[iwar] http://www.rand.org/hot/newslinks/terrorism.html

From: yangyun@metacrawler.com
Date: 2001-10-17 13:25:40


Return-Path: <sentto-279987-3047-1003350345-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 17 Oct 2001 13:27:07 -0700 (PDT)
Received: (qmail 7845 invoked by uid 510); 17 Oct 2001 20:25:30 -0000
Received: from n33.groups.yahoo.com (216.115.96.83) by 204.181.12.215 with SMTP; 17 Oct 2001 20:25:30 -0000
X-eGroups-Return: sentto-279987-3047-1003350345-fc=all.net@returns.onelist.com
Received: from [10.1.1.221] by n33.groups.yahoo.com with NNFMP; 17 Oct 2001 20:25:45 -0000
X-Sender: yangyun@metacrawler.com
X-Apparently-To: iwar@yahoogroups.com
Received: (EGP: mail-8_0_0_1); 17 Oct 2001 20:25:45 -0000
Received: (qmail 11985 invoked from network); 17 Oct 2001 20:25:44 -0000
Received: from unknown (10.1.10.26) by 10.1.1.221 with QMQP; 17 Oct 2001 20:25:44 -0000
Received: from unknown (HELO n15.groups.yahoo.com) (10.1.1.31) by mta1 with SMTP; 17 Oct 2001 20:25:44 -0000
X-eGroups-Return: yangyun@metacrawler.com
Received: from [10.1.2.163] by n15.groups.yahoo.com with NNFMP; 17 Oct 2001 20:25:41 -0000
To: iwar@yahoogroups.com
Message-ID: <9qkpg4+1gs1@eGroups.com>
User-Agent: eGroups-EW/0.82
X-Mailer: eGroups Message Poster
X-Originating-IP: 24.112.32.13
From: yangyun@metacrawler.com
X-Yahoo-Profile: televr
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 17 Oct 2001 20:25:40 -0000
Reply-To: iwar@yahoogroups.com
Subject: [iwar] http://www.rand.org/hot/newslinks/terrorism.html
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

http://www.rand.org/hot/newslinks/terrorism.html
Terrorism
Research and Analysis 
Reports and Books 
Countering the New Terrorism, by Ian Lesser, Bruce Hoffman, John 
Arquilla, David Ronfeldt, Michele Zanini, and Brian Jenkins (RAND 
report, 1999, PDF): Traces the recent evolution of international 
terrorism against civilian and U.S. military targets, looks ahead to 
where terrorism is going, and assesses how it might be contained. A 
summary of the book is available. Read also an interview at Salon.com 
on the new breed of terrorism with one of the authors of the book.

Networks and Netwars: The Future of Terror, Crime, and Militancy, 
John Arquilla, David Ronfeldt (editors) (RAND report, 2001, PDF): 
Discusses groups, like Osama bin Laden's al-Qaeda, that feature 
network forms of organization, doctrine, strategy, and technology 
attuned to the information age.

Inside Terrorism, by Bruce Hoffman (Commercial book, 1998, read a 
description and find out how to order): Describes the changing face of 
terrorism, probing the new adversaries, methods, and motivations that 
have surfaced in recent years, challenging our fundamental 
assumptions about terrorists and how they operate.

Reshaping National Intelligence for an Age of Information, by Gregory F. 
Treverton (Commercial book, 2001, read a description and find out how 
to order): An insider's view on how intelligence gathering and analysis 
must change with the ending of the Cold War and the onset of an age of 
information. Read also an article and an excerpt (PDF) from the book.

Trends in Outside Support for Insurgent Movements, Daniel L. Byman, 
Peter Chalk, Bruce Hoffman, William Rosenau, David Brannan (RAND 
report, 2001, PDF): Examines trends in how outside supporters--
including both state and non-state sponsors--of insurgent movements 
offer various forms of assistance to insurgents based on a wide range 
of motivations.

Preparing the U.S. Army for Homeland Security: Concepts, Issues, and 
Options, Eric V. Larson, John E. Peters (RAND report, 2000, PDF): 
Recommends a planning framework that can facilitate planning to meet 
homeland security needs, including domestic preparedness and civil 
support in case of attacks on civilians, continuity of government, 
continuity of military operations, and border and coastal defense.

Strategic Appraisal: The Changing Role of Information in Warfare, by 
Zalmay Khalilzad, John White, Andrew Marshall (RAND report, 1999, 
PDF): Explores the opportunities and vulnerabilities inherent in the 
increasing reliance on information technology. 
Securing the U.S. Defense Information Infrastructure: A Proposed 
Approach, by Robert H. Anderson et al. (RAND report, 1999, PDF): 
Analyzes the concept of a minimum essential information infrastructure 
(MEII) in light of the characteristics of the national information 
infrastructure and the nature of potential threats against it.

Political Violence and Stability in the States of the Northern Persian 
Gulf, Daniel Byman and Jerrold Green (RAND report, 1999, PDF): 
Examines the threat of political violence in the Persian Gulf states of 
Saudi Arabia, Kuwait, Bahrain, and the United Arab Emirates and the 
best means of reducing that threat.

In Athena's Camp: Preparing for Conflict in the Information Age, edited 
by John Arquilla and David Ronfeldt (RAND report, 1997, PDF): The 
information revolution is transforming the nature of conflict across the 
spectrum: from open warfare, to terrorism, crime, and even radical 
social activism. This book argues that Mars, the old brute-force god of 
war, must give way to Athena, the well-armed goddess of wisdom.

The Advent of Netwar, by John Arquilla and David Ronfeldt (RAND 
report, 1996, PDF): Recognizes that many terrorists, criminals, 
fundamentalists, and ethno-nationalists are developing netwar 
capabilities and discusses the need to rethink strategy and doctrine to 
conduct counternetwar. 
Colombian Labyrinth: The Synergy of Drugs and Insurgency and Its 
Implications for Regional Stability, by Angel Rabasa and Peter Chalk 
(RAND report, 2001, PDF): Examines the objectives and strategies of 
the guerrillas in Colombia.

Domestic Terrorism: A National Assessment of State and Local Law 
Enforcement Preparedness, by Kevin Jack Riley and Bruce Hoffman 
(RAND report, 1995, read a summary or order a printed copy): Analyzed 
states' and municipalities' terrorism preparedness as a means of 
providing law enforcement with information about the prevention and 
control of terrorist activities in the United States. 
New Modes of Conflict, by Brian Michael Jenkins (RAND report, 1983, 
read a description or order a printed copy): Attempts to describe how 
contemporary international terrorism fits into the broader scheme of 
armed conflict in general. 
Summaries 
Old Madness, New Methods: The cover stories of the winter 1998-99 
issue of RAND Review discuss the revival of religious terrorism and the 
evolution of netwar (HTML).

Taking Charge: A Bipartisan Report to the President Elect on Foreign 
Policy and National Security, edited by Frank Carlucci, Robert Hunter, 
and Zalmay Khalilzad; section on terrorism by Bruce Hoffman (RAND 
report, 2000, PDF): Identifies the basic requirements of a strategy for 
crafting an effective counterterrorism policy.

Super Bowl Surveillance: Facing Up to Biometrics, by John Woodward, 
RAND issue paper, 2001, PDF): Biometric facial recognition can allow 
law enforcement to identify terrorists; however there are concerns. This 
issue paper offers policy recommendations to help maximize the 
technology's utility, while minimizing its threat to our privacy. Read also 
Woodward's op-ed on this topic that ran earlier this year in The 
Washington Post. 
Bioterrorism: Homeland Defense Symposium: The Next Steps -- An 
Executive Summary, ed. Maurice Eisenstein (RAND conference 
proceedings, 2000, PDF): Seeks to identify the elements of an 
integrated homeland defense against bioterrorism, identify critical gaps, 
and offer suggestions on how a relatively cost-effective homeland 
defense program might be achieved. 
Terrorism and Weapons of Mass Destruction: An Analysis of Trends 
and Motivations, by Bruce Hoffman (RAND paper, 1999, read a 
description or order a printed copy): Examines reasons that may 
account for terrorism's increasing lethality. 
The RAND-St. Andrews Chronology of International Terrorist Incidents: 
1995, Bruce Hoffman, Donna Kim Hoffman (RAND reprint, 1998, read a 
description or order a printed copy): The RAND-St. Andrews chronology 
focuses on incidents of international violence. 









------------------------ Yahoo! Groups Sponsor ---------------------~-->
Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more!
http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:55 PST