Military Threats

Military Threats

Author: Branislav L. Slantchev

Publisher: Cambridge University Press

Published: 2011-02-03

Total Pages: 328

ISBN-13: 1139493051

DOWNLOAD EBOOK

Is military power central in determining which states get their voice heard? Must states run a high risk of war to communicate credible intent? In this book, Slantchev shows that states can often obtain concessions without incurring higher risks when they use military threats. Unlike diplomatic forms of communication, physical military moves improve a state's expected performance in war. If the opponent believes the threat, it will be more likely to back down. Military moves are also inherently costly, so only resolved states are willing to pay these costs. Slantchev argues that powerful states can secure better peaceful outcomes and lower the risk of war, but the likelihood of war depends on the extent to which a state is prepared to use military threats to deter challenges to peace and compel concessions without fighting. The price of peace may therefore be large: states invest in military forces that are both costly and unused.


Between Threats and War

Between Threats and War

Author: Micah Zenko

Publisher: Stanford University Press

Published: 2010-08-03

Total Pages: 241

ISBN-13: 0804771901

DOWNLOAD EBOOK

In Between Threats and War: U.S. Discrete Military Operations in the Post-Cold War World, author Micah Zenko presents a new concept to capture and illuminate the phenomenon: "Discrete Military Operations."


Calculating Credibility

Calculating Credibility

Author: Daryl G. Press

Publisher: Cornell University Press

Published: 2007

Total Pages: 244

ISBN-13: 9780801474156

DOWNLOAD EBOOK

"Daryl G. Press uses historical evidence to answer two crucial questions: When a country backs down in a crisis, does its credibility suffer? How do leaders assess their adversaries' credibility? Press illuminates the decision-making processes behind events such as the crises in Europe that preceded World War II, the superpower showdowns over Berlin in the 1950s and 60s, and the Cuban Missile Crisis."--Page 4 of cover.


Senior Leadership Roundtable on Military and Defence Aspects of Border Security in South East Europe

Senior Leadership Roundtable on Military and Defence Aspects of Border Security in South East Europe

Author: I.V. Lochard

Publisher: IOS Press

Published: 2019-02-08

Total Pages: 246

ISBN-13: 1614999082

DOWNLOAD EBOOK

The region of South East Europe (SEE), which is home to both NATO and Partnership for Peace (PfP) countries, serves as an important corridor between Europe and the Middle East, North Africa, and the Caucasus. In recent years, however, SEE has also experienced high levels of cross-border, military and defense-related challenges in the form of migration, smuggling, terrorism, and cyber threats. Furthermore, the use of the new information environment (IE) to further extremism in SEE and elsewhere in NATO and PfP countries has had far-reaching command and control (C2) implications for the Alliance. A collaborative interdisciplinary, international and regional approach is clearly needed to adequately assess and address these hybrid threats. This book presents papers delivered at the NATO Science for Peace and Security (SPS) event: “Senior Leadership Roundtable on Military and Defense Aspects of Border Security in South East Europe”, held in Berovo, the Former Yugoslav Republic of Macedonia* from 23-30 September 2017. The aim of this special SPS grant was to maximize opportunities for extensive dialogue and collaboration between senior regional members, and the almost 70 distinguished academic and legal experts, as well as current or former senior-level practitioners from various governments, NATO bodies, and international organization that participated. It was the first SPS event of its kind in SEE as well as the first NATO SPS grant to be co-executed by the U.S. Department of Defense via the U.S. National Defense University. Other co-organizers were the C4I and Cyber Center of Excellence at George Mason University and PfP partner institution, the General Mihailo Apostolski Military Academy – Skopje, Associate Member of the University of Goce Delčev – Stip. The book is divided into five parts: global trends, defining the problem, policy and academic solutions, national and regional case studies, and technological solutions. It will prove an invaluable source of reference for all those with an interest in the SEE region as well as cross-border hybrid threats, in general. * Turkey recognizes the Republic of Macedonia with its constitutional name.


Preventive Defense

Preventive Defense

Author: Ashton B. Carter

Publisher: Rowman & Littlefield

Published: 2000-09-01

Total Pages: 276

ISBN-13: 9780815791003

DOWNLOAD EBOOK

William J. Perry and Ashton B. Carter, two of the world's foremost defense authorities, draw on their experience as leaders of the U.S. Defense Department to propose a new American security strategy for the twenty-first century. After a century in which aggression had to be defeated in two world wars and then deterred through a prolonged cold war, the authors argue for a strategy centered on prevention. Now that the cold war is over, it is necessary to rethink the risks to U.S. security. The A list--threats to U.S. survival--is empty today. The B list--the two major regional contingencies in the Persian Gulf and on the Korean peninsula that dominate Pentagon planning and budgeting--pose imminent threats to U.S. interests but not to survival. And the C list--such headline-grabbing places as Kosovo, Bosnia, Somalia, Rwanda, and Haiti--includes important contingencies that indirectly affect U.S. security but do not directly threaten U.S. interests. Thus the United States is enjoying a period of unprecedented peace and influence; but foreign policy and defense leaders cannot afford to be complacent. The authors' preventive defense strategy concentrates on the dangers that, if mismanaged, have the potential to grow into true A-list threats to U.S. survival in the next century. These include Weimar Russia: failure to establish a self-respecting place for the new Russia in the post-cold war world, allowing it to descend into chaos, isolation, and aggression as Germany did after World War I; Loose Nukes: failure to reduce and secure the deadly legacy of the cold war--nuclear, chemical, and biological weapons in Russia and the rest of the former Soviet Union; A Rising China Turned Hostile: failure to shape China's rise to Asian superpower status so that it emerges as a partner rather than an adversary; Proliferation: spread of weapons of mass destruction; and Catastrophic Terrorism: increase in the scope and intensity of transnational terrorism.They also argue for


Mobilizing Force

Mobilizing Force

Author: David Kuehn

Publisher: Lynne Rienner Publishers

Published: 2021

Total Pages:

ISBN-13: 9781626379435

DOWNLOAD EBOOK

"Considering a wide range of democratic states, explores the interrelationships among perceived security threats, the militarization of security policy, and democratic accountability"--


US National Security

US National Security

Author: Paul R. Viotti

Publisher:

Published: 2016-08

Total Pages: 326

ISBN-13: 9781604979305

DOWNLOAD EBOOK

"This book addresses various security threats, and the reciprocal use of force they engender, through a constructivist lens: one that assumes the ideas in the heads of policy makers, and their particular interpretations of "facts," to be part of a highly subjective process. After analyzing and explaining the key threats and the vehicles in which they become manifest-- war, armed intervention, insurgency, countering insurgency and terrorism, and intelligence--the book examines the projection of force and elements of force maximization, in chapters on civil-military relations, a diverse military of citizen volunteers, and organization and budget. And it traces how the role of the US dollar, as a globally accepted currency, gives a particular advantage to US business and banking interests, and to the US government, when it comes to financing the costs of global diplomatic, military, and other operations. Taking into account these threats and opportunities, Paul Viotti identifies a number of strategies and policies for the US that are central to the maintaining of peace and security over the next few decades"--Provided by publisher.


Threatcasting

Threatcasting

Author: Brian David Johnson

Publisher: Springer Nature

Published: 2022-06-01

Total Pages: 285

ISBN-13: 303102575X

DOWNLOAD EBOOK

Impending technological advances will widen an adversary’s attack plane over the next decade. Visualizing what the future will hold, and what new threat vectors could emerge, is a task that traditional planning mechanisms struggle to accomplish given the wide range of potential issues. Understanding and preparing for the future operating environment is the basis of an analytical method known as Threatcasting. It is a method that gives researchers a structured way to envision and plan for risks ten years in the future. Threatcasting uses input from social science, technical research, cultural history, economics, trends, expert interviews, and even a little science fiction to recognize future threats and design potential futures. During this human-centric process, participants brainstorm what actions can be taken to identify, track, disrupt, mitigate, and recover from the possible threats. Specifically, groups explore how to transform the future they desire into reality while avoiding an undesired future. The Threatcasting method also exposes what events could happen that indicate the progression toward an increasingly possible threat landscape. This book begins with an overview of the Threatcasting method with examples and case studies to enhance the academic foundation. Along with end-of-chapter exercises to enhance the reader’s understanding of the concepts, there is also a full project where the reader can conduct a mock Threatcasting on the topic of “the next biological public health crisis.” The second half of the book is designed as a practitioner’s handbook. It has three separate chapters (based on the general size of the Threatcasting group) that walk the reader through how to apply the knowledge from Part I to conduct an actual Threatcasting activity. This book will be useful for a wide audience (from student to practitioner) and will hopefully promote new dialogues across communities and novel developments in the area.


The Dictator's Army

The Dictator's Army

Author: Caitlin Talmadge

Publisher: Cornell University Press

Published: 2015-09-22

Total Pages: 319

ISBN-13: 1501701754

DOWNLOAD EBOOK

In The Dictator's Army, Caitlin Talmadge presents a compelling new argument to help us understand why authoritarian militaries sometimes fight very well—and sometimes very poorly. Talmadge's framework for understanding battlefield effectiveness focuses on four key sets of military organizational practices: promotion patterns, training regimens, command arrangements, and information management. Different regimes face different domestic and international threat environments, leading their militaries to adopt different policies in these key areas of organizational behavior.Authoritarian regimes facing significant coup threats are likely to adopt practices that squander the state's military power, while regimes lacking such threats and possessing ambitious foreign policy goals are likely to adopt the effective practices often associated with democracies. Talmadge shows the importance of threat conditions and military organizational practices for battlefield performance in two paired comparisons of states at war: North and South Vietnam (1963–1975) and Iran and Iraq (1980–1988). Drawing on extensive documentary sources, her analysis demonstrates that threats and practices can vary not only between authoritarian regimes but also within them, either over time or across different military units. The result is a persuasive explanation of otherwise puzzling behavior by authoritarian militaries. The Dictator's Army offers a vital practical tool for those seeking to assess the likely course, costs, and outcomes of future conflicts involving nondemocratic adversaries, allies, or coalition partners.