Skip to main content
  • Book
  • © 2022

The U.S. Cybersecurity and Intelligence Analysis Challenges

Palgrave Macmillan
  • Makes use of a qualitative research methodology looking at a conventional understanding of the instruments of power

  • Tells about prevailing issues regarding security to North America and more pointedly the US

  • Uses secondary data and the Federal Secondary Data Case Study Triangulation Model

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (11 chapters)

  1. Front Matter

    Pages i-xiii
  2. Introduction and Background

    • John Michael Weaver
    Pages 1-12
  3. Research Questions, Methodology, and Limitations

    • John Michael Weaver
    Pages 13-25
  4. The United States

    • John Michael Weaver
    Pages 27-40
  5. Al Qaeda

    • John Michael Weaver
    Pages 41-49
  6. People’s Republic of China (China)

    • John Michael Weaver
    Pages 51-64
  7. Islamic Republic of Iran (Iran)

    • John Michael Weaver
    Pages 65-76
  8. Islamic State (IS)

    • John Michael Weaver
    Pages 77-88
  9. Russian Federation (Russia)

    • John Michael Weaver
    Pages 101-118
  10. Analysis, Findings, Assessment

    • John Michael Weaver
    Pages 119-127
  11. Conclusion and Recommendations

    • John Michael Weaver
    Pages 129-137
  12. Back Matter

    Pages 139-142

About this book

One of the prevailing issues regarding security to North America and more pointedly, the United States, gravitates on the topic of cyber threats confronting this nation.  These threats are becoming more disruptive and destructive and many nations’ infrastructure is vulnerable to them. This book makes use of a qualitative research methodology looking at a conventional understanding of the four instruments of power that include diplomacy, information, military and economic (D.I.M.E.) efforts through the use of the York Intelligence Red Team Model-Cyber (Modified) and seeing how adversaries are using them against the United States.  Moreover, this project uses secondary data and makes use of the Federal Secondary Data Case Study Triangulation Model to ensure a balance of sources to dissect the problem. 

Authors and Affiliations

  • Department of History and Political Science, York College of Pennsylvania, York, USA

    John Michael Weaver

About the author

John M. Weaver is Associate Professor of Intelligence Analysis at York College of Pennsylvania, the US.

Bibliographic Information

  • Book Title: The U.S. Cybersecurity and Intelligence Analysis Challenges

  • Authors: John Michael Weaver

  • DOI: https://doi.org/10.1007/978-3-030-95841-1

  • Publisher: Palgrave Macmillan Cham

  • eBook Packages: Political Science and International Studies, Political Science and International Studies (R0)

  • Copyright Information: The Author(s), under exclusive license to Springer Nature Switzerland AG 2022

  • Hardcover ISBN: 978-3-030-95840-4Published: 03 March 2022

  • eBook ISBN: 978-3-030-95841-1Published: 02 March 2022

  • Edition Number: 1

  • Number of Pages: XIII, 142

  • Number of Illustrations: 3 b/w illustrations

  • Topics: International Security Studies

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access