Presented to you through Paradigm Publishing Services
Princeton University Press
Chapter
Licensed
Unlicensed
Requires Authentication
10 Decoding Cyber Threats
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter i
- Contents vii
- Tables ix
- Figures xi
- Abbreviations and Acronyms xiii
- 1 Intelligence Challenges in the Digital Age: Cloaks, Daggers, and Tweets 1
- 2 The Education Crisis: How Fictional Spies are Shaping Public Opinion and Intelligence Policy 16
- 3 American Intelligence History at A Glance: From Fake Bakeries to Armed Drones 44
- 4 Intelligence Basics: Knowns and Unknowns 77
- 5 Why Analysis Is So Hard: The Seven Deadly Biases 108
- 6 Counterintelligence: To Catch A Spy 143
- 7 Covert Action “A Har d Business of Agonizing Choices” 169
- 8 Congressional Oversight: Eyes on Spies 195
- 9 Intelligence Isn’t Just For Governments Anymore: Nuclear Sleuthing in A Google Earth World 225
- 10 Decoding Cyber Threats 251
- Acknowledgments 277
- Notes 281
- Selected Reading 379
- Index 393
Chapters in this book
- Frontmatter i
- Contents vii
- Tables ix
- Figures xi
- Abbreviations and Acronyms xiii
- 1 Intelligence Challenges in the Digital Age: Cloaks, Daggers, and Tweets 1
- 2 The Education Crisis: How Fictional Spies are Shaping Public Opinion and Intelligence Policy 16
- 3 American Intelligence History at A Glance: From Fake Bakeries to Armed Drones 44
- 4 Intelligence Basics: Knowns and Unknowns 77
- 5 Why Analysis Is So Hard: The Seven Deadly Biases 108
- 6 Counterintelligence: To Catch A Spy 143
- 7 Covert Action “A Har d Business of Agonizing Choices” 169
- 8 Congressional Oversight: Eyes on Spies 195
- 9 Intelligence Isn’t Just For Governments Anymore: Nuclear Sleuthing in A Google Earth World 225
- 10 Decoding Cyber Threats 251
- Acknowledgments 277
- Notes 281
- Selected Reading 379
- Index 393