Intelligence Analysis: Unclassified Area and Point Estimates (and Other Intelligence Related Topics). 2nd Edition

John Michael Weaver (Editor)
DPA, Assistant Professor of Intelligence Analysis, York College, PA, USA

Jennifer Yongmei Pomeroy, Ph.D. (Editor)
Assistant Professor of Geography, York College, PA, USA

Series: Government Procedures and Operations
BISAC: POL030000

This is the second edition of an earlier work that looks at current threats to the United States. The US under a new presidential administration is looking to depart from globalization, though there are still inextricable linkages among all countries in the world. This book provides an open source intelligence analysis of regions, countries and non-state actors from around the world that could have an impact on the United States. These areas and actors are dissected using predominately qualitative analysis techniques focusing on secondary data sources in order to provide an open source intelligence look at threats as seen by the United States using two models (the York Intelligence Red Team Model and the Federal Secondary Data Case Study Triangulation Model). The key audience for this book includes the 17 members of the US intelligence community, members of the US National Security Council, governments of other countries that share the United States’ assessment of current threats, nongovernmental organizations (NGOs) looking to provide support abroad, and private sector companies that are considering expanding their operations overseas.



Volume 10

Issue 1

Volume 2

Volume 3

Special issue: Resilience in breaking the cycle of children’s environmental health disparities
Edited by I Leslie Rubin, Robert J Geller, Abby Mutic, Benjamin A Gitterman, Nathan Mutic, Wayne Garfinkel, Claire D Coles, Kurt Martinuzzi, and Joav Merrick


Digitally watermarked, DRM-free.
Immediate eBook download after purchase.

Product price
Additional options total:
Order total:



Table of Contents


Chapter 1. Introduction to the National Security Issues Confronting the United States (pp. 1-10)
(John M. Weaver)

Chapter 2. Threats to the National Security of the U.S. Homeland: A Qualitative Assessment (pp. 11-46)
(Maura Gallant, Savannah Galati, Megan Martin and Jennifer Pomeroy)

Chapter 3. Russia’s Search for Stability: Cyber Capabilities and Military Buildup (pp. 47-76)
(Jennifer Pomeroy, Nathan Swartz, Logan Suntzenich and Kevin Winz)

Chapter 4. An Overview of China’s Threat to the National Security of the United States: A Qualitative Assessment (pp. 77-116)
(Matthew Breneman, Corey Byrne and Peter Ring)

Chapter 5. North Korean Threats to the National Security of the United States: A Qualitative Assessment (pp. 117-154)
(Jesse Huber, Bobby Kuehn, Luke Knott, Dylan Nuttall and Jacob C. Swartz)

Chapter 6. Iranian Threats to the National Security of the United States: A Qualitative Assessment (pp. 155-192)
(Claire Ashcraft, Grant Cahill and Miranda Reisinger)

Chapter 7. A Qualitative Assessment of Instability and Uncertainty in the Middle East: The Syrian Civil War (pp. 193-232)
(Erika Lewis, Victoria Miravich, Jennifer Pomeroy, Rachele Tombolini and Amanda Tondin)

Chapter 8. The Islamic State and Its Threat to the National Security of the United States: A Qualitative Assessment (pp. 233-252)
(Andrew Blackburn, Jordan Bernard and John Richards)

Chapter 9. The Relationship Between Cocaine-Related Activities and Emigration (pp. 253-274)
(Kimberly Levan-Quirk)

Chapter 10. Cyber Threats to the National Security of the United States: A Qualitative Assessment (pp. 275-296)
(Benjamin J. O’Connor, Camila Salaverria, Ethan Moore and Adam Hand)

Chapter 11. Conclusions (pp. 297-308)
(Jennifer Y. Pomeroy)

Index (pp. 311)

Keywords: YIRTM, Qualitative Data, Intelligence, National Security Strategy, Intelligence Community, Department of Defense, Department of State, Department of Homeland Security, York Intelligence Red Team Model, Federal Secondary Data Case Study Triangulation Model, Qualitative.

This book will be useful to both academics and practitioners looking at contemporary threats to the United States.

You have not viewed any product yet.