Hostname: page-component-857557d7f7-nbs69 Total loading time: 0 Render date: 2025-11-20T07:57:19.925Z Has data issue: false hasContentIssue false

Allies and Access: Implications of an American Turn Away from Alliances

Published online by Cambridge University Press:  20 November 2025

Austin Carson*
Affiliation:
Department of Political Science, University of Chicago, Illinois, USA
Rachel Metz
Affiliation:
Department of Political Science, George Washington University, Washington, DC, USA
Paul Poast
Affiliation:
Department of Political Science, University of Chicago, Illinois, USA
*
*Corresponding author. Email: acarson@uchicago.edu

Abstract

A defining feature of the post-1945 international system is the American network of allies and partners that has underpinned its global power. Recent developments within the United States and in the international system have severely strained that alliance network. If it collapses, what is at stake? Existing scholarship in International Relations highlights losses in aggregated military capabilities, reduced diplomatic support, and lost trade. In this essay we review these benefits and another that has been overlooked: ally-enabled access. Access refers to permission from allies and partners to engage in military and intelligence missions within their borders on their territory, through their airspace, or in their territorial waters. Access via America’s allies and security partners has enabled Washington to use foreign sovereign spaces for military logistics, military operations, and foreign surveillance to overcome the tyranny of distance. Examples include permission from allies and partners in the Middle East to allow the US Air Force to fly from their bases to strike targets in Afghanistan and Iraq after 9/11, and US intelligence installations built and operated by permission from Pakistani, Turkish, and Japanese territory during the Cold War. We describe the broad functions of alliances and show how access has been key to projection of American military and intelligence power at a global scale. Perhaps limiting or ending America’s global hegemonic role is desirable; perhaps it is dangerous. We argue that accounting for the contributions of access made by allies and security partners is critical if scholars, policymakers, and publics are to properly assess what is at stake in an American turn away from alliances.

Information

Type
Short Essay — Future IR
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution, and reproduction in any medium, provided the original work is properly cited.
Copyright
© The Author(s), 2025. Published by Cambridge University Press on behalf of The IO Foundation

The United States’ post–World War II alliance network, which some have called the “Shield of the Republic,”Footnote 2 is under perhaps its greatest strain in its nearly eighty-year existence. Some attribute this strain to Donald Trump, who heavily criticized the US alliance system during his first term as president and, in his second term, seems poised to completely rewrite the terms of that network. The strains on the US alliance network are not limited to Trump, let alone internal factors. This is also a transitional moment in world politics, with the end of US unipolarity and the rise of multiple major powers. The internal and systemic conditions under which the American alliance system was created have changed, raising the question of whether its alliances and partnerships will also change. If the US system of security allies and partnerships were to end as we know it, what impact would it have on US foreign policy and the shape of the international system? Clear answers to this question have implications for whether and why the United States should continue to support a system of alliances and security partners, and for understanding the implications if it does not.

There is no doubt that the US system of alliances and security partners carries with it a financial burden,Footnote 3 and, consequently, there are long-standing complaints that US allies should “do more.”Footnote 4 Scholars and policymakers have also argued that alliances and a US security umbrella more broadly can embolden other states to act more aggressively and to potentially entrap the United States in foreign wars.Footnote 5 The Trump administration has raised similar questions regarding security partners that are not formal treaty allies, asking whether the United States should subsidize the security of nontreaty allies like Ukraine, Taiwan, and Qatar. Yet understanding the function and value of the US system of alliances and partnerships requires accounting not only for the cost of those relationships but also its benefits. Here we revisit the fundamental question: What do states, particularly major powers like the United States, gain from such relationships? When it comes to allies, why bother?

We conceptualize allies broadly as “formal or informal arrangements for security cooperation between two or more sovereign states.”Footnote 6 These include formal alliance treaty members,Footnote 7 signatories of defense cooperation agreements,Footnote 8 participants in ad hoc coalition,Footnote 9 and states with patterns of security cooperation but no formal relationship.Footnote 10 The variety of forms these relationships take reflects the variety of purposes they serve. We develop an updated typology focused on the security, diplomatic, and economic benefits of alliances. We highlight a category of security-related benefits within this typology that has been largely overlooked by International Relations scholarship and the current administration: the benefits of access.

Access refers to decisions by states to allow other states’ military and intelligence services to operate inside their borders, on their land, in their territorial waters, or through their airspace. We show how US alliances and partnerships, in addition to providing routine or peacetime basing, offer contingency access: that is, permission to engage in active combat operations and military logistics during war from within their borders. When states allow the US military to fight wars from inside their borders, they make it possible for the United States to bring the full weight of its military power to bear against adversaries around the world. We also highlight the importance of access in the logistics of collecting high-quality intelligence—an easily overlooked security benefit that is distinct from military operations and relevant during peacetime and wartime. Proper attention to access provides a more complete picture of how allies have enabled US power projection around the world.

We use these ideas to help make sense of the potential implications of substantial changes in US security relationships. If the United States weakens its global network of allies, it could lose more than the defense budgets, coalition contributions, and the legitimacy conferred through international cooperation. Losing allies could mean an end to open access—in part because it is an underappreciated benefit of such partnerships. Without access, the United States severely restricts its ability to project military and intelligence power. Reasonable people may disagree about whether the United States should seek to maintain hegemony.Footnote 11 These are important debates with implications for the purpose of allies. Our core claim is that policies toward US allies should reflect what is really at stake. Simply put, turning away from allies could mean forgoing open access, and access denied would mean the end of US hegemony and of the global order US hegemony underwrites.

Reconsidering the Benefits of Allies

What is the point of having allies, whether through a formal treaty or via informal security partnerships? The traditional understanding of alliances is that they are a means of achieving security via capability aggregation,Footnote 12 or “external balancing.”Footnote 13 The work of Morrow helped scholars to broaden their understanding of the function of alliances to include nonsecurity benefits like enhancing the independent influence, or “autonomy,” of a major power in world politics.Footnote 14

Alliances and security partnerships can offer three sets of benefits: security, diplomatic, and economic. Such relationships can support economic ties, whether those allies provide raw materials,Footnote 15 offer trading markets,Footnote 16 or are willing to hold a security patron’s currency.Footnote 17 Diplomatic benefits pertain to the autonomy benefits highlighted by Morrow, the legitimacy conferred by even token participation by coalition partners in the military efforts of the major power,Footnote 18 and diplomatic support for the broader policy pursuits of a major power ally.Footnote 19 A benefit that sits at the intersection of diplomatic and security issues is greater control over the foreign and defense policies of allies, including decisions to initiate war, make defense investments, and develop operational plans. American security assurances can also reduce the desire of allies to weaponize their nuclear energy programs, as in South Korea and Japan.Footnote 20

While economic and broader diplomatic benefits are important, our focus is on the third set of benefits: security. The security benefit most emphasized in past scholarship and by the Trump administration is the pooling of equipment and personnel to deter or fight a common adversary.Footnote 21 Exclusive focus on capability aggregation in the form of pooling resources can generate concerns about unequal burden sharing.Footnote 22 Scholars measure allies’ contribution to collective security via indicators of capability aggregation such as an ally’s level of defense spending,Footnote 23 the complementarity of its defense investments,Footnote 24 or its provision of combat power during war.Footnote 25 These same allied investments in defense can help prevent wars from happening in the first place,Footnote 26 although the efficacy of this deterrence benefit is difficult to empirically measure.Footnote 27

While important, scholarly studies of allies largely overlook a second set of security benefits they offer: access. Allies, with or without formal treaties, can share the burden of security not only by spending on defense or contributing their troops and materiel to coalitions, but by allowing each other’s troops and materiel inside their borders. Access includes permission for military basing, which has been studied in existing work.Footnote 28 But basing is just one dimension of access—and not necessarily the most important.

Allies grant access in many forms. Allies can allow states’ military services to transit through their territory, resupply in their ports, or fly through their skies. Allies can allow states’ intelligence services to build and operate surveillance infrastructure without ever committing to hosting a military base. Basing itself is a broad category of access that can be usefully disaggregated. An ally can let a foreign state own and operate bases from inside its sovereign territory; alternatively, the host can allow a state to use its own bases. An ally can allow a state to operate from its bases in peacetime only or to fight wars from inside its borders.

The value of access is rooted in a concept that has been underappreciated by scholars of alliances: the “tyranny of distance.” Kenneth Boulding introduced the concept of the “loss of strength” gradientFootnote 29 in which the potency of military power diminishes the further away it is used. Boulding’s insight reflects the stubborn challenges raised by military logistics. Later scholarship has further shown how security-related missions and activities become more complicated at greater distance.Footnote 30 A similar insight drives the logic of the “stopping power of water.”Footnote 31

Combat missions are harder to execute from a distance due to the practicalities that guns on tanks and aircraft do not shoot very far, aircraft need refueling, and short-range weapons systems must be transported close to the adversary. Sustainment likewise requires the transportation of the voluminous and bulky material necessary to keep the tip of the spear in the fight. Similarly, intelligence gathering is degraded by distance. Obtaining documents or insights from human sources requires intimate proximity. Wireless radio signals weaken as they travel. Reconnaissance aircraft require maintenance and refueling. There are exceptions—that is, intelligence collected at a distance via space-based platforms or cyber intrusions—but, on the whole, good intelligence is harder to obtain without close access.

Access offers a solution to tyranny of distance. If a major power can secure permission to use the territory, airspace, and waters of a foreign country that are near an adversary it wishes to deter, a theater of military operations, or a target of intelligence collection, this radically reduces the logistical burden of military and intelligence activity. Such access can, in turn, greatly increase the military and intelligence capability a major power can bring to bear against distant adversaries.

The Importance of Ally-Enabled Access

We now turn to explaining precisely how access has facilitated the projection of US military and intelligence power. We argue that access granted by the United States’ network of alliances and security partnerships has underpinned the US-led global system since 1945. Access has allowed Washington to deploy personnel and infrastructure near potential combat theaters, move materiel, conduct logistics, and fight directly from within foreign territory. Foreign partners have also permitted the United States to engage in intelligence collection activities. This has extended the reach of Washington’s ability to “see” and “hear.” In short, access has allowed the United States to overcome the tyranny of distance, command the commons,Footnote 32 and project power around the world.

The significance of access contributions for the projection of US military power can be understood across two scenarios: routine access during times of peace, and contingency access during times of war. Routine access during times of peace is perhaps the better understood and studied form of access. Allies permitting routine access, or forward presence, allow the US military to put its people and/or the infrastructure to support them inside their borders on a regular basis. The central purpose of forward presence facilitated by routine access is deterrence of interstate aggression, by punishment and by denial. The logic of “tripwire forces” holds that by putting US skin in the game, adversaries will calculate that attacking the ally will surely trigger a broader US intervention in the war. When US forward presence is more substantial, it can shift the local balance of military power such that adversaries calculate that they would be unable to achieve their military objectives quickly at reasonable cost.Footnote 33

But routine access may not be the most important form of access offered by US allies. Allies often grant the US contingency access during times of war, meaning they allow the United States to conduct military operations against an adversary from inside their sovereign boundaries even if they are not under direct threat by an adversary. For every military operation, US allies not only decide whether, how many, and what kind of forces to contribute to the war effort, but also whether, how much, and what kind of contingency access to grant the US military. States can deny contingency access altogether, they can grant restricted contingency access, or they can grant total contingency access. States that grant total contingency access permit the US military to transit through their territory, skies, and/or waters en route to a target, conduct logistical operations in support of the military operation within their borders, and conduct direct combat operations from within their borders.

Consider Operation Desert Storm in 1991, hailed as the pinnacle demonstration of US military power. During Operation Desert Storm, the United States conducted a massive sealift and airlift to bases in Saudi Arabia, Oman, Qatar, the United Arab Emirates, and Turkey, stopping along the way at bases in Europe and North Africa. Egypt permitted the passage of US aircraft carriers through the Suez Canal. Once in theater, the United States Air Force decimated the Iraqi Army from runways in Oman, Qatar, the United Arab Emirates, Turkey and, of course, Saudi Arabia. In Desert Storm, the United States’ allies, both formal alliance members and security partners, contributed less than 15 percent of the coalition’s total sorties against the Iraqi Air Force and Iraqi Army. However, the vast majority of the airpower the United States brought to bear in the Gulf War was facilitated by access from the United States’ allies.Footnote 34

Consider also NATO’s effort to stop President Slobodan Milosevic’s ethnic cleansing of Albanians. In the aerial bombing campaign Operation Allied Force, the coalition in total flew almost 40,000 sorties. While the United States flew the vast majority of the sorties and coalition partners flew only a small fraction, the United States flew almost entirely from bases inside coalition partners’ borders.Footnote 35 Force contributions by US allies in Operation Allied Force might have been less than impressive, but their contributions in access were decisive.

More generally, try to imagine any US-led military operation since World War II without access: Vietnam. Iraq I. The wars in Iraq and Afghanistan. The ongoing war against the Islamic State. The United States generated the most combat power by far in each of these wars. But it did so largely from inside the borders of allies proximate to the targets. Without contingency access from its allies, the United States would have had to generate all its military power through naval aviation or long-range weapons systems. This would have dramatically raised the costs and lowered the effectiveness of the operations. Probably, for better or for worse, it would mean that the United States would not have conducted many of those operations at all because it could not have done so at an acceptable cost. It is unclear whether the United States would (or should) defend Taiwan if the People’s Republic of China attempts to seize it by force. It is clear, however, that without access from allies in the region, the United States would be unable to do so.Footnote 36

In addition to facilitating the projection of US military power, access-granting allies facilitate the projection of US intelligence power. Intelligence, or the raw data and insights states obtain through clandestine means, enables diplomacy and military planning, for defensive missions (for example, warning of military attack) and offensive actions (for example, identifying targets for a bombing campaign). The collection of intelligence—meaning the methods states use to acquire raw informational data about foreign intentions, capabilities, and events—relies on its own kind of infrastructure. This includes the physical sites, installations, and buildings that house intelligence collection and analytic functions. Such sites need to be near the intelligence targets, which are not often physically close to the United States. For this reason, since 1945, the United States has consistently and broadly relied on allies to permit building installations and operate intelligence collection activities on its territory.

The infrastructure for collection activity is easy to overlook but an essential part of its logistics. Overhead imagery obtained via drones or crewed aircraft rely on foreign airfields for take-off and landing and communication links to transmit photographs.Footnote 37 Signals interception relies on some kind of sensor (that is, an antenna) positioned to detect a wireless radio or other signal at the correct frequency and direction.Footnote 38 Seismic monitors in foreign locations enable states to monitor nuclear programs of other states.Footnote 39 Human-source intelligence often requires intimate access inside the target of interest. Such logistics are part of the “how” of intelligence collection, the “sources and methods” that states work hard to hide.Footnote 40

Declassification of US official records is shedding more light on intelligence collection logistics and the special role of its alliances and security partnerships. One example is Turkey, America’s NATO ally. Beginning in the mid-1950s, the United States operated a network of installations for intercepting missile telemetry signals and military communications along the Turkish coast of the Black Sea.Footnote 41 Access to Turkish territory allowed the United States the rare opportunity to build infrastructure close to Soviet missile testing grounds and military/naval movements in the Black Sea. As one history notes, “no piece of real estate during the Cold War bulked larger than Turkey” from foreign surveillance activity and this activity “came to dominate American–Turkish relations.”Footnote 42

Another example, also within the NATO alliance, is Denmark. Denmark’s control of Greenland offered the United States a strategically valuable position in the Far North that was highly valuable for American intelligence collection and early warning. The shortest route for any attack by Moscow was over the North Pole. Early warning installations built in Greenland could detect incoming Soviet bombers and, later, ballistic missiles.Footnote 43 Decades later, the American presence in Greenland has evolved into an important installation for space situational awareness and, in the second Trump administration, a potential new patch of American territory.Footnote 44

The story in East Asia was similar. Along with controversial military bases in places like Okinawa, the United States also built and operated sensitive intelligence collection installations in Japan. A declassified National Security Agency (NSA) history notes the important role of signal intercept sites at Misawa and Wakkanai in Japan, which allowed the United States to listen in on Soviet military chatter during its 1983 shootdown of civilian flight KAL 007.Footnote 45 During the Vietnam War, Washington relied on access to Thailand for its surveillance activities. The NSA “used Thailand as a principal base of cryptologic operations”Footnote 46 while the CIA flew flights from Thai territory.Footnote 47

Even as surveillance technology evolved, US allies continued to provide important forms of access. In the 1960s, the United States obtained access to British-controlled Seychelles islands in the Indian Ocean to build a space tracking installation for its new satellite reconnaissance program.Footnote 48 Later the United States built installations in Australia. Later exposed by Edward Snowden,Footnote 49 a large installation at Pine Gap has, for decades, enabled American satellite-based detection of Soviet missile launches and interception of signals.Footnote 50 Before its revolution in 1979, American leaders built a close relationship with the Shah in Iran in large part due to his willingness to permit the operation of sensitive intelligence facilities on Iranian territory.Footnote 51

Implications for the Future of US Foreign Policy and World Order

Given the benefits provided by of alliances and security partnerships, as well as the broader role they have played for the United States, what are their implications for the United States and the international order going forward? If the United States dramatically reorients its policies toward its allies, it will have significant implications for the diplomatic, economic, and security benefits it has long derived from those relationships. That, in turn, could reshape the world order.

Such questions arise now because of four broad patterns in the Trump administration’s approach to allies thus far. First, the United States has imposed historically high tariffs on its closest allies while demanding significant improvements in how US exports are treated. Second, it has aggressively demanded that US allies pay more for their defense. At the same time, Washington is using language and adopting policies that raise doubts about its own commitment to defending its allies and upholding broader norms of territorial integrity. Third, the Trump administration has by and large been toughest on its traditional liberal democratic allies while exhibiting a proclivity to take a softer line on autocratic adversaries of the United States. Fourth, the administration has engaged in broad attack on the institutions and practices of multilateralism and has embraced unilateral military action, most notably in the American military strike against Iran’s nuclear facilities and on a Venezuelan speedboat.

Returning to the prior typology, such actions could endanger the diplomatic, economic, and/or security benefits that alliances and security partnerships have historically provided. For example, allies may balk at offering diplomatic cover to an American administration that wavers in its commitments. A future effort to assemble a “coalition of the willing” for a military campaign could find fewer friends and allies willing to actively participate or otherwise lend public support. The economic implications of the Trump administration’s actions are likely to be mixed and will depend on the outcome of ongoing bargaining. On one hand, economic pressure via tariffs could yield improved investment commitments and terms of trade from allies. A US–Japan trade deal reached in September 2025 is one example. On the other hand, the shakier US security commitment to allies could make many of them less willing to offer favorable economic treatment. This and other stumbling blocks could prevent the United States from reaching generous new deals, leaving aggregate tariff levels higher and diminishing the economic perks of alliances.

While the implications for the diplomatic and economic benefits are important, perhaps the most consequential changes will be in the category of security. On the one hand, the Trump administration’s singular focus on the defense spending of allies has already produced meaningful increases in defense spending by its European allies, as in NATO’s commitment to invest 5 percent of GDP on defense by 2035. This could reduce the free riding that has long been a complaint of the US toward its allies.Footnote 52 Moral hazard should also be reduced, as allies less certain of the United States’ security umbrella should be more cautious about escalating conflicts against adversaries. Yet, over time, increased security independence does have a downside. The more capable the United States’ allies become, the more they can operate without US support and initiate policies—including starting crises or even wars—that the United States opposes. Nuclear proliferation is also more likely in a world characterized by wavering US assurances and more frequent interstate wars.

When it comes to access, the United States may lose the permissions that have facilitated US military and intelligence power projection since World War II. To be clear, some host states have a strong self-interest in US access. Countries like South Korea and Taiwan face direct threats from large security rivals; access could be critical to their survival. Yet in many other places, the United States will no longer be able to take for granted the access it may need. It has lost access in the past. Consider Turkey’s refusal to allow the US Army to open a northern front against Iraq in 2003. Or Spain and France’s refusal to allow the US Air Force to overfly their territory en route to bomb Libya in 1986. The United States lost access—sometimes overnight—to intelligence installations in Pakistan, Turkey, and Iran during the 1960s and 1970s. If the PRC attacks Taiwan, US military access to bases in South Korea and the Philippines are far from assured. Such instances would likely multiply.

States have many reasons to restrict or deny access, and the pressure and disruptions from Washington, combined with the shifting balance of power, may increase the perceived costs and reduce the perceived benefits of letting the United States in. Granting access increases the risk a host is the target of military attacks or sabotage. Allowing a foreign power like the United States to attack a neighbor from its territory can invite retaliation. Allowing the United States to collect intelligence can similarly attract the coercive attention of an adversary, a factor that led both Turkish and Australian leaders to press for reduced US access in the Cold War. Given the Trump administration’s wavering commitment to collective defense, such criticism could convince allies that they have little to gain from offering access to a state unwilling to protect them in return. This could be particularly decisive in a strategic environment characterized by rising powers and the proliferation of offensive weapons that make states increasingly vulnerable to attack.Footnote 53

Allies may also restrict or deny access for reputational reasons. Hosts may deny access to spare themselves the reputational costs abroad and at home of abetting a great power whose foreign policy is increasingly viewed as illegitimate, particularly if the military operation for which access is requested is controversial. States may also deny the US access due to its support for allies engaged in what many foreign capitals see as human rights abuses, such as Saudi Arabia in the War in Yemen or Israel in the War in Gaza. The United States may find itself relying on hefty cash payments to try to buy access, and it might find itself unable to purchase the alliance benefits it previously enjoyed for a much lower cost. Future research can deepen and extend these ideas, including by analyzing the causes of variation in access, why access changes over time, and generating new empirical evidence on the consequences of different access arrangements.

In short, the current administration’s shift in approach toward its alliances and security partnerships may reduce some alliance costs but do significant damage to diplomatic and access-related security benefits. Loss of access, a form of burden sharing often taken for granted by policymakers, is a significant but overlooked risk that affects both American military and intelligence power. There is debate in International Relations scholarship and within the current administration about whether the United States should continue to project power globally or give up its global role and focus on its borders. Ending access would end the debate. Access denied would mean the end of American hegemony and the end of US-led world order.

Acknowledgments

We thank the editors and three anonymous reviewers for helpful comments and advice.

Footnotes

1

Author order is alphabetical.

3 Alley and Fuhrmann Reference Alley and Fuhrmann2021.

6 Walt Reference Walt1987, 12.

10 Henry Reference Henry2022, 14.

11 Gholz, Press, and Sapolsky Reference Gholz, Press and Sapolsky1997; Posen Reference Posen2008; Brooks, Ikenberry, and Wohlforth 2012; Priebe et al. Reference Priebe, Schuessler, Rooney and Castillo2024.

13 Waltz 1979.

15 Croteau and Poast Reference Croteau and Poast2020.

17 Norrlof 2020.

21 Altfeld Reference Altfeld1984; Snyder 1997.

23 Becker, Poast, and Hasebrook 2025.

25 Snyder 1997; Morrow Reference Morrow1991; Kreps Reference Kreps2011; Auerswald and Saideman Reference Auerswald and Saideman2014; Weitsman Reference Weitsman2004; Cappella Zielinski and Grauer Reference Cappella Zielinski and Grauer2022.

27 Leeds and Johnson Reference Leeds and Johnson2017; Kenwick, Vasquez, and Powers Reference Kenwick, Vasquez and Powers2015; Kenwick and Vasquez Reference Kenwick and Vasquez2017.

28 Examples include Blankenship and Joyce Reference Blankenship and Joyce2020; Nieman, Martinez Machain, Chyzh, and Bell Reference Nieman, Machain, Chyzh and Bell2021; Cooley Reference Cooley2008; Allen, Martinez Machain, Flynn, and Stravers Reference Allen, Machain, Flynn and Stravers2023; Kim Reference Kim2023; Allen, VanDusky–Allen, and Flynn Reference Alley and Fuhrmann2016; Musgrave and Ward Reference Musgrave and Ward2023; Reiter and Poast Reference Reiter and Poast2021.

29 Boulding Reference Boulding1962; see also Blainey Reference Blainey1966.

30 Hulme and Gartzke Reference Patrick and Gartzke2021; Hulme et al. Reference Hulme2025.

33 Reiter and Poast Reference Reiter and Poast2021.

34 Keaney and Cohen Reference Keaney and Cohen1993.

36 Anderson and Press Reference Anderson and Press2025.

37 Duffy et al. Reference Duffy2018.

40 Carnegie and Carson Reference Carnegie and Carson2020.

41 Johnson Reference Johnson1998. When multiple versions of a declassified history are available publicly, we indicate the specific version with the second year.

44 Crowley and Haberman Reference Crowley and Haberman2025.

47 Pedlow and Weizenbach Reference Pedlow and Welzenbach1992.

53 Poznansky and Sand Reference Poznansky and Sand2025.

References

Allen, Michael A., Machain, Carla Martinez, Flynn, Michael E., and Stravers, Andrew. 2023. Beyond the Wire: US Military Deployments and Host Country Public Opinion. Oxford University Press.Google Scholar
Allen, Michael A., VanDusky-Allen, Julie, and Flynn, Michael E.. 2016. The Localized and Spatial Effects of US Troop Deployments on Host-State Defense Spending. Foreign Policy Analysis 12 (4):674–94.Google Scholar
Alley, Joshua, and Fuhrmann, Matthew. 2021. Budget Breaker? The Financial Cost of US Military Alliances. Security Studies 30 (5):661–90.CrossRefGoogle Scholar
Altfeld, Michael F. 1984. The Decision to Ally: A Theory and Test. Western Political Quarterly 37 (4):523–44.CrossRefGoogle Scholar
Anderson, Nicholas D., and Press, Daryl G.. 2025. Access Denied? The Sino–American Contest for Military Primacy in Asia. International Security 50 (1):118–51.CrossRefGoogle Scholar
Arnold, David Christopher. 2005. Spying from Space: Constructing America’s Satellite Command and Control Systems. Texas A&M University Press.Google Scholar
Auerswald, David P., and Saideman, Stephen M.. 2014. NATO in Afghanistan: Fighting Together, Fighting Alone. Princeton University Press.Google Scholar
Baker, Ryan T. 2020. Logistics and Military Power: Tooth, Tail, and Territory in Conventional Military Conflict. The George Washington University.Google Scholar
Becker, Jordan, Benson, Seth, Dunne, John Paul, and Malesky, Edmund J.. 2025. Disaggregated Defense Spending: Introduction to Data. Journal of Peace Research 62 (3):772–88.CrossRefGoogle Scholar
Becker, Jordan, Kreps, Sarah E., Poast, Paul, and Terman, Rochelle. 2024. Transatlantic Shakedown: Presidential Shaming and NATO Burden Sharing. Journal of Conflict Resolution 68 (2–3):195229.CrossRefGoogle Scholar
Benson, Brett V. 2012. Constructing International Security: Alliances, Deterrence, and Moral Hazard. Cambridge University Press.CrossRefGoogle Scholar
Bernard, Richard L. 2004. The Foreign Missile and Space Telemetry Collection Story. The National Security Agency, Center for Cryptologic History. 2 Vols, Declassification Version: Interagency Security Classification Appeals Panel, 26 July 2021.Google Scholar
Blainey, Geoffrey. 1966. The Tyranny of Distance: How Distance Shaped Australia’s History.Google Scholar
Blankenship, Brian D. 2023. The Burden-Sharing Dilemma: Coercive Diplomacy in US Alliance Politics. Cornell University Press.Google Scholar
Blankenship, Brian, and Joyce, Renanah M.. 2020. Purchasing Power: US Overseas Defense Spending and Military Statecraft. Journal of Conflict Resolution 64 (2):545–73.CrossRefGoogle Scholar
Bolsinger, Diana. 2021–2022. Not at Any Price: LBJ, Pakistan, and Bargaining in an Asymmetric Intelligence Relationship. Texas National Security Review.Google Scholar
Boulding, Kenneth. 1962. Conflict and Defense. Harper and Row.Google Scholar
Brooks, Stephen G., John Ikenberry, G., and Wohlforth, William C.. 2012. Don’t Come Home, America: The Case Against Retrenchment. International Security 37 (3):751.CrossRefGoogle Scholar
Cancian, Mark F., Cancian, Matthew, and Heginbotham, Eric. 2023. The First Battle of the Next War. Center for Strategic and International Studies, 9 January.Google Scholar
Cappella Zielinski, Rosella, and Grauer, Ryan. 2022. Understanding Battlefield Coalitions. Journal of Strategic Studies 45 (2):177–85.CrossRefGoogle Scholar
Carll, Kendall. 2025. Lending An Ear: Project Chestnut and US–China Intelligence Cooperation, 1975–1989. The International History Review 47 (1):105118.CrossRefGoogle Scholar
Carnegie, Allison, and Carson, Austin. 2020. Secrets in Global Governance: Disclosure Dilemmas and the Challenge of International Cooperation. Cambridge University Press.CrossRefGoogle Scholar
Clark, Robert M. 2013. Intelligence Collection. CQ Press.Google Scholar
Cooley, Alexander. 2008. Base Politics: Democratic Change and the US Military Overseas. Cornell University Press.Google Scholar
Cooley, Alexander, and Nexon, Daniel H.. 2013. “The Empire Will Compensate You”: The Structural Dynamics of the US Overseas Basing Network. Perspectives on Politics 11 (4):1034–50.CrossRefGoogle Scholar
Croteau, Sabrina and Poast, Paul. 2020. Global Monetary Order and the Liberal Order Debate. International Studies Perspectives 21 (2):109153.Google Scholar
Crowley, Michael and Haberman, Maggie. 2025. Inside Trump’s Plan to “Get” Greenland. New York Times, 10 April.Google Scholar
Dent, Jackie. 2017. An American Spy Base Hidden in Australia’s Outback. New York Times, 23 November.Google Scholar
Duffy, James P., et al. 2018. Location, Location, Location: Considerations When Using Lightweight Drones in Challenging Environments. Remote Sensing in Ecology and Conservation 4 (1):719.CrossRefGoogle Scholar
Fang, Songying, Johnson, Jesse C., and Ashley Leeds, Brett. 2014. To Concede or to Resist? The Restraining Effect of Military Alliances. International Organization 68 (4):775809.Google Scholar
Fearon, James D. 1997. Signaling Foreign Policy Interests: Tying Hands versus Sinking Costs. Journal of Conflict Resolution 41 (1):6890.Google Scholar
Fordham, Benjamin O. 2010. Trade and Asymmetric Alliances. Journal of Peace Research 47 (6):685–96.CrossRefGoogle Scholar
Gannon, J. Andrés. 2025. Complementarity in Alliances: How Strategic Compatibility and Hierarchy Promote Efficient Cooperation in International Security. American Journal of Political Science. CrossRefGoogle Scholar
Gavin, Francis J. 2015. Strategies of Inhibition: US Grand Strategy, the Nuclear Revolution, and Nonproliferation. International Security 40 (1):946.CrossRefGoogle Scholar
Gholz, E., Press, D.G., and Sapolsky, H.M.. 1997. Come Home, America: The Strategy of Restraint in the Face of Temptation. International Security 21 (4):548.CrossRefGoogle Scholar
Henke, Marina E. 2019. Constructing Allied Cooperation: Diplomacy, Payments, and Power in Multilateral Military Coalitions. Cornell University Press.Google Scholar
Henry, Iain D. 2022. Reliability and Alliance Interdependence: The United States and Its Allies in Asia, 1949–1969. Cornell University Press.CrossRefGoogle Scholar
Patrick, Hulme, M., and Gartzke, Erik. 2021. The Tyranny of Distance: Assessing and Explaining the Apparent Decline in US Military Performance. International Studies Quarterly 65 (2):542–50.Google Scholar
Hulme, M. Patrick, et al. 2025. Power, Parity, and Place: Why Forgetting the Loss-of-Strength Gradient Misses the Relative Power Relationship. Journal of Conflict Resolution, 1 August.CrossRefGoogle Scholar
Johnson, Jesse C. 2015. The Cost of Security: Foreign Policy Concessions and Military Alliances. Journal of Peace Research 52 (5):665–79.Google Scholar
Johnson, Jesse C., and Ashley Leeds, Brett. 2011. Defense Pacts: A Prescription for Peace?. Foreign Policy Analysis 7 (1):4565.CrossRefGoogle Scholar
Johnson, Thomas R. 1998. American Cryptology During the Cold War, 1945–1989. National Security Agency, Center for Cryptologic History. 4 Vols, Declassification Version: Interagency Security Classification Appeals Panel.Google Scholar
Keaney, Thomas A., and Cohen, Eliot A.. 1993. Gulf War Air Power Survey. Vol. 6. Office of the Secretary of the Air Force.CrossRefGoogle Scholar
Kenwick, Michael R., Vasquez, John A., and Powers, Matthew A.. 2015. Do Alliances Really Deter? The Journal of Politics 77 (4):943–54.CrossRefGoogle Scholar
Kenwick, Michael R., and Vasquez, John A.. 2017. Defense Pacts and Deterrence: Caveat Emptor. The Journal of Politics 79 (1):329–34.CrossRefGoogle Scholar
Kim, Claudia Junghyun. 2023. Base Towns: Local Contestation of the US Military in Korea and Japan. Oxford University Press.CrossRefGoogle Scholar
Kim, Tongfi. 2016. The Supply Side of Security: A Market Theory of Military Alliances. Stanford University Press.Google Scholar
Kinne, Brandon J., and Kang, Stephanie N.. 2023. Free Riding, Network Effects, and Burden Sharing in Defense Cooperation Networks. International Organization 77 (2):405439.CrossRefGoogle Scholar
Kreps, Sarah E. 2011. Coalitions of Convenience: United States Military Interventions after the Cold War. Oxford University Press.CrossRefGoogle Scholar
Lambeth, Benjamin S. 2001. Air Power Against Terror: America’s Conduct of Operation Enduring Freedom. Rand Corporation.Google Scholar
Leeds, Brett Ashley, and Johnson, Jesse C.. 2017. Theory, Data, and Deterrence: A Response to Kenwick, Vasquez, and Powers. The Journal of Politics 79 (1):335–40.CrossRefGoogle Scholar
Leeds, Brett Ashley, Long, Andrew G., and McLaughlin Mitchell, Sara. 2000. Reevaluating Alliance Reliability: Specific Threats, Specific Promises. Journal of Conflict Resolution 44 (5):686–99.CrossRefGoogle Scholar
Mearsheimer, John J. 2001. The Tragedy of Great Power Politics. W.W. Norton & Company.Google Scholar
Morrow, James D. 1991. Alliances and Asymmetry: An Alternative to the Capability Aggregation Model of Alliances. American Journal of Political Science 35 (44):904933.CrossRefGoogle Scholar
Morrow, James D. 1994. Alliances, Credibility, and Peacetime Costs. Journal of Conflict Resolution 38 (2):270–97.CrossRefGoogle Scholar
Musgrave, Paul, and Ward, Steven. 2023. The Tripwire Effect: Experimental Evidence Regarding US Public Opinion. Foreign Policy Analysis 19 (4).CrossRefGoogle Scholar
Nieman, Mark David, Machain, Carla Martinez, Chyzh, Olga V., and Bell, Sam R.. 2021. An International Game of Risk: Troop Placement and Major Power Competition. The Journal of Politics 83 (4):13071321.CrossRefGoogle Scholar
Norrlof, Carla, et al. 2020. Global Monetary Order and the Liberal Order Debate. International Studies Perspectives 21 (2):109153.Google Scholar
Nutt, Cullen G. 2024. “Vital and Irreplaceable Facilities”: Explaining Leverage When States Host Great Powers’ Spying Operations. Intelligence and National Security 39 (5):841–63.CrossRefGoogle Scholar
Olson, Mancur, and Zeckhauser, Richard. 1966. An Economic Theory of Alliances. The Review of Economics and Statistics 48 (3):266–79.CrossRefGoogle Scholar
Pedlow, Gregory W. and Welzenbach, Donald E.. 1992. The Central Intelligence Agency and Overhead Reconnaissance: The U-2 and Oxcart Programs, 1954–1974. Central Intelligence Agency, History Staff, 1992. Declassification Version: Interagency Security Classification Appeals Panel.Google Scholar
Poast, Paul. 2019. Arguing About Alliances: The Art of Agreement in Military-Pact Negotiations. Cornell University Press.Google Scholar
Posen, Barry R. 2008. A Grand Strategy of Restraint. Finding Our Way: Debating American Grand Strategy, 81102.Google Scholar
Posen, Barry R. 2014. Restraint: A New Foundation for US Grand Strategy. Cornell University Press.Google Scholar
Poznansky, Michael and Sand, Erik. 2025. Spectacular Drone Strikes and the Future Sanctuary of the US Homeland. War on the Rocks, 27 August.Google Scholar
Priebe, Miranda, Schuessler, John, Rooney, Bryan, and Castillo, Jasen. 2024. Competing Visions of Restraint. International Security 49 (2):135–69.CrossRefGoogle Scholar
Rapp-Hooper, Mira. 2020. Shields of the Republic: The Triumph and Peril of America’s Alliances. Harvard University Press.Google Scholar
Reiter, Dan, and Poast, Paul. 2021. The Truth About Tripwires: Why Small Force Deployments Do Not Deter Aggression. Texas National Security Review 4 (3):3354.Google Scholar
Richelson, Jeffrey. 2007. Spying on the Bomb: American Nuclear Intelligence from Nazi Germany to Iran and North Korea. W.W. Norton & Company.Google Scholar
Richelson, Jeffrey. 2002. The Wizards of Langley: Inside the CIA’s Directorate of Science and Technology. Westview Press.Google Scholar
Sandler, Todd, and George, Justin. 2025. Economic Theory of Alliances: Sixty Years Later. Journal of Conflict Resolution, 15 July.CrossRefGoogle Scholar
Schelling, Thomas C. 1966. Arms and Influence. Yale University Press.Google Scholar
Scott, James C. 1998. Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed. Yale University Press.Google Scholar
Sims, Jennifer E. 2022. Decision Advantage: Intelligence in International Politics from the Spanish Armada to Cyberwar. Oxford University Press.CrossRefGoogle Scholar
Smith, Alastair. 1995. Alliance Formation and War. International Studies Quarterly 39 (4):405425.CrossRefGoogle Scholar
Snyder, Glenn H. 1984. The Security Dilemma in Alliance Politics. World Politics 36 (4):461–45.CrossRefGoogle Scholar
Snyder, Glenn H. 2007. Alliance Politics. Cornell University Press.Google Scholar
Walsh, James Igoe. 2009. The International Politics of Intelligence Sharing. Columbia University Press.Google Scholar
Walt, Stephen M. 1987. The Origins of Alliance. Cornell University Press.Google Scholar
Weitsman, Patricia A. 2004. Dangerous Alliances: Proponents of Peace, Weapons of War. Stanford University Press.Google Scholar
Wolford, Scott. 2015. The Politics of Military Coalitions. Cambridge University Press.CrossRefGoogle Scholar