Threat Archives on Public Intelligence (1992-2006)

Threats

2004

NO

Threat Bjorgo Root Causes of Terrorism

2004

US

Threat Kaplan The Saudi Connection to Terrorism

2004

US

Threat Knapp Al Qaeda and the Mass Media (PSYOP Briefing)

2004

US

Threat Knapp Al Qaeda and the Mass Media (Reference)

2004

US

Threat Knapp Distortion in Islam and Jihad

2004

US

Threat Knapp Diversity in Islam

2006

US

Threat Daly Al Qaeda Against Saudi Oil

2006

US

Threat Johnson Battle of Algiers and Its Lessons

2006

US

Threat Seagraves Gold Warriors: New Epilogue, Further of US Theft of WWII Gold Loot

2006

US

Threat Seagraves Gold Warriors New Chapter Seventeen

2006

US

Threat Steele Who Is to Blamce?  The Vice President and Us

2006

US

Threat Stern Al Qaeda Approach to US Muslims

2006

UK

Threat Story Crunch Time for CIA, Banks, and Related Thieves of $742 Trillion

2005

US

Threat Ellis Scenarios for Next Generation Crises in Latin America

2005

US

Threat GAO GAO Report: US Not Addressing Islamic Fundamentalism

2005

US

Threat OSS Somalia Piracy Quick Report

2005

US

Threat OSS Report on Remote Detonation of Improvised Explosive Devices

2005

US

Threat OSS PRC Trade in Latin America

2005

US

Threat Ray & Gross The Perfect Storm

2005

US

Threat Steele Worksheet for Book Review on Crossing the Rubicon

2005

US

Threat Steele Mother Nature as Terrorist

2005

US

Threat Steele 9-11: Who’s To Blame?  One Man’s Opinion

2005

US

Threat Thompson Is the Terrorism Threat Over-Rated?

2004

US

Threat Daly Globalization & National Defense (Ecological Economics)

2004

US

Threat Louisiana Pre-Hurricane Katrina Study and Conclusions

2004

US

Threat Palmer The Real Axis of Evil: 44 Dictators

2004

US

Threat Peters Early Warning of Disease From Pattern Analysis

2004

US

Threat Seagrave Transcript of Video on Stolen Gold Held by US Treasury & Citi-Bank

2004

US

Threat Vlahos Attachment to the Muslim Renovatio Memorandum

2004

US

Threat Vlahos The Muslim Renovatio and U.S. Strategy

2004

US

Threat Vlahos The Muslims Are Coming

2004

US

Threat Vlahos Insurgency Within Islam

2003

US

Threat Danzip Countering Traumatic Attacks

2003

PRC

Threat OSS PRC Treaty & Trade Penetration of Latin America

2002

US

Threat Emerson & Steele American Jihad Map

2002

US

Threat Steele ACFR, 19 Cities: 9-11, U.S. Intelligence, & the Real World

2000

US

Threat Steele Georgetown/AWC: Non-Traditional Threats

1998

US

Threat Steele TAKEDOWN: Targets, Tools, & Technocracy

1994

US

Threat Steele 6th National Threat Symposium: New Directions in Information Sharing

2005

NGO

Threat NGO Changing Face of Global Violence

2005

NGO

Threat NGO Human Security Audit

2004

US

Threat Pelton Robert Young Pelton on Dangerous World

2004

US

Threat Steele Three Book Review Relevant to Global War on Terror (GWOT)

2003

US

Threat Copeland Analysis of the New Paradigm for Terrorism

2003

US

Threat Manwaring Street Gangs: New Urban Insurgency

2003

US

Threat Manwaring War & Conflict: Six Generations

2003

US

Threat Pelton Summary of Presentation on World’s Most Dangerous Places

2002

US

Threat Betts The Next Intelligence Failure: The Limits of Prevention

2002

NL

Threat Jongman World Conflict and Human Rights Map 2001-2002

2002

US

Threat Wheaton Transitions from Authoritarian Rule: A Model

2002

US

Threat Wheaton Virtual Afghanistan: Modeling a Transition from Authoritarian Rule

2001

US

Threat Godson Governments and Gangs

2001

US

Threat Heidenrich Early Warning & Complex Monitoring of Ethnic Genocide (Slides)

2001

US

Threat Heidenrich Early Warning & Complex Monitoring of Ethnic Genocide (Text)

1998

US

Threat Transnational Enemies: Threats Without Names

1998

US

Threat Glaebus Metaphors & Modern Threats: Biological, Computer, Cognitive Viruses

1997

US

Threat Fialka War by Other Means: Economic Espionage In (Against) America

1997

US

Threat Schwartau Information Warfare: The Weapons of the Information Age

1997

US

Threat Tenney Cyber-Law and Cyber-Crime: Spamming Methods and Costs

1996

US

Threat Keuhl School of Information Warfare Threat and Strategy: Shifting Paradigms

1996

US

Threat O’Malley Countering the Business Intelligence Threat

1996

US

Threat Strassmann U.S. Knowledge Assets: The Choice Target for Information Crime

1996

US

Threat Winkler Electronic Industrial Espionage: Defining Ground Zero

1994

US

Threat Whitney-Smith Refugees: Weapon of the Post Cold War World–Counter Offensive: IW

Government Archive on Public Intelligence (1992-2006)

Government
Archives 1996-2006
Archives 1996-2006

2006

SA

Government Yekelo African Early Warning

2002

US

Government FSMO Foreign Military Studies Office

2000

US

Government Steele Spies and Secrecy in an Open World

1999

US

Government Coile Information Overlay for Preparing & Coping with Local Disasters

1999

CA

Government George OSINT: Islamic Unrest in China

1999

US

Government Heidenrich Genocide Web Sites (At the Time)

1999

US

Government Heidenrich Sample Daily Briefing on Genocide

1999

UN

Government Marks Proposal for Integrated Regional Information Networks (IRIN)

1999

US

Government OSS Proliferation Web Sites (At the Time)

1999

US

Government OSS Sample Daily Briefing on Proliferation

1999

NL

Government Reserved OSINT: Foundation for Co-Ordination and Information Sharing

1999

US

Government Sanz Nuclear Terrorism Literature Since 1992

1999

US

Government Sovereign Information Sharing for the Lower End of the Spectrum

1999

US

Government Steele Relevant Information: New Approach to Collection, Sharing, Analysis

1999

US

Government Steele Web-Based Concept for a Global Information Sharing Environment

1999

CA

Government Stout & Quiggin OSINT: High Resolution Imagery for Anyone

1999

AU

Government Wing Optimizing Open Source Information Sharing in Australia

1999

AU

Government Wing OSINT in Australia: The Report

1998

NL

Government BVD Annual Report of the National Security Service

1998

BE

Government Cailloux Belgian Observations on Intelligence Oversight

1998

BE

Government Cailloux Report of the Intelligence Oversight Committee

1998

FR

Government Clerc Economic Intelligence

1998

US

Government Dearth Government and the Information Marketplace

1998

US

Government Hughes FBIS 1995-1998: Transition and Transformation

1998

US

Government Lee Letter to HPSCI Urging Attention to Commercial Mapping Technology

1998

SE

Government Leijonhelm OSINT  and Information Sharing Between Government & Industry

1998

S. Africa

Government Mti OSINT, the African Renaissance, and Sustainable Development

1998

GE

Government Schlickman Ensuring Trust and Security in Electronic Communications

1998

US

Government Steele INFORMATION PEACEKEEPING: The Purest Form of War

1998

US

Government Steele Strategic Issues in National and Regional Intelligence & Security

1998

US

Government Steele Clandestine Human Intelligence Successes, Failures, Possibilities

1998

US

Government Steele (in French) Strategic Intelligence in the USA: Myth or Reality?

1997

UK

Government Andrew Presidents, Secret Intelligence, and Open Sources

1997

US

Government Carroll CENDI Information Managers Group

1997

US

Government Haakon Commercial Imagery Options and Trade-Offs

1997

US

Government Hodge CENDI: Help!  Impact of the Internet on the Consumer

1997

US

Government Johnson National Technical Information Center

1997

US/UK

Government Kerr & Herman Does the Intelligence Community Have a Future? (Two Items in One)

1997

US

Government Robideau Department of Energy Technical Information Program

1996

US

Government Kalil (NEC) Leveraging Cyberspace

1996

US

Government Lucas (COSPO) The Open Source Information System

1995

US

Government Markowitz Community Open Source Program Office (COSPO), Report on the Program

1995

US

Government Peters INADEQUATE ANSWERS: Bureaucracy, Wealth, & Mediocrity (US IC)

1994

US

Government Carroll Harsh Realities: S&T Acquisition Costs, Obstacles, and Results

1994

AU

Government Chantler Producing Intelligence in Australia: H National Open Source Foundation?

1994

US

Government Devost Digital Threat: United States National Security and Computers

1994

US

Government Wiener The Intelligence Community: An Outsider’s View

1993

SE

Government Heden & Dedijer The State of the National Intelligence and Security Community of Sweden

1992

US

Government Cotter NASA Open Source Intelligence Requirements & Capabilities (Slides)

1992

US

Government Cotter NASA Open Source Intelligence Requirements & Capabilities (Text)

1992

US

Government Johnson NTIS Open Source Intelligence Requirements & Capabilities

1992

US

Government Keyworth Government as a Customer in the Digital Age

1992

US

Government McConnell Planned Revisions to Circular No. A-130

1992

US

Government Molholm The CENDI Paradigm: How Some Federal Managers Have Organized

1992

US

Government Mortimer LC FRD Open Source Intelligence Requirements & Capabilities

1992

US

Government Riddle FBIS Open Source Intelligence Requirements & Capabilities

1992

US

Government Steele Information Concepts & Doctrine for the Future

1992

US

Government Studeman Teaching the Giant to Dance

Review: How to Prevent Genocide–A Guide for Policymakers, Scholars, and the Concerned Citizen

5 Star, Atrocities & Genocide

Amazon Page
Amazon Page

5.0 out of 5 stars Brilliant, Compelling, Practical, Essential and Unnerving,

December 10, 2001
John G. Heidenrich
The author of this book not only completed graduate work with a direct focus on genocide, but spent over a year supporting the Office of War Crimes at the Department of State, each day creating an open source intelligence report on genocide-at the time he was engaged in this activity, there were eighteen (18) such active genocidal movements going on around the world.This is a brilliant and compelling book that is also practical and essential for anyone who desires to understand the complete inadequacy of the diplomats, the policymakers, the media, and the intelligence communities. It is unnerving in its calm and reasoned detailing of how genocide can take place, its survey of the millions upon millions of post-WWII holocausts taking place today–as the media and policymakers ignore these realities.

Citizen-voters, in my view, will benefit considerably from this book because it will help them understand that there are three worlds out there, and we as a nation are not dealing well with two of the three–the most dangerous two. There is the world of well-fed diplomats and businessman, traveling and negotiating in their warm safe buffer zones. There is the real world as experienced by normal people, many of whom are oppressed and poor and feel helpless in the face of dictatorial regimes and local warlords who may do as they wish absent the rule of law. And then there is the world of genocide, an underworld of such horrific pervasive violence and inhuman brutality that one can only wonder if we are all guilty of mass insanity for turning our backs on this murder of millions.

The author is a world-class scholar and ardent champion for informing the public and achieving informed policy in this vital area, and I can only hope that serious people put some money behind his thinking.
Vote on Review
Vote on Review