Most cyber analysis begins with incidents. It should begin with intent. Adversaries sometimes declare strategic priorities, yet cyber incidents that align with them are not assessed accordingly. We should in fact be guarding against intrusions ...