| List of Figures | x |
| List of Tables | x |
| List of Maps | xi |
| Foreword | xiii |
| Acknowledgments | xv |
| Prospectus | 1 |
1. | Overview | 3 |
| Strategic Hierarchy | 3 |
| Strategic Processes | 5 |
| Strategic Summation | 8 |
Part I | The Framework of Military Strategy | |
2. | National Security Interests | 13 |
| Basic Attributes | 13 |
| Universally Valuable Interests | 14 |
| Variably Valuable Interests | 16 |
| Conflicts of Interest | 18 |
| Key Points | 18 |
3. | Foreign and Domestic Threats | 21 |
| The Conflict Spectrum | 21 |
| Strategic Guidance | 22 |
| Enemy Military Power | 23 |
| Intelligence Estimates | 25 |
| Net Assessments | 28 |
| Threat Assessments | 30 |
| Key Points | 31 |
4. | Basic Security Objectives | 35 |
| National Security Objectives | 35 |
| National Military Aims | 36 |
| Military Roles and Missions | 39 |
| Strategic Centers of Gravity | 41 |
| Key Points | 44 |
5. | The Primacy of Policy | 47 |
| Basic Policy Attributes | 47 |
| Civil-Military Policies | 49 |
| Foreign vs. Domestic Policies | 51 |
| Military vs. Nonmilitary Power | 52 |
| Strategic Bead-Stringing | 53 |
| Key Points | 53 |
Part II | Fundamentals of Military Strategy | |
6. | Strategic Starting Points | 59 |
| Strategic Building Blocks | 59 |
| Strategic Schools of Thought | 61 |
| Elemental Alternatives | 62 |
| Politico-Military Assumptions | 64 |
| Strategic Paths and Pitfalls | 65 |
| Key Points | 67 |
7. | Fundamentals of Deterrence | 71 |
| The Dynamics of Deterrence | 71 |
| Causes of Conflict | 72 |
| Principles of Deterrence | 73 |
| Deterrent Theories and Concepts | 75 |
| Key Points | 77 |
8. | War-Fighting Fundamentals | 81 |
| Principles of War | 81 |
| Premier War-Fighting Policies | 85 |
| War-Fighting Theories and Concepts | 88 |
| Conflict Termination | 91 |
| Key Points | 93 |
9. | Fundamentals of Military Preparedness | 99 |
| Readiness vs. Sustainability | 99 |
| Principles of Preparedness | 99 |
| Present Preparedness | 102 |
| Future Preparedness | 106 |
| Key Points | 106 |
10. | Fundamentals of Arms Control | 109 |
| Arms Control Aims | 109 |
| Quantitative Restrictions | 109 |
| Qualitative Limitations | 113 |
| Negotiating Techniques | 115 |
| Compliance Problems | 116 |
| Key Points | 117 |
Part III | Specialized Military Strategies | |
11. | Counterproliferation Strategies | 123 |
| Causes of Proliferation | 123 |
| Intelligence Indicators | 126 |
| Counterproliferation | 127 |
| Current Outlook | 130 |
| Key Points | 130 |
12. | Nuclear Warfare Strategies | 133 |
| The Nature of Nuclear Warfare | 133 |
| Nuclear Arms Control | 135 |
| Nuclear Deterrent Strategies | 136 |
| Nuclear War-Fighting Strategies | 140 |
| Nuclear War Termination Strategies | 142 |
| Key Points | 143 |
13. | Biological and Chemical Warfare Strategies | 145 |
| Biological and Chemical Weapons | 145 |
| Biological and Chemical Arms Control | 147 |
| Biological Warfare Strategies | 148 |
| Chemical Warfare Strategies | 149 |
| Needs for Creative Concepts | 151 |
| Key Points | 151 |
14. | Traditional Forces and Strategies | 155 |
| Complementary Force Contributions | 155 |
| Comparative Force Postures | 156 |
| Traditional Deterrence | 157 |
| Traditional War Fighting | 159 |
| Nuclear Warfare Nexus | 161 |
| Traditional Warfare Fulcrum | 162 |
| Key Points | 162 |
15. | Insurgency Strategies | 167 |
| The Nature of Insurgencies | 167 |
| Revolutionary Warfare | 168 |
| Counterrevolutions | 173 |
| Resistance Movements | 174 |
| Traditional Warfare Nexus | 175 |
| Key Points | 177 |
16. | Counterinsurgency Strategies | 181 |
| The Nature of Counterinsurgency | 181 |
| Anti-Underground Strategies | 182 |
| Counterguerrilla Strategies | 186 |
| Pacification Programs | 189 |
| Prescriptions for Success | 190 |
| Key Points | 190 |
17. | Sociopolitical Terrorism | 193 |
| The Nature of Sociopolitical Terrorism | 193 |
| Atypical Terrorists | 193 |
| Typical Terrorist Organizations | 194 |
| Terrorist Tools | 194 |
| Terrorist Targets and Tactics | 196 |
| Sponsorship and Support | 200 |
| Key Points | 200 |
18. | Counterterrorism Strategies | 205 |
| The Nature of Counterterrorism | 205 |
| Participants and Control | 205 |
| Overarching Issues | 206 |
| Deterrent Dilemmas | 207 |
| Defensive Counterterrorism | 208 |
| Offensive Counterterrorism | 211 |
| Democratic Constraints | 213 |
| Key Points | 215 |
19. | Nonlethal Warfare Strategies | 219 |
| The Nature of Nonlethal Warfare | 219 |
| Political Warfare | 220 |
| Economic Warfare | 222 |
| Technological Warfare | 224 |
| Psychological Warfare | 227 |
| Cybernetic Warfare | 230 |
| Key Points | 232 |
20. | Coalition Warfare Strategies | 237 |
| Collective Security Incentives | 237 |
| Collective Security Choices | 238 |
| Compatibility Prospects | 239 |
| Formal and Informal Coalitions | 240 |
| Command and Control | 242 |
| Respective Contributions | 243 |
| Requirements for Review | 244 |
| Key Points | 245 |
Part IV | Keys to Strategic Superiority | |
21. | Strategic Trailblazers | 251 |
| Illustrative Role Models | 251 |
| Coveted Characteristics | 253 |
| Composite Requirements | 254 |
| Key Points | 254 |
22. | Strategic Stepping-Stones | 257 |
| Creative Environments | 257 |
| Strategic Education | 258 |
| Strategic Research | 260 |
| Key Points | 263 |
Part V | Applied Strategies | |
23. | Balkan Tar-Babies | 267 |
| Politico-Military Backdrop | 267 |
| Peacekeeping in Bosnia | 268 |
| Peacemaking in Kosovo | 275 |
| Strategic Critiques | 282 |
| Intervention Checklist | 285 |
| Key Points | 287 |
24. | Final Reflections | 291 |
Appendix A. | Strategic Terminology | 293 |
Appendix B. | Abbreviations | 309 |
Appendix C. | A Bookshelf for Military Strategists | 311 |
| Index | 319 |
| About the Author | 333 |