Search Results

You are looking at 1 - 2 of 2 items for

  • Author or Editor: John Michael Weaver x
Clear All Modify Search
Restricted access

United Nations Security Council Permanent Member Perspectives

Implications for U.S. and Global Intelligence Professionals

John Michael Weaver

Threats to peace and stability are real and will likely continue into the foreseeable future. Likewise, globalization and its proliferation has made it increasingly difficult in knowing whether one is a friend or foe. This is particularly true when turning to the relationship of the five permanent members of the United Nations Security Council (UNSC); the relationships are not as clear as was the case two decades ago. Intelligence professionals the world over would be remiss in their assessments if they fail to take into account the position of each in the context of contemporary issues. Countries can be aligned on one issue and yet diametrically opposed on others. This research looks to enhance what Ernest Boyer refers to as scholarship of integration and uses the Federal Qualitative Secondary Data Case Study Triangulation Model and a variation of a model referred to as the York Intelligence Red Team Model-Modified (YIRTM-M) to conduct the analysis. More pointedly, this book looks at issues from the U.S. perspective to see how the YIRTM-M can be applied to advance its own interests on the world stage and to better understand when each can be seen as a friend or foe.

Restricted access

John Michael Weaver and Benjamin T. Johnson

This study turned the tables on a conventional understanding of the four instruments of national power (diplomacy, information, military and economic measures/D.I.M.E.) to see how potential adversaries could use these against the national security interests of Canada and the United States. Moreover, this particular work focuses on qualitative research regarding cyber threats that have continually beleaguered these nations by malevolent actors mostly over the last five years. This study also affords consideration to how nefarious individuals, non-state actors, or nation states can implement the instruments of national power through the application of a new model named the York Intelligence Red Team Model-Cyber (YIRTM-C) using sources guided by the Federal Qualitative Secondary Data Case Study Triangulation Model to arrive at results.