Military Threats

Military Threats

Author: Branislav L. Slantchev

Publisher: Cambridge University Press

Published: 2011-02-03

Total Pages: 328

ISBN-13: 1139493051

DOWNLOAD EBOOK

Is military power central in determining which states get their voice heard? Must states run a high risk of war to communicate credible intent? In this book, Slantchev shows that states can often obtain concessions without incurring higher risks when they use military threats. Unlike diplomatic forms of communication, physical military moves improve a state's expected performance in war. If the opponent believes the threat, it will be more likely to back down. Military moves are also inherently costly, so only resolved states are willing to pay these costs. Slantchev argues that powerful states can secure better peaceful outcomes and lower the risk of war, but the likelihood of war depends on the extent to which a state is prepared to use military threats to deter challenges to peace and compel concessions without fighting. The price of peace may therefore be large: states invest in military forces that are both costly and unused.


Between Threats and War

Between Threats and War

Author: Micah Zenko

Publisher: Stanford University Press

Published: 2010-08-03

Total Pages: 241

ISBN-13: 0804771901

DOWNLOAD EBOOK

In Between Threats and War: U.S. Discrete Military Operations in the Post-Cold War World, author Micah Zenko presents a new concept to capture and illuminate the phenomenon: "Discrete Military Operations."


Calculating Credibility

Calculating Credibility

Author: Daryl G. Press

Publisher: Cornell University Press

Published: 2007

Total Pages: 244

ISBN-13: 9780801474156

DOWNLOAD EBOOK

"Daryl G. Press uses historical evidence to answer two crucial questions: When a country backs down in a crisis, does its credibility suffer? How do leaders assess their adversaries' credibility? Press illuminates the decision-making processes behind events such as the crises in Europe that preceded World War II, the superpower showdowns over Berlin in the 1950s and 60s, and the Cuban Missile Crisis."--Page 4 of cover.


Active Defense

Active Defense

Author: M. Taylor Fravel

Publisher: Princeton University Press

Published: 2020-12-08

Total Pages: 396

ISBN-13: 0691210330

DOWNLOAD EBOOK

What changes in China's modern military policy reveal about military organizations and strategySince the 1949 Communist Revolution, China has devised nine different military strategies, which the People's Liberation Army (PLA) calls "strategic guidelines." What accounts for these numerous changes? Active Defense offers the first systematic look at China's military strategy from the mid-twentieth century to today. Exploring the range and intensity of threats that China has faced, M. Taylor Fravel illuminates the nation's past and present military goals and how China sought to achieve them, and offers a rich set of cases for deepening the study of change in military organizations.Drawing from diverse Chinese-language sources, including memoirs of leading generals, military histories, and document collections that have become available only in the last two decades, Fravel shows why transformations in military strategy were pursued at certain times and not others. He focuses on the military strategies adopted in 1956, 1980, and 1993-when the PLA was attempting to wage war in a new kind of way-to show that China has pursued major change in its strategic guidelines when there has been a significant shift in the conduct of warfare in the international system and when China's Communist Party has been united.Delving into the security threats China has faced over the last seven decades, Active Defense offers a detailed investigation into how and why states alter their defense policies.


Senior Leadership Roundtable on Military and Defence Aspects of Border Security in South East Europe

Senior Leadership Roundtable on Military and Defence Aspects of Border Security in South East Europe

Author: I.V. Lochard

Publisher: IOS Press

Published: 2019-02-08

Total Pages: 246

ISBN-13: 1614999082

DOWNLOAD EBOOK

The region of South East Europe (SEE), which is home to both NATO and Partnership for Peace (PfP) countries, serves as an important corridor between Europe and the Middle East, North Africa, and the Caucasus. In recent years, however, SEE has also experienced high levels of cross-border, military and defense-related challenges in the form of migration, smuggling, terrorism, and cyber threats. Furthermore, the use of the new information environment (IE) to further extremism in SEE and elsewhere in NATO and PfP countries has had far-reaching command and control (C2) implications for the Alliance. A collaborative interdisciplinary, international and regional approach is clearly needed to adequately assess and address these hybrid threats. This book presents papers delivered at the NATO Science for Peace and Security (SPS) event: “Senior Leadership Roundtable on Military and Defense Aspects of Border Security in South East Europe”, held in Berovo, the Former Yugoslav Republic of Macedonia* from 23-30 September 2017. The aim of this special SPS grant was to maximize opportunities for extensive dialogue and collaboration between senior regional members, and the almost 70 distinguished academic and legal experts, as well as current or former senior-level practitioners from various governments, NATO bodies, and international organization that participated. It was the first SPS event of its kind in SEE as well as the first NATO SPS grant to be co-executed by the U.S. Department of Defense via the U.S. National Defense University. Other co-organizers were the C4I and Cyber Center of Excellence at George Mason University and PfP partner institution, the General Mihailo Apostolski Military Academy – Skopje, Associate Member of the University of Goce Delčev – Stip. The book is divided into five parts: global trends, defining the problem, policy and academic solutions, national and regional case studies, and technological solutions. It will prove an invaluable source of reference for all those with an interest in the SEE region as well as cross-border hybrid threats, in general. * Turkey recognizes the Republic of Macedonia with its constitutional name.


Preventive Defense

Preventive Defense

Author: Ashton B. Carter

Publisher: Rowman & Littlefield

Published: 2000-09-01

Total Pages: 276

ISBN-13: 9780815791003

DOWNLOAD EBOOK

William J. Perry and Ashton B. Carter, two of the world's foremost defense authorities, draw on their experience as leaders of the U.S. Defense Department to propose a new American security strategy for the twenty-first century. After a century in which aggression had to be defeated in two world wars and then deterred through a prolonged cold war, the authors argue for a strategy centered on prevention. Now that the cold war is over, it is necessary to rethink the risks to U.S. security. The A list--threats to U.S. survival--is empty today. The B list--the two major regional contingencies in the Persian Gulf and on the Korean peninsula that dominate Pentagon planning and budgeting--pose imminent threats to U.S. interests but not to survival. And the C list--such headline-grabbing places as Kosovo, Bosnia, Somalia, Rwanda, and Haiti--includes important contingencies that indirectly affect U.S. security but do not directly threaten U.S. interests. Thus the United States is enjoying a period of unprecedented peace and influence; but foreign policy and defense leaders cannot afford to be complacent. The authors' preventive defense strategy concentrates on the dangers that, if mismanaged, have the potential to grow into true A-list threats to U.S. survival in the next century. These include Weimar Russia: failure to establish a self-respecting place for the new Russia in the post-cold war world, allowing it to descend into chaos, isolation, and aggression as Germany did after World War I; Loose Nukes: failure to reduce and secure the deadly legacy of the cold war--nuclear, chemical, and biological weapons in Russia and the rest of the former Soviet Union; A Rising China Turned Hostile: failure to shape China's rise to Asian superpower status so that it emerges as a partner rather than an adversary; Proliferation: spread of weapons of mass destruction; and Catastrophic Terrorism: increase in the scope and intensity of transnational terrorism.They also argue for


Mobilizing Force

Mobilizing Force

Author: David Kuehn

Publisher: Lynne Rienner Publishers

Published: 2021

Total Pages:

ISBN-13: 9781626379435

DOWNLOAD EBOOK

"Considering a wide range of democratic states, explores the interrelationships among perceived security threats, the militarization of security policy, and democratic accountability"--


US National Security

US National Security

Author: Paul R. Viotti

Publisher:

Published: 2016-08

Total Pages: 326

ISBN-13: 9781604979305

DOWNLOAD EBOOK

"This book addresses various security threats, and the reciprocal use of force they engender, through a constructivist lens: one that assumes the ideas in the heads of policy makers, and their particular interpretations of "facts," to be part of a highly subjective process. After analyzing and explaining the key threats and the vehicles in which they become manifest-- war, armed intervention, insurgency, countering insurgency and terrorism, and intelligence--the book examines the projection of force and elements of force maximization, in chapters on civil-military relations, a diverse military of citizen volunteers, and organization and budget. And it traces how the role of the US dollar, as a globally accepted currency, gives a particular advantage to US business and banking interests, and to the US government, when it comes to financing the costs of global diplomatic, military, and other operations. Taking into account these threats and opportunities, Paul Viotti identifies a number of strategies and policies for the US that are central to the maintaining of peace and security over the next few decades"--Provided by publisher.


Threatcasting

Threatcasting

Author: Brian David Johnson

Publisher: Springer Nature

Published: 2022-06-01

Total Pages: 285

ISBN-13: 303102575X

DOWNLOAD EBOOK

Impending technological advances will widen an adversary’s attack plane over the next decade. Visualizing what the future will hold, and what new threat vectors could emerge, is a task that traditional planning mechanisms struggle to accomplish given the wide range of potential issues. Understanding and preparing for the future operating environment is the basis of an analytical method known as Threatcasting. It is a method that gives researchers a structured way to envision and plan for risks ten years in the future. Threatcasting uses input from social science, technical research, cultural history, economics, trends, expert interviews, and even a little science fiction to recognize future threats and design potential futures. During this human-centric process, participants brainstorm what actions can be taken to identify, track, disrupt, mitigate, and recover from the possible threats. Specifically, groups explore how to transform the future they desire into reality while avoiding an undesired future. The Threatcasting method also exposes what events could happen that indicate the progression toward an increasingly possible threat landscape. This book begins with an overview of the Threatcasting method with examples and case studies to enhance the academic foundation. Along with end-of-chapter exercises to enhance the reader’s understanding of the concepts, there is also a full project where the reader can conduct a mock Threatcasting on the topic of “the next biological public health crisis.” The second half of the book is designed as a practitioner’s handbook. It has three separate chapters (based on the general size of the Threatcasting group) that walk the reader through how to apply the knowledge from Part I to conduct an actual Threatcasting activity. This book will be useful for a wide audience (from student to practitioner) and will hopefully promote new dialogues across communities and novel developments in the area.