China's Forbearance Has Limits: Chinese Threat and Retaliation Signaling and Its Implications for a Sino-American Military Confrontation - Maritime Claims, Senkaku and Spratly Islands, Taiwan

Nonfiction, History, Asian, China, Military, United States
Cover of the book China's Forbearance Has Limits: Chinese Threat and Retaliation Signaling and Its Implications for a Sino-American Military Confrontation - Maritime Claims, Senkaku and Spratly Islands, Taiwan by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781311377623
Publisher: Progressive Management Publication: February 24, 2014
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781311377623
Publisher: Progressive Management
Publication: February 24, 2014
Imprint: Smashwords Edition
Language: English

This report from the Center for the Study of Chinese Military Affairs of the Institute for National Strategic Studies provides a thorough discussion of the use of the Chinese military in past and future confrontations, including historic information about previous signals of military intention and possible future military threats regarding disputed islands. Contents: The Record: Beijing's Use of Military Force * China's Crisis Decisionmaking Process and Crisis Management * Signaling the Intent to Employ Military Force— China's Warnings Calculus * Signaling Case Studies—Taiwan * Analyzing Beijing's Signals—Things to Consider * Conclusion—A Hypothetical South China Sea Signaling Scenario * Appendix 1. Chronology of the 1978-1979 Sino-Vietnamese Border Crisis * Appendix 2. Chronology of the 1961-1962 Sino-Indian Border Crisis * Appendix 3. PRC Signaling Over Taiwan: 1991, 1995, 1999, 2003-2004

Since its founding in 1949, the People's Republic of China (PRC) has employed military force in defense of China's security and territorial integrity. In many such instances, Beijing implemented a calculus of threat and retaliation signals intended first to deter an adversary from taking actions contrary to Chinese interests by threatening the use of military force and, if deterrence failed, to explain and justify Beijing's resort to military force.

This deterrence calculus was applied in each of the major instances in which Beijing has resorted to military force—in Korea in 1950, in the Sino-Indian border dispute in 1961-1962, in the Sino-Soviet border dispute in 1968-1969, and in China's attack on northern Vietnam in 1979. It was also applied in instances in which Beijing's effort at deterrence apparently succeeded and China ultimately stopped short of using military force. Examples include China's responses to the intensifying American combat effort in Vietnam in 1965-1968 and to the 1991 debates in Taipei about delimiting the Republic of China's sovereignty claims.

Beijing implements this deterrence calculus by a carefully calibrated hierarchy of official protests, authoritative press comment, and leadership statements. If the crisis persists and Beijing perceives its interests are not satisfactorily taken into account, its statements escalate in level and may include at first implicit and thereafter increasingly explicit warnings that it may use military force to achieve its goals. This approach has been employed consistently despite the sweeping changes in the PRC's place in the international order, the proliferation of foreign policy instruments at its disposal, the more complex crisis decisionmaking process and domestic political environment, and the dramatic evolution in the Chinese media over the decades. The question for U.S. policymakers is whether improving military capabilities will lead Beijing to substitute sudden or surprise attack for the politically calibrated deterrence signaling it has employed prior to its past use of force. This study assesses the problem in four ways.

In addition to the China paper, this unique collection of American military documents provides a special view of recent Chinese military and policy developments. Contents: China Shaping the Operational Environment - A Disciple on the Path of Deception and Influence * The "People" in the PLA: Recruitment, Training, and Education in China's 80-Year-Old Military * China's Maritime Quest * The PLA At Home and Abroad: Assessing The Operational Capabilities of China's Military * Arms Sales To Taiwan: Enjoy The Business While It Lasts * China's Role In The Stabilization Of Afghanistan * The Coming of Chinese Hawks * Turkey and China: Unlikely Strategic Partners. This ebook also includes the annual U.S. intelligence community worldwide threat assessment in Congressional testimony by Director of National Intelligence James R. Clapper Jr.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This report from the Center for the Study of Chinese Military Affairs of the Institute for National Strategic Studies provides a thorough discussion of the use of the Chinese military in past and future confrontations, including historic information about previous signals of military intention and possible future military threats regarding disputed islands. Contents: The Record: Beijing's Use of Military Force * China's Crisis Decisionmaking Process and Crisis Management * Signaling the Intent to Employ Military Force— China's Warnings Calculus * Signaling Case Studies—Taiwan * Analyzing Beijing's Signals—Things to Consider * Conclusion—A Hypothetical South China Sea Signaling Scenario * Appendix 1. Chronology of the 1978-1979 Sino-Vietnamese Border Crisis * Appendix 2. Chronology of the 1961-1962 Sino-Indian Border Crisis * Appendix 3. PRC Signaling Over Taiwan: 1991, 1995, 1999, 2003-2004

Since its founding in 1949, the People's Republic of China (PRC) has employed military force in defense of China's security and territorial integrity. In many such instances, Beijing implemented a calculus of threat and retaliation signals intended first to deter an adversary from taking actions contrary to Chinese interests by threatening the use of military force and, if deterrence failed, to explain and justify Beijing's resort to military force.

This deterrence calculus was applied in each of the major instances in which Beijing has resorted to military force—in Korea in 1950, in the Sino-Indian border dispute in 1961-1962, in the Sino-Soviet border dispute in 1968-1969, and in China's attack on northern Vietnam in 1979. It was also applied in instances in which Beijing's effort at deterrence apparently succeeded and China ultimately stopped short of using military force. Examples include China's responses to the intensifying American combat effort in Vietnam in 1965-1968 and to the 1991 debates in Taipei about delimiting the Republic of China's sovereignty claims.

Beijing implements this deterrence calculus by a carefully calibrated hierarchy of official protests, authoritative press comment, and leadership statements. If the crisis persists and Beijing perceives its interests are not satisfactorily taken into account, its statements escalate in level and may include at first implicit and thereafter increasingly explicit warnings that it may use military force to achieve its goals. This approach has been employed consistently despite the sweeping changes in the PRC's place in the international order, the proliferation of foreign policy instruments at its disposal, the more complex crisis decisionmaking process and domestic political environment, and the dramatic evolution in the Chinese media over the decades. The question for U.S. policymakers is whether improving military capabilities will lead Beijing to substitute sudden or surprise attack for the politically calibrated deterrence signaling it has employed prior to its past use of force. This study assesses the problem in four ways.

In addition to the China paper, this unique collection of American military documents provides a special view of recent Chinese military and policy developments. Contents: China Shaping the Operational Environment - A Disciple on the Path of Deception and Influence * The "People" in the PLA: Recruitment, Training, and Education in China's 80-Year-Old Military * China's Maritime Quest * The PLA At Home and Abroad: Assessing The Operational Capabilities of China's Military * Arms Sales To Taiwan: Enjoy The Business While It Lasts * China's Role In The Stabilization Of Afghanistan * The Coming of Chinese Hawks * Turkey and China: Unlikely Strategic Partners. This ebook also includes the annual U.S. intelligence community worldwide threat assessment in Congressional testimony by Director of National Intelligence James R. Clapper Jr.

More books from Progressive Management

Cover of the book U.S. Army Medical Correspondence Course: Food Deterioration - Detection, Major Causes, Meat, Seafood, Dairy Products, Eggs, Milk, Fruits and Vegetables, Health Hazards by Progressive Management
Cover of the book Decade of War, Volume I: Enduring Lessons from the Past Decade of Operations - Mistakes and Failures in the Iraq and Afghanistan Wars, Strategic Themes and Recommendations by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Aviation Brigades Field Manual 3-04.111 - Command and Control, Missions, Operations (Professional Format Series) by Progressive Management
Cover of the book The Revolutionary War (War of American Independence): United States Army and the Forging of a Nation, from Colonial Militia to the Continental Army in the American Revolution, Valley Forge, Yorktown by Progressive Management
Cover of the book The Evolving Arctic: Current State of U.S. Arctic Policy - Strategies of Other Arctic Nations, Russia, Canada, Denmark, Norway, Sweden, Finland, Iceland, Icebreakers, UNCLOS, SAR Assets by Progressive Management
Cover of the book Ambassador Stephen Krasner's Orienting Principle for Foreign Policy (and Military Management) - Responsible Sovereignty by Progressive Management
Cover of the book Insurgent Uprising: An Unconventional Warfare Wargame - Special Operations Command (USSOCOM) Practical Exercise to Reinforce UW Training, Special Forces COIN Against Guerrillas by Progressive Management
Cover of the book 2016 National Network of Fusion Centers: Final Report July 2017 - Fusion Center Profiles and Full List, Partner Agency Data, Staff and Analysts, Governance Structure and Membership, Operational Costs by Progressive Management
Cover of the book 2011 Complete Guide to Spent Nuclear Fuel Pool Risks at Nuclear Power Plants: NRC Reports on Spent Fuel Rods, Zircaloy Fires, Mitigation Measures, Crisis at Japan's TEPCO Fukushima Power Plant by Progressive Management
Cover of the book Strategic Air Command (SAC) and the Alert Program: A Brief History - Nuclear Weapons Bombers and Tankers, Mid-air Refueling, B-52, Response to Soviet Cold War Threat, Command Post by Progressive Management
Cover of the book Spiritual Dormancy: the Strategic Effect of the Depravation of God - Army Chaplains, Philosophical, Theological and Religious Underpinnings, Spiritual Conflict, Keeping Religion in the Military by Progressive Management
Cover of the book National Defense Intelligence College Paper: Intelligence Analysis in Theater Joint Intelligence Centers: An Experiment in Applying Structured Methods - Case Studies, Scenarios, Two-Tailed Tests by Progressive Management
Cover of the book Addressing the Fog of COG: Perspectives on the Center of Gravity in U.S. Military Doctrine - Clausewitz Theory, U.S. Warfare from Revolutionary War through the War on Terror by Progressive Management
Cover of the book The Air War in Southeast Asia: Case Studies of Selected Campaigns - Vietnam War, Ho Chi Minh Trail, Linebacker, All-weather Bombing, Strike Patterns, Campaign Impact by Progressive Management
Cover of the book FBI Study of Active Shooter Incidents in the United States Between 2000 and 2013: List of 160 Active Shooter Incidents, Methodology, Incident Locations and Types, Casualties and Resolutions by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy