Deterrence theory in the contemporary operating environmentChapter 1. IntroductionChapter 2. Literature reviewChapter 3. Research methodologyChapter 4. Case studiesChapter 5. Conclusions and recommendations2017 U.S. intelligence community worldwide threat assessement