Whole Earth Review Archives on Public Intelligence (Historical)

Whole Earth Review

1992

US

Whole Earth RBrandArmy Green

1992

US

Whole Earth RKapor et alWe Need a National Public Network

1992

US

Whole Earth RKleinerThe Co-Evolution of Governance

1992

US

Whole Earth RPetersenWill the Military Miss the Market

1992

US

Whole Earth RStaple & DixonTelegeography: Mapping the New World Order

1992

US

Whole Earth RSteeleE3i: Ethics, Ecology, Evolution, and Intelligence

1992

US

Whole Earth RTibbsIndustrial Ecology: An Environmental Agenda for Industry

1991

US

Whole Earth RBrilliantComputer Conferencing: The Global Connection

1991

US

Whole Earth RClayGenes, Genius, and Genocide

1991

US

Whole Earth RElginConscious Democracy Through Electronic Town Meetings

1991

US

Whole Earth RGarciaAssessing the Impacts of Technology

1991

US

Whole Earth RGodwinThe Electronic Frontier Foundation and Virtual Communities

1991

US

Whole Earth RKarrakerHighways of the Mind

1991

US

Whole Earth RLovins & LovinsWinning the Peace

1991

US

Whole Earth RMarxPrivacy & Technology

1991

US

Whole Earth RMeeksThe Global Commons

1991

US

Whole Earth RRheingoldElectronic Democracy: The Great Equalizer

1991

US

Whole Earth RSchumanReclaiming our Technological Future

1991

US

Whole Earth RWarren & RheingoldAccess to Political Tools: Effective Citizen Action

1991

US

Whole Earth RWhiteEarthtrust: Electronic Mail and Ecological Activism

1991

US

Whole Earth RWhitney-SmithInformation Doesn’t Want

1991

US

Whole Earth RWittigElectronic City Hall

1990

US

Whole Earth RBarlowCrime and Puzzlement: The Advance of the Law on the Electronic Frontier

1990

US

Whole Earth RBrandOutlaws, Musicians, Lovers, and Spies: The Future of Control

1990

US

Whole Earth RDodgeLife Work

1990

JP

Whole Earth RIshiiCross-Cultural Communications & Computer-Supported Cooperative Work

1990

US

Whole Earth RJordon IIIRestoration: Shaping the Land, Transforming the Spirit

1990

JP

Whole Earth RKumonToward Co-Emulation: Japan and the United States in the Information Age

1990

US

Whole Earth RMonschkeHow to Heal the Land

1990

US

Whole Earth RShapardObservations on Cross-Cultural Electronic Networking

1990

US

Whole Earth RVidalFounding Father Knows Best

1989

US

Whole Earth RBermanThe Gesture of Balance

1989

US

Whole Earth RGarfinkleSocial Security Numbers: And Other Telling Information

1989

US

Whole Earth RHaightLiving in the Office

1989

US

Whole Earth RHorvitzThe USENET Underground

1989

US

Whole Earth RJaffeHello, Central: Phone Conferencing Tips

1989

US

Whole Earth RJohnson`The Portable Office

1989

US

Whole Earth RRheingoldEthnobotany: The Search for Vanishing Knowledge

1988

US

Whole Earth RBaker, S.Gossip

1988

US

Whole Earth RBaker, W.Gossip

1988

US

Whole Earth RBrandThe Information Wants to Be Free Strategy

1988

US

Whole Earth RCoateTales from Two Communities: The Well and the Farm

1988

US

Whole Earth RFergusonGossip

1988

US

Whole Earth RFieldsGossip

1988

US

Whole Earth RHardinGossip

1988

US

Whole Earth RHawkinsComputer Parasites & Remedies–A Catalog of First Sightings

1988

US

Whole Earth RKeenGossip

1988

US

Whole Earth RKleinerGossip

1988

US

Whole Earth RLearyGossip

1988

US

Whole Earth RNelsonGossip

1988

US

Whole Earth RNewroeDistance Learning

1988

US

Whole Earth RPertThe Material Basis of Emotions with Inset, Mind as Information

1988

US

Whole Earth RRappaportGossip

1988

US

Whole Earth RThurow & WalshGetting Over the Information Economy

1987

US

Whole Earth RDonaldsonAn Incomplete History of Microcomputing

1987

US

Whole Earth RHensonMEMETICS: The Science of Information Viruses

1987

US

Whole Earth RHorvitzAn Intelligent Guide to Intelligence

1987

US

Whole Earth RKrauseBio-Acoustics: Habitat Ambience & Ecological Balance

1987

US

Whole Earth RRobertsElectronic Cottage on Wheels

1986

US

Whole Earth RFend & GuntherWhat Have You Got to Hide: Iraq Iran Basra Abadan

1986

US

Whole Earth RMinskySociety of Mind

1986

US

Whole Earth RSandersEtiquette for the Age of Transparency

1986

US

Whole Earth RScxhwartz & BrandThe World Information Economy

1986

US

Whole Earth RThompsonA Gaian Politics

1985

US

Whole Earth RBrand, Kelly, KinneyDigital Retouching: The End of Photography as Evidence of Anything

1985

US

Whole Earth RHunterPublic Image

1985

US

Whole Earth RKleinerThe Health Hazards of Computers: A Guide to Worrying Intelligently

1985

US

Whole Earth RManderSix Grave Doubts About Computers

1983

US

Whole Earth RIllichSilence is a Commons: Computers Are Doing to Communication What …

1982

US

Whole Earth RBrandUncommon Courtesy: A School of Compassionate Skills

1982

US

Whole Earth RKayesForce Without Power: A Doctrine of Unarmed Military Service

1982

US

Whole Earth RMeadowsWhole Earth Models & Systems

Threat Archives on Public Intelligence (1992-2006)

Threats

2004

NO

ThreatBjorgoRoot Causes of Terrorism

2004

US

ThreatKaplanThe Saudi Connection to Terrorism

2004

US

ThreatKnappAl Qaeda and the Mass Media (PSYOP Briefing)

2004

US

ThreatKnappAl Qaeda and the Mass Media (Reference)

2004

US

ThreatKnappDistortion in Islam and Jihad

2004

US

ThreatKnappDiversity in Islam

2006

US

ThreatDalyAl Qaeda Against Saudi Oil

2006

US

ThreatJohnsonBattle of Algiers and Its Lessons

2006

US

ThreatSeagravesGold Warriors: New Epilogue, Further of US Theft of WWII Gold Loot

2006

US

ThreatSeagravesGold Warriors New Chapter Seventeen

2006

US

ThreatSteeleWho Is to Blamce?  The Vice President and Us

2006

US

ThreatSternAl Qaeda Approach to US Muslims

2006

UK

ThreatStoryCrunch Time for CIA, Banks, and Related Thieves of $742 Trillion

2005

US

ThreatEllisScenarios for Next Generation Crises in Latin America

2005

US

ThreatGAOGAO Report: US Not Addressing Islamic Fundamentalism

2005

US

ThreatOSSSomalia Piracy Quick Report

2005

US

ThreatOSSReport on Remote Detonation of Improvised Explosive Devices

2005

US

ThreatOSSPRC Trade in Latin America

2005

US

ThreatRay & GrossThe Perfect Storm

2005

US

ThreatSteeleWorksheet for Book Review on Crossing the Rubicon

2005

US

ThreatSteeleMother Nature as Terrorist

2005

US

ThreatSteele9-11: Who’s To Blame?  One Man’s Opinion

2005

US

ThreatThompsonIs the Terrorism Threat Over-Rated?

2004

US

ThreatDalyGlobalization & National Defense (Ecological Economics)

2004

US

ThreatLouisianaPre-Hurricane Katrina Study and Conclusions

2004

US

ThreatPalmerThe Real Axis of Evil: 44 Dictators

2004

US

ThreatPetersEarly Warning of Disease From Pattern Analysis

2004

US

ThreatSeagraveTranscript of Video on Stolen Gold Held by US Treasury & Citi-Bank

2004

US

ThreatVlahosAttachment to the Muslim Renovatio Memorandum

2004

US

ThreatVlahosThe Muslim Renovatio and U.S. Strategy

2004

US

ThreatVlahosThe Muslims Are Coming

2004

US

ThreatVlahosInsurgency Within Islam

2003

US

ThreatDanzipCountering Traumatic Attacks

2003

PRC

ThreatOSSPRC Treaty & Trade Penetration of Latin America

2002

US

ThreatEmerson & SteeleAmerican Jihad Map

2002

US

ThreatSteeleACFR, 19 Cities: 9-11, U.S. Intelligence, & the Real World

2000

US

ThreatSteeleGeorgetown/AWC: Non-Traditional Threats

1998

US

ThreatSteeleTAKEDOWN: Targets, Tools, & Technocracy

1994

US

ThreatSteele6th National Threat Symposium: New Directions in Information Sharing

2005

NGO

ThreatNGOChanging Face of Global Violence

2005

NGO

ThreatNGOHuman Security Audit

2004

US

ThreatPeltonRobert Young Pelton on Dangerous World

2004

US

ThreatSteeleThree Book Review Relevant to Global War on Terror (GWOT)

2003

US

ThreatCopelandAnalysis of the New Paradigm for Terrorism

2003

US

ThreatManwaringStreet Gangs: New Urban Insurgency

2003

US

ThreatManwaringWar & Conflict: Six Generations

2003

US

ThreatPeltonSummary of Presentation on World’s Most Dangerous Places

2002

US

ThreatBettsThe Next Intelligence Failure: The Limits of Prevention

2002

NL

ThreatJongmanWorld Conflict and Human Rights Map 2001-2002

2002

US

ThreatWheatonTransitions from Authoritarian Rule: A Model

2002

US

ThreatWheatonVirtual Afghanistan: Modeling a Transition from Authoritarian Rule

2001

US

ThreatGodsonGovernments and Gangs

2001

US

ThreatHeidenrichEarly Warning & Complex Monitoring of Ethnic Genocide (Slides)

2001

US

ThreatHeidenrichEarly Warning & Complex Monitoring of Ethnic Genocide (Text)

1998

US

ThreatTransnational Enemies: Threats Without Names

1998

US

ThreatGlaebusMetaphors & Modern Threats: Biological, Computer, Cognitive Viruses

1997

US

ThreatFialkaWar by Other Means: Economic Espionage In (Against) America

1997

US

ThreatSchwartauInformation Warfare: The Weapons of the Information Age

1997

US

ThreatTenneyCyber-Law and Cyber-Crime: Spamming Methods and Costs

1996

US

ThreatKeuhlSchool of Information Warfare Threat and Strategy: Shifting Paradigms

1996

US

ThreatO’MalleyCountering the Business Intelligence Threat

1996

US

ThreatStrassmannU.S. Knowledge Assets: The Choice Target for Information Crime

1996

US

ThreatWinklerElectronic Industrial Espionage: Defining Ground Zero

1994

US

ThreatWhitney-SmithRefugees: Weapon of the Post Cold War World–Counter Offensive: IW

Process Archives on Public Intelligence (1992-2006)

Methods & Process

2006

US

ProcessCRSData Mining and Homeland Security

2006

US

ProcessTurnbullGSA Collaborative Workshop on Information Sharing

2005

US

ProcessClapperInterview

2005

US

ProcessDNIPress Release on Appointment of ADDNI/OS

2005

US

ProcessDNIOffice of the DNI Organization Charts

2005

US

ProcessGerechtNeed for New Clandestine Service

2005

US

ProcessHarrisABLE DANGER Summary

2005

US

ProcessJHU-APLAsymmetric Information

2005

US

ProcessKamien et allNeeds Analysis for Information Sharing

2005

US

ProcessLiszkiewiezReconfiguring the Global System through Mobile Democracy

2005

US

ProcessPetersOn the Soul of Intelligence

2005

US

ProcessRushkoffOpen Source Democracy

2004

US

ProcessSteeleOSS Proprietary Listing of Capabilities Needed by Open Source Agency

2001

US

ProcessChesterThe Atlantic Command’s Open Source Intelligence Approach & Future

2001

US

ProcessDziedzic & WoodInformation Technology as Catalyst for Civil-Military Unity of Effort

1999

US

ProcessApplebyFeedback: The Missing Link in Information Superiority

1997

US

ProcessGupta & PabianTricks of the Trade: Analytic Tools and Techniques

1997

US

ProcessPinchotBeyond Bureaucracy: Intrapreurship

1993

US

ProcessBermudezLetter from a Source

1993

FR

ProcessBonthousCulture: The Missing Intelligence Variable

1993

US

ProcessBrodwin & BernardiInformation Overload

1993

US

ProcessChristianArea Information Servers (WAIS) and Global Change Research

1993

US

ProcessHalberstadtPower and Communication in the Information Age

1993

US

ProcessHerringThe Role of Intelligence in Formulating Strategy

1993

US

ProcessHorowitzUnderstanding Sources: The Real Challenge

1993

JP

ProcessIshiiCross-Cultural Communication & Computer-Supported Collaboration

1993

US

ProcessMageeThe Age of Imagination: Coming Soon to a Civilization Near You

1993

US

ProcessPedtkePutting Functionality in the Open Source Network

1992

US

ProcessAndrioleIT Support for OSINT Analysis & Production (Slides)

1992

US

ProcessAndrioleIT Support for OSINT Analysis & Production (Text)

1992

US

ProcessBodansky & ForestGOP Terrorism Task Force: Research Techniques & Philosophy

1992

US

ProcessFedanzoImplementing OSINT Through a Distributed Collection Model

1992

US

ProcessKeesAdvanced Information Processing and Analysis

1992

US

ProcessMcIntyreCompetitive Advantage: The Power of Online Systems

1992

US

ProcessOgdinWords Are Not Enough

1992

US

ProcessSacksUsing the Telephone as a Research Tool

1992

US

ProcessShepardAnalysis in the Year 2002: A Concept of Operations

1992

US

ProcessSibbetCommercial Remote Sensing: Open Source Imagery Intelligence

1992

US

ProcessTennyGovernment Information Wants to be Free

1992

US

ProcessThompsonRanked Retrieval and Extraction of Open Source Intelligence

1992

US

ProcessTowPainting the Future: Some Remarks from INTERVAL

1992

US

ProcessWhitney-SmithInformation Revolutions and the End of History

2003

US

ProcessDoDDefense Intelligence Meta-Tagging

Analysis Archives on Public Intelligence (1992-2006)

Analysis

2005

SE

AnalysisBjoreSample SILOBREAKER Slides

2005

US

AnalysisOSSMenopause Memorandum

2003

US

AnalysisAndreggWisdom versus Intelligence

2003

US

AnalysisDavisAnalytic Paradoxes: Can OSINT Help?

2003

US

AnalysisMedina21st Century Analysis

2003

US

AnalysisMooreAnalytic Competencies

2002

US

AnalysisAndreggIntelligence-Academia Relationship

1999

US

AnalysisHueurThe Psychology of Intelligence Analysis

1999

US

AnalysisMadisonOSINT and Analysis (One Slide)

1999

US

AnalysisSteeleFuture of Analysis (Two Slides)

1993

US

AnalysisWhitney-SmithAnalysis for Information Revolutions: Dynamic Analogy Analysis

1992

US

AnalysisShepardIntelligence Analysis in the Year 2002

1955

US

AnalysisNADiscovering and Understanding Elites

UN-NGO Archives on Public Intelligence (1992-2006)

Non-Governmental
Archives 1992-2006
Archives 1992-2006

2006

US

NGONoneDraft Legislation to Establish Department of Peace

2006

SE

NGOSalinPeacekeeping Intelligence Training

2006

US

NGOSteelePeacekeeping Intelligence & Information Peacekeeping 1.3

2006

SE

NGOSvenssonSwedish Peacekeeping Intelligence Curriculum

2006

SE

NGOSvenssonSwedish Peacekeeping Intelligence Course Description

2006

US

NGOTillmanDepartment of Peace (Kucinich Supports)

2006

US

NGOTillmanPeace Trip

2004

US

NGOSchellReview of Unconquerable World by Richard Falk

2004

US

NGOSteelePKI III: Peacekeeping Intelligence & Information Peacekeeping

2004

US

NGOSteeleSweden: Peacekeeping Intelligence & Information Peacekeeping

2003

AF

NGOBrahimiBrahimi Report Extracts Relevant to UN/NGO Intelligence Function

2003

NL

NGOCammaertComments on Intelligence and Peacekeeping

2003

US

NGOSteelePeacekeeping Intelligence Leadership Guidance 1.0

2003

US

NGOSteeleInformation Peacekeeping & The Future of Intelligence

2003

US

NGOSteele et alPeacekeeping Intelligence Leadership Digest 1.0

2002

US

NGOSteeleNetherlands: Information Peacekeeping & The Future of Intelligence

2002

US

NGOSteeleNetherlands Keynote on Information Peacekeeping

2000

CA

NGOChartersOSINT for Peace Operations: Perspectives from UN Operations

2000

UN

NGOChitumbo et alNuclear Transparency through Open Source Intelligence (Slides)

2000

UN

NGOChitumbo et alNuclear Transparency through Open Source Intelligence (Text)

1999

US

NGODearthPeacekeeping in the Information Age

1999

Switz

NGOFuchsSummary of 1994 Remarks on Red Cross OSINT

1999

UN

NGOGDINGlobal Disaster Information Network Participants

1999

US

NGOGDINGlobal Disaster Information Network Background Paper

1999

US

NGOGDINProposal to Increase Information Sharing Through ReliefWeb

1999

US

NGORhoaderPeace Wing

1999

AU

NGOSmithIntelligence and UN Peacekeeping

1998

US

NGOGDINBackground on Meeting of Disaster Relief Experts

1998

US

NGOGDINGlobal Disaster Information Network Conference Concept Paper

1996

US

NGOAir ForcePeacespace Dominance

1994

Switz

NGOFuchsComplete Remarks of the Director General of the Red Cross

1994

Switz

NGOFuchsHandling Information in Humanitarian Operations Within Armed Conflicts

1993

US

NGOSteeleInformation Peacekeeping: A Note

1993

US

NGOWhitney-SmithToward an Epistemology of Peace

1993 Whitney-Smith Toward An Epistemology of Peace

Historic Contributions, Peace Intelligence
Epistemology for Peace
Epistemology for Peace

We’ve lost touch with this visionary, but our current work on datqa pathologies and information asymmetries bear out the view of Gandhi and so many others–there is plenty for all, but war is a racket, banks are legalized theft, and most governments are corrupt at all levels for lack of visionary ethical informed leaders as well as informed citizens devoted to preserving the commons for all.

Below is a second document that she provided for OSS ‘1993.

Analysis for Information Revolutions
Analysis for Information Revolutions