Here to Help: Third Party Deterrence Against Insurgent Groups - State Centrism, Nuclear Prominence, and Congruent Relationships, Denial, Delegitimization, Case Study of Boko Haram, Nigeria and America

Nonfiction, History, Military, United States, Social & Cultural Studies, Political Science
Cover of the book Here to Help: Third Party Deterrence Against Insurgent Groups - State Centrism, Nuclear Prominence, and Congruent Relationships, Denial, Delegitimization, Case Study of Boko Haram, Nigeria and America by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370186037
Publisher: Progressive Management Publication: March 2, 2017
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370186037
Publisher: Progressive Management
Publication: March 2, 2017
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. During the Cold War, both the United States and the Soviet Union exercised third party deterrence to protect key allies against hostile aggression. However, since the end of World War II, violent non-state groups such as terrorists, insurgents, and criminal organizations represent the predominant security threats to states. This monograph argues that third party deterrence is a valid concept applied against an insurgent group challenging a partner state. This monograph analyzes three key variables of Cold War deterrence—state centrism; nuclear prominence; and congruent relationships. Recognizing the evolution of those variables since the end of the Cold War unlocks deterrence methods not just limited to threats of punishment, but of deterrence through denial and delegitimization. Deterring an insurgent or potential insurgent group through delegitimization is a powerful approach, but it requires the third party state to apply coercive force against both the insurgent group and the partner state's government.

Is deterrence still relevant in the contemporary operating environment? With a few exceptions, deterrence was at the foundation of order during the bipolarity of the Cold War era. The United States and the Soviet Union built alliances, nuclear stockpiles, and even anti-ballistic missile systems, signaling to each other the potential consequences of taking aggressive military action against them or their friends. The fear of punishment or retaliation was the language of deterrence. However, in the current world where the vast majority of armed conflicts since World War II occur within national borders, and arguably the most urgent security concerns arise from violent non-state groups unfazed by threats of punishment, deterrence as a strategy seems anachronistic and impractical. Nevertheless, the term "deterrence" remains a fixture in US strategic planning documents and generally applicable to all types of potential enemies.

Between two adversarial states, the traditional idea of deterrence—threatening punishment through retaliation centered around military capabilities and a willingness to use them—mostly endures. However, third party or "extended deterrence" where a state attempts to deter attacks against an ally, is more dubious than during the Cold War given the preponderance of violent non-state groups that threaten states now. Insurgencies, in particular, which Phil Williams defines as "an organized, armed political struggle whose goal may be the seizure of power through revolutionary takeover and replacement of the existing government," have proven extremely resilient and tough to defeat.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. During the Cold War, both the United States and the Soviet Union exercised third party deterrence to protect key allies against hostile aggression. However, since the end of World War II, violent non-state groups such as terrorists, insurgents, and criminal organizations represent the predominant security threats to states. This monograph argues that third party deterrence is a valid concept applied against an insurgent group challenging a partner state. This monograph analyzes three key variables of Cold War deterrence—state centrism; nuclear prominence; and congruent relationships. Recognizing the evolution of those variables since the end of the Cold War unlocks deterrence methods not just limited to threats of punishment, but of deterrence through denial and delegitimization. Deterring an insurgent or potential insurgent group through delegitimization is a powerful approach, but it requires the third party state to apply coercive force against both the insurgent group and the partner state's government.

Is deterrence still relevant in the contemporary operating environment? With a few exceptions, deterrence was at the foundation of order during the bipolarity of the Cold War era. The United States and the Soviet Union built alliances, nuclear stockpiles, and even anti-ballistic missile systems, signaling to each other the potential consequences of taking aggressive military action against them or their friends. The fear of punishment or retaliation was the language of deterrence. However, in the current world where the vast majority of armed conflicts since World War II occur within national borders, and arguably the most urgent security concerns arise from violent non-state groups unfazed by threats of punishment, deterrence as a strategy seems anachronistic and impractical. Nevertheless, the term "deterrence" remains a fixture in US strategic planning documents and generally applicable to all types of potential enemies.

Between two adversarial states, the traditional idea of deterrence—threatening punishment through retaliation centered around military capabilities and a willingness to use them—mostly endures. However, third party or "extended deterrence" where a state attempts to deter attacks against an ally, is more dubious than during the Cold War given the preponderance of violent non-state groups that threaten states now. Insurgencies, in particular, which Phil Williams defines as "an organized, armed political struggle whose goal may be the seizure of power through revolutionary takeover and replacement of the existing government," have proven extremely resilient and tough to defeat.

More books from Progressive Management

Cover of the book Modern Shale Gas Development in the United States: A Primer - Geology, Regulations, Environmental Considerations, Hydraulic Fracturing, Protecting Groundwater, Pollution Threats, Impact to Land by Progressive Management
Cover of the book United Arab Emirates (UAE) in Perspective - Orientation Guide and Emirati Cultural Orientation: Geography, History, Economy, Security, Customs, Rural and Urban Life, Abu Dhabi, Dubai, Al-Ain, Islam by Progressive Management
Cover of the book 21st Century U.S. Air Force (USAF) Judge Advocate General (JAG): The Military Commander and the Law, Eleventh Edition - Criminal and Military Justice, Personnel Issues, Civil Law, Ethics by Progressive Management
Cover of the book The Declaration of War: One for the History Books? War Powers Resolution (WPR), Constitutional Provisions, War in Iraq, Modern Warfare and Conflicts, Commitment of U.S. Troops, War-Making Powers by Progressive Management
Cover of the book Military Aviation: Fascinating Preview of Aviation Concepts by an Early Visionary Before the Wright Brothers First Flight - Ideas from Birds, War Fighting Strategy, Naval Airplanes, Runways and Bases by Progressive Management
Cover of the book The Role of the U.S. Army Reserve in Support of the U.S. Army Force 2025 and Beyond: Challenges and Opportunities - Private/Public Partnerships and the Human Dimension, Unanswered Questions by Progressive Management
Cover of the book The Valley Forge Encyclopedia: Comprehensive History of the Famous American Revolutionary War Winter Continental Army Encampment, Valley Forge Historical Research Report, Logistics, Cabins by Progressive Management
Cover of the book Art of War Paper: Survival Through Adaptation: The Chinese Red Army and the Extermination Campaigns, 1927-1936 - Late Qing to Early Republican China, Li Lisan Line, Bolsheviks by Progressive Management
Cover of the book On the Frontier: Preparing Leaders: Yesterday, Today, and Tomorrow: U.S. Army Command and General Staff College 125th Anniversary 1881-2006 - End of Détente, Prairie Warrior, Iraqi Freedom by Progressive Management
Cover of the book 2018 Complete Guide to Regulation of Cryptocurrency Around the World: Survey of 130 Countries and Organizations - Bitcoin, Virtual Currencies, Digital Money, Blockchain Technologies Laws and Policies by Progressive Management
Cover of the book 2011 After the Nuclear Meltdown: Crucial Survival and Medical Data for Nuclear Power Plant and Radiation Accidents and Terrorism - Essential Emergency Information for You and Your Family by Progressive Management
Cover of the book History of the Bureau of Diplomatic Security of the United States Department of State: Cold War, McCarthyism, Spies, Leaks, Bugs, Ambassador Dubs Killing, Moscow Embassy Bugging by Progressive Management
Cover of the book Affecting U.S. Policy Toward Latin America: An Analysis of Lower-Level Officials - Case Studies of Guatemala 1954, Costa Rica 1948, Present-day Bolivia and President Morales, Anti-Communist Hysteria by Progressive Management
Cover of the book With the 1st Marine Division in Desert Shield and Desert Storm: U.S. Marines in the Persian Gulf, 1990-1991 - Khafji, Weapons Systems, Combat Engineer Breaching Equipment, Training with Saudi Army by Progressive Management
Cover of the book 2017 Cyber Attack Deterrence: Defense Science Board (DSB) Task Force on Cyber Deterrence – Developing Scalable Strategic Offensive Cyber Capabilities, Resilience of U.S. Nuclear Weapons, Attribution by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy