Linked e-resources
Details
Table of Contents
Intro; A Note from the Author on the Second Edition; Preface; Acknowledgements; Contents; List of Figures; List of Tables; Chapter 1 A Critique on Current Methods; 1.1 Embargoes; 1.2 Blockades; 1.3 Tariffs and Quotas; 1.4 Subsidies and Dumping; 1.5 Trade Sanctions; 1.6 Exchange Rate Manipulation; 1.7 Humanitarian Aid; 1.8 Summary; Part I Supply Manipulation; Chapter 2 Altering Distribution of Supplies; 2.1 Blockades and the Ostrogoths Sack Rome; 2.2 Supply Channel and the USA Civil War; 2.3 The Impact of Specific Supplies; 2.4 Strategic Targeting.
Chapter 3 Altering Distribution of Capital Assets3.1 Funding Sources; 3.2 Civil Forfeiture in the USA; 3.3 Commercial Funding and Al-Qaeda; 3.4 Reactions to Capital Shortages; 3.5 Trade During the Cold War; Chapter 4 Altering Distribution of Human Assets; 4.1 Skilled and Unskilled Labor; 4.2 Nazi Labor and the Atomic Bomb; 4.3 Hiring Local Nationals; 4.4 Human Resource Management; Chapter 5 Physical Confrontation; 5.1 Measuring Their Incentive to Attack; 5.2 Resource Consumption and the 23rd Headquarters Special Troops; 5.3 Cost of the War on Terror.
5.4 Resource Infiltration and Merchant RaidersChapter 6 Systempunkt Targets; 6.1 Resource Mapping and Systempunkt Identification; 6.2 Systempunkt Targets and Operation Pastorius; 6.3 Cybersecurity According to Robert M. Lee; Chapter 7 Limitations and Failures of Supply Manipulation; 7.1 Black Market Trade; 7.2 Market Destruction; Chapter 8 Suggestions for Future Research; Part II Trade Manipulation; Chapter 9 Preliminary Concept: Terms of Trade; 9.1 Definition and Application; 9.2 Implications of Altering Terms of Trade; 9.3 Industries to Target; Chapter 10 Preclusive Purchasing.
10.1 Altering Price and Supply10.2 Tungsten in Nazi Germany; 10.3 Optimizing Strategy; Chapter 11 Resource Appropriation; 11.1 The Value of Supplies; 11.2 Daesh Oil; Chapter 12 Supply Exploitations; 12.1 Anticipating Black Markets; 12.2 Supply Exploitation and the Second Sack of Rome; 12.3 Secondary Impacts; 12.4 Peter Singer on North Korea; Chapter 13 Tactical Hiring; 13.1 Labor Market Equilibrium; 13.2 Altering Capital Ownership and Social Dynamics; 13.3 Chinese Technological Dominance; Chapter 14 Tactical Pricing; 14.1 Predatory Pricing.
14.2 Taking Advantage of Tariffs and Subsidies14.3 Price Discrimination; 14.4 War Profiteering, Waste and Fraud During OIF/OEF; 14.5 Insider Trading; 14.6 Preventing and Controlling the Competition; Chapter 15 Trade Agreements; 15.1 Finding Potential Partners; 15.2 Iran-Contra; 15.3 Terms of Partnership; 15.4 Adapting to the Strategic Environment; 15.5 White Supremacist Infiltration of Law Enforcement; Chapter 16 Currency Manipulation; 16.1 Catalan Fight for Independence; 16.2 Currency Liquidation and China's Reserve of US Dollars; 16.3 Diverting Foreign Currencies.
Chapter 3 Altering Distribution of Capital Assets3.1 Funding Sources; 3.2 Civil Forfeiture in the USA; 3.3 Commercial Funding and Al-Qaeda; 3.4 Reactions to Capital Shortages; 3.5 Trade During the Cold War; Chapter 4 Altering Distribution of Human Assets; 4.1 Skilled and Unskilled Labor; 4.2 Nazi Labor and the Atomic Bomb; 4.3 Hiring Local Nationals; 4.4 Human Resource Management; Chapter 5 Physical Confrontation; 5.1 Measuring Their Incentive to Attack; 5.2 Resource Consumption and the 23rd Headquarters Special Troops; 5.3 Cost of the War on Terror.
5.4 Resource Infiltration and Merchant RaidersChapter 6 Systempunkt Targets; 6.1 Resource Mapping and Systempunkt Identification; 6.2 Systempunkt Targets and Operation Pastorius; 6.3 Cybersecurity According to Robert M. Lee; Chapter 7 Limitations and Failures of Supply Manipulation; 7.1 Black Market Trade; 7.2 Market Destruction; Chapter 8 Suggestions for Future Research; Part II Trade Manipulation; Chapter 9 Preliminary Concept: Terms of Trade; 9.1 Definition and Application; 9.2 Implications of Altering Terms of Trade; 9.3 Industries to Target; Chapter 10 Preclusive Purchasing.
10.1 Altering Price and Supply10.2 Tungsten in Nazi Germany; 10.3 Optimizing Strategy; Chapter 11 Resource Appropriation; 11.1 The Value of Supplies; 11.2 Daesh Oil; Chapter 12 Supply Exploitations; 12.1 Anticipating Black Markets; 12.2 Supply Exploitation and the Second Sack of Rome; 12.3 Secondary Impacts; 12.4 Peter Singer on North Korea; Chapter 13 Tactical Hiring; 13.1 Labor Market Equilibrium; 13.2 Altering Capital Ownership and Social Dynamics; 13.3 Chinese Technological Dominance; Chapter 14 Tactical Pricing; 14.1 Predatory Pricing.
14.2 Taking Advantage of Tariffs and Subsidies14.3 Price Discrimination; 14.4 War Profiteering, Waste and Fraud During OIF/OEF; 14.5 Insider Trading; 14.6 Preventing and Controlling the Competition; Chapter 15 Trade Agreements; 15.1 Finding Potential Partners; 15.2 Iran-Contra; 15.3 Terms of Partnership; 15.4 Adapting to the Strategic Environment; 15.5 White Supremacist Infiltration of Law Enforcement; Chapter 16 Currency Manipulation; 16.1 Catalan Fight for Independence; 16.2 Currency Liquidation and China's Reserve of US Dollars; 16.3 Diverting Foreign Currencies.