Architecture in the Era of Terror: the Security Dilemma

Total Page:16

File Type:pdf, Size:1020Kb

Architecture in the Era of Terror: the Security Dilemma Safety and Security Engineering 805 Architecture in the era of terror: the security dilemma G. Zilbershtein Department of Architecture, Texas A&M University, U.S.A. Abstract The growing public concern over the proliferation of terrorism has made protection of the physical environment of potential targets and terror interdiction a salient issue. The objective to secure the built environment against terrorism introduces a complex dilemma. At one level, the extent of investments in security in terms of cost-effectiveness is not proportional to the relatively rare threat of terrorism. Another level of the dilemma is rooted in the complex psychological implications of using security measures, that is, how to physically secure a building, while psychologically deter potential terrorists; more importantly is the question of how to accomplish those and yet not scare the users, i.e., the public. The latter part of the dilemma has been relatively ignored in the analysis of architectural measures against terrorism. And since catering to the psychological comfort of the users of the built environment has always been one of the greatest challenges of architecture, this paper focuses on that portion of the security dilemma of terrorism. Specifically, the study examines the threat characteristics and analyzes design recommendations that address the threat of terror for their contribution to the psychological comfort of the end users. Keywords: architecture, built environment, terrorism, risk assessment, security perception, security measures, design recommendations. 1 Introduction The post–cold war, as defined by John Lewis Gaddis [1], began with the collapse of one structure, the Berlin wall on November 9, 1989, and ended with the collapse of another, the World Trade Center on September 11, 2001. Paul Bracken [2] describes this new age as the era of “think the unthinkable”, as it has become a common term in thinking of our life in a terror stricken environment. WIT Transactions on The Built Environment, Vol 82, © 2005 WIT Press www.witpress.com, ISSN 1743-3509 (on-line) 806 Safety and Security Engineering How far should society, and designers of environments, take this slogan? How do we assess the risks and accommodate our design approach to it, when the entire concept of buildings as our shelters is questioned? How can design deal/work against the physical and the psychological threats of terror? Launching the discussion, we need to consider what terrorism is, and what measures are taken to counter this threat. While there is no single, universally accepted, definition to terrorism and whether it is perceived as a righteous fight for a higher cause, or as an unlawful horrible act, according to all, it is associated with the “use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof” [3]. Counter-terrorism includes operations on different levels. Central to this paper that focuses on the built environment as it relates to the threat of terror, are efforts to secure potential targets and threat interdiction. These correspond to one of the greatest challenges of the design realm: to provide the users of the built environment with physically and psychologically comfortable designs [6, 7, 8]. The two aspects of comfort are inherently associated with security [8]. Consequently, this paper provides a first step towards a better understanding of the nexus: terrorism threat - physical environment - users of the environment. This is accomplished through a rational assessment of risks; and a review of existing counter-terrorism design policies/measures to physically secure a place, while analysing their relevance to the psychological comfort of the end users. 2 Assessing the risk 2.1 General Fulfilling the architecture profession’s objective to protect people and property from various offenses requires a development of an introspective definition of specific security needs. Many sources refer to the analysis by which security needs are defined as a risk assessment. Risk assessment examines the consequences of hostile actions for a building and its occupants. It consists of: (1) threat analysis which defines the level of threat to a facility by evaluating the intent, motivation, and possible tactics of potential offenders; (2) asset analysis that identifies and prioritizes the asset to be protected according to its nature, value, location and how, when, and by whom it is accessed and used; (3) vulnerability analysis which defines the weaknesses of a facility in its design, construction, operation and location [9]. Over the years, computer applications have been integrated into the risk assessment analysis (e.g., CAPIndex). Such applications calculate probability assessment as related to statistics of specific categories of crime, based on location and use of the architectural item [10]. 2.2 The risk of terrorism In the case of terrorism, assessment of risk is an intricate matter. While it seems that the media covers terror attacks around the globe on a daily basis, the actual number of occurrences is too limited to reach a significant numerical probability WIT Transactions on The Built Environment, Vol 82, © 2005 WIT Press www.witpress.com, ISSN 1743-3509 (on-line) Safety and Security Engineering 807 for a place [10]. Inevitably, current statistics of terrorism patterns are only supporters to theoretical risk assessment endeavors. A theoretical testing of the three basic components of terrorism risk assessment is presented. 2.2.1 Threat analysis Many sources present different views on terrorists’ motivation. It is not for this paper to speculate or judge whether terrorism is means to an end, utilized for achieving other political, social or religious goals [5], or whether it has become “the end in itself” [3]. The discussion however, does point out two main issues. First, as recognized by many around the world, terrorism is associated with fear or instigation of it. Empirical evidence attests that terrorism is one of the most dreaded man-made hazards [11]. Second, the lethality of terrorism attacks has grown. Statistics from the last 20 years show that while the number of attacks decreased over the years, they have become more lethal [4, 12]. Terrorism can be manifested in different forms: assassination, armed assault, hijacking, hostage-taking, bombings, product or air contamination and cyber- terrorism [5, 12]. Many of these involve the incursion of armed terrorists into a target. Most common terrorism acts are bombings [13]. These involve the use of explosives that are relatively easy to obtain, or by utilizing whatever destructive means are available as incendiary devices (e.g., using airplanes as missiles in September 11) [13, 14]. Besides being destructive, and relatively easy to carry through, bombing events also appeal to terrorists due to their theatrical nature. The extensive media coverage of events with bleeding casualties and severely damaged environments serves two interrelated purposes: demonstrating power over authorities and inducing fear in the population [14]. Despite of past tendencies to use conventional weapons [12], the risks of chemical, biological, radiological or nuclear (CBRN) attacks are not to be dismissed [4, 14]. Multiple simultaneous attacks or sequential attacks in a concentrated area also need to be addressed. Another factor to consider is the growing number of suicide missions [12, 14]. This may have an impact on tactics of defense in the built environment. Theories such as defensible space, Crime Prevention through Environmental Design, CPTED [15, 16, 17], were developed to address threats of conventional crime. These theories, which rely on deterrence by raising the probability of perpetrator to be caught in action, need to be re-evaluated as terrorists may not fear death. Moreover, even if terrorists are prevented from reaching their ultimate target, the space where they are stopped may suffer the hit. 2.2.2 Asset analysis It is almost impossible to develop a comprehensive list of potential terrorism targets, as in today’s urban environment target selection is nearly unlimited. Yet, the presumed intention of terrorism to maximize destruction suggests traits of possible targets: facilities which possess symbolic value, those that if damaged would provoke anxiety/fear among the population, would disturb the economy, or infrastructure; and those which offer the possibility of a Mass Casualty Incident – MCI [5, 18, 19]. Using September 11 terrorist attacks in the US as a case study, we find that the target fits most of these traits: devastating damage to the physical environment and to human lives in a place of symbolic and WIT Transactions on The Built Environment, Vol 82, © 2005 WIT Press www.witpress.com, ISSN 1743-3509 (on-line) 808 Safety and Security Engineering economic significance. However, sources contend that despite that attack fear does not dominate Americans’ lives -- people feel comfortable and safe enough to continue everyday activities without much consideration of possible terrorist attacks [20]. The terrorists’ failure in that respect may suggest that in the future, terrorist organizations will attempt to hit places where every American may happen to be during daily activities. The latter assumption is supported by what has been the case in other parts of the world (e.g., in Europe, in the Middle East). Consequently, most probable future targets are places which present opportunity of MCI and great destruction
Recommended publications
  • Coping with the Security Dilemma: a Fundamental Ambiguity of State Behaviour Andras Szalai Central European University
    Volume 2 (2), 2009 AMBIGUITIES Coping with the Security Dilemma: A Fundamental Ambiguity of State Behaviour Andras Szalai Central European University Abstract he wording of international treaties, the language and actions of statesmen are often T ambiguous, even controversial. But there is a different, more fundamental ambiguity underlying international relations; one that is independent of human nature or the cognitive limitations of decision makers but instead results from the correct adjustment of state behaviour to the uncertainties of an anarchical international system. Due to the anarchical nature of the international system — the lack of a sovereign — states can only rely on their own strength for self-defence. But self-protection often threatens other states. If a state purchases armaments, even if it claims not to have aggressive intents, there is no sovereign to enforce these commitments and there is no way of being certain that the purchasing state is telling the truth, or that it will not develop such intents in the future. The so- called security dilemma has a number of effects on state behaviour. First, states often worry about implausible threats (see e.g. British defence plans against a possible French invasion in the 1930s) and/or get caught in arms races. Second, states develop an inherent mistrust in the language of the other, requiring commitments to be firm and unambiguous in order to be credible, since ambiguity invites conflicts and renders cooperation more difficult. Still, on the one hand, instead of a world of constant mistrust, we register instances of institutionalized inter-state cooperation. On the other hand, states often choose to make commitments that are deliberately ambiguous and outperform more transparent commitments.
    [Show full text]
  • Correspondence Ronan Tse-Min Fu David James Gill Eric Hundman
    Correspondence: Looking for Asia’s Security Dilemma Correspondence Ronan Tse-min Fu David James Gill Looking for Asia’s Security Dilemma Eric Hundman Adam P. Liff and G. John Ikenberry To the Editors (Ronan Tse-min Fu writes): In “Racing toward Tragedy? China’s Rise, Military Competition in the Asia Paciªc, and the Security Dilemma,” Adam Liff and John Ikenberry claim that “a number of recent developments suggest that the region is ripe for, or may already be experiencing, severe security dilemma–driven dynamics, even arms races.”1 They portray China’s rise as the main cause of this dilemma and assert that states must adopt measures to reduce mili- tary competition in the region while they still can. I applaud Liff and Ikenberry for the policy relevance of their research, but their fun- damental claim about the prevalence of severe military competition in the Asia Paciªc region does not match the empirical reality. The real puzzle is why over the last thirty years Asian countries have shown a surprising lack of interest in boosting their military expenditures in response to China’s massive increases, whether these expenditures are measured in absolute or proportional terms, and whether they are measured over the past generation or the last few years. is there “severe military competition” in the asia paciªc? Liff and Ikenberry ground their analysis in the empirical observation that Asia might already be engaged in severe military competition, but they never deªne what they mean by “military competition” (pp. 65–82). They imply that such competition exists when parties seek to enhance their military capabilities in response to an external threat (p.
    [Show full text]
  • When Are Arms Races Dangerous? When Are Arms Races Charles L
    When Are Arms Races Dangerous? When Are Arms Races Charles L. Glaser Dangerous? Rational versus Suboptimal Arming Are arms races dan- gerous? This basic international relations question has received extensive at- tention.1 A large quantitative empirical literature addresses the consequences of arms races by focusing on whether they correlate with war, but remains divided on the answer.2 The theoretical literature falls into opposing camps: (1) arms races are driven by the security dilemma, are explained by the rational spiral model, and decrease security, or (2) arms races are driven by revisionist adversaries, explained by the deterrence model, and increase security.3 These Charles L. Glaser is a Professor in the Irving B. Harris Graduate School of Public Policy Studies at the Uni- versity of Chicago. For their helpful comments on earlier drafts of this article, the author would like to thank James Fearon, Michael Freeman, Lloyd Gruber, Chaim Kaufmann, John Schuessler, Stephen Walt, the anonymous reviewers for International Security, and participants in seminars at the Program on In- ternational Security Policy at the University of Chicago, the Program on International Political Economy and Security at the University of Chicago, the John M. Olin Institute at Harvard Univer- sity, and the Institute of War and Peace Studies at Columbia. He also thanks John Schuessler for valuable research assistance. 1. The pioneering study is Samuel P. Huntington, “Arms Races: Prerequisites and Results,” Public Policy, Vol. 8 (1958), pp. 41–86. Historical treatments include Paul Kennedy, “Arms-Races and the Causes of War, 1850–1945,” in Kennedy, Strategy and Diplomacy, 1870–1945 (London: George Allen and Unwin, 1983); and Grant T.
    [Show full text]
  • Security Debates and Alliance Against Terrorism Ramazan Erdağ
    ALTERNATIVES: Turkish Journal of International Relations Vol.9, No.4, 133-148, Winter 2010 Security Debates and Alliance against Terrorism Ramazan Erda ğ* Abstract This article searches the answer that how security could be defined, what the new security studies are and what can be done against global terrorism and how can be assured peace and stability condition? In this context, with new security disputes and perspectives it can be said that security is not an alone issue, it’s a collective study and mostly claimed as dilemma. It also can be said that in the new era more international collaboration and alliance are need to supply international security. In this regard this article expounds global alliances’ effectiveness -especially NATO- for global security. Key words : security, terrorism, alliance, cooperation and NATO * PhD Candidate, Sakarya University, Department of International Relations, Sakarya, TÜRK İYE, [email protected] 134 Ramazan Erda ğ Introduction During Cold War world lived two super power’s competition and armament race. Under this two-pole construction states had to take one side in order to survive. This era’s security concept based on nuclear threats. Classical security threats ad armament were basic arguments. 1 State had to be strong and provide security via military force. In the nation-state process this argument was the main concern of the states. But the end of the cold war changed this paradigm. Dissolving of Soviet Union finished the bipolar era and this changed not only world order but also threat perceptions. When new states gained independency against Soviet Union new security matters appeared in the Caucasus and East Europe.
    [Show full text]
  • The Rise of Cyber Warfare: the Digital Age and American Decline
    The Rise of Cyber Warfare The Digital Age and American Decline Hanyu Chwe In May 2007, unknown attackers de- advantages in cyberspace; the increasing clared cyberwar on Estonia. Estonians importance of cyberwarfare will accelerate woke up to find that the websites of their the relative decline of American military banks, newspapers, and government agen- power. cies had been systematically dismantled. This was one of the world’s first cyberwar- For the purposes of this paper, I define fare attacks; I argue that it won’t be the cyberwarfare as the use of computer pro- last. grams to attack, disrupt, destroy, disable, In the future, the amount of cyberwar- or steal anything of military, economic or fare will increase drastically. First, the in- general strategic value or e↵orts to defend creased value of cyberspace increases the against such attacks. I am not considering incentives to wage cyberwarfare. Second, industrial corporate espionage, cyber at- the logic of cyberwarfare nullifies several tacks meant to aid the use of conventional mechanisms that constrain territorial war. military force, or the use of internet media Finally, the o↵ensive advantage inherent to organize social action. In my definition, in cyberwarfare exacerbates the security cyberwarfare is not intentionally accompa- dilemma. The United States lacks many nied by corresponding actions in the real of its traditional military and economic world. Cyberwarfare Incentives The strategic and economic value of state needs to guard its cyberspace in order cyberspace is huge. Facebook and to ensure stability. Google were worth 200 billion dollars It’s unlikely internet reliance will de- and 400 billion dollars in 2014 respec- crease.
    [Show full text]
  • Biological Weapons and Security Dilemmas
    Biological Weapons and Security Dilemmas by David Malet and Herman Rogers Technological advancements throughout history have had significant effects on international politics and conflict strategies. Some inventions, such as the compound bow and the strategic bomber, were designed specifically for combat purposes. Others, such as the stirrup and the sextant, were innovations intended for commerce that inevitably changed the nature of military competition. The advent of “Weapons of Mass Destruction”—most of which originated from scientific developments unrelated to national defense—has also produced dramatic changes in warfare. 1 The best-known example of this occurred during the Cold War, as both superpowers engaged in nuclear stockpiling rather than bearing the cost of maintaining fully mobilized conventional forces. The resulting reliance on strategies of brinksmanship and deterrence arguably prevented the resumption of great power warfare in the decades following World War II. However, this trade-off created the perpetual risk that any miscalculation would produce Armageddon. As both sides sought security through larger arsenals, each side became more threatening to the other, resulting in a seemingly inescapable security dilemma. 2 The perceived necessity of maintaining a nuclear second-strike capability resulted in the spiraling of attempted strategic advantage into the strategic stalemate of mutual assured destruction (MAD). It also led to proliferation concerns as other actors attempted to create their own nuclear deterrents. At the same time, a less familiar but perhaps equally consequential security dilemma arose out of bioweapon proliferation. The competition in biological arms led to the Biological Weapons Convention (BWC) of 1972 that formally restricted research into offensive technologies.
    [Show full text]
  • Cooperation & Security Dilemma in the South China
    Cooperation & Security Dilemma in the South China Sea: Conflict Management & the Increasing of China’s Power Rizky Widian & Arimadona Universitas Indonesia ABSTRACT This article seeks to explain about security dilemma and offense-defense balance in the South China Sea. The rising of China’s power in the South China Sea that facilitate security dilemma makes cooperation between claimant countries becoming more difficult. Regarding this matter, it’s important to explain why cooperation in the area is difficult in the midst of many literatures that advocated cooperation as the tools for conflict management in the South China Sea. This article refers to the concepts of security dilemma and offense-defense balance by Robert Jervis. By employing qualitative research method of literature review, this article illustrates the distribution of power in the region. Through data exploration, this article finds that China’s offensive power in the South China Sea is massive and triggers security dilemma. Thus, this article argues that security dilemma caused by China’s offensive power in South China Sea is the main the reason that inhibiting cooperation between claimant states. Keywords: Security Dilemma, South China Sea, Military Capability, Offense-defense Balance, Cooperation. Artikel ini membicarakan dilema keamanan serta keseimbangan offense-defense di Laut Tiongkok Selatan. Peningkatan kekuatan Tiongkok di Laut Tiongkok Selatan yang memperlancar proses dilema keamanan membuat kerjasama antar negara menjadi sulit. Dengan kata lain, penting untuk menjelaskan mengapa kerjasama sulit dilakukan ditengah banyaknya literatur yang mengadvokasikan hal tersebut sebagai upaya pengelolaan tensi di Laut Tiongkok Selatan. Dalam membentuk penjelasan yang ideal, artikel ini akan merujuk pada konsep dilema keamanan serta keseimbangan offense-defense oleh Robert Jervis.
    [Show full text]
  • Reflections Upon a Paradigm of Military Strategy Within the European Common Security and Defense Policy (ESDP)
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2001-06 Clausewitz and the theory of military strategy in Europe : reflections upon a paradigm of military strategy within the European Common Security and Defense Policy (ESDP) Hartmann, Uwe. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/2213 NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS CLAUSEWITZ AND THE THEORY OF MILITARY STRATEGY IN EUROPE – REFLECTIONS UPON A PARADIGM OF MILITARY STRATEGY WITHIN THE EUROPEAN COMMON SECURITY AND DEFENSE POLICY (ESDP) by Uwe Hartmann June 2001 Thesis Advisor: Donald Abenheim Co-Advisor: Daniel Moran Approved for public release; distribution is unlimited i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 2001 Master’s Thesis 4. TITLE AND SUBTITLE: Title (Mix case letters) 5.
    [Show full text]
  • The Western Deterrence Policy Regime Against a Resurgent Russia in the Post-Cold War Security Environment: Failures and a Way Ahead for the Future
    THE WESTERN DETERRENCE POLICY REGIME AGAINST A RESURGENT RUSSIA IN THE POST-COLD WAR SECURITY ENVIRONMENT: FAILURES AND A WAY AHEAD FOR THE FUTURE by Rachael Deskin A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts Baltimore, Maryland January 2020 2019 Rachael Deskin All Rights Reserved Abstract Aggressive Russian foreign policy and accompanying military actions have destabilized Europe’s periphery in the post-Cold War security environment. The occupation and annexation of the Georgian territories of Abkhazia and South Ossetia, along with the annexation of Crimea and the continued conflict in the Donbass region of eastern Ukraine prove that the West’s Deterrence Policy regime is ineffective. This thesis analyzes how and why the Western Deterrence Policy regime against Russia has failed and examines prospects for the future. To gain an understanding of this issue, this thesis portfolio will review Western foreign and security policy mistakes through a Spiral and Deterrence Model analysis and analyze how the West found itself in the current security dilemma with Russia due to NATO and United States’ (US) actions. The result will be a way-ahead for the European Union (EU), as the best-suited actor to successfully deter Russia, so it can create successful a Deterrence Policy regime against Russia by making necessary changes to its Common Foreign and Security Policy. The first chapter in this portfolio analyzes how the US ineffectively created policy towards Russia through the Deterrence Model instead of the Spiral Model. As a result of misapplied Deterrence Model policies, Russia reacted via the Spiral Model and a post- Cold War security dilemma ensued as a result of Russia’s perception of these seemingly offensive Western policies.
    [Show full text]
  • The South China Sea Security Dilemma (For ISA Hong Kong 2017)
    Agata Zietek PhD Faculty of Political Science International Relations Department Maria Curie Sklodowska University, Lublin Poland [email protected] The South China Sea Security Dilemma (for ISA Hong Kong 2017) (This is an early draft– please do not cite without the author’s permission) Paper to be presented at the ISA International Conference June 15-18, 2017, at the University of Hong Kong 1. The importance of the SCS in any analysis of the security situation in Asia Pacific region. 2. Questions are: can we use the theory of the security dilemma to analyze the security situation in the Asia Pacific generally and in the SCS particularly? And what makes it more or less likely that states will cooperate? 3. Security dilemma has been one of the most important theoretical ideas in IR since Herbart Butterfield, John Herz and Robert Jervis first developed the concept. It is connected with defensive realism, because for a defensive realist the security dilemma makes possible genuine cooperation between states--beyond a fleeting alliance in the face of a common foe. But it is also important for offensive realists, who think that the security dilemma makes war inevitable and rational. (See also: Shiping Tang, The security Dilemma….Security Studies 2009) 4. According to John Herz, the Security Dilemma is “a structural notion in which the self- help attempts of states to look after their security needs tend, regardless of intention, to lead to rising insecurity for others as each interprets its own measures as defensive and measures of others as potentially threatening/offensive.” 5. The Security Dilemma is a two-level strategic predicament in relations between states and other actors, with each level consisting of two related lemmas (propositions) which force decision-makers to choose between them.
    [Show full text]
  • The Internet's Security Dilemma: Why Cyber-Weapons Beget Instability
    Feldman 1 Jonah Feldman Ming Chow COMP-116 6 December 2017 The Internet’s Security Dilemma: Why Cyber-Weapons Beget Instability Abstract This paper analyzes interstate cyberwarfare through the lens of Robert Jervis’s offense/defense paradigm. In this paradigm, two factors are important in determining technology’s impact on global stability: whether a technology favors offensive or defensive strategy, and whether offensive technology can be distinguished from defensive technology. This paper argues that cybersecurity exemplifies Jervis’s “third world,” where offense has the advantage while offensive and defensive technologies are easily distinguishable. The case for offense/defense distinguishability is straightforward: defensive tactics like encryption, firewalls, and air gapping have little offensive utility. Thus, this paper will focus primarily on cybersecurity’s offensive advantages and its implications for the international system. In Jervis’s “third world,” cooperation is still possible among status-quo states because they can pursue defensive strategies that do not engender the security dilemma. However, this paper argues the rapid proliferation of information technology among small and medium powers will greatly enhance the odds of cyberwarfare spiraling into interstate conflict. This paper also suggests legal and regulatory strategies states can undertake to increase the value of cyber defense and therefore decrease the risk of cyberwarfare. Feldman 2 Introduction From the rifled musket to the intercontinental ballistic missile,
    [Show full text]
  • Should the United States Reject MAD? Should the United Charles L
    Should the United States Reject MAD? Should the United Charles L. Glaser and States Reject MAD? Steve Fetter Damage Limitation and U.S. Nuclear Strategy toward China China’s growing in- vestment in nuclear forces, combined with increasing strains in the U.S.-China relationship, are raising concern at home and abroad about the adequacy of U.S. nuclear strategy and forces.1 The key strategic nuclear choice facing the United States is whether to attempt to preserve and enhance its damage- limitation capability—that is, the ability to reduce meaningfully the costs that China can inºict against the U.S. homeland in an all-out nuclear retaliatory at- tack. The most recent U.S. Nuclear Posture Review, which was completed in 2010, did not present a clear position on whether the United States would ac- cept growing vulnerability to massive Chinese nuclear retaliation or instead attempt to preserve the U.S. ability to destroy most of China’s nuclear force.2 Chinese experts reacted distrustfully: “If the United States cannot answer so simple a question as ‘do you accept mutual vulnerability or not?’ then some- thing must be seriously wrong in the relationship.”3 With a few exceptions,4 this critical choice has generated little public attention. Nevertheless, because it lies at the heart of U.S. nuclear strategy, the question of whether the United States should preserve and enhance its damage-limitation capability against China deserves thorough analysis. Damage limitation differs fundamentally from deterrence, which is the most Charles L. Glaser is a professor in the Elliott School of International Affairs and the Department of Political Science at George Washington University; he directs the Elliott School’s Institute for Security and Conºict Studies.
    [Show full text]