Deterrence by Punishment
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Deterring and Dissuading Nuclear Terrorism
Journal of Strategic Security Volume 5 Number 1 Volume 5, No. 1: Spring 2012 Article 6 Deterring and Dissuading Nuclear Terrorism John J. Klein ANSER, [email protected] Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 15-30 Recommended Citation Klein, John J.. "Deterring and Dissuading Nuclear Terrorism." Journal of Strategic Security 5, no. 1 (2012) : 15-30. DOI: http://dx.doi.org/10.5038/1944-0472.5.1.2 Available at: https://scholarcommons.usf.edu/jss/vol5/iss1/6 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Deterring and Dissuading Nuclear Terrorism Abstract While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military repercussions following a nuclear attack. -
Deterrence Theory in the Cyber-Century Lessons from a State-Of-The-Art Literature Review
Working Paper Research Division EU/Europe Stiftung Wissenschaft und Politik German Institute for International and Security Affairs Annegret Bendiek, Tobias Metzger Deterrence theory in the cyber-century Lessons from a state-of-the-art literature review SWP Working Papers are online publications of SWP’s research divisions which have not been formally reviewed by the Institute. Ludwigkirchplatz 3−4 10719 Berlin Phone +49 30 880 07-0 Fax +49 30 880 07-100 www.swp-berlin.org Working Paper RD EU/Europe, 2015/ 02, May 2015 [email protected] SWP Berlin Table of Contents List of Figures 1 List of Abbreviations 2 Introduction 3 In theory – Deterrence theory and cyberspace 4 Deterrence-by-retaliation and deterrence-by-denial 6 In practice – Suitability of cyber: lessons and implications 7 Key challenges: Credibility and capability to display and use force 7 How to deter? Deterrence-by-denial and deterrence-by- retaliation 9 Determining the type of defence 9 Adding offence to the equation 10 When and whom to deter? Immediate vs. general deterrence and the challenge of attribution 10 What to deter? Narrow vs. broad deterrence 12 For whom? Central vs. extended deterrence 13 Conclusion and outlook 14 Annex 16 Glossary 16 List of References 17 List of Figures Figure 1: Limits to retaliation in cyberspace .................. 9 Figure 2: A possible model of escalation ....................... 11 Figure 3: EEAS figure on a possible inter-ministry division of labour ................................................................. 15 Figure 4: Risk assessment -
Essays on Equilibrium Asset Pricing and Investments
Institute of Fisher Center for Business and Real Estate and Economic Research Urban Economics PROGRAM ON HOUSING AND URBAN POLICY DISSERTATION AND THESIS SERIES DISSERTATION NO. D07-001 ESSAYS ON EQUILIBRIUM ASSET PRICING AND INVESTMENTS By Jiro Yoshida Spring 2007 These papers are preliminary in nature: their purpose is to stimulate discussion and comment. Therefore, they are not to be cited or quoted in any publication without the express permission of the author. UNIVERSITY OF CALIFORNIA, BERKELEY Essays on Equilibrium Asset Pricing and Investments by Jiro Yoshida B.Eng. (The University of Tokyo) 1992 M.S. (Massachusetts Institute of Technology) 1999 M.S. (University of California, Berkeley) 2005 A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Business Administration in the GRADUATE DIVISION of the UNIVERSITY OF CALIFORNIA, BERKELEY Committee in charge: Professor John Quigley, Chair Professor Dwight Ja¤ee Professor Richard Stanton Professor Adam Szeidl Spring 2007 The dissertation of Jiro Yoshida is approved: Chair Date Date Date Date University of California, Berkeley Spring 2007 Essays on Equilibrium Asset Pricing and Investments Copyright 2007 by Jiro Yoshida 1 Abstract Essays on Equilibrium Asset Pricing and Investments by Jiro Yoshida Doctor of Philosophy in Business Administration University of California, Berkeley Professor John Quigley, Chair Asset prices have tremendous impacts on economic decision-making. While substantial progress has been made in research on …nancial asset prices, we have a quite limited un- derstanding of the equilibrium prices of broader asset classes. This dissertation contributes to the understanding of properties of asset prices for broad asset classes, with particular attention on asset supply. -
Course Syllabus
The University of Oklahoma College of Continuing Education Advanced Programs – Course Syllabus Course Title: National Security Leadership Course Number: IAS 5940-108 Course Description: National Security Leadership is a course designed to focus the student both on the policy process and its substance. To that end, we will look at how the national security policymaking process developed from the National Security Act of 1947 through the Goldwater-Nichols DOD Reorganization Act of 1986 to the present. This will entail a thorough examination of the US interagency process both in theory and how it works in practice. In terms of substance, we will consider the products beginning with NSC 68 and continuing up to the current National Security Strategy of the United States. We will also examine a series of case studies beginning with the 1989 invasion of Panama up to and including the current conflicts in Iraq and Afghanistan. In this regard, we will pay particular attention to the Iraq situation from 2006 to the present with a hard look at the “surge” strategy and how it came into being. As a counterpoint to the major cases we will consider the variety of “low intensity” national security conflicts that have involved the US since the end of World War II. The culminating exercise of the course will be a day long crisis action simulation that will take place in real time. Class Dates, Location and Hours: Dates: August 14 – 20, 2017 Location: Hurlburt Field, Florida. Class will be held in Bldg. 90220, 221 Lukasik Ave. Hours: Monday - Friday 6:00 p.m.-9:30 p.m.; Saturday 8:00 a.m.-4:30 p.m.; Sunday 8:00 a.m.-12:00 p.m. -
Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government. -
Security Studies
SECURITY STUDIES POSTGRADUATE CERTIFICATE POSTGRADUATE DIPLOMA MASTER OF SCIENCE INVESTIGATING THE KEY ISSUES AND EMERGING PARADIGMS OF SECURITY, INTELLIGENCE ANALYSIS AND CRIMINOLOGY AT LOCAL, NATIONAL AND INTERNATIONAL LEVELS In Partnership with www.security-studies.com [email protected] UK +44 (0)20 7017 4483 INTRODUCTION Dear Prospective Student, Security is one of the fastest growing areas of concern in the academic, corporate and public domains. This is due not only to the threats of war and terrorism but also issues related to crime, safety, global strategy and political upheaval. More than ever before, national governments, international agencies and major corporations recognise the need for personnel with a strong grasp of intelligence and security issues who can also demonstrate exceptional skills of research and analysis. This postgraduate Security Studies programme will give you a solid understanding of the many problems facing the international community today, with flexible study options of a PGCert, PGDip and MSc. The programme examines key themes and debates shaping the concepts of security and security studies. It addresses critical areas of contemporary concern within security studies, covering issues stretching from foreign policy through to the role of radicalisation in international politics to the evolving dangers of financial crime all within and including the background of the cyber or digital dimension. The Security Studies programme will not only equip you to analyse these types of problems but will also help you to place them in the context of broader military, strategic and political considerations. You will gain a solid academic grounding in criminology, terrorism studies and intelligence studies. -
Experimental Game Theory and Its Application in Sociology and Political Science
Journal of Applied Mathematics Experimental Game Theory and Its Application in Sociology and Political Science Guest Editors: Arthur Schram, Vincent Buskens, Klarita Gërxhani, and Jens Großer Experimental Game Theory and Its Application in Sociology and Political Science Journal of Applied Mathematics Experimental Game Theory and Its Application in Sociology and Political Science Guest Editors: Arthur Schram, Vincent Buskens, Klarita Gërxhani, and Jens Großer Copyright © òýÔ Hindawi Publishing Corporation. All rights reserved. is is a special issue published in “Journal of Applied Mathematics.” All articles are open access articles distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Editorial Board Saeid Abbasbandy, Iran Song Cen, China Urmila Diwekar, USA Mina B. Abd-El-Malek, Egypt Tai-Ping Chang, Taiwan Vit Dolejsi, Czech Republic Mohamed A. Abdou, Egypt Shih-sen Chang, China BoQing Dong, China Subhas Abel, India Wei-Der Chang, Taiwan Rodrigo W. dos Santos, Brazil Janos Abonyi, Hungary Shuenn-Yih Chang, Taiwan Wenbin Dou, China Sergei Alexandrov, Russia Kripasindhu Chaudhuri, India Rafael Escarela-Perez, Mexico M. Montaz Ali, South Africa Yuming Chen, Canada Magdy A. Ezzat, Egypt Mohammad R, Aliha, Iran Jianbing Chen, China Meng Fan, China Carlos J. S. Alves, Portugal Xinkai Chen, Japan Ya Ping Fang, China Mohamad Alwash, USA Rushan Chen, China István Faragó, Hungary Gholam R. Amin, Oman Ke Chen, UK Didier Felbacq, France Igor Andrianov, Germany Zhang Chen, China Ricardo Femat, Mexico Boris Andrievsky, Russia Zhi-Zhong Chen, Japan Antonio J. M. Ferreira, Portugal Whye-Teong Ang, Singapore Ru-Dong Chen, China George Fikioris, Greece Abul-Fazal M. -
What About Peacekeepers? Deterring Attacks Against Humanitarian Workers
What about Peacekeepers? Deterring Attacks against Humanitarian Workers Marcellina Priadi Uppsala University Department of Peace & Conflict Research Master Thesis Summer 2017 Word Count: 18,208 Abstract This thesis seeks to understand the phenomenon of attacks against humanitarian workers by asking: why are humanitarian workers attacked in some contexts, but not in others? By exploring the effects of deterrence as a security strategy, this thesis investigates the direct link between causes of attacks against humanitarian workers and humanitarian security. It argues that when humanitarian organisations involve peacekeepers directly in their humanitarian relief activities, this is likely to lead to a decrease in attacks. This is because peacekeepers are armed and able to function as a capable and credible counterthreat against belligerents for humanitarian organisations. A game- like theoretic model of the decision-making sequence leading up to attacks in the humanitarian space is applied to illustrate this. The theoretical argument is tested quantitatively on freshly collated data on peacekeeping activities using a negative binomial count model. Unexpectedly however, the results reveal a contradictory relationship to the hypothesis. Directly involving peacekeepers in humanitarian relief activities is associated with an increase in attacks against humanitarian workers. The surprising results are found to be significant and robust overall. 2 Acknowledgements I would like to take the opportunity to thank everyone that has assisted and supported me throughout this research process. To my classmates, for the camaraderie we have shared during this time and the immeasurable ways they have helped me to grow. To my teachers, who have challenged my thoughts and built the foundation for this thesis. -
Deterrence? What About Dissuasion? by MAJ Lim Guang He
Deterrence? What About Dissuasion? By MAJ Lim Guang He February 2020 Deterrence? What About Dissuasion? DETERRENCE? WHAT ABOUT DISSUASION? By MAJ Lim Guang He ABSTRACT In this essay, the author is not attempting to redefine deterrence but to encourage readers to consider the notion of acting before deterrence—through dissuasion. So what constitutes dissuasion and why consider it? The author feels that similar to deterrence, there is no direct answer as each country has its own set of unique security challenges and capabilities. Furthermore, the issue is made more complex as nuclear powers and non-nuclear powers employ different strategies. So, in this essay, the author attempts to: (1) elucidate the limitations of deterrence theory, (2) establish a coherent trend of elements that help define the concept of dissuasion, and (3) adapt them to the Singapore Armed Forces (SAF)’s defence policy. He first begins by analysing the limitations of classical (rational) deterrence theory and its modern derivatives in the security landscape of tomorrow. He then explores the interpretations of dissuasion today and how they can be applied. Finally, the author develops what dissuasion as a strategic concept means for Singapore and how the SAF can meld dissuasion into deterrence thinking. Keywords: Deterrence; Dissuasion; Asymmetric; Hybrid Warfare; Adversaries INTRODUCTION deterrence itself: is the SAF too entrenched in its Deterrence—a word that appears in almost every deterrence philosophy to think outside of deterrence? Is contemporary defence doctrine—including Singapore’s deterrence a sacred cow that contemporary defence ‘twin pillars of deterrence and diplomacy.’1 However, thinking must always link back to? Instead of arguing the original premise of nuclear capability and/or military the evolution of deterrence further and further away superiority as the backbone of deterrence has steadily from its conceptual roots, why not argue for a eroded into the 21st Century. -
Coalitional Stochastic Stability in Games, Networks and Markets
Coalitional stochastic stability in games, networks and markets Ryoji Sawa∗ Department of Economics, University of Wisconsin-Madison November 24, 2011 Abstract This paper examines a dynamic process of unilateral and joint deviations of agents and the resulting stochastic evolution of social conventions in a class of interactions that includes normal form games, network formation games, and simple exchange economies. Over time agents unilater- ally and jointly revise their strategies based on the improvements that the new strategy profile offers them. In addition to the optimization process, there are persistent random shocks on agents utility that potentially lead to switching to suboptimal strategies. Under a logit specification of choice prob- abilities, we characterize the set of states that will be observed in the long-run as noise vanishes. We apply these results to examples including certain potential games and network formation games, as well as to the formation of free trade agreements across countries. Keywords: Logit-response dynamics; Coalitions; Stochastic stability; Network formation. JEL Classification Numbers: C72, C73. ∗Address: 1180 Observatory Drive, Madison, WI 53706-1393, United States., telephone: 1-608-262-0200, e-mail: [email protected]. The author is grateful to William Sandholm, Marzena Rostek and Marek Weretka for their advice and sugges- tions. The author also thanks seminar participants at University of Wisconsin-Madison for their comments and suggestions. 1 1 Introduction Our economic and social life is often conducted within a group of agents, such as people, firms or countries. For example, firms may form an R & D alliances and found a joint research venture rather than independently conducting R & D. -
Department of Security Studies 1
Department of Security Studies 1 DEPARTMENT OF SECURITY STUDIES About Chair: Nadav Morag ([email protected]) Contact Information: (936) 294-1646; Vivian Carlson ([email protected]) Website: Department of Security Studies (http://www.shsu.edu/academics/criminal-justice/departments/security-studies/) Mission Homeland Security (HS) is an emerging and evolving discipline that continues to have a significant impact on the public and private sectors. Terrorism, natural disasters, cyber-attacks against critical infrastructures, public health emergencies, and large-scale organized crime, and similar issues all present challenges in terms of the ability of society, the economy, and the government to function when such events occur. Moreover, despite the fact that these are very different types of threats, they will require many of the same tools in order to cope with them. For example, prevention of terrorism and prevention of cyber-attacks require that law enforcement and intelligence agencies cooperate, share information, and design integrated strategies to track down and apprehend such threats domestically (or in concert with the military when the threat is based overseas). Similarly, critical infrastructure targets and industries must share information and engage in joint planning across their respective industries, with governmental authorities. This same type of information-sharing and joint planning is important in preparing for, and responding to, natural disasters such as Hurricane Harvey and environmental disasters such as Deepwater Horizon. -
International Security Studies After the Cold War: an Agenda for the Future
INTERNATIONAL SECURITY STUDIES AFTER THE COLD WAR: AN AGENDA FOR THE FUTURE SEAN M. LYNN-JONES 91-11 DECEMBER 1991 CITATION AND REPRODUCTION This document appears as Discussion Paper 91-11 of the Center for Science and International Affairs. CSIA Discussion papers are works in progress. Comments are welcome and may be directed to the author in care of the Center. This paper may be cited as: Sean M. Lynn-Jones, International Security Studies after the Cold War: An Agenda for the Future. CSIA Discussion Paper 91-11, Kennedy School of Government, Harvard University, December 1991. The views expressed in this paper are those of the authors and publication does not imply their endorsement by CSIA and Harvard University. This paper may be reproduced for personal and classroom use. Any other reproduction is not permitted without written permission of the Center for Science and International Affairs, Publications, 79 JFK Street, Cambridge, MA 02138, telephone (617) 495-3745 or telefax (617) 495-5776. Introduction* The field of international security studies has always examined important public policy problems, and its scholars and analysts often have been drawn to prominent current issues. At the dawn of the atomic age, scholars tried to understand the implications of "the absolute weapon" for the United States and the world. In the 1950s, the thermonuclear revolution led to an explosion of work on deterrence theory and the conundrum of how to make the hydrogen bomb militarily and politically useful. In the 1970s, the Vietnam War and U.S.-Soviet détente reduced interest in military questions. Later in that decade strategic parity prompted increased attention to problems of conventional deterrence and defense.