|
2004
|
NO
|
Threat |
Bjorgo |
Root Causes of Terrorism |
|
2004
|
US
|
Threat |
Kaplan |
The Saudi Connection to Terrorism |
|
2004
|
US
|
Threat |
Knapp |
Al Qaeda and the Mass Media (PSYOP Briefing) |
|
2004
|
US
|
Threat |
Knapp |
Al Qaeda and the Mass Media (Reference) |
|
2004
|
US
|
Threat |
Knapp |
Distortion in Islam and Jihad |
|
2004
|
US
|
Threat |
Knapp |
Diversity in Islam |
|
2006
|
US
|
Threat |
Daly |
Al Qaeda Against Saudi Oil |
|
2006
|
US
|
Threat |
Johnson |
Battle of Algiers and Its Lessons |
|
2006
|
US
|
Threat |
Seagraves |
Gold Warriors: New Epilogue, Further of US Theft of WWII Gold Loot |
|
2006
|
US
|
Threat |
Seagraves |
Gold Warriors New Chapter Seventeen |
|
2006
|
US
|
Threat |
Steele |
Who Is to Blamce? The Vice President and Us |
|
2006
|
US
|
Threat |
Stern |
Al Qaeda Approach to US Muslims |
|
2006
|
UK
|
Threat |
Story |
Crunch Time for CIA, Banks, and Related Thieves of $742 Trillion |
|
2005
|
US
|
Threat |
Ellis |
Scenarios for Next Generation Crises in Latin America |
|
2005
|
US
|
Threat |
GAO |
GAO Report: US Not Addressing Islamic Fundamentalism |
|
2005
|
US
|
Threat |
OSS |
Somalia Piracy Quick Report |
|
2005
|
US
|
Threat |
OSS |
Report on Remote Detonation of Improvised Explosive Devices |
|
2005
|
US
|
Threat |
OSS |
PRC Trade in Latin America |
|
2005
|
US
|
Threat |
Ray & Gross |
The Perfect Storm |
|
2005
|
US
|
Threat |
Steele |
Worksheet for Book Review on Crossing the Rubicon |
|
2005
|
US
|
Threat |
Steele |
Mother Nature as Terrorist |
|
2005
|
US
|
Threat |
Steele |
9-11: Who’s To Blame? One Man’s Opinion |
|
2005
|
US
|
Threat |
Thompson |
Is the Terrorism Threat Over-Rated? |
|
2004
|
US
|
Threat |
Daly |
Globalization & National Defense (Ecological Economics) |
|
2004
|
US
|
Threat |
Louisiana |
Pre-Hurricane Katrina Study and Conclusions |
|
2004
|
US
|
Threat |
Palmer |
The Real Axis of Evil: 44 Dictators |
|
2004
|
US
|
Threat |
Peters |
Early Warning of Disease From Pattern Analysis |
|
2004
|
US
|
Threat |
Seagrave |
Transcript of Video on Stolen Gold Held by US Treasury & Citi-Bank |
|
2004
|
US
|
Threat |
Vlahos |
Attachment to the Muslim Renovatio Memorandum |
|
2004
|
US
|
Threat |
Vlahos |
The Muslim Renovatio and U.S. Strategy |
|
2004
|
US
|
Threat |
Vlahos |
The Muslims Are Coming |
|
2004
|
US
|
Threat |
Vlahos |
Insurgency Within Islam |
|
2003
|
US
|
Threat |
Danzip |
Countering Traumatic Attacks |
|
2003
|
PRC
|
Threat |
OSS |
PRC Treaty & Trade Penetration of Latin America |
|
2002
|
US
|
Threat |
Emerson & Steele |
American Jihad Map |
|
2002
|
US
|
Threat |
Steele |
ACFR, 19 Cities: 9-11, U.S. Intelligence, & the Real World |
|
2000
|
US
|
Threat |
Steele |
Georgetown/AWC: Non-Traditional Threats |
|
1998
|
US
|
Threat |
Steele |
TAKEDOWN: Targets, Tools, & Technocracy |
|
1994
|
US
|
Threat |
Steele |
6th National Threat Symposium: New Directions in Information Sharing |
|
2005
|
NGO
|
Threat |
NGO |
Changing Face of Global Violence |
|
2005
|
NGO
|
Threat |
NGO |
Human Security Audit |
|
2004
|
US
|
Threat |
Pelton |
Robert Young Pelton on Dangerous World |
|
2004
|
US
|
Threat |
Steele |
Three Book Review Relevant to Global War on Terror (GWOT) |
|
2003
|
US
|
Threat |
Copeland |
Analysis of the New Paradigm for Terrorism |
|
2003
|
US
|
Threat |
Manwaring |
Street Gangs: New Urban Insurgency |
|
2003
|
US
|
Threat |
Manwaring |
War & Conflict: Six Generations |
|
2003
|
US
|
Threat |
Pelton |
Summary of Presentation on World’s Most Dangerous Places |
|
2002
|
US
|
Threat |
Betts |
The Next Intelligence Failure: The Limits of Prevention |
|
2002
|
NL
|
Threat |
Jongman |
World Conflict and Human Rights Map 2001-2002 |
|
2002
|
US
|
Threat |
Wheaton |
Transitions from Authoritarian Rule: A Model |
|
2002
|
US
|
Threat |
Wheaton |
Virtual Afghanistan: Modeling a Transition from Authoritarian Rule |
|
2001
|
US
|
Threat |
Godson |
Governments and Gangs |
|
2001
|
US
|
Threat |
Heidenrich |
Early Warning & Complex Monitoring of Ethnic Genocide (Slides) |
|
2001
|
US
|
Threat |
Heidenrich |
Early Warning & Complex Monitoring of Ethnic Genocide (Text) |
|
1998
|
US
|
Threat |
|
Transnational Enemies: Threats Without Names |
|
1998
|
US
|
Threat |
Glaebus |
Metaphors & Modern Threats: Biological, Computer, Cognitive Viruses |
|
1997
|
US
|
Threat |
Fialka |
War by Other Means: Economic Espionage In (Against) America |
|
1997
|
US
|
Threat |
Schwartau |
Information Warfare: The Weapons of the Information Age |
|
1997
|
US
|
Threat |
Tenney |
Cyber-Law and Cyber-Crime: Spamming Methods and Costs |
|
1996
|
US
|
Threat |
Keuhl |
School of Information Warfare Threat and Strategy: Shifting Paradigms |
|
1996
|
US
|
Threat |
O’Malley |
Countering the Business Intelligence Threat |
|
1996
|
US
|
Threat |
Strassmann |
U.S. Knowledge Assets: The Choice Target for Information Crime |
|
1996
|
US
|
Threat |
Winkler |
Electronic Industrial Espionage: Defining Ground Zero |
|
1994
|
US
|
Threat |
Whitney-Smith |
Refugees: Weapon of the Post Cold War World–Counter Offensive: IW |