Thinking About Deterrence

Total Page:16

File Type:pdf, Size:1020Kb

Thinking About Deterrence Thinking about Deterrence Enduring Questions in a Time of Rising Powers, Rogue Regimes, and Terrorism Edited by Adam Lowther Air University Press Air Force Research Institute Maxwell Air Force Base, Alabama Project Editor Library of Congress Cataloging-in-Publication Data James S. Howard Thinking about deterrence : enduring questions in a Cover Art, Book Design, and Illustrations time of rising powers, rogue regimes, and terrorism / Daniel Armstrong edited by Adam Lowther. Composition and Prepress Production pages cm Nedra Looney Includes bibliographical references and index. Print Preparation and Distribution ISBN 978-1-58566-227-2 (pbk : alk. paper) Diane Clark 1. Deterrence (Strategy) 2. United States—Military policy. I. Lowther, Adam, editor of compilation. U162.6.D487 2013 355’.033573—dc23 AIR FORCE RESEARCH INSTITUTE 2013035133 AIR UNIVERSITY PRESS Director and Publisher Allen G. Peck Published by Air University Press in December 2013 Editor in Chief Oreste M. Johnson Managing Editor Demorah Hayes Design and Production Manager Cheryl King Air University Press 155 N. Twining St., Bldg. 693 Maxwell AFB, AL 36112-6026 [email protected] http://aupress.au.af.mil http://afri.au.af.mil/ Disclaimer Opinions, conclusions, and recommendations expressed or implied within are solely those of the author and do not necessarily represent the views of Air University, the United States Air Force, the Department of Defense, or any other AFRI US government agency. Cleared for public Air Force Research Institute release: distribution unlimited. ii Contents List of Illustrations v About the Authors vii Foreword xi SECTION 1 THE Prospects for Deterrence IN CYBerspace 1 Introduction: The Evolution of Deterrence 3 Adam Lowther 2 Operationally Responsive Cyberspace: A Critical Piece in the Strategic Deterrence Equation 17 Kevin R. Beeker, Robert F. Mills, Michael R. Grimaila, and Michael W. Haas 3 Deterrence in Cyberspace 37 Kamal T. Jabbour and E. Paul Ratazzi SECTION 2 THE RELEVance of NUCLEAR Deterrence IN THE TWENTY-First CENTURY 4 Why Nuclear Deterrence Is Still Relevant 51 Elbridge A. Colby 5 How Much Is Enough? A Goal-Driven Approach to Defining Key Principles for Measuring the Adequacy of US Strategic Forces 75 Keith B. Payne 6 Tailored Deterrence, Smart Power, and the Long-Term Challenge of Nuclear Proliferation 95 Jonathan Trexel 7 Is a New Focus on Nuclear Weapons Research and Development Necessary? 119 Anne Fitzpatrick iii CONTENTS 8 Mathematical Foundations of Strategic Deterrence 137 Edward H. Robbins, Hunter Hustus, and James A. Blackwell Section 3 NEW ApproacHES TO ConVentional Deterrence 9 Deterring Rogues: Modeling the Intent of Revolutionary State Actors 169 Gary Schaub Jr 10 Deterring Nonstate Actors 195 Adam Lowther 11 Space Strategic Deterrence: Achieving Space Superiority 217 Dale Hayden 12 Unmanned Air Systems and Deterrence 249 James D. Perry Abbreviations 271 Bibliography 273 Index 309 iv CONTENTS Illustrations Figure 1.1 Conflict pyramid 7 2.1 DOJOC model of deterrence 19 2.2 ORS concept 22 2.3 Implementation of the ORS concept 23 2.4 ORC contributes to benefit denial 24 5.1 Requirements for strategic forces 92 6.1 Strategic deterrence model 96 6.2 Long-term deterrence strategies 100 6.3 Strategy options 101 6.4 Campaigning and bargaining 107 6.5 Bargaining early 108 8.1 Depiction of optimization of the linear function for first strike 150 10.1 Deterrence model 199 10.2 National interests 203 10.3 Conflict pyramid 204 10.4 Nonstate actor deterrence model 207 Table 2.1 Comparison of ORS to ORC 25 3.1 USAF strategic imperatives are enabled by nine primary technical capabilities 38 3.2 Cyberspace differs fundamentally from other domains 42 6.1 Long-term deterrence strategy overview 103 v CONTENTS 8.1 Ellsberg’s nuclear warfare incomplete game payoff matrix 139 8.2 Altered model (payoff matrix) of two-player nuclear war 142 8.3 Ellsberg’s incomplete game restated in our context and notation 143 8.4 Tacit formulation of Ellsberg’s game in our context/notation 144 12.1 Manned and unmanned endurance 256 12.2 Hours on station per sortie for manned and unmanned aircraft at a given range 256 12.3 Number of persistent orbits a force of 100 aircraft generates at a given range 257 vi About the Authors Kevin R. Beeker is a US Air Force senior combat pilot in the A/OA-10 and has also completed a joint tour flying F/A-18s with the US Navy. He currently works in the Combat Targeting Division at US Cyber Command, Fort Meade, Maryland. He received his MS degree in cyber warfare from the Air Force Institute of Technology, Wright- Patterson AFB, Ohio. James A. Blackwell is special advisor to the assistant chief of staff, strategic deterrence and nuclear integration, at Headquarters US Air Force. He received his PhD and MALD from the Fletcher School of International Law and Diplomacy and BS from the US Military Academy. He previously served as executive director of the Secretary of Defense Task Force on DOD Nuclear Weapons Management. He co-edited Making Defense Reform Work with Barry Blechman (Brassey’s, 1990) and has authored numerous books and articles. Elbridge A. Colby is a principal analyst at the Center for Naval Anal- ysis, where he advises a number of US government entities on deter- rence and nuclear weapons issues. He previously served in a number of government positions, including the New START negotiations and ratification team for the Department of Defense and as an advisor to the Congressional Strategic Posture Commission. He is a graduate of Harvard College and Yale Law School. Anne Fitzpatrick earned her PhD in science and technology studies from Virginia Tech in 1998. Her research includes high-performance computing and strategic science and technology analyses. She has lived and worked in the former Soviet Union and is fluent in Russian. Michael R. Grimaila is an associate professor of systems engineering at the Air Force Institute of Technology, Wright-Patterson AFB, Ohio. He received his PhD in electrical engineering from Texas A&M University. His research interests include mission assurance, network manage- ment and security, quantum cryptography, and systems engineering. Michael W. Haas is a principal electronics engineer at the 711th Human Performance Wing, Air Force Research Laboratory, Wright- Patterson AFB, Ohio. He received his PhD in engineering and ap- plied science from the University of Southampton, United Kingdom. His research interests include cyberspace operations, information operations, and human interface technology. Dale Hayden is the deputy director of the Air Force Research In- stitute (AFRI). He has authored a number of articles on Air Force vii ABOUT THE AUTHORS topics, with a focus on space issues. Colonel Hayden completed a dis- tinguished Air Force career in 2008 after more than 25 years of ser- vice as a space and missile officer. He holds a PhD in administration of higher education from the University of Alabama. Hunter Hustus is technical advisor to the assistant chief of staff, strategic deterrence and nuclear integration at Headquarters US Air Force. He received his MA in political science from the University of South Dakota. He previously served as foreign policy and congres- sional affairs advisor to US Air Forces in Europe and served as a B-52 electronic warfare officer and NATO staff officer before retiring from active duty. Kamal T. Jabbour is senior scientist for information assurance in the Information Directorate, Air Force Research Laboratory, Rome, New York. He taught and conducted research for two decades on the computer engineering faculty at Syracuse University, including a three-year term as department chair. Dr. Jabbour has received one US patent, published more than 60 papers in refereed journals and con- ference proceedings, and penned 317 articles on running. Adam B. Lowther is a research professor at the AFRI. He is the author of numerous books, chapters, journal articles, and editorials on contemporary defense issues. Before joining AFRI, Dr. Lowther taught international relations and security studies at two universities. He also served in the US Navy at several shipboard and shore com- mands. He holds a PhD in international relations from the University of Alabama. Robert F. Mills is an associate professor of electrical engineering at the Air Force Institute of Technology, Wright-Patterson AFB, Ohio. He received his PhD in electrical engineering from the University of Kansas. His research interests include network management and security, electronic warfare, and systems engineering. James D. Perry holds an MA degree in security policy studies and a PhD in history from George Washington University and was a visit- ing fellow at the Hoover Institution, Stanford University, 1996–97. He is currently a senior analyst for Northrop Grumman Corporation, where he conducts defense policy, operational, and budgetary analyses to support company programs. His particular areas of expertise include long-range strike, unmanned systems, and emerging antiaccess threats to power projection. E. Paul Ratazzi is a principal engineer in the Cyber Assurance Branch of the Air Force Research Laboratory in Rome, New York. His viii ABOUT THE AUTHORS research interests include access control and security for mobile devices and assured cloud computing. He holds BSEE and MS degrees in management from Rensselaer Polytechnic Institute and an MSEE from Syracuse University and is currently a PhD candidate (ABD) in electrical and computer engineering at Syracuse University. Keith B. Payne is the president of the National Institute for Public Policy, a professor and the head of the Graduate Department of De- fense and Strategic Studies, Missouri State University (Washington Campus), the chairman of the US Strategic Command’s Strategy and Policy Panel, the editor-in-chief of Comparative Strategy: An Inter- national Journal, and a co-chair of the US Nuclear Strategy Forum. He has served as the Deputy Assistant Secretary of Defense for Forces Policy.
Recommended publications
  • Deterring and Dissuading Nuclear Terrorism
    Journal of Strategic Security Volume 5 Number 1 Volume 5, No. 1: Spring 2012 Article 6 Deterring and Dissuading Nuclear Terrorism John J. Klein ANSER, [email protected] Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 15-30 Recommended Citation Klein, John J.. "Deterring and Dissuading Nuclear Terrorism." Journal of Strategic Security 5, no. 1 (2012) : 15-30. DOI: http://dx.doi.org/10.5038/1944-0472.5.1.2 Available at: https://scholarcommons.usf.edu/jss/vol5/iss1/6 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Deterring and Dissuading Nuclear Terrorism Abstract While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military repercussions following a nuclear attack.
    [Show full text]
  • Deterrence Theory in the Cyber-Century Lessons from a State-Of-The-Art Literature Review
    Working Paper Research Division EU/Europe Stiftung Wissenschaft und Politik German Institute for International and Security Affairs Annegret Bendiek, Tobias Metzger Deterrence theory in the cyber-century Lessons from a state-of-the-art literature review SWP Working Papers are online publications of SWP’s research divisions which have not been formally reviewed by the Institute. Ludwigkirchplatz 3−4 10719 Berlin Phone +49 30 880 07-0 Fax +49 30 880 07-100 www.swp-berlin.org Working Paper RD EU/Europe, 2015/ 02, May 2015 [email protected] SWP Berlin Table of Contents List of Figures 1 List of Abbreviations 2 Introduction 3 In theory – Deterrence theory and cyberspace 4 Deterrence-by-retaliation and deterrence-by-denial 6 In practice – Suitability of cyber: lessons and implications 7 Key challenges: Credibility and capability to display and use force 7 How to deter? Deterrence-by-denial and deterrence-by- retaliation 9 Determining the type of defence 9 Adding offence to the equation 10 When and whom to deter? Immediate vs. general deterrence and the challenge of attribution 10 What to deter? Narrow vs. broad deterrence 12 For whom? Central vs. extended deterrence 13 Conclusion and outlook 14 Annex 16 Glossary 16 List of References 17 List of Figures Figure 1: Limits to retaliation in cyberspace .................. 9 Figure 2: A possible model of escalation ....................... 11 Figure 3: EEAS figure on a possible inter-ministry division of labour ................................................................. 15 Figure 4: Risk assessment
    [Show full text]
  • The New Calculus of Pre-Emption 53 the New Calculus Of
    The New Calculus of Pre-emption 53 The New Calculus of Pre-emption ○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○ Robert S. Litwak With the publication of its new National Security Strategy document in September 2002, the Bush administration has elevated military pre-emption against ‘rogue states’ and terrorist groups to official US doctrine. Initial press reports characterised that element of the emerging ‘Bush Doctrine’ as the most revolutionary change in American strategy since the forging of US nuclear deterrence policy in the 1950s. Pre-emption was said to be supplanting the outdated Cold War concepts of deterrence and containment. The public presentation of the pre-emption policy generated controversy and apprehension, particularly among America’s European allies. Could unilateral and pre-emptive military action by the United States in the post-11 September era erode international norms governing the use of force? Seeking to allay these concerns, Secretary of State Colin Powell has stressed the continuity of the policy. Pre-emption has long been part of the panoply of American defence instruments, he has asserted, and deterrence is not dead. Officials maintain that although pre-emption has gained heightened status as an understandable response to the advent of qualitatively new threats, such as al-Qaeda, it remains part of a spectrum of means, including non-military instruments, which the United States will continue to employ. Confusion about the meaning of the document was all the more pronounced because the administration was ostensibly unveiling a general doctrine of pre-emption, to be undertaken unilaterally when necessary, just as it was making the specific case for multilateral military action against a state – Iraq – that has been in non-compliance with UN Security Council resolutions for over a decade.
    [Show full text]
  • Nuclear Deterrence in the Information Age?
    SUMMER 2012 Vol. 6, No. 2 Commentary Our Brick Moon William H. Gerstenmaier Chasing Its Tail: Nuclear Deterrence in the Information Age? Stephen J. Cimbala Fiscal Fetters: The Economic Imperatives of National Security in a Time of Austerity Mark Duckenfield Summer 2012 Summer US Extended Deterrence: How Much Strategic Force Is Too Little? David J. Trachtenberg The Common Sense of Small Nuclear Arsenals James Wood Forsyth Jr. Forging an Indian Partnership Capt Craig H. Neuman II, USAF Chief of Staff, US Air Force Gen Norton A. Schwartz Mission Statement Commander, Air Education and Training Command Strategic Studies Quarterly (SSQ) is the senior United States Air Force– Gen Edward A. Rice Jr. sponsored journal fostering intellectual enrichment for national and Commander and President, Air University international security professionals. SSQ provides a forum for critically Lt Gen David S. Fadok examining, informing, and debating national and international security Director, Air Force Research Institute matters. Contributions to SSQ will explore strategic issues of current and Gen John A. Shaud, PhD, USAF, Retired continuing interest to the US Air Force, the larger defense community, and our international partners. Editorial Staff Col W. Michael Guillot, USAF, Retired, Editor CAPT Jerry L. Gantt, USNR, Retired, Content Editor Disclaimer Nedra O. Looney, Prepress Production Manager Betty R. Littlejohn, Editorial Assistant The views and opinions expressed or implied in the SSQ are those of the Sherry C. Terrell, Editorial Assistant authors and should not be construed as carrying the official sanction of Daniel M. Armstrong, Illustrator the United States Air Force, the Department of Defense, Air Education Editorial Advisors and Training Command, Air University, or other agencies or depart- Gen John A.
    [Show full text]
  • Comments by Jon Mark Meeting of Board of Trustees December 13, 2016
    Comments by Jon Mark Meeting of Board of Trustees December 13, 2016 Dr. John Salimbene: It is with great sadness that we note the tragic death of Dr. John Salimbene. As has been publicly reported, Dr. Salimbene died in the fire that occurred in his home on Sunday, December 4, 2016. Many of his neighbors and other Scarsdale residents were his patients and he was fondly remembered by one of them as an old-fashioned town doctor. In addition, for more than half a century, Dr. Salimbene served as Tuckahoe’s village-appointed physician. Earlier this year, the Tuckahoe Police Department honored the doctor for his many years of kind and compassionate service. Here in Scarsdale, this Board and Village staff send our sincere condolences and prayers to the Salimbene family at this difficult time. We ask for a moment of silence in Dr. Salimbene’s memory. Dr. Richard Garwin : On November 22, 2016, President Barack Obama presented Dr. Richard Garwin with the Presidential Medal of Freedom. Dr. Garwin is a long-time resident of the Village. In making that award, the President noted that Dr. Garwin is a polymath physicist who earned a Ph.D. under Enrico Fermi at age 21 and subsequently made pioneering contributions to U.S. defense and intelligence technologies, low-temperature and nuclear physics, detection of gravitational radiation, magnetic resonance imaging (MRI), computer systems, laser printing, and nuclear arms control and nonproliferation. He directed Applied Research at IBM’s Thomas J. Watson Research Center and taught at the University of Chicago, Columbia University, and Harvard University.
    [Show full text]
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • April 06,1882
    .•• 1- r. i ..... i .b* ...... ... i, *>■ « *A H-i \ |7 FARM. GARDEN AND HOUSEHOLD. theological exposition of the matter, and then inquired, “Hut, my man, why did you ask so For this brief facts department suggestions, unusual a question?” "Oh, nothin' answered and experiences are solicited from liousekeep- the innocent we have seen it > rs. farmers and gardeners. Aildress Agri- Dick, "only stamp- cultural editor. Journal Office, Belfast Maine.] ed on these sheets of hard tack, and were curi- ous to know why it was there.” At this point A New Industry. the listeners all exploded with laughter, the I luring the past two years a new in- Chaplain saw ttiat lie was sold, and walked dustry has been introduced into the rapidly away. State, one which we believe has come to But of all the “shining lights,” or men pos- stay and which will prove of value to sessing remarkable qualities, in company II, it both the manufacturers and the farmers. is safe to say that our company cook ranked ail 1 allude to the Facto- Evaporated Apple others. He is living now, and if lie reads these one of the two ries, already established, lines I know he will forgive the description I located at East Baldwin, on the Portland Seasonable Advice. Miss Lollipop’s Housekeeping. dishes if they would have “I must see Huldali!” he said, thought- Longfellow. Sketches of Army Life. give of him, and also thank me for revelatious \ R. li., I visited and accomplished Ogdensburg lay such wonderful She was and was Farmer" in the Boston Jour-j Little Miss Lollipop thought she must help things.
    [Show full text]
  • Kahn Used the Metaphor of an 'Escalation Ladder'
    Preventing Nuclear Use: Internationally-Controlled Theater Missile Defenses Among Non- Super-Arsenal States1 Carolyn C. James, PhD University of Missouri, Columbia INTRODUCTION The current debates over missile defenses in the United States all have a common aspect - the systems are meant to provide a defense for US territory, allies, or troops abroad.2 This article proposes a different view with significant security potential. Specifically, theater missile defenses (TMD) should be considered as an international tool to prevent nuclear weapons use among proliferated states.3 Internationally-controlled TMD placed at potential flash points could prevent conflicts and crises from escalating to nuclear levels. These areas include borders with so-called “rogue” states, such as North Korea, Iran and Iraq, all of whom have seemingly aggressive ballistic missile programs and are embroiled in protracted conflicts with their neighbors.4 Similar to the goal of peacekeeping, reducing and limiting conflict in regions such as the Middle East clearly is in the US national interest. How, then, can nuclear use be prevented? Currently, there are seven declared nuclear weapon states (US, Russia, China, Great Britain, France, Pakistan, India), one non-declared “opaque” nuclear weapon state (Israel), and several states with known or suspected nuclear aspirations (including Iran, Iraq, North Korea, Libya and Taiwan). Two of these, the US and Russia, have established a legacy of Cold War deterrence policies. Nuclear deterrence, in particular, has been credited with maintaining crisis stability during those years.5 Today, a major debate in the field of security studies surrounds the question: Does nuclear deterrence really work? A common failure in most of these discussions about successful deterrence and avoiding nuclear use is the lack of distinction among nuclear force levels.6 The debate tends to be clarified by asking whether it was nuclear weapons, or mutual assured destruction (MAD), that kept the Cold War cold.
    [Show full text]
  • A Cryogenic Telescope for Far-Infrared Astrophysics: a Vision for NASA in the 2020 Decade a White Paper Submitted to NASA’S Cosmic Origins Program Office
    A Cryogenic Telescope for Far-Infrared Astrophysics: A Vision for NASA in the 2020 Decade A white paper submitted to NASA’s Cosmic Origins Program Office 1,2 1 4 2,3 3,1 2 C.M. Bradford ∗ , P.F. Goldsmith , A. Bolatto , L. Armus , J. Bauer , P. Appleton , A. Cooray5,2, C. Casey5, D. Dale6, B. Uzgil7,2, J. Aguirre7, J.D. Smith8, K. Sheth10, E.J. Murphy3, C. McKenney1,2, W. Holmes1, M. Rizzo9, E. Bergin11 and G. Stacey12 1Jet Propulsion Laboratory 2California Institute of Technology 3Infrared Processing and Analysis Center, Caltech 4University of Maryland 5University of California, Irvine 6University of Wyoming 7University of Pennsylvania 8University of Toledo 9Goddard Space Flight Center 10NRAO, Charlottesville 11University of Michigan 12Cornell University May 7, 2015 Abstract Many of the transformative processes in the Universe have taken place in regions obscured by dust, and are best studied with far-IR spectroscopy. We present the Cryogenic-Aperture Large Infrared-Submillimeter Telescope Observatory (CALISTO), a 5-meter class, space-borne telescope actively cooled to T 4 K, emphasizing moderate-resolution spec- ∼ troscopy in the crucial 35 to 600 µm band. CALISTO will enable NASA and the world to study the rise of heavy elements in the Universe’s first billion years, chart star formation and black hole growth in dust-obscured galaxies through cosmic time, and conduct a census of forming planetary systems in our region of the Galaxy. CALISTO will capitalize on rapid progress in both format and sensitivity of far-IR detectors. Arrays with a total count of a few arXiv:1505.05551v1 [astro-ph.IM] 20 May 2015 105 detector pixels will form the heart of a suite of imaging spectrometers in which each detector reaches the photon × background limit.
    [Show full text]
  • The Rise and Decline of Rogue States
    The Rise and Decline of Rogue States THOMAS H. HENRIKSEN ____________________________________ “While rogue powers have emerged throughout history, their re-appearance on the international scene was greeted with surprise in political circles in the aftermath of the Soviet collapse. The Cold War’s familiar pattern of dual superpower relations left Western policymakers ill-prepared for the menacing misconduct of unpredictable regimes, which have been seemingly beyond the influence of leading states.” ____________________________________ ince time immemorial there have been polities that have stood outside the international community. For centuries, rogue Sentities have flouted the rules imposed by major states or imperial structures to attain their ends. As in modern times, they rose to assault the status quo but then fell either to defeat or to clientage of a stronger power. In the modern context, rogue states show contempt for international norms by repressing their own populations, promoting international terrorism, seeking weapons of mass destruction and standing outside the global community. If these states approach clientage or a loose affiliation with a Great Power or even a stronger regional player, they lose one vital rogue quality and move toward a more traditional proxy relationship of a vulnerable state under a patron power. Examining the rich historical role rogues have played throughout the ages can help advance our understanding of their contemporary counterparts. However, this does not imply that today’s rogues are exact historical analogs to their ancient cousins. Rather, they are forces that share a number of common traits and typically disrupt an established order. —————————————— Journal of International Affairs, Spring 2001, 54, no.
    [Show full text]
  • Applying Traditional Military Principles to Cyber Warfare
    2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].
    [Show full text]
  • Omnicide “Here Is What We Now Know: the United States and Russia Each Have an Actual Doomsday Machine.”
    Omnicide “Here is what we now know: the United States and Russia each have an actual Doomsday Machine.” By Daniel Ellsberg From The Doomsday Machine, published by Bloomsbury. The book is an account of America’s nuclear program in the 1960s drawn from Ellsberg’s experience as a consultant to the Department of Defense and the White House, drafting Secretary Robert McNamara’s plans for nuclear war. Ellsberg is the author of Secrets, a book about his experiences leaking the Pentagon Papers. At the conclusion of his 1964 film, Dr. Strangelove, Stanley Kubrick introduced the concept of a “Doomsday Machine”—designed by the Soviet Union to deter nuclear attack against the country by automating the destruction of all human life as a response to such an attack. The movie’s Russian leader had installed the system before revealing it to the world, however, and it was now being triggered by a single nuclear explosion from an American B-52 sent off by a rogue commander without presidential authorization. Kubrick had borrowed the name and the concept of the Doomsday machine from my former colleague Herman Kahn, a Rand physicist with whom he had discussed it. In his 1960 book On Thermonuclear War, Kahn wrote that he would be able to design such a device. It could be produced within ten years and would be relatively cheap— since it could be placed in one’s own country or in the ocean. It would not depend on sending warheads halfway around the world. But, he said, the machine was obviously undesirable. It would be too difficult to control— too inflexible and automatic—and its failure “kills too many people”— everyone, in fact, an outcome that the philosopher John Somerville later termed “omnicide.” Kahn was sure in 1961 that no such system had been built, nor would it be, by either the United States or the Soviet Union.
    [Show full text]