Three Threats


Book Description

Under what conditions might a foreign acquisition of a US company constitute a genuine national security threat to the United States? What kinds of risks and threats should analysts and strategists on the Committee on Foreign Investment in the United States (CFIUS), as well as their congressional overseers, be prepared to identify and deal with? This study looks at three types of foreign acquisitions of US companies that may pose a legitimate national security threat. The first is a proposed acquisition that would make the United States dependent on a foreign-controlled supplier of goods or services that are crucial to the functioning of the US economy and that this supplier might delay, deny, or place conditions on the provision of those goods or services. The second is a proposed acquisition that would allow the transfer to a foreign-controlled entity of technology or other expertise that might be deployed in a manner harmful to US national interests. The third potential threat is a proposed acquisition that would provide the capability to infiltrate, conduct surveillance on, or sabotage the provision of goods or services that are crucial to the functioning of the US economy. This study analyzes these threats in detail and considers what criteria are needed for a proposed foreign acquisition to be considered threatening. Ultimately, the vast majority of foreign acquisitions pose no credible threat to national security on these grounds.




Three Threats


Book Description

What kinds of risks and threats should CFIUS (Committee on Foreign Investment in the United States) analysts, strategists, and congressional overseers be prepared to identify and deal with? This book presents an examination of analytical tools that might aid CFIUS deliberations, namely, the Herfindahl-Hirschman concentration index.




The Power of Crisis


Book Description

Renowned political scientist Ian Bremmer draws lessons from global challenges of the past 100 years—including the pandemic—to show how we can respond to three great crises unfolding over the next decade. In this revelatory, unnerving, and ultimately hopeful book, Bremmer details how domestic and international conflicts leave us unprepared for a trio of looming crises—global health emergencies, transformative climate change, and the AI revolution. Today, Americans cannot reach consensus on any significant political issue, and US and Chinese leaders behave as if they’re locked in a new Cold War. We are squandering opportunities to meet the challenges that will soon confront us all. In coming years, humanity will face viruses deadlier and more infectious than Covid. Intensifying climate change will put tens of millions of refugees in flight and require us to reimagine how we live our daily lives. Most dangerous of all, new technologies will reshape the geopolitical order, disrupting our livelihoods and destabilizing our societies faster than we can grasp and address their implications. The good news? Some farsighted political leaders, business decision-makers, and individual citizens are already collaborating to tackle all these crises. The question that should keep us awake is whether they will work well and quickly enough to limit the fallout—and, most importantly, whether we can use these crises to innovate our way toward a better world. Drawing on strategies both time-honored and cutting-edge, from the Marshall Plan to the Green New Deal, The Power of Crisis provides a roadmap for surviving—even thriving in—the 21st century. Bremmer shows governments, corporations, and every concerned citizen how we can use these coming crises to create the worldwide prosperity and opportunity that 20th-century globalism promised but failed to deliver.




Four Threats


Book Description

An urgent, historically-grounded take on the four major factors that undermine American democracy, and what we can do to address them. While many Americans despair of the current state of U.S. politics, most assume that our system of government and democracy itself are invulnerable to decay. Yet when we examine the past, we find that to the contrary, the United States has undergone repeated crises of democracy, from the earliest days of the republic to the present. In The Four Threats, Robert C. Lieberman and Suzanne Mettler explore five historical episodes when democracy in the United States was under siege: the 1790s, the Civil War, the Gilded Age, the Depression, and Watergate. These episodes risked profound, even fatal, damage to the American democratic experiment, and on occasion antidemocratic forces have prevailed. From this history, four distinct characteristics of democratic disruption emerge. Political polarization, racism and nativism, economic inequality, and excessive executive power – alone or in combination – have threatened the survival of the republic, but it has survived, so far. What is unique, and alarming, about the present moment is that all four conditions are present in American politics today. This formidable convergence marks the contemporary era as an especially grave moment for democracy in the United States. But history provides a valuable repository from which contemporary Americans can draw lessons about how democracy was eventually strengthened — or in some cases weakened — in the past. By revisiting how earlier generations of Americans faced threats to the principles enshrined in the Constitution, we can see the promise and the peril that have led us to the present and chart a path toward repairing our civic fabric and renewing democracy.




Three Threats to Brand Relevance


Book Description

"Threats to brand relevance are always lurking around the corner. Your brand is virtually never immune from the risk of fading instead of being energized or being damaged instead of strengthened."—David Aaker From branding guru David Aaker comes Three Threats to Brand Relevance, a provocative new offering in the Jossey-Bass Short Format series. In Three Threats Aaker reveals that the key to an organization's sustained growth is to learn what it takes to bring "big" innovation to market and create barriers to competitors. Aaker also shows how well-established companies can avoid becoming irrelevant in the face of the continuing parade of marketing dynamics led by others. Building on his full-length book Brand Relevance, Aaker offers a guide for confronting the three threats if they emerge and shows how to put in place the strategies that will keep the threats at bay. Threat #1: A decline in category or subcategory relevance. Customers simply no longer want to buy what you are making, despite the fact you are offering a quality product and some customers love it. Threat #2: The loss of energy relevance. Without energy the brand simply does not come to mind as other more visible brands and a decline in energy can create a perception that it is locked in the past, suitable for an older generation. Threat #3: The emergence of a "reason-not-to-buy." The brand may have a perceived quality problem or be associated with a firm policy that is not acceptable. Whether your brand is just breaking into the marketplace or has a long held place in the hearts of its consumers, any forward-thinking company can implement Aaker's proven methods and strategies as part of their organization's ongoing review of brand strategy with the help of this succinct and to-the-point resource. About the Jossey-Bass Short Format Series Written by thought leaders and experts in their fields, pieces in the Jossey-Bass Short Format Series provide busy, on-the-go professionals, managers and leaders around the world with must-have, just-in-time information in a concise and actionable format.







Between Threats and War


Book Description

In Between Threats and War: U.S. Discrete Military Operations in the Post-Cold War World, author Micah Zenko presents a new concept to capture and illuminate the phenomenon: "Discrete Military Operations."




Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications


Book Description

Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.




Emerging Cyber Threats and Cognitive Vulnerabilities


Book Description

Emerging Cyber Threats and Cognitive Vulnerabilities identifies the critical role human behavior plays in cybersecurity and provides insights into how human decision-making can help address rising volumes of cyberthreats. The book examines the role of psychology in cybersecurity by addressing each actor involved in the process: hackers, targets, cybersecurity practitioners and the wider social context in which these groups operate. It applies psychological factors such as motivations, group processes and decision-making heuristics that may lead individuals to underestimate risk. The goal of this understanding is to more quickly identify threat and create early education and prevention strategies. This book covers a variety of topics and addresses different challenges in response to changes in the ways in to study various areas of decision-making, behavior, artificial intelligence, and human interaction in relation to cybersecurity. - Explains psychological factors inherent in machine learning and artificial intelligence - Discusses the social psychology of online radicalism and terrorist recruitment - Examines the motivation and decision-making of hackers and "hacktivists" - Investigates the use of personality psychology to extract secure information from individuals




Threats


Book Description

"It's a rare author who can combine literary erudition and an easy fluency of style together with expert knowledge of psychology and evolutionary biology. David Barash adds to all this a far-seeing wisdom and a humane decency that shines through on every page. The concluding section on the senseless and dangerous futility of nuclear deterrence theory is an irrefutable tour de force which should be read by every politician and senior military officer. If only!" -- Richard Dawkins From hurricanes and avalanches to diseases and car crashes, threats are everywhere. Beyond objective threats like these, there are also subjective ones: situations in which individuals threaten each other or feel threatened by society. Animals, too, make substantial use of threats. Evolution manipulates threats like these in surprising ways, leading us to question the ethics of honest versus dishonest communication. Rarely acknowledged--and yet crucially important--is the fact that humans, animals, and even plants don't only employ threats, they often respond with counter-threats that ultimately make things worse. By exploring the dynamic of threat and counter-threat, this book expands on many fraught human situations, including the fear of death, of strangers, and of "the other." Each of these leads to unique challenges, such as the specter of eternal damnation, the murderous culture of guns and capital punishment, and the emergence of right-wing nationalist populism. Most worrisome is the illusory security of deterrence, the idea that we can use the threat of nuclear war to prevent nuclear war! Threats are so widespread that we often don't realize how deeply they are ingrained in our minds or how profoundly and counter-productively they operate. Animals, humans, societies, and even countries internalize threats, behind which lie a myriad of intriguing questions: How do we know when to take a threat seriously? When do threats make things worse? Can they make things better? What can we do to use them wisely rather than destructively? In a comprehensive exploration into questions like these, noted scientist David P. Barash explains some of the most important characteristics of life as we know it.