4
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

US Military Force Structure After Korean Reunification

Pages 213-228 | Published online: 25 Mar 2009

  • See Richard K. Betts, “Wealth, Power, and Instability: East Asia and the United States After the Cold War,” International Security, Vol. 18, No. 3 (Winter 1993/94), p. 46.
  • See Marcus Noland, “Why North Korea Will Muddle Through,” Foreign Affairs, Vol. 76, No. 4 (July/August 1997), pp. 105–118.
  • See Robert Ross, “Assessing the China Challenge,” Henry Stimson Center, Washington DC, May 14, 1997.
  • See David Shambaugh, “China's Security and Military Policy and the Potential for CBMs in the Region,” Henry Stimson Center, Washington DC, December 17, 1996.
  • Posen , Barry R. and Ross , Andrew L. Winter 1996 . “Competing Visions for U.S. Grand Strategy,” . In International Security Vol. 21 , Winter , See, No. 3 (/97), pp. 15–16; Richard N. Haass, The Reluctant Sheriff: The United States After the Cold War (Washington DC: Council on Foreign Relations 1997), p. 85.
  • See Robert Crumplar, “A Future U.S. Military Presence on a Unified Korean Peninsula,” Paper Presented at Brookings-IFANS Conference, Washington DC, July 1997, p. 3; Haass, The Reluctant Sheriff: The United States After the Cold War, p. 85.
  • See Kishore Mahbubani, “An Asia-Pacific Consensus,” Foreign Affairs, Vol. 76, No. 5 (September/October 1997), pp. 149–158; for evidence of Japanese views, see Mike M. Mochizuki, “American and Japanese Strategic Debates: The Need for a New Synthesis,” and Takuma Takahashi, “Economic Interdependence and Security in the East Asia-Pacific Region,” in Mike M. Mochizuki, ed., Toward a True Alliance: Restructuring U.S.-Japan Security Relations (Washington DC: Brookings, 1997), pp. 56–72 and p. 114, respectively.
  • See Kenneth N. Waltz, Theory of International Politics (Reading, Massachusetts: Addison-Wesley, 1979), pp. 129–193; Aaron L. Friedberg, “Ripe for Rivalry: Prospects for Peace in a Multipolar Asia,” International Security, Vol. 18, No. 3 (Winter 1993/94), pp. 5–10; Donald Kagan, “Locarno's Lessons for NATO,” Wall Street Journal, October 28, 1997, p. 22.
  • For a thoughtful Chinese view admitting the potential for specific tension and conflict but underscoring the region's general commitment to peaceful relations, see Tian Xinjian and Feng Haixia, “Asian Security and CBMs Over the Next Decade,” in Michael Krepon, ed., Chinese Perspectives on Confidence-building Measures, Report No. 23 (Washington DC: Henry Stimson Center, 1997), pp. 39–50.
  • For one possible approach, see Ashton B. Carter, William J. Perry, and John D. Steinbruner, A New Concept of Cooperative Security (Washington DC: Brookings Institution, 1992), pp. 64–65; for a related and more recent view, see Zbigniew Brzezinski, “A Geostrategy for Eurasia,” Foreign Affairs, Vol. 76, No. 5 (September/October 1997), pp. 63–64.
  • See Dennis C. Blair and John T. Hanley, Jr., “From Wheels to Webs: Reconstructing Asia-Pacific Security Arrangements,” Washington Quarterly (Winter 2001), p. 13.
  • Desjardins , Marie-France . 1996 . “Rethinking Confidence-Building Measures,” . In Adelphi Paper 307 60 – 63 . Oxford : Oxford University Press . pp.
  • Andrew Mack and Pauline Kerr, “The Evolving Security Discourse in the Asia-Pacific,” Washington Quarterly, Vol. 18, No. 1 (Winter 1995), p. 129.
  • See Kishore Mahbubani, “An Asia-Pacific Consensus,” Foreign Affairs, Vol. 76, No. 5 (September/October 1997), pp. 149–158; Michael H. Armacost, Friends or Rivals? (New York: Columbia University Press, 1996), p. 212; Satoshi Morimoto, “The Security Environment in East Asia,” in Mike M. Mochizuki, ed., Toward a True Alliance (Washington DC: Brookings Institution, 1997), pp. 84–85.
  • See Assistant Chief of Staff, Resource Management, US Forces Korea, “U.S. Forces Korea in the Republic of Korea 1997,” Department of Defense, 1997; International Institute for Strategic Studies, The Military Balance 1996/1997 (Oxford, England: Oxford University Press, 1996), p. 29.
  • See Michael O'Hanlon, Defense Planning for the Late 1990s: Beyond the Desert Storm Framework (Washington DC: Brookings, 1995), pp. 50–65; Rachel Schmidt, Moving U.S. Forces: Options for Strategic Mobility (Congressional Budget Office, 1997), p. 79.
  • See Russ Swinnerton, “Piracy Remains A Concern for Southeast Asian Nations,” Defense News, August 25–31, 1997, p. 8.
  • 1995 . Encyclopedia of Modern U.S. Military Weapons 59 New York : Berkley Books . For example, the Senkaku Islands are about 650 miles from southern South Korea, the Taiwan Straits roughly 750 miles distant, and the Paracel Islands in the South China Sea about 1500 miles away. At a distance of roughly 1,000 miles from its base and with one in-flight refueling, an AW ACS surveillance aircraft can maintain station for about 15 hours, and an F-16 can conduct a combat mission (but with only modest loiter time). The Navy's P-3 land-based maritime surveillance aircraft could loiter about 5 hours at that distance. See Colonel Timothy M. Laur and Steven L. Llanso, (78, 91.
  • William E. Odom, “Transforming the Military,” Foreign Affairs, Vol. 76, No. 4 (July/August 1997), p. 60. Odom makes the point in specific regard to Japan, but the point is valid more generally.
  • O'Hanlon , Michael . 1997 . “Restructuring U.S. Forces and Bases in Japan,” . In Toward a True Alliance: Restructuring U.S.-Japan Security Relations Edited by: Mochizuki , Mike M. 159 – 161 . Washington DC : Brookings Institution . See in, ed., (pp.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.