Civilian-based defenseHere are entered works on a nonviolent, non-military national defense strategy designed to repulse invasions and prevent internal takeovers by preparing the people and institutions of society to be noncooperative and defiant to government by aggressors. See also what's at Wikipedia, your library, or elsewhere.
Broader term:Used for:- Alternative defense
- CBD (Civilian-based defense)
- Civilian-based deterrence
- Defense, Civilian-based
- Defense, Social
- Nonviolent defense
- Popular non-violent defense
- Social defense
|
Filed under: Civilian-based defense- Self-Reliant Defense Without Bankruptcy or War: Considerations for the Baltics, East Central Europe, and Members of the Commonwealth of Independent States (Boston: Albert Einstein Institution, c1992), by Gene Sharp, contrib. by Bruce Jenkins (PDF via aeinstein.org)
- Civilian-Based Defense: A Post-Military Weapons System (Princeton: Princeton University Press, c1990), by Gene Sharp, contrib. by Bruce Jenkins (PDF via aeinstein.org)
- Civilian-Based Defense in a New Era (Cambridge, MA: Albert Einstein Institution, c1990), by Johan Jørgen Holst (PDF via aeinstein.org)
- The Anti-Coup (Boston: Albert Einstein Institution, 2003), by Gene Sharp and Bruce Jenkins (PDF via aeinstein.org)
- National Security Through Civilian-based Defense (Omaha: Association for Transarmament Studies, c1985), by Gene Sharp (PDF via aeinstein.org)
- Tyranny Could Not Quell Them! How Norway's Teachers Defeated Quisling During the Nazi Occupation and What it Means for Unarmed Defence Today (London: Peace News, ca. 1959), by Gene Sharp (PDF via aeinstein.org)
Items below (if any) are from related and broader terms.
Filed under: National security
Filed under: National security -- Afghanistan
Filed under: National security -- Africa
Filed under: National security -- Africa, Southern
Filed under: National security -- Africa, West
Filed under: National security -- Asia
Filed under: National security -- Canada
Filed under: National security -- China
Filed under: National security -- Computer network resources
Filed under: National security -- East Asia
Filed under: National security -- Economic aspects
Filed under: National security -- Europe- The Missing Link: West European Neutrals and Regional Security (Durham, NC and London: Duke University Press, 1990), ed. by Richard E. Bissell and Curt Walter Gasteyger, contrib. by Lars Wallin, Pauli Järvenpää, Heinz Vetschera, Laurent François Carrel, Jens Reuter, Lothar Rühl, John G. Hines, Phillip A. Petersen, and Philip Windsor (page images at HathiTrust)
- Borderlands: Comparing Border Security in North America and Europe (2007), ed. by Emmanuel Brunet-Jailly (PDF with commentary at Ottawa)
Filed under: National security -- International cooperation- A Hard Look at Hard Power: Assessing the Defense Capabilities of Key U.S. Allies and Security Partners (second edition; Carlisle, PA: Strategic Studies Institute and U.S. Army War College Press, 2020), ed. by Gary James Schmitt (PDF with commentary at armywarcollege.edu)
- Pacific Currents: The Responses of U.S. Allies and Security Partners in East Asia to China's Rise (2008), by Evan S. Medeiros, Keith Crane, Eric Heginbotham, Norman D. Levin, Julia Lowell, Angel Rabasa, and So-mi Song (PDF with commentary at rand.org)
Filed under: National security -- Israel
Filed under: National security -- Japan
Filed under: National security -- Latin America- The Role of the Armed Forces in the Americas: Civil-Military Relations for the 21st Century (conference report; Carlisle Barracks, PA: Strategic Studies Institute, U.S. Army War College, 1998), ed. by Donald E. Schulz, contrib. by Richard A. Witherspoon, Michael R. Gonzáles, Richard Downes, Eliézer Rizzo de Oliveira, Fred F. Woerner, Luis Tibiletti, Luís Antonio Bitencourt Emilio, Manuel José Bonett Locarno, Victor Manuel Ventura Arellano, William J. Jefferds, Robert B. James, Thomas C. Bruneau, Judith Gentleman, Victor Tise, William Deane Stanley, and Andrés Serbín
Filed under: National security -- Law and legislation- Fresh Perspectives on the "War on Terror" (2008), ed. by Miriam Gani and Penelope Mathew (multiple formats with commentary at ANU E Press)
- Law, Liberty, and the Pursuit of Terrorism (Ann Arbor: University of Michigan Press, c2014), by Roger Douglas
Filed under: National security -- Mexico
Filed under: National security -- Middle East
Filed under: National security -- Moral and ethical aspects
Filed under: National security -- North America
Filed under: National security -- Pacific Area
Filed under: National security -- Pakistan
Filed under: National security -- Psychological aspects
Filed under: National security -- Russia (Federation)
Filed under: National security -- Scotland
Filed under: National security -- South Africa
Filed under: National security -- Taiwan
Filed under: National security -- TurkeyFiled under: National security -- United States- National Security Strategy of the United States of America (2017), by United States Executive Office of the President (PDF at fdlp.gov)
- National Security Strategy (2015), by United States Executive Office of the President (PDF at archives.gov)
- Discourse, Dissent, and Strategic Surprise: Formulating U.S. Security Policy in an Age of Uncertainty (Washington: Institute for the Study of Diplomacy, Georgetown University, c2006), by Janne E. Nolan and Douglas J. MacEachin, contrib. by Christine Tockman (PDF at Wayback Machine)
- The Myth of National Defense: Essays on the Theory and History of Security Production (c2003), ed. by Hans-Hermann Hoppe (PDF and Epub with commentary at mises.org)
- The National Security Strategy of the United States of America (September 2002), by United States Executive Office of the President (HTML at archives.gov)
- National Strategy for Homeland Security (July 2002), by United States Office of Homeland Security (PDF at fdlp.gov)
- Challenges of the Global Century: Report of the Project on Globalization and National Security (2001), by Stephen J. Flanagan, Ellen L. Frost, and Richard L. Kugler (page images at Google)
- Safeguarding Defense Technology, Enabling Commerce: A New Balance in the New Economy (Washington: AEI Press, 2001), by Sean Cropsey (PDF at AEI)
- A National Security Strategy for a Global Age (December 2000), by United States Executive Office of the President (HTML at af.mil)
- The Big Three: Our Greatest Security Risks and How to Address Them (1999), by Richard Danzig (PDF at dtic.mil)
- A National Security Strategy for a New Century (December 1999), by United States Executive Office of the President (PDF and partial HTML at nssarchive.us)
- Report of the Select Committee on U.S. National Security and Military/Commercial Concerns with the People's Republic of China (1999), by United States House Select Committee on U.S. National Security and Military/Commercial Concerns with the People's Republic of China (HTML and PDF files at house.gov)
- A National Security Strategy for a New Century (October 1998), by United States Executive Office of the President (PDF and partial HTML at nara.gov)
- A National Security Strategy for a New Century (May 1997), by United States Executive Office of the President (HTML at nara.gov)
- The National Security Strategy: Documenting Strategic Vision (1995), by Don M. Snider (PDF at carlisle-www.army.mil)
- The U.S.-Japan Security Relationship After the Cold War (c1993), by Francis Fukuyama and Kong Dan Oh (PDF with commentary at rand.org)
- National Security Strategy of the United States (August 1991), by United States Executive Office of the President (PDF with commentary at nssarchive.us)
- Making Strategy: An Introduction to National Security Processes and Problems (Maxwell AFB, AL: Air University Press, 1988), by Dennis M. Drew and Donald M. Snow
- National Security Strategy of the United States (last Reagan-era version; 1988), by United States Executive Office of the President (PDF at defense.gov)
- Shariah, the Threat to America: An Exercise in Competitive Analysis (Report of Team B II; Washington: Center for Security Policy, 2010), ed. by Clare Lopez (PDF at centerforsecuritypolicy.org)
- A Report to the National Security Council by the Executive Secretary, on United States Objectives and Programs for National Security, April 14, 1950 (declassified copy of NSC 68, released 1975), ed. by James S. Lay (PDF at trumanlibrary.org)
- Challenging the United States Symmetrically and Asymmetrically: Can America be Defeated? (Carlisle Barracks, PA: U.S. Army War College, 1998), by Lloyd J. Matthews (PDF at fdlp.gov)
- Challenge and Response: Anticipating US Military Security Concerns (Maxwell AFB, AL: Air University Press, 1994), by Lewis B. Ware, ed. by K. P. Magyar, Maris McCrabb, and Albert Mitchum
- Capital, State, Empire: The New American Way of Digital Warfare (London: University of Westminster Press, 2017), by Scott Timcke (HTML and PDF files at Project MUSE)
- Blueprint for America (c2016), ed. by George P. Shultz (PDF files with commentary at Hoover Institution)
- Scientific Communication and National Security (1982), by Committee on Science, Engineering, and Public Policy (U.S.) (page images with commentary at NAP)
- Domestic Intelligence: New Powers, New Risks (New York: Brennan Center for Justice, c2011), by Emily Berman (PDF with commentary at brennancenter.org)
- The Secrecy Problem in Terrorism Trials (New York: Brennan Center for Justice, c2005), by Serrin Turner and Stephen J. Schulhofer (PDF with commentary at brennancenter.org)
- America the Vulnerable: Our Military Problems and How to Fix Them (Philadelphia: Foreign Policy Research Institute, ca. 2002), ed. by John F. Lehman and Harvey Sicherman (PDF with commentary at fpri.org)
- Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001: Report of the U.S. Senate Select Committee on Intelligence and U.S. House Permanent Select Committee on Intelligence, Together With Additional Views (declassified version, December 2002), by United States Senate Select Committee on Intelligence and United States House Permanent Select Committee on Intelligence (PDF at govinfo.gov)
- Asymmetry and U.S. Military Strategy: Definition, Background, and Strategic Concepts (2001), by Steven Metz and Douglas V. Johnson
- Rebuilding America's Defenses: Strategy, Forces and Resources for a New Century (Washington: Project for the New American Century, 2000), by Donald Kagan, Gary Schmitt, and Thomas Donnelly (PDF at Wayback Machine)
- Criminal Prohibitions on Leaks and Other Disclosures of Classified Defense Information (Washington: Congressional Research Service, 2017), by Stephen P. Mulligan and Jennifer Elsea (PDF at fas.org)
- The Olympics and the Threat of Terrorism: Hearing Before the Committee on the Judiciary, United States Senate, One Hundred Fourth Congress, Second Session (Washington: GPO, 1997), by United States Senate Committee on the Judiciary (page images at HathiTrust)
- Report of the Commission on Protecting and Reducing Government Secrecy, Pursuant to Public Law 236, 103rd Congress (1997), by United States Commission on Protecting and Reducing Government Secrecy (PDF files at govinfo.gov)
- A National Security Strategy of Engagement and Enlargement (February 1996), by United States Executive Office of the President (HTML at fas.org)
- Final Report of the Task Force on Combating Terrorist and Foreign Fighter Travel (committee print; 2015), by United States House Committee on Homeland Security (PDF at govinfo.gov)
- Neither the Fanatics Nor the Faint-Hearted: The Tour Leading to the President's Death and the Two Speeches He Could Not Give (Austin, TX: Pemberton Press, c1963), by John Holmes Jenkins, contrib. by John F. Kennedy (multiple formats at archive.org)
- Russia in the Arctic (Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2011), ed. by Stephen Blank (multiple formats with commentary at armywarcollege.edu)
- Diplomacy and Security in the Twenty-First Century (Washington: Institute for the Study of Diplomacy, Georgetown University, c2009), by Janne E. Nolan (PDF at Wayback Machine)
- Nuclear Heuristics: Selected Writings of Albert and Roberta Wohlstetter (2009), by Albert J. Wohlstetter and Roberta Wohlstetter, ed. by Robert Zarate and Henry D. Sokolski (page images at HathiTrust)
- Pacific Currents: The Responses of U.S. Allies and Security Partners in East Asia to China's Rise (2008), by Evan S. Medeiros, Keith Crane, Eric Heginbotham, Norman D. Levin, Julia Lowell, Angel Rabasa, and So-mi Song (PDF with commentary at rand.org)
- Diversity Visa Program: Hearing Before the Subcommittee on Immigration, Border Security, and Claims of the Committee on the Judiciary, House of Representatives, One Hundred Ninth Congress, First Session, June 15, 2005 (Washington: GPO, 2005), by United States House Committee on the Judiciary (page images at HathiTrust)
- The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (official government edition, 2004), by National Commission on Terrorist Attacks upon the United States (HTML and PDF files at 9-11commission.gov)
- An Abrupt Climate Change Scenario and its Implications for United States National Security (2003; released 2004), by Peter Schwartz and Doug Randall (PDF at dtic.mil)
- In Liberty's Shadow: U.S. Detention of Asylum Seekers in the Era of Homeland Security (New York: Human Rights First, 2004), by Eleanor Acer and Archana Pyati (PDF at Wayback Machine)
- Conventional Coercion Across the Spectrum of Operations: The Utility of U.S. Military Forces in the Emerging Security Environment (Santa Monica, CA: Rand, 2002), by David E. Johnson, Karl P. Mueller, and William H. Taft (PDF files at rand.org)
- American Strategy: Issues and Alternatives for the Quadrennial Defense Review (2000), by Steven Metz (PDF with commentary at armywarcollege.edu)
- Countering the New Terrorism (1999), by Ian O. Lesser, Bruce Hoffman, John Arquilla, David F. Ronfeldt, Michelle Zanini, and Brian Michael Jenkins (PDF files at rand.org)
- Controlling Threats to Nuclear Security: A Holistic Model (1997), by James L. Ford and C. R. Schuller (page images at Google)
- Strategic Horizons: The Military Implications of Alternative Futures (1997), by Steven Metz (PDF with commentary at armywarcollege.edu)
- Transforming Nuclear Deterrence (1997), ed. by Hans Binnendijk and James E. Goodby (HTML at fdlp.gov)
- America in the Third World: Strategic Alternatives and Military Implications (1994), by Steven Metz (PDF with commentary at armywarcollege.edu)
- Multinationals and the National Interest: Playing by Different Rules (OTA-ITE-569; 1993), by United States Congress Office of Technology Assessment
- Soviet, East German, and Cuban Involvement in Fomenting Terrorism in Southern Africa: Report of the Chairman of the Subcommittee on Security and Terrorism to the Committee on the Judiciary, United States Senate, Ninety-seventh Congress, Second Session (Washington: GPO, 1982), by United States Senate Committee on the Judiciary (page images at HathiTrust)
- The U.S. Machine Tool Industry and the Defense Industrial Base, by National Research Council Committee on the Machine Tool Industry (page images with commentary at NAP)
More items available under broader and related terms at left. |