語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
FindBook
Google Book
Amazon
博客來
Misuse and Manipulation: The Strategic Politics of Military Capacity Building.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Misuse and Manipulation: The Strategic Politics of Military Capacity Building./
作者:
Grinberg, Marc Toby.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2021,
面頁冊數:
329 p.
附註:
Source: Dissertations Abstracts International, Volume: 83-06, Section: A.
Contained By:
Dissertations Abstracts International83-06A.
標題:
Terrorism. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28812921
ISBN:
9798494453235
Misuse and Manipulation: The Strategic Politics of Military Capacity Building.
Grinberg, Marc Toby.
Misuse and Manipulation: The Strategic Politics of Military Capacity Building.
- Ann Arbor : ProQuest Dissertations & Theses, 2021 - 329 p.
Source: Dissertations Abstracts International, Volume: 83-06, Section: A.
Thesis (Ph.D.)--Stanford University, 2021.
This item must not be sold to any third party vendors.
In the hours after the attacks of September 11, 2001, President Bush and his top aides frantically sought to prevent what was widely expected to be a wave of terrorist attacks against the United States and its interests around the world. Recognizing that the principles of deterrence, which had protected the United States since its birth, did not apply to suicidal terrorists, the national security apparatus began an unprecedented foreign-policy offensive that leveraged every element of statecraft. Borders and ports were effectively closed. The defense readiness condition was raised to DEFCON-3, mandating bombers and missile sites be ready to deploy on 15-minutes notice, elevated security at military bases and continuity-of-government protocols to protect the presidency. It was only the third time in history that the entire military was ordered to elevated readiness. Intelligence officials quickly identified Al Qaeda as the likely culprit and an ultimatum was delivered to the Taliban government: turn over Al Qaeda leadership and shut down its infrastructure or the U.S. would do whatever it thought necessary to prevent Al Qaeda from launching future attacks. Anticipating that the Taliban would balk at U.S. demands, Defense Department officials drew up plans for military operations. The CIA was given new legal authorities to conduct covert operations in Afghanistan. To support U.S. threats and likely military action, the State Department organized a broad coalition to enhance the legitimacy of America's response and provide material support. The Treasury began taking steps to starve Al Qaeda of financial resources.The threat confronting the U.S., though, was unlike any it had experienced or prepared to fight. Al Qaeda did not hold territory, have populations to serve or wear uniforms. There were formal group members, largely in Afghanistan, but also an unknown number of ideological adherents and financial supporters integrated into civilian society across the globe. And Al Qaeda was only one of a set of adversarial state and non-state actors that used terrorism as an instrument of political violence. It would be hard to overstate how fearful U.S. officials were that an opportunistic adversary would provide Al Qaeda or another terrorist group with chemical, biological or nuclear weapons. Americans saw themselves as under attack from what was, essentially, a global network of individuals with the potential to create destruction on the scale of which only a few nation states were capable. As the distributed and decentralized nature of the terrorist threat became clear, the Bush Administration concluded that this was not a problem the U.S. could solve on its own. Countries in which terrorist groups operated would need to destroy their training camps and arrest their members. Neighboring states would need to secure their borders to prevent the threat from simply moving. And governments around the world would need to shut off the flow of resources from financial supporters, protect critical infrastructure and take steps to ensure ideological supporters did not form new groups or launch lone-wolf attacks. "Every nation, in every region, now has a decision to make," President Bush declared to a joint session of Congress just ten days after the attacks, "Either you are with us, or you are with the terrorists." Counterterrorism quickly became the focal point of most of America's bilateral relationships.
ISBN: 9798494453235Subjects--Topical Terms:
569041
Terrorism.
Misuse and Manipulation: The Strategic Politics of Military Capacity Building.
LDR
:04627nmm a2200373 4500
001
2344080
005
20220513115404.5
008
241004s2021 ||||||||||||||||| ||eng d
020
$a
9798494453235
035
$a
(MiAaPQ)AAI28812921
035
$a
(MiAaPQ)STANFORDvk245ft0630
035
$a
AAI28812921
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Grinberg, Marc Toby.
$3
3682809
245
1 0
$a
Misuse and Manipulation: The Strategic Politics of Military Capacity Building.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2021
300
$a
329 p.
500
$a
Source: Dissertations Abstracts International, Volume: 83-06, Section: A.
500
$a
Advisor: Schultz, Kenneth;Fearon, James;Krasner, Stephen;Weinstein, Jeremy.
502
$a
Thesis (Ph.D.)--Stanford University, 2021.
506
$a
This item must not be sold to any third party vendors.
520
$a
In the hours after the attacks of September 11, 2001, President Bush and his top aides frantically sought to prevent what was widely expected to be a wave of terrorist attacks against the United States and its interests around the world. Recognizing that the principles of deterrence, which had protected the United States since its birth, did not apply to suicidal terrorists, the national security apparatus began an unprecedented foreign-policy offensive that leveraged every element of statecraft. Borders and ports were effectively closed. The defense readiness condition was raised to DEFCON-3, mandating bombers and missile sites be ready to deploy on 15-minutes notice, elevated security at military bases and continuity-of-government protocols to protect the presidency. It was only the third time in history that the entire military was ordered to elevated readiness. Intelligence officials quickly identified Al Qaeda as the likely culprit and an ultimatum was delivered to the Taliban government: turn over Al Qaeda leadership and shut down its infrastructure or the U.S. would do whatever it thought necessary to prevent Al Qaeda from launching future attacks. Anticipating that the Taliban would balk at U.S. demands, Defense Department officials drew up plans for military operations. The CIA was given new legal authorities to conduct covert operations in Afghanistan. To support U.S. threats and likely military action, the State Department organized a broad coalition to enhance the legitimacy of America's response and provide material support. The Treasury began taking steps to starve Al Qaeda of financial resources.The threat confronting the U.S., though, was unlike any it had experienced or prepared to fight. Al Qaeda did not hold territory, have populations to serve or wear uniforms. There were formal group members, largely in Afghanistan, but also an unknown number of ideological adherents and financial supporters integrated into civilian society across the globe. And Al Qaeda was only one of a set of adversarial state and non-state actors that used terrorism as an instrument of political violence. It would be hard to overstate how fearful U.S. officials were that an opportunistic adversary would provide Al Qaeda or another terrorist group with chemical, biological or nuclear weapons. Americans saw themselves as under attack from what was, essentially, a global network of individuals with the potential to create destruction on the scale of which only a few nation states were capable. As the distributed and decentralized nature of the terrorist threat became clear, the Bush Administration concluded that this was not a problem the U.S. could solve on its own. Countries in which terrorist groups operated would need to destroy their training camps and arrest their members. Neighboring states would need to secure their borders to prevent the threat from simply moving. And governments around the world would need to shut off the flow of resources from financial supporters, protect critical infrastructure and take steps to ensure ideological supporters did not form new groups or launch lone-wolf attacks. "Every nation, in every region, now has a decision to make," President Bush declared to a joint session of Congress just ten days after the attacks, "Either you are with us, or you are with the terrorists." Counterterrorism quickly became the focal point of most of America's bilateral relationships.
590
$a
School code: 0212.
650
4
$a
Terrorism.
$3
569041
650
4
$a
Threats.
$3
594889
650
4
$a
Diplomatic & consular services.
$3
3564114
650
4
$a
Military engagements.
$3
3642033
650
4
$a
Apartheid.
$2
fast
$3
2076210
650
4
$a
Defense.
$3
3681633
650
4
$a
Nuclear weapons.
$3
810318
650
4
$a
Armed forces.
$3
3562018
650
4
$a
Foreign policy.
$3
3563440
650
4
$a
Military policy.
$3
753758
650
4
$a
National security.
$3
594947
650
4
$a
Military sales.
$3
3682810
650
4
$a
Cooperation.
$3
594090
650
4
$a
Power.
$3
518736
650
4
$a
Empowerment.
$2
lcstt
$3
3266631
650
4
$a
World War II.
$3
3303653
650
4
$a
Covert operations.
$3
3682811
650
4
$a
Government.
$3
3415717
650
4
$a
Military history.
$3
552332
650
4
$a
Military studies.
$3
2197382
650
4
$a
Political science.
$3
528916
650
4
$a
Public policy.
$3
532803
650
4
$a
South African studies.
$3
3175326
650
4
$a
Regional studies.
$3
3173672
690
$a
0601
690
$a
0722
690
$a
0750
690
$a
0615
690
$a
0630
690
$a
0654
690
$a
0604
710
2
$a
Stanford University.
$3
754827
773
0
$t
Dissertations Abstracts International
$g
83-06A.
790
$a
0212
791
$a
Ph.D.
792
$a
2021
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28812921
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9466518
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入