Return-Path: <sentto-279987-3047-1003350345-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 17 Oct 2001 13:27:07 -0700 (PDT) Received: (qmail 7845 invoked by uid 510); 17 Oct 2001 20:25:30 -0000 Received: from n33.groups.yahoo.com (216.115.96.83) by 204.181.12.215 with SMTP; 17 Oct 2001 20:25:30 -0000 X-eGroups-Return: sentto-279987-3047-1003350345-fc=all.net@returns.onelist.com Received: from [10.1.1.221] by n33.groups.yahoo.com with NNFMP; 17 Oct 2001 20:25:45 -0000 X-Sender: yangyun@metacrawler.com X-Apparently-To: iwar@yahoogroups.com Received: (EGP: mail-8_0_0_1); 17 Oct 2001 20:25:45 -0000 Received: (qmail 11985 invoked from network); 17 Oct 2001 20:25:44 -0000 Received: from unknown (10.1.10.26) by 10.1.1.221 with QMQP; 17 Oct 2001 20:25:44 -0000 Received: from unknown (HELO n15.groups.yahoo.com) (10.1.1.31) by mta1 with SMTP; 17 Oct 2001 20:25:44 -0000 X-eGroups-Return: yangyun@metacrawler.com Received: from [10.1.2.163] by n15.groups.yahoo.com with NNFMP; 17 Oct 2001 20:25:41 -0000 To: iwar@yahoogroups.com Message-ID: <9qkpg4+1gs1@eGroups.com> User-Agent: eGroups-EW/0.82 X-Mailer: eGroups Message Poster X-Originating-IP: 24.112.32.13 From: yangyun@metacrawler.com X-Yahoo-Profile: televr Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 17 Oct 2001 20:25:40 -0000 Reply-To: iwar@yahoogroups.com Subject: [iwar] http://www.rand.org/hot/newslinks/terrorism.html Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit http://www.rand.org/hot/newslinks/terrorism.html Terrorism Research and Analysis Reports and Books Countering the New Terrorism, by Ian Lesser, Bruce Hoffman, John Arquilla, David Ronfeldt, Michele Zanini, and Brian Jenkins (RAND report, 1999, PDF): Traces the recent evolution of international terrorism against civilian and U.S. military targets, looks ahead to where terrorism is going, and assesses how it might be contained. A summary of the book is available. Read also an interview at Salon.com on the new breed of terrorism with one of the authors of the book. Networks and Netwars: The Future of Terror, Crime, and Militancy, John Arquilla, David Ronfeldt (editors) (RAND report, 2001, PDF): Discusses groups, like Osama bin Laden's al-Qaeda, that feature network forms of organization, doctrine, strategy, and technology attuned to the information age. Inside Terrorism, by Bruce Hoffman (Commercial book, 1998, read a description and find out how to order): Describes the changing face of terrorism, probing the new adversaries, methods, and motivations that have surfaced in recent years, challenging our fundamental assumptions about terrorists and how they operate. Reshaping National Intelligence for an Age of Information, by Gregory F. Treverton (Commercial book, 2001, read a description and find out how to order): An insider's view on how intelligence gathering and analysis must change with the ending of the Cold War and the onset of an age of information. Read also an article and an excerpt (PDF) from the book. Trends in Outside Support for Insurgent Movements, Daniel L. Byman, Peter Chalk, Bruce Hoffman, William Rosenau, David Brannan (RAND report, 2001, PDF): Examines trends in how outside supporters-- including both state and non-state sponsors--of insurgent movements offer various forms of assistance to insurgents based on a wide range of motivations. Preparing the U.S. Army for Homeland Security: Concepts, Issues, and Options, Eric V. Larson, John E. Peters (RAND report, 2000, PDF): Recommends a planning framework that can facilitate planning to meet homeland security needs, including domestic preparedness and civil support in case of attacks on civilians, continuity of government, continuity of military operations, and border and coastal defense. Strategic Appraisal: The Changing Role of Information in Warfare, by Zalmay Khalilzad, John White, Andrew Marshall (RAND report, 1999, PDF): Explores the opportunities and vulnerabilities inherent in the increasing reliance on information technology. Securing the U.S. Defense Information Infrastructure: A Proposed Approach, by Robert H. Anderson et al. (RAND report, 1999, PDF): Analyzes the concept of a minimum essential information infrastructure (MEII) in light of the characteristics of the national information infrastructure and the nature of potential threats against it. Political Violence and Stability in the States of the Northern Persian Gulf, Daniel Byman and Jerrold Green (RAND report, 1999, PDF): Examines the threat of political violence in the Persian Gulf states of Saudi Arabia, Kuwait, Bahrain, and the United Arab Emirates and the best means of reducing that threat. In Athena's Camp: Preparing for Conflict in the Information Age, edited by John Arquilla and David Ronfeldt (RAND report, 1997, PDF): The information revolution is transforming the nature of conflict across the spectrum: from open warfare, to terrorism, crime, and even radical social activism. This book argues that Mars, the old brute-force god of war, must give way to Athena, the well-armed goddess of wisdom. The Advent of Netwar, by John Arquilla and David Ronfeldt (RAND report, 1996, PDF): Recognizes that many terrorists, criminals, fundamentalists, and ethno-nationalists are developing netwar capabilities and discusses the need to rethink strategy and doctrine to conduct counternetwar. Colombian Labyrinth: The Synergy of Drugs and Insurgency and Its Implications for Regional Stability, by Angel Rabasa and Peter Chalk (RAND report, 2001, PDF): Examines the objectives and strategies of the guerrillas in Colombia. Domestic Terrorism: A National Assessment of State and Local Law Enforcement Preparedness, by Kevin Jack Riley and Bruce Hoffman (RAND report, 1995, read a summary or order a printed copy): Analyzed states' and municipalities' terrorism preparedness as a means of providing law enforcement with information about the prevention and control of terrorist activities in the United States. New Modes of Conflict, by Brian Michael Jenkins (RAND report, 1983, read a description or order a printed copy): Attempts to describe how contemporary international terrorism fits into the broader scheme of armed conflict in general. Summaries Old Madness, New Methods: The cover stories of the winter 1998-99 issue of RAND Review discuss the revival of religious terrorism and the evolution of netwar (HTML). Taking Charge: A Bipartisan Report to the President Elect on Foreign Policy and National Security, edited by Frank Carlucci, Robert Hunter, and Zalmay Khalilzad; section on terrorism by Bruce Hoffman (RAND report, 2000, PDF): Identifies the basic requirements of a strategy for crafting an effective counterterrorism policy. Super Bowl Surveillance: Facing Up to Biometrics, by John Woodward, RAND issue paper, 2001, PDF): Biometric facial recognition can allow law enforcement to identify terrorists; however there are concerns. This issue paper offers policy recommendations to help maximize the technology's utility, while minimizing its threat to our privacy. Read also Woodward's op-ed on this topic that ran earlier this year in The Washington Post. Bioterrorism: Homeland Defense Symposium: The Next Steps -- An Executive Summary, ed. Maurice Eisenstein (RAND conference proceedings, 2000, PDF): Seeks to identify the elements of an integrated homeland defense against bioterrorism, identify critical gaps, and offer suggestions on how a relatively cost-effective homeland defense program might be achieved. Terrorism and Weapons of Mass Destruction: An Analysis of Trends and Motivations, by Bruce Hoffman (RAND paper, 1999, read a description or order a printed copy): Examines reasons that may account for terrorism's increasing lethality. The RAND-St. Andrews Chronology of International Terrorist Incidents: 1995, Bruce Hoffman, Donna Kim Hoffman (RAND reprint, 1998, read a description or order a printed copy): The RAND-St. Andrews chronology focuses on incidents of international violence. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more! http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:55 PST