SlideShare a Scribd company logo
Discuss the challenges for intelligence analysts when considering the usage of dual-use material.
Solution
Dual use commodities are “those that can be used in weapons of mass destruction (WMD)
programs or in legitimate civilian applications” (Fuhrmann, 2014, p.2). Those materials can be
used for practical or radical reasons hence the reason whythe intelligence community faces
challenges in determining the threat involved. We can see this taking place in China where its
leaders continue to pursue dual tracks of facilitating internet access to the country for economic
and commerce growth and policing certain unwanted online behaviors. China also continues to
expand its cyber-attacks around the world and continues its network exploitation as well as theft
of intellectual property (Clapper, 2014). This recently took place where several F-35 jet
prototypes ended up with in the hands of the Chinese government.

More Related Content

Similar to Discuss the challenges for intelligence analysts when considering th.pdf

The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
Fas (Feisal) Mosleh
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Buy A Paper Gallatin
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
Dharani Adusumalli
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
IRJET Journal
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Maira Asif
 
114-116
114-116114-116
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
Talwant Singh
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the Internet
Maurice Dawson
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
Write My Paper One Day Mercy College
 
The secret Guard Vol.02.pdf
The secret Guard Vol.02.pdfThe secret Guard Vol.02.pdf
The secret Guard Vol.02.pdf
fasil12
 
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docxUNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
ouldparis
 
Wired for repression_Document
Wired for repression_DocumentWired for repression_Document
Wired for repression_Document
Mahesh Jakhotia
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
Quinnipiac University
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
IJCI JOURNAL
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
CloudCamp Chicago
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
ZahidManiyar
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
Andrea Rossetti
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
ijtsrd
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Maurice Dawson
 

Similar to Discuss the challenges for intelligence analysts when considering th.pdf (20)

The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
114-116
114-116114-116
114-116
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the Internet
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
The secret Guard Vol.02.pdf
The secret Guard Vol.02.pdfThe secret Guard Vol.02.pdf
The secret Guard Vol.02.pdf
 
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docxUNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
 
Wired for repression_Document
Wired for repression_DocumentWired for repression_Document
Wired for repression_Document
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
 

More from herminaherman

Write an equation for the height of the point P above the ground as .pdf
Write an equation for the height of the point P above the ground as .pdfWrite an equation for the height of the point P above the ground as .pdf
Write an equation for the height of the point P above the ground as .pdf
herminaherman
 
Wild-type (WT) mice are irradiated, destroying all of their bone marr.pdf
Wild-type (WT) mice are irradiated, destroying all of their bone marr.pdfWild-type (WT) mice are irradiated, destroying all of their bone marr.pdf
Wild-type (WT) mice are irradiated, destroying all of their bone marr.pdf
herminaherman
 
Which of the following is considered to be a distributed denial of s.pdf
Which of the following is considered to be a distributed denial of s.pdfWhich of the following is considered to be a distributed denial of s.pdf
Which of the following is considered to be a distributed denial of s.pdf
herminaherman
 
Which of the folllowing statements about the solubility of 1- propan.pdf
Which of the folllowing statements about the solubility of 1- propan.pdfWhich of the folllowing statements about the solubility of 1- propan.pdf
Which of the folllowing statements about the solubility of 1- propan.pdf
herminaherman
 
What type of mutation that impacts splicing is a significant contrib.pdf
What type of mutation that impacts splicing is a significant contrib.pdfWhat type of mutation that impacts splicing is a significant contrib.pdf
What type of mutation that impacts splicing is a significant contrib.pdf
herminaherman
 
What data indicate that all three germ layers are specified in the b.pdf
What data indicate that all three germ layers are specified in the b.pdfWhat data indicate that all three germ layers are specified in the b.pdf
What data indicate that all three germ layers are specified in the b.pdf
herminaherman
 
Unlike RNA, DNA containsA. adenine.B. uracil.C. phosphate grou.pdf
Unlike RNA, DNA containsA. adenine.B. uracil.C. phosphate grou.pdfUnlike RNA, DNA containsA. adenine.B. uracil.C. phosphate grou.pdf
Unlike RNA, DNA containsA. adenine.B. uracil.C. phosphate grou.pdf
herminaherman
 
Use provided HTML file.Create JavaScript file to validate user i.pdf
Use provided HTML file.Create JavaScript file to validate user i.pdfUse provided HTML file.Create JavaScript file to validate user i.pdf
Use provided HTML file.Create JavaScript file to validate user i.pdf
herminaherman
 
Two four-sided dice are rolled. One die has the letters A through D..pdf
Two four-sided dice are rolled. One die has the letters A through D..pdfTwo four-sided dice are rolled. One die has the letters A through D..pdf
Two four-sided dice are rolled. One die has the letters A through D..pdf
herminaherman
 
The job of a CODEC (CoderDecoder) is to Convert an analog voice si.pdf
The job of a CODEC (CoderDecoder) is to  Convert an analog voice si.pdfThe job of a CODEC (CoderDecoder) is to  Convert an analog voice si.pdf
The job of a CODEC (CoderDecoder) is to Convert an analog voice si.pdf
herminaherman
 
Question 4 Constructive retirement is when A. P buys Ss common stoc.pdf
Question 4 Constructive retirement is when A. P buys Ss common stoc.pdfQuestion 4 Constructive retirement is when A. P buys Ss common stoc.pdf
Question 4 Constructive retirement is when A. P buys Ss common stoc.pdf
herminaherman
 
Private and Public Health are working together through many program .pdf
Private and Public Health are working together through many program .pdfPrivate and Public Health are working together through many program .pdf
Private and Public Health are working together through many program .pdf
herminaherman
 
Name the two standards that are supported by major DBMSs for distrib.pdf
Name the two standards that are supported by major DBMSs for distrib.pdfName the two standards that are supported by major DBMSs for distrib.pdf
Name the two standards that are supported by major DBMSs for distrib.pdf
herminaherman
 
Material Manufacturing Name 3 ways that the properties of thermosett.pdf
Material Manufacturing Name 3 ways that the properties of thermosett.pdfMaterial Manufacturing Name 3 ways that the properties of thermosett.pdf
Material Manufacturing Name 3 ways that the properties of thermosett.pdf
herminaherman
 
Mean can be computed for variables with ordinal-level measurements..pdf
Mean can be computed for variables with ordinal-level measurements..pdfMean can be computed for variables with ordinal-level measurements..pdf
Mean can be computed for variables with ordinal-level measurements..pdf
herminaherman
 
Let u_1, u_2 be finite dimensional subspaces of a vector space V. Sho.pdf
Let u_1, u_2 be finite dimensional subspaces of a vector space V. Sho.pdfLet u_1, u_2 be finite dimensional subspaces of a vector space V. Sho.pdf
Let u_1, u_2 be finite dimensional subspaces of a vector space V. Sho.pdf
herminaherman
 
IV. Which compound would have the higher water solubility, tetrahydro.pdf
IV. Which compound would have the higher water solubility, tetrahydro.pdfIV. Which compound would have the higher water solubility, tetrahydro.pdf
IV. Which compound would have the higher water solubility, tetrahydro.pdf
herminaherman
 
Interseting discussion topic,want to chime inDescribe a symbol .pdf
Interseting discussion topic,want to chime inDescribe a symbol .pdfInterseting discussion topic,want to chime inDescribe a symbol .pdf
Interseting discussion topic,want to chime inDescribe a symbol .pdf
herminaherman
 
IN JAVA Write a program to create a binary data file named RandomInt.pdf
IN JAVA Write a program to create a binary data file named RandomInt.pdfIN JAVA Write a program to create a binary data file named RandomInt.pdf
IN JAVA Write a program to create a binary data file named RandomInt.pdf
herminaherman
 
I wanna add the shape creator like rectangular , square , circle etc.pdf
I wanna add the shape creator like rectangular , square , circle etc.pdfI wanna add the shape creator like rectangular , square , circle etc.pdf
I wanna add the shape creator like rectangular , square , circle etc.pdf
herminaherman
 

More from herminaherman (20)

Write an equation for the height of the point P above the ground as .pdf
Write an equation for the height of the point P above the ground as .pdfWrite an equation for the height of the point P above the ground as .pdf
Write an equation for the height of the point P above the ground as .pdf
 
Wild-type (WT) mice are irradiated, destroying all of their bone marr.pdf
Wild-type (WT) mice are irradiated, destroying all of their bone marr.pdfWild-type (WT) mice are irradiated, destroying all of their bone marr.pdf
Wild-type (WT) mice are irradiated, destroying all of their bone marr.pdf
 
Which of the following is considered to be a distributed denial of s.pdf
Which of the following is considered to be a distributed denial of s.pdfWhich of the following is considered to be a distributed denial of s.pdf
Which of the following is considered to be a distributed denial of s.pdf
 
Which of the folllowing statements about the solubility of 1- propan.pdf
Which of the folllowing statements about the solubility of 1- propan.pdfWhich of the folllowing statements about the solubility of 1- propan.pdf
Which of the folllowing statements about the solubility of 1- propan.pdf
 
What type of mutation that impacts splicing is a significant contrib.pdf
What type of mutation that impacts splicing is a significant contrib.pdfWhat type of mutation that impacts splicing is a significant contrib.pdf
What type of mutation that impacts splicing is a significant contrib.pdf
 
What data indicate that all three germ layers are specified in the b.pdf
What data indicate that all three germ layers are specified in the b.pdfWhat data indicate that all three germ layers are specified in the b.pdf
What data indicate that all three germ layers are specified in the b.pdf
 
Unlike RNA, DNA containsA. adenine.B. uracil.C. phosphate grou.pdf
Unlike RNA, DNA containsA. adenine.B. uracil.C. phosphate grou.pdfUnlike RNA, DNA containsA. adenine.B. uracil.C. phosphate grou.pdf
Unlike RNA, DNA containsA. adenine.B. uracil.C. phosphate grou.pdf
 
Use provided HTML file.Create JavaScript file to validate user i.pdf
Use provided HTML file.Create JavaScript file to validate user i.pdfUse provided HTML file.Create JavaScript file to validate user i.pdf
Use provided HTML file.Create JavaScript file to validate user i.pdf
 
Two four-sided dice are rolled. One die has the letters A through D..pdf
Two four-sided dice are rolled. One die has the letters A through D..pdfTwo four-sided dice are rolled. One die has the letters A through D..pdf
Two four-sided dice are rolled. One die has the letters A through D..pdf
 
The job of a CODEC (CoderDecoder) is to Convert an analog voice si.pdf
The job of a CODEC (CoderDecoder) is to  Convert an analog voice si.pdfThe job of a CODEC (CoderDecoder) is to  Convert an analog voice si.pdf
The job of a CODEC (CoderDecoder) is to Convert an analog voice si.pdf
 
Question 4 Constructive retirement is when A. P buys Ss common stoc.pdf
Question 4 Constructive retirement is when A. P buys Ss common stoc.pdfQuestion 4 Constructive retirement is when A. P buys Ss common stoc.pdf
Question 4 Constructive retirement is when A. P buys Ss common stoc.pdf
 
Private and Public Health are working together through many program .pdf
Private and Public Health are working together through many program .pdfPrivate and Public Health are working together through many program .pdf
Private and Public Health are working together through many program .pdf
 
Name the two standards that are supported by major DBMSs for distrib.pdf
Name the two standards that are supported by major DBMSs for distrib.pdfName the two standards that are supported by major DBMSs for distrib.pdf
Name the two standards that are supported by major DBMSs for distrib.pdf
 
Material Manufacturing Name 3 ways that the properties of thermosett.pdf
Material Manufacturing Name 3 ways that the properties of thermosett.pdfMaterial Manufacturing Name 3 ways that the properties of thermosett.pdf
Material Manufacturing Name 3 ways that the properties of thermosett.pdf
 
Mean can be computed for variables with ordinal-level measurements..pdf
Mean can be computed for variables with ordinal-level measurements..pdfMean can be computed for variables with ordinal-level measurements..pdf
Mean can be computed for variables with ordinal-level measurements..pdf
 
Let u_1, u_2 be finite dimensional subspaces of a vector space V. Sho.pdf
Let u_1, u_2 be finite dimensional subspaces of a vector space V. Sho.pdfLet u_1, u_2 be finite dimensional subspaces of a vector space V. Sho.pdf
Let u_1, u_2 be finite dimensional subspaces of a vector space V. Sho.pdf
 
IV. Which compound would have the higher water solubility, tetrahydro.pdf
IV. Which compound would have the higher water solubility, tetrahydro.pdfIV. Which compound would have the higher water solubility, tetrahydro.pdf
IV. Which compound would have the higher water solubility, tetrahydro.pdf
 
Interseting discussion topic,want to chime inDescribe a symbol .pdf
Interseting discussion topic,want to chime inDescribe a symbol .pdfInterseting discussion topic,want to chime inDescribe a symbol .pdf
Interseting discussion topic,want to chime inDescribe a symbol .pdf
 
IN JAVA Write a program to create a binary data file named RandomInt.pdf
IN JAVA Write a program to create a binary data file named RandomInt.pdfIN JAVA Write a program to create a binary data file named RandomInt.pdf
IN JAVA Write a program to create a binary data file named RandomInt.pdf
 
I wanna add the shape creator like rectangular , square , circle etc.pdf
I wanna add the shape creator like rectangular , square , circle etc.pdfI wanna add the shape creator like rectangular , square , circle etc.pdf
I wanna add the shape creator like rectangular , square , circle etc.pdf
 

Recently uploaded

spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
JomonJoseph58
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 

Recently uploaded (20)

spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 

Discuss the challenges for intelligence analysts when considering th.pdf

  • 1. Discuss the challenges for intelligence analysts when considering the usage of dual-use material. Solution Dual use commodities are “those that can be used in weapons of mass destruction (WMD) programs or in legitimate civilian applications” (Fuhrmann, 2014, p.2). Those materials can be used for practical or radical reasons hence the reason whythe intelligence community faces challenges in determining the threat involved. We can see this taking place in China where its leaders continue to pursue dual tracks of facilitating internet access to the country for economic and commerce growth and policing certain unwanted online behaviors. China also continues to expand its cyber-attacks around the world and continues its network exploitation as well as theft of intellectual property (Clapper, 2014). This recently took place where several F-35 jet prototypes ended up with in the hands of the Chinese government.