

2004

US

ThreatVlahosInsurgency Within Islam

2003

US

ThreatDanzipCountering Traumatic Attacks

2003

PRC

ThreatOSSPRC Treaty & Trade Penetration of Latin America

2002

US

ThreatEmerson & SteeleAmerican Jihad Map

2002

US

ThreatSteeleACFR, 19 Cities: 9-11, U.S. Intelligence, & the Real World

2000

US

ThreatSteeleGeorgetown/AWC: Non-Traditional Threats

1998

US

ThreatSteeleTAKEDOWN: Targets, Tools, & Technocracy

1994

US

ThreatSteele6th National Threat Symposium: New Directions in Information Sharing

2005

NGO

ThreatNGOChanging Face of Global Violence

2005

NGO

ThreatNGOHuman Security Audit

2004

US

ThreatPeltonRobert Young Pelton on Dangerous World

2004

US

ThreatSteeleThree Book Review Relevant to Global War on Terror (GWOT)

2003

US

ThreatCopelandAnalysis of the New Paradigm for Terrorism

2003

US

ThreatManwaringStreet Gangs: New Urban Insurgency

2003

US

ThreatManwaringWar & Conflict: Six Generations

2003

US

ThreatPeltonSummary of Presentation on World’s Most Dangerous Places

2002

US

ThreatBettsThe Next Intelligence Failure: The Limits of Prevention

2002

NL

ThreatJongmanWorld Conflict and Human Rights Map 2001-2002

2002

US

ThreatWheatonTransitions from Authoritarian Rule: A Model

2002

US

ThreatWheatonVirtual Afghanistan: Modeling a Transition from Authoritarian Rule

2001

US

ThreatGodsonGovernments and Gangs

2001

US

ThreatHeidenrichEarly Warning & Complex Monitoring of Ethnic Genocide (Slides)

2001

US

ThreatHeidenrichEarly Warning & Complex Monitoring of Ethnic Genocide (Text)

1998

US

ThreatTransnational Enemies: Threats Without Names

1998

US

ThreatGlaebusMetaphors & Modern Threats: Biological, Computer, Cognitive Viruses

1997

US

ThreatFialkaWar by Other Means: Economic Espionage In (Against) America

1997

US

ThreatSchwartauInformation Warfare: The Weapons of the Information Age

1997

US

ThreatTenneyCyber-Law and Cyber-Crime: Spamming Methods and Costs

1996

US

ThreatKeuhlSchool of Information Warfare Threat and Strategy: Shifting Paradigms

1996

US

ThreatO’MalleyCountering the Business Intelligence Threat

1996

US

ThreatStrassmannU.S. Knowledge Assets: The Choice Target for Information Crime

1996

US

ThreatWinklerElectronic Industrial Espionage: Defining Ground Zero

1994

US

ThreatWhitney-SmithRefugees: Weapon of the Post Cold War World–Counter Offensive: IW

Review: The Volunteer Recruitment (and Membership Development) Book

4 Star, Best Practices in Management, Civil Society

Amazon Page
Amazon Page

4.0 out of 5 stars Somewhat Dated, Some Nuggets,

July 23, 2002
Susan J. Ellis
This book (acutally an 8.5 by 11 manual), originally published in 1994 and based on 1980’s readings, is somewhat dated and has been only marginally updated. It falls into the second rank of the four books that made the cut from among the many available. Helen Little’s “Volunteers: How to Get Them, How to Keep Them” stands alone as the single “must buy.” This book is co-equal to two others, each recommended as supplementary reading because each has something to offer at a secondary level: Sue Vineyard and Steve McCurley’s “Best Practices for Volunteer Programs” and Jarene Frances Lee with Julai M. Catagnus, “Supervising Volunteers: An Action Guide for Making Your Job Easier.”There are two aspects of this manual by Susan Ellis that I did not see in the other books: first, her emphasis on casting a wide net and reaching as many potential volunteers as possible….(“Most people do not say ‘no’; they simply never knew you wanted them to say ‘yes’.) While I am skeptical of wasteful advertising programs in this time of diminishing leisure hours, there is something to this. The other vital chapter that this manual offers is the one addressing the importance of image, i.e. the public perception of the organization seeking volunteers, the reputation that it can specifically draw on as a resource.

There are a few flakey notes (e.g. one vignette about recruiting people to call parents and offer support as they are getting kids out the door to school. Any normal parent, especially if one parent is absent or has an early work start, would be furious at any volunteer daring to call in the midst of the chaos that charactizes getting three kids out the door to three different bus pick-up times.)

This manual does have an index. Bottom line: dated, some nuggets, if volunteers are vital to your success, worth getting.

Vote on Review
Vote on Review