Deterring Armageddon: A Biography of NATO


Book Description

The history of the world's most successful military alliance, from the wrecked Europe of 1945 to Vladimir Putin's invasion of Ukraine. As they signed NATO into being after World War II, its founders fervently believed that only if the West's democracies banded permanently together could they avoid a catastrophic global atomic conflict. Over the 75 years since, the alliance has indeed avoided war with Russia, also becoming a major political, strategic and diplomatic player well beyond its borders. It has survived disagreements between leaders from Eisenhower, Churchill and de Gaulle to Trump, Stoltenberg and Merkel, faced down Kremlin foes from Stalin to Putin and endured unending questions and debate over what new nations might be allowed to join. Deterring Armageddon takes the reader from backroom deals that led to NATO's creation, through the Cold War, the Balkans and Afghanistan to the current confrontation with the Kremlin following the invasion of Ukraine. It examines the tightrope walked by alliance leaders between a powerful United States sometimes flirting with isolationism and European nations with their ever-evolving wishes for autonomy and influence. Having spent much of its life preparing for conflicts that might never come, NATO has sometimes found itself in wars that few had predicted - and with its members now again planning for a potential major European conflict. It is a tale of tension, danger, rivalry, conflict, big personalities and high-stakes military and diplomatic posturing - as well as espionage, politics and protest. From the Korean War to the pandemic, the Berlin and Cuba crises to the chaotic evacuation from Kabul, Deterring Armageddon tells how the alliance has shaped and been shaped by history - and looks ahead to what might be the most dangerous era it has ever faced. 'Utterly eye-opening - compelling, haunting and continually illuminating. As Peter Apps so brilliantly demonstrates in this gripping book, the story of the NATO alliance is in many ways a parallel global history of the last 75 years. As well as all the outbreaks of seething tension between the US and its European allies - and the counter-moves of rival powers - this is also an account of just how often in those postwar years that we all stood on the edge of the most terrible abyss. With mesmerising fluency, and dazzling research, Apps follows the criss-crossing threads of the Cold War and beyond. Those threads converge in our shadowed present, and the conflict in Ukraine. In order to fathom today's dark world, Apps has explored a labyrinth of once-classified history, and he brings dazzling clarity.' - Sinclair McKay







Stalking the Antichrists (1940?1965) Volume 1


Book Description

It is based on the inspiring "definitions" of the word "introduction" (1651): My actions of "bringing in" a "newly" weapon (since August 1945) "brought into" the world and to its "process" of the application in "war" and with an in-depth "initiation in the knowledge" of "elementary instruction" regarding "Deterrents" and "Deterrence" thereof, which "leads to the knowledge or understanding of " the impact of both fission and fusion "nuclear weapons" on war/politics/foreign policy/strategy and the fate of the Earth/Gaia/God's Creation, thanks to my insights gained "personally" at Grove City College, the University of Chicago, U.S. Navy (Air Intelligence Officer) and State Department (Foreign Service Officer) and herewith presented as my "introduction" to the formal introduction of my halting, but determined attempts to deter a thermonuclear World War III and Armageddon too (1945-2012). Modified from "Introduction" (Shorter Oxford English Dictionary (Third Edition, 1959, p. 1036)







Deterring Terrorism


Book Description

This book examines the question of how to deter a non-state terrorist actor. Can terrorism be deterred? This book argues that current research is unable to find strong cases of deterrence success, because it uses a flawed research design which does not capture the longitudinal dynamics of the process. So far, the focus of inquiry has been on the tactical elements of a state’s counterterrorism strategy, instead of the non-state actor’s grand strategies. By studying the campaigns of Hezbollah, the Palestinians, the Irish Republican Army, Chechens, the Kurdistan Workers' Party, and Al-Qaeda/Taliban and ISIS over time, we can see that deterrence strategies that target the cost-benefit calculus of terrorist organizations lead to wars of attrition – which is the non-state organization’s strategy for victory. To escape the attrition trap, the state must undermine the attrition strategy of terrorist organizations by using offensive campaigns that become critical educational moments. The case studies presented here uncover an evolutionary process of learning, leading to strategic deterrence successes. Some terrorist organizations abandoned the use of force altogether, while others abandoned their aspirational goals or resorted to lower levels of violence. These findings should enable policymakers to transition from the failed policy that sought to defeat the Taliban and al-Qaeda in the unending war in Afghanistan to a policy that successfully applies deterrence. This book will be of much interest to students of deterrence theory, terrorism studies, war and conflict studies, and security studies.




Deter, Disrupt, or Deceive


Book Description

A fresh perspective on statecraft in the cyber domain The idea of “cyber war” has played a dominant role in both academic and popular discourse concerning the nature of statecraft in the cyber domain. However, this lens of war and its expectations for death and destruction may distort rather than help clarify the nature of cyber competition and conflict. Are cyber activities actually more like an intelligence contest, where both states and nonstate actors grapple for information advantage below the threshold of war? In Deter, Disrupt, or Deceive, Robert Chesney and Max Smeets argue that reframing cyber competition as an intelligence contest will improve our ability to analyze and strategize about cyber events and policy. The contributors to this volume debate the logics and implications of this reframing. They examine this intelligence concept across several areas of cyber security policy and in different national contexts. Taken as a whole, the chapters give rise to a unique dialogue, illustrating areas of agreement and disagreement among leading experts and placing all of it in conversation with the larger fields of international relations and intelligence studies. Deter, Disrupt, or Deceive is a must read because it offers a new way for scholars, practitioners, and students to understand statecraft in the cyber domain.




CNN 互動英語 2022 年 4 月號 No.259 【有聲版】


Book Description

政治 Teetering on the Brink 俄國、烏克蘭戰爭一觸即發 牽動全球局勢 Tensions between Russia and Ukraine Continue to Escalate 俄國在烏克蘭邊境集結大批軍力,衝突一觸即發,美方的態度則由原先的輕描淡寫轉為嚴聲撻伐,欲與盟國共同對俄國實施強力制裁。 社會 A Platinum Reign 英國女王伊莉莎白二世歡慶登基70 年 Britain’s Longest-Serving Monarch Counts 70 Years on the Throne 伊莉莎白二世女王是英國第一個在位超過70年的君主,她以溫柔堅定的形象帶領英國皇室,成為人民心中無可取代的精神領袖。 科技 Webvolution? 網際網路大革命 Web3到底是什麼? The World Is Buzzing at the Prospect of Web3 Web3最近在科技圈裡掀起熱烈討論,有人看好其未來發展,也有人認為這只是行銷噱頭。本文從網際網路的演進說起,綜覽Web 3的概念與潛在優缺點。 科技 Preventing Armageddon 小行星撞地球怎麼辦?NASA行星防衛計畫升空 NASA to Carry Out Its First Planetary Defense Mission 為了不讓科幻災難片中小行星撞地球的情節成真,NASA轉守為攻,發射太空船撞擊小行星,觀察是否能改變小行星運行軌道。 保健 A Cure for All 廣效疫苗研發中!新冠疫情有解了? Scientists Plan for Future Variants with the Universal Coronavirus Vaccine 新冠病毒不斷變異,疫苗也必須與時俱進。科學家正在開發可對抗傳播中的新冠病毒及未來變異株的廣效疫苗,盼成為終結疫情的解方。 商業 Dynamic Sophistication 新世代勞斯萊斯的極簡設計和純粹奢華 A New Rolls-Royce for a New Generation 新車款黑幻鬼魅傳承勞斯萊斯不可或缺的經典元素,揉合跑車性能及尖端科技,開啟品牌年輕化新世代。 環境 Harness the Wind 駕馭風的力量——低碳排綠能新科技 New Innovations Use Natural Air Power to Curb Carbon Emissions 風電佔全球所有可再生能源產量的四分之一,新創公司也持續腦力激盪,找尋這種綠色能源的可能應用方法。 文化 Decade-Old Delight 義大利比托乳酪——源自阿爾卑斯山的千年技藝 Stanley Tucci Samples One of the World’s Finest Cheeses 比托乳酪是世界上最昂貴的乳酪之一,也是一道有兩千年歷史、蘊含牧人的耐心與智慧的美饌。 旅遊 Roamers under the Palace 喵星人的天堂——俄國隱士廬博物館 Richard Quest Discovers the Unexpected Treasures of the Hermitage Museum 在富麗堂皇的俄國隱士廬博物館偌大的建物群之下,有一群令人意想不到的守護者——超可愛喵星人! 時尚 A Fashion Fusion 揉合奇幻與現實的時尚新美學 An American Couture Designer Showcases His Skills in Paris 一位美國設計師擔任法國時裝屋夏帕瑞麗的創意總監,為歐式古典風格加入美式觀點。 焦點話題 CNN 全球瞭望 Oil Prices Soar 油價再漲 回到疫情前水平 Canadian Truckers Protest Vaccine Mandates 加拿大卡車司機抗議 要求全國撤銷疫苗令 First Images of Venus’ Surface 帕克太陽探測器傳回首批金星表面影像 談天說地話英文 全方位理解CNN Eileen Gu Gets the Gold 滑雪新星谷愛凌 北京冬奧一戰成名 新聞片語通 CNN主編教你唸 汽車品牌 單字聯想地圖 汽車世界




Cross-Domain Deterrence


Book Description

The complexity of the twenty-first century threat landscape contrasts markedly with the bilateral nuclear bargaining context envisioned by classical deterrence theory. Nuclear and conventional arsenals continue to develop alongside anti-satellite programs, autonomous robotics or drones, cyber operations, biotechnology, and other innovations barely imagined in the early nuclear age. The concept of cross-domain deterrence (CDD) emerged near the end of the George W. Bush administration as policymakers and commanders confronted emerging threats to vital military systems in space and cyberspace. The Pentagon now recognizes five operational environments or so-called domains (land, sea, air, space, and cyberspace), and CDD poses serious problems in practice. In Cross-Domain Deterrence, Erik Gartzke and Jon R. Lindsay assess the theoretical relevance of CDD for the field of International Relations. As a general concept, CDD posits that how actors choose to deter affects the quality of the deterrence they achieve. Contributors to this volume include senior and junior scholars and national security practitioners. Their chapters probe the analytical utility of CDD by examining how differences across, and combinations of, different military and non-military instruments can affect choices and outcomes in coercive policy in historical and contemporary cases.




Proceedings of a Workshop on Deterring Cyberattacks


Book Description

In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed.




START and the Future of Deterrence


Book Description

Examining the future of nuclear deterrence in the 1990s and beyond, this book outlines aspects of the evolving strategic environment. It also projects the likely future of deterrence strategies and strategic force postures. Other topics, such as the Soviet nuclear doctrine are also covered.