001444953 000__ 03219cam\a2200541Ii\4500 001444953 001__ 1444953 001444953 003__ OCoLC 001444953 005__ 20230310003804.0 001444953 006__ m\\\\\o\\d\\\\\\\\ 001444953 007__ cr\un\nnnunnun 001444953 008__ 220306s2022\\\\sz\a\\\\o\\\\\000\0\eng\d 001444953 019__ $$a1302100819$$a1302184148 001444953 020__ $$a9783030958411$$q(electronic bk.) 001444953 020__ $$a3030958418$$q(electronic bk.) 001444953 020__ $$z9783030958404 001444953 020__ $$z303095840X 001444953 0247_ $$a10.1007/978-3-030-95841-1$$2doi 001444953 035__ $$aSP(OCoLC)1302124874 001444953 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dN$T$$dOCLCO$$dUKMGB$$dOCLCF$$dOCLCO$$dSFB$$dOCLCQ 001444953 043__ $$an-us--- 001444953 049__ $$aISEA 001444953 050_4 $$aHV6773.15.C97$$bW43 2022 001444953 08204 $$a363.3250973$$223 001444953 1001_ $$aWeaver, John Michael,$$eauthor. 001444953 24514 $$aThe U.S. cybersecurity and intelligence analysis challenges /$$cJohn Michael Weaver. 001444953 264_1 $$aCham :$$bPalgrave Macmillan,$$c[2022] 001444953 264_4 $$c©2022 001444953 300__ $$a1 online resource :$$billustrations 001444953 336__ $$atext$$btxt$$2rdacontent 001444953 337__ $$acomputer$$bc$$2rdamedia 001444953 338__ $$aonline resource$$bcr$$2rdacarrier 001444953 4901_ $$aPalgrave pivot 001444953 5050_ $$aChapter 1 Introduction and Background -- Chapter 2 Research Questions, Methodology, and Limitations -- Chapter 3 The United States (an Overview) -- Chapter 4 Al Qaeda -- Chapter 5 People's Republic of China (PRC) -- Chapter 6 Islamic Republic of Iran (Iran) -- Chapter 7 Islamic State (IS) -- Chapter 8 Democratic People's Republic of Korea (DPRK) -- Chapter 9 Russian Federation (Russia) -- Chapter 10 Analysis and Findings -- Chapter 11 Conclusion. 001444953 506__ $$aAccess limited to authorized users. 001444953 520__ $$aOne of the prevailing issues regarding security to North America and more pointedly, the United States, gravitates on the topic of cyber threats confronting this nation. These threats are becoming more disruptive and destructive and many nations' infrastructure is vulnerable to them. This book makes use of a qualitative research methodology looking at a conventional understanding of the four instruments of power that include diplomacy, information, military and economic (D.I.M.E.) efforts through the use of the York Intelligence Red Team Model-Cyber (Modified) and seeing how adversaries are using them against the United States. Moreover, this project uses secondary data and makes use of the Federal Secondary Data Case Study Triangulation Model to ensure a balance of sources to dissect the problem. John M. Weaver is Associate Professor of Intelligence Analysis at York College of Pennsylvania, the US. 001444953 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed March 11, 2022). 001444953 650_0 $$aCyberterrorism$$zUnited States. 001444953 650_0 $$aCyberterrorism$$zUnited States$$xPrevention. 001444953 650_6 $$aCyberterrorisme$$zÉtats-Unis. 001444953 655_0 $$aElectronic books. 001444953 77608 $$iPrint version:$$z303095840X$$z9783030958404$$w(OCoLC)1291170424 001444953 830_0 $$aPalgrave pivot. 001444953 852__ $$bebk 001444953 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-95841-1$$zOnline Access$$91397441.1 001444953 909CO $$ooai:library.usi.edu:1444953$$pGLOBAL_SET 001444953 980__ $$aBIB 001444953 980__ $$aEBOOK 001444953 982__ $$aEbook 001444953 983__ $$aOnline 001444953 994__ $$a92$$bISE