SlideShare a Scribd company logo
1 of 24
Cross Domain
Deterrence
November	
  18,	
  2014	
  
LLNL	
  (Livermore)	
  
Cross Domain
Deterrence: Strategy in an
Era of Complexity
Mission:	
  	
  Develop	
  a	
  theory	
  of	
  cross-­‐domain	
  deterrence	
  
	
  
	
  Humility,	
  but	
  with	
  opportunity	
  (low	
  expectaFons)	
  
	
  Complexity	
  is	
  the	
  challenge,	
  not	
  the	
  objecFve	
  	
  
Three(?) Harrison Fords of CDD
•  Academics	
  tend	
  to	
  study	
  what	
  pracFFoners	
  already	
  know.	
  	
  
“That’s	
  all	
  well	
  in	
  pracFce,	
  but	
  how	
  does	
  it	
  work	
  in	
  theory?”	
  	
  
•  In	
  CDD	
  there	
  is	
  an	
  Inversion	
  of	
  pracFce/ideas/aTtudes:	
  
•  Academic	
  perspecFve	
  (30,000	
  feet,	
  “too	
  cold”):	
  
•  Academics	
  think	
  they	
  already	
  know	
  how	
  deterrence	
  works.	
  
•  Simple	
  linear	
  argument	
  focusing	
  on	
  achieving	
  given	
  ends	
  
•  CDD	
  skepFcism:	
  	
  Not	
  interesFng.	
  	
  “Nothing	
  [new]	
  to	
  see	
  here”	
  
•  PracFFoner	
  perspecFve	
  (trenches,	
  “too	
  hot”?):	
  
•  Deterrence	
  is	
  abstract,	
  not	
  always	
  helpful	
  in	
  formulaFng	
  policy.	
  
•  Complex	
  process	
  involving	
  means	
  (“how”	
  to	
  deter)	
  
•  CDD	
  defies	
  analysis:	
  	
  really	
  interesFng,	
  but	
  too	
  complex.	
  	
  
•  Our	
  perspecFve	
  (“just	
  right”??):	
  	
  Let’s	
  see	
  what’s	
  out	
  there	
  	
  	
  	
  	
  	
  	
  
(Iowa:	
  field	
  of	
  dreams,	
  James	
  T.	
  Kirk	
  vs.	
  Missouri:	
  “show	
  me”).	
  
•  This	
  is	
  the	
  beginning	
  of	
  a	
  process	
  
•  I	
  will	
  share	
  iniFal	
  hunches	
  with	
  you	
  
Agenda
•  The	
  CDD	
  project	
  	
  
•  CDD	
  as	
  a	
  policy	
  problem	
  
•  CDD	
  as	
  a	
  theoreFcal	
  problem	
  
h^p://deterrence.ucsd.edu	
  
DoD	
  Minerva	
  IniFaFve	
  Award:	
  “Deterring	
  Complex	
  Threats:	
  The	
  Effects	
  of	
  Asymmetry,	
  Interdependence,	
  
and	
  MulF-­‐polarity	
  on	
  InternaFonal	
  Strategy”	
  supported	
  by	
  ONR	
  Research	
  Grant	
  N00014-­‐14-­‐1-­‐0071	
  
DuraFon:	
  2013-­‐2018	
  
Basic	
  research	
  quesFon	
  for	
  CDD:	
  
How	
  does	
  the	
  increasing	
  number	
  or	
  “types”	
  
of	
  means	
  available	
  for	
  poliFcal	
  influence	
  
affect	
  deterrence	
  in	
  theory	
  and	
  pracFce?	
  
Prior	
  research	
  interests	
  and	
  policy	
  concerns:	
  
Nuclear	
  force	
  posture	
  
GlobalizaFon	
  and	
  interdependence	
  
Cybersecurity	
  and	
  the	
  RMA	
  
Outer	
  space	
  security	
  
Chinese	
  military	
  modernizaFon	
  
US	
  Grand	
  Strategy	
  
Agenda
•  The	
  CDD	
  project	
  	
  
•  CDD	
  as	
  a	
  policy	
  problem	
  
•  CDD	
  as	
  a	
  theoreFcal	
  problem	
  
More types of means, linkages, threats
“The	
  fragility	
  of	
  chokepoints	
  in	
  air,	
  space,	
  
cyberspace	
   and	
   on	
   the	
   sea	
   enable	
   an	
  
increasing	
   number	
   of	
   enFFes,	
   states	
   and	
  
non-­‐state	
  actors	
  alike	
  to	
  disrupt	
  the	
  global	
  
economy	
   with	
   small	
   numbers	
   of	
   well-­‐
placed,	
   precise	
   a^acks…these	
   strategies	
  
and	
   the	
   weapons	
   that	
   support	
   them	
   are	
  
also	
   no	
   longer	
   the	
   exclusive	
   province	
   of	
  
large	
   states…America’s	
   adversaries	
   today	
  
are	
  embracing	
  a	
  strategy	
  of	
  access	
  denial	
  
to	
  counter	
  American	
  power	
  projecFon.”	
  
Gen.	
  Norton	
  A.	
  Schwartz	
  &	
  Adm.	
  Jonathan	
  W.	
  Greenert,	
  	
  
“Air-­‐Sea	
  Ba^le:	
  PromoFng	
  Stability	
  in	
  an	
  Era	
  of	
  
Uncertainty,”	
  The	
  American	
  Interest	
  (February	
  2012)	
  
The “Third Offset”
“The	
  criFcal	
  innovaFon	
  was	
  to	
  apply	
  and	
  combine	
  these	
  new	
  
systems	
   and	
   technologies	
   with	
   new	
   strategic	
   operaFonal	
  
concepts,	
  in	
  ways	
  that	
  enable	
  the	
  American	
  military	
  to	
  avoid	
  
matching	
  an	
  adversary	
  “tank-­‐for-­‐tank	
  or	
  soldier-­‐for-­‐soldier.”	
  
Secretary	
  of	
  Defense	
  Hagle	
  
November	
  17,	
  Reagan	
  NaFonal	
  
Defense	
  Forum	
  
Complexity is a challenge for
strategy, and even grand strategy
•  Emerging	
  capabiliFes	
  
•  Accessible,	
  omen	
  civilian,	
  technologies—e.g.,	
  cyber,	
  space,	
  
manufacturing,	
  bio,	
  etc.—have	
  a	
  latent	
  capacity	
  to	
  inflict	
  
harm,	
  possibly	
  even	
  commensurate	
  with	
  strategic	
  weapons	
  
•  (Yet	
  insFtuFonal	
  capacity	
  for	
  weaponizaFon	
  and	
  employment	
  
of	
  technologies	
  is	
  underesFmated	
  in	
  techno-­‐centric	
  accounts)	
  
•  Dense	
  linkages	
  
•  The	
  most	
  connected	
  and	
  technology-­‐dependent	
  states	
  are	
  
also	
  the	
  states	
  that	
  are	
  most	
  vulnerable	
  to	
  disrupFon	
  
•  (Yet	
  interdependence	
  is	
  also	
  thought	
  to	
  promote	
  restraint)	
  
•  Empowered	
  actors	
  
•  Weaker	
  states	
  or	
  non-­‐state	
  actors	
  are	
  gaining	
  the	
  ability	
  to	
  
inflict	
  costs	
  on	
  stronger	
  rivals	
  while	
  avoiding	
  retaliaFon	
  
•  (Yet	
  rich	
  and	
  experienced	
  states	
  can	
  exploit	
  the	
  same	
  
technologies	
  to	
  enhance	
  intelligence	
  and	
  military	
  power)	
  
What is a domain?
•  DoD	
  war-­‐fighFng	
  domains:	
  sea,	
  air,	
  land,	
  space,	
  cyber	
  
•  Are	
  these	
  disFnct	
  strategic	
  environments	
  or	
  bureaucraFc	
  turfs?	
  
•  Space	
  and	
  cyber	
  are	
  driving	
  policy	
  concerns	
  about	
  CDD	
  
•  There	
  are	
  other	
  ways	
  to	
  parse	
  the	
  means	
  of	
  influence	
  
•  Military	
  vs.	
  non-­‐military	
  tools	
  
•  Specialized	
  experFse,	
  economic	
  sectors,	
  or	
  jurisdicFons	
  
•  Differences	
  among	
  domains	
  are	
  probably	
  more	
  important	
  
analyFcally	
  than	
  defining	
  boundaries	
  between	
  them	
  
•  “Cross	
  domain	
  deterrence”	
  is	
  the	
  use	
  of	
  one	
  type	
  of	
  means	
  to	
  
dissuade	
  the	
  target	
  from	
  using	
  some	
  other	
  type	
  of	
  means	
  
Agenda
•  The	
  CDD	
  project	
  	
  
•  CDD	
  as	
  a	
  policy	
  problem	
  
•  CDD	
  as	
  a	
  theoreFcal	
  problem	
  
The Conceptual Limits of
Cross-Domain Deterrence
•  “Domains”	
  are	
  arFficial	
  constructs	
  
•  Underlying	
  differences	
  in	
  capabiliFes	
  and	
  environments	
  are	
  real	
  
•  DefiniFonal	
  debates	
  risk	
  becoming	
  “academic”	
  (angels	
  +	
  pins)	
  
•  NaFons	
  (even	
  the	
  United	
  States)	
  don’t	
  just	
  wish	
  to	
  deter	
  
•  Deterrence	
  implies	
  a	
  staFc/limited	
  noFon	
  of	
  influence	
  
•  Symmetry:	
  	
  if	
  someone	
  is	
  deterring,	
  others	
  are	
  compelling/conquering	
  	
  
•  Even	
  deterrence	
  involves	
  reallocaFng	
  security	
  or	
  influence	
  
•  What	
  does	
  it	
  mean	
  to	
  “cross”	
  a	
  domain?	
  
•  Arbitrary	
  boundaries	
  imply	
  arbitrary	
  transiFons	
  
•  CapabiliFes/threats	
  may	
  not	
  be	
  specific	
  or	
  may	
  be	
  mulF-­‐	
  domain	
  
CDD is not new: Actors have long
combined or shifted domains for
strategic advantage
Yet	
  the	
  number	
  and	
  complexity	
  
of	
  means	
  now	
  available	
  make	
  it	
  
hard	
  to	
  choose	
  wisely.	
  We	
  need	
  
more	
  explicit	
  a^enFon	
  to	
  the	
  
logic	
  of	
  combinaFon	
  of	
  means.	
  
(Deterrence	
  itself	
  was	
  not	
  new,	
  but	
  “ripened”	
  
when	
  nuclear	
  weapons	
  made	
  it	
  essenFal	
  to	
  
consider	
  security	
  in	
  the	
  absence	
  of	
  defense.)	
  
War is politics by many means
•  Strategic	
  bargaining	
  is	
  a	
  contest	
  between	
  sets	
  of	
  means	
  
and	
  ends	
  
•  TradiFonal	
  deterrence	
  theory	
  focuses	
  on	
  ends	
  
•  PrioriFes,	
  resolve,	
  credibility,	
  mispercepFon	
  
•  The	
  means	
  have	
  usually	
  been	
  assumed	
  to	
  be	
  nuclear,	
  while	
  
consequences	
  were	
  generally	
  characterized	
  as	
  existenFal	
  
•  Chicken	
  games:	
  	
  “swerving”	
  is	
  different	
  in	
  a	
  steam	
  roller	
  
•  CDD	
  focuses	
  on	
  means	
  (tension	
  between	
  policy/theory)	
  
•  OpFons,	
  combinaFons,	
  tradeoffs	
  
•  CDD	
  relaxes	
  the	
  assumpFons	
  of	
  tradiFonal	
  deterrence:	
  	
  More	
  
means	
  available,	
  more	
  linkages	
  across	
  them,	
  and	
  more	
  actors	
  
with	
  different	
  porqolios	
  and	
  vulnerabiliFes	
  
•  Rock,	
  paper,	
  scissors	
  games	
  
How do means matter?
•  The	
  proliferaFon	
  of	
  capabiliFes	
  for	
  defense:	
  
•  “porqolio”	
  approach:	
  	
  More	
  of	
  same	
  not	
  as	
  good	
  as	
  variety	
  
•  If	
  defense	
  is	
  increased	
  by	
  variaFon	
  in	
  capabiliFes…	
  
•  This	
  must	
  improve	
  deterrence	
  (det.	
  by	
  defense)	
  
•  Can	
  also	
  produce	
  deficiencies	
  
•  We	
  already	
  know	
  lots	
  about	
  this	
  tacFcally	
  
•  Combined	
  arms,	
  air/land/sea	
  ba^le	
  (Biddle)	
  
•  Apply	
  it	
  to	
  deterrence	
  (strategy/grand	
  strategy)	
  
•  What	
  are	
  “best	
  response”	
  acFons	
  to	
  threats?	
  
•  Can	
  we	
  develop	
  rules	
  of	
  thumb	
  (similar	
  to	
  combined	
  arms)?	
  
•  Humility	
  moment	
  
•  Real	
  limits	
  to	
  what	
  theory	
  can	
  do,	
  but…	
  
•  Decisions	
  in	
  anFcipaFon	
  of	
  consequences	
  requires	
  theory	
  
•  RelaFve	
  area	
  of	
  advantage:	
  	
  “first”	
  is	
  be^er	
  than	
  “best”	
  
Unpacking deterrence/TOW
•  Deterrence	
  involves	
  at	
  least	
  three	
  objecFves:	
  
1.  Reduce	
  risk	
  of	
  escalaFon/war	
  (accommodaFon)	
  
2.  “Win”	
  policy	
  dispute	
  (internaFonal	
  “tug-­‐o-­‐war”)	
  
3.  Minimize	
  cost	
  of	
  achieving	
  first	
  two	
  objecFves	
  
•  Tradeoffs	
  (“speak	
  somly	
  AND	
  carry	
  a	
  big	
  sFck”)	
  
•  If	
  war	
  is	
  a	
  product	
  of	
  different	
  expectaFons	
  about	
  BOP	
  or	
  BOT	
  
–	
  the	
  informaFonal	
  theory	
  of	
  war	
  
•  Then	
  deterrent	
  acFons/capabiliFes/threats	
  that	
  minimize	
  
uncertainty	
  about	
  BOP/BOT	
  reduce	
  the	
  risk	
  of	
  war	
  (1)	
  
•  ...	
  But	
  reducing	
  uncertainty	
  does	
  not	
  necessarily	
  maximize	
  2,	
  3.	
  
•  Can	
  also	
  minimize	
  risk	
  of	
  war	
  by	
  conceding	
  policy	
  dispute	
  
•  Increasing	
  condiFons	
  increases	
  risk	
  of	
  deterrence	
  failure	
  
•  Use	
  of	
  deterrence	
  is	
  omen	
  response	
  to	
  low	
  risk	
  tolerance	
  
Why act across domains?
•  Crossing	
  domains	
  can	
  either:	
  
1.  Alter	
  BOP/BOT	
  (presumably	
  advantage	
  defender)	
  
2.  Reduce	
  uncertainty	
  about	
  intensions	
  
•  First	
  cut:	
  	
  “ComparaFve	
  advantage”	
  
•  Threaten/deploy	
  capabiliFes	
  to	
  win	
  if	
  war	
  happens	
  
•  Maximize	
  influence	
  –	
  max	
  BOP/BOT,	
  diplomaFc	
  leverage	
  
•  Mobility	
  is	
  an	
  advantage	
  in	
  war	
  but	
  a	
  disadvantage	
  in	
  signaling	
  
•  Threaten/deploy	
  capabiliFes	
  that	
  make	
  war	
  less	
  likely	
  
•  “Tripwires”	
  are	
  bad	
  military	
  tacFcs	
  but	
  great	
  for	
  deterrence	
  
•  Example:	
  	
  NATO	
  acFons	
  in	
  response	
  to	
  Ukrainian	
  crisis	
  
Why do actors escalate?
•  EscalaFon—like	
  war	
  itself—reflects	
  uncertainty	
  
•  Why	
  take	
  acFons	
  that	
  don’t	
  deter	
  in	
  hindsight?	
  
•  EscalaFon	
  reflects	
  effort	
  to	
  	
  deter/compel	
  at	
  lower	
  cost.	
  	
  	
  
•  Cross	
  domain	
  may	
  lessen	
  or	
  heighten	
  escalaFon	
  
•  Lessen:	
  	
  deterrent/compellent	
  acFons	
  must	
  do	
  more	
  to	
  
inform	
  opponents	
  about	
  eventual	
  outcome	
  of	
  conflict	
  
•  Heighten:	
  	
  	
  
•  TentaFve	
  a^empts	
  to	
  “win”	
  indicate	
  ambivalence	
  
•  Increase	
  opponent’s	
  belief	
  that	
  persisFng/escalaFng	
  will	
  prevail	
  
•  An	
  increase	
  in	
  opFons	
  _inherently_	
  increases	
  uncertainty	
  
•  Actors	
  themselves	
  don’t	
  know	
  what	
  they	
  will	
  do	
  in	
  a	
  crisis	
  
How do combinations work?
•  Tough:	
  	
  Can	
  fall	
  back	
  on	
  some	
  theory/heurisFcs	
  
•  EffecFve	
  combinaFons	
  win	
  wars,	
  affect	
  BOP/BOT	
  
•  More	
  costly/heighten	
  uncertainty	
  about	
  who	
  will	
  win	
  
•  Removing	
  opFons	
  for	
  an	
  opponent	
  also	
  creates	
  a	
  “wedge”	
  
•  More	
  likely	
  to	
  get	
  opponent	
  to	
  back	
  down	
  
•  More	
  likely	
  to	
  get	
  opponent	
  to	
  escalate	
  (which	
  do	
  you	
  prefer?)	
  
•  However,	
  “hybrid”	
  combinaFons	
  may	
  be	
  be^er	
  
•  ComparaFve	
  advantage	
  could	
  be	
  Fed	
  to	
  signaling	
  
•  2nd-­‐mover	
  advantage	
  (mostly	
  focus	
  on	
  1st	
  mover)	
  
•  Power	
  projecFon	
  creates	
  depth	
  
•  Especially	
  useful	
  in	
  period	
  of	
  status	
  quo/decline	
  
•  Stability/instability	
  across	
  domains	
  
•  No	
  domain	
  is	
  stable/unstable	
  by	
  itself	
  given	
  CDD	
  
Cyber and space (our final frontier!)
•  IniFal	
  work	
  by	
  project	
  on	
  cyber:	
  
•  StuxNet	
  as	
  model	
  (Lindsay)	
  
•  The	
  myth	
  of	
  cyber	
  Pearl	
  Harbor	
  (Gartzke)	
  
•  DecepFon	
  as	
  alternaFve	
  strategy	
  (Gartzke	
  and	
  Lindsay)	
  
•  Nature	
  of	
  cyber	
  coercion	
  (Lindsay	
  and	
  Gartzke)	
  
•  Where	
  we	
  are	
  headed:	
  
•  SubsFtutes	
  and	
  complements	
  
•  When	
  is	
  cyber	
  used	
  instead	
  of	
  other	
  capabiliFes?	
  
•  When	
  is	
  cyber	
  used	
  because	
  of	
  other	
  capabiliFes?	
  
•  Interdependence—similariFes/differences	
  between	
  
cyber,	
  nuclear	
  and	
  economic	
  modes	
  of	
  interdependence	
  
•  Space—deterrence	
  in	
  space	
  has	
  never	
  been	
  in	
  space.	
  
Some thoughts about empirics
•  PreconcepFon:	
  	
  cannot	
  measure	
  CDD	
  
•  Historical	
  use	
  of	
  CDD/CDC	
  creates	
  basis	
  for	
  analysis	
  
•  InternaFonal	
  Crisis	
  Database	
  
•  Code	
  domains/capabiliFes	
  (acFons	
  and	
  outcomes	
  already	
  coded)	
  
•  Deterrence	
  data	
  (Huth)	
  
•  Uncertainty	
  and	
  war	
  project	
  (Gartzke	
  and	
  Kaplow	
  
•  Nuclear	
  force	
  structure	
  project	
  (Gartzke,	
  Kaplow	
  and	
  Mehta)	
  
•  Space	
  ISR/launch	
  data—informaFon	
  theory,	
  vulnerabiliFes	
  
•  Modeling/measuring/theorizing	
  
•  Complementarity	
  of	
  different	
  components	
  
•  Caveat:	
  	
  when	
  “general”	
  deterrence	
  works,	
  there	
  is	
  
nothing	
  to	
  see	
  (Russians	
  not	
  crossing	
  German	
  border)	
  	
  	
  
Interdependence & Multi-polarity
•  Interdependence	
  (economic,	
  nuclear,	
  cyber)	
  
•  Increase	
  consequences	
  for	
  unrestricted	
  warfare	
  
•  Deterrent	
  effect	
  on	
  escalaFon	
  (fewer	
  big	
  contests)	
  
•  Decrease	
  consequences	
  of	
  restricted	
  forms	
  of	
  conflict	
  
•  Stability/instability	
  paradox	
  (more	
  lower	
  intensity	
  contests)	
  
•  Passive	
  effect	
  of	
  interdep.	
  (PuFn:	
  	
  sancFons	
  vs	
  markets)	
  
•  MulFpolarity	
  
•  Increased	
  uncertainty	
  (inherent	
  increase	
  in	
  conflicts)	
  
•  Pivotal	
  paradox:	
  	
  declining	
  US	
  leverage	
  with	
  enemies	
  actually	
  
increases	
  US	
  leverage	
  with	
  its	
  (many)	
  friends.	
  	
  
•  More	
  and	
  more	
  circumspect	
  contests	
  
•  Increased	
  use	
  of	
  asymmetric	
  capabiliFes	
  (on	
  both	
  sides)	
  
•  A	
  “rock/paper/scissors/…	
  carrots/sFcks”	
  world	
  
•  Worth	
  understanding	
  how	
  these	
  offsets	
  work,	
  are	
  exploited	
  
Thank you!
rock	
   paper	
   scissors	
  
sFcks	
  and	
  carrots	
   cyberwar!	
  

More Related Content

What's hot

Army in multi domain operations 2028
Army in multi domain operations 2028Army in multi domain operations 2028
Army in multi domain operations 2028Neil McDonnell
 
strategic studies and international relations
strategic studies and international relationsstrategic studies and international relations
strategic studies and international relationsTallat Satti
 
Continental schools of thoughts in strategic studies.
Continental schools of thoughts in strategic studies.Continental schools of thoughts in strategic studies.
Continental schools of thoughts in strategic studies.cliffordcomondi
 
Deterrence Theory in International Relations
Deterrence Theory in International RelationsDeterrence Theory in International Relations
Deterrence Theory in International RelationsBalaram Pradhan
 
Introduction to strategic studies & key concepts 2013 1
Introduction to strategic studies & key concepts 2013 1Introduction to strategic studies & key concepts 2013 1
Introduction to strategic studies & key concepts 2013 1bakri303
 
Defining asymmetric warfare
Defining asymmetric warfareDefining asymmetric warfare
Defining asymmetric warfareLex Pit
 
Legal regulation on the use of force
Legal regulation on the use of forceLegal regulation on the use of force
Legal regulation on the use of forceFAROUQ
 
Army Futures Command Concept for Maneuver in Multi Domain Operations 2028
Army Futures Command Concept for Maneuver in Multi Domain Operations 2028Army Futures Command Concept for Maneuver in Multi Domain Operations 2028
Army Futures Command Concept for Maneuver in Multi Domain Operations 2028Neil McDonnell
 
Non kinetic warfare share
Non kinetic warfare shareNon kinetic warfare share
Non kinetic warfare share104016032
 
Technology and changing nature of warfare
Technology and changing nature of warfareTechnology and changing nature of warfare
Technology and changing nature of warfareandeedalal
 
Human Security Implications of Climate Change
Human Security Implications of Climate ChangeHuman Security Implications of Climate Change
Human Security Implications of Climate ChangeRolph Payet
 
Evolution of air power
Evolution of air powerEvolution of air power
Evolution of air powerKashif Shamaun
 
Coercive-Diplomacy
Coercive-DiplomacyCoercive-Diplomacy
Coercive-DiplomacyJames Peters
 
Realist theories of global politics
Realist theories of global politicsRealist theories of global politics
Realist theories of global politicsbentogo
 
Arms Control and Disarmament
Arms Control and DisarmamentArms Control and Disarmament
Arms Control and DisarmamentAnikesh Sinha
 

What's hot (20)

Evolution of strategic doctrines
Evolution of strategic doctrinesEvolution of strategic doctrines
Evolution of strategic doctrines
 
Army in multi domain operations 2028
Army in multi domain operations 2028Army in multi domain operations 2028
Army in multi domain operations 2028
 
21st Century Air Force Nuclear Deterrence and Escalation
21st Century Air Force Nuclear Deterrence and Escalation21st Century Air Force Nuclear Deterrence and Escalation
21st Century Air Force Nuclear Deterrence and Escalation
 
strategic studies and international relations
strategic studies and international relationsstrategic studies and international relations
strategic studies and international relations
 
Continental schools of thoughts in strategic studies.
Continental schools of thoughts in strategic studies.Continental schools of thoughts in strategic studies.
Continental schools of thoughts in strategic studies.
 
Deterrence Theory in International Relations
Deterrence Theory in International RelationsDeterrence Theory in International Relations
Deterrence Theory in International Relations
 
Introduction to strategic studies & key concepts 2013 1
Introduction to strategic studies & key concepts 2013 1Introduction to strategic studies & key concepts 2013 1
Introduction to strategic studies & key concepts 2013 1
 
Defining asymmetric warfare
Defining asymmetric warfareDefining asymmetric warfare
Defining asymmetric warfare
 
Principles of war new
Principles of war newPrinciples of war new
Principles of war new
 
Legal regulation on the use of force
Legal regulation on the use of forceLegal regulation on the use of force
Legal regulation on the use of force
 
Army Futures Command Concept for Maneuver in Multi Domain Operations 2028
Army Futures Command Concept for Maneuver in Multi Domain Operations 2028Army Futures Command Concept for Maneuver in Multi Domain Operations 2028
Army Futures Command Concept for Maneuver in Multi Domain Operations 2028
 
Non kinetic warfare share
Non kinetic warfare shareNon kinetic warfare share
Non kinetic warfare share
 
Technology and changing nature of warfare
Technology and changing nature of warfareTechnology and changing nature of warfare
Technology and changing nature of warfare
 
Human Security Implications of Climate Change
Human Security Implications of Climate ChangeHuman Security Implications of Climate Change
Human Security Implications of Climate Change
 
Evolution of air power
Evolution of air powerEvolution of air power
Evolution of air power
 
Coercive-Diplomacy
Coercive-DiplomacyCoercive-Diplomacy
Coercive-Diplomacy
 
Realist theories of global politics
Realist theories of global politicsRealist theories of global politics
Realist theories of global politics
 
Role of Space in Deterrence
Role of Space in DeterrenceRole of Space in Deterrence
Role of Space in Deterrence
 
Arms Control and Disarmament
Arms Control and DisarmamentArms Control and Disarmament
Arms Control and Disarmament
 
Deterrence .pptx
Deterrence .pptxDeterrence .pptx
Deterrence .pptx
 

Viewers also liked

Chapter 6 - Diplomacy and Deterrance
Chapter 6 - Diplomacy and Deterrance Chapter 6 - Diplomacy and Deterrance
Chapter 6 - Diplomacy and Deterrance earlgreytea
 
All About that Bayes: Probability, Statistics, and the Quest to Quantify Unce...
All About that Bayes: Probability, Statistics, and the Quest to Quantify Unce...All About that Bayes: Probability, Statistics, and the Quest to Quantify Unce...
All About that Bayes: Probability, Statistics, and the Quest to Quantify Unce...Lawrence Livermore National Laboratory
 
Portunus webinar: Floating port technologies could revolutionize container co...
Portunus webinar: Floating port technologies could revolutionize container co...Portunus webinar: Floating port technologies could revolutionize container co...
Portunus webinar: Floating port technologies could revolutionize container co...Lawrence Livermore National Laboratory
 
3 seo-fundamentals-establishing a domain strategy-slides
3 seo-fundamentals-establishing a domain strategy-slides3 seo-fundamentals-establishing a domain strategy-slides
3 seo-fundamentals-establishing a domain strategy-slidesMasterCode.vn
 
Practices of Deterrence [Notes]
Practices of Deterrence [Notes]Practices of Deterrence [Notes]
Practices of Deterrence [Notes]Nicholas Teh
 
Nuclear proliferation
Nuclear proliferationNuclear proliferation
Nuclear proliferationRobert Young
 
Unit #4 Nuclear Proliferation Student Version
Unit #4 Nuclear Proliferation Student VersionUnit #4 Nuclear Proliferation Student Version
Unit #4 Nuclear Proliferation Student VersionNick Allgyer
 
Non proliferation treaty-23_47
Non proliferation treaty-23_47Non proliferation treaty-23_47
Non proliferation treaty-23_47domsr
 

Viewers also liked (16)

Chapter 6 - Diplomacy and Deterrance
Chapter 6 - Diplomacy and Deterrance Chapter 6 - Diplomacy and Deterrance
Chapter 6 - Diplomacy and Deterrance
 
.GLOBAL Webinar
.GLOBAL Webinar.GLOBAL Webinar
.GLOBAL Webinar
 
The Cyber Pearl Harbor
The Cyber Pearl HarborThe Cyber Pearl Harbor
The Cyber Pearl Harbor
 
Lessons Learned from Analysis of Minimum Deterrence Proposals
Lessons Learned from Analysis of Minimum Deterrence ProposalsLessons Learned from Analysis of Minimum Deterrence Proposals
Lessons Learned from Analysis of Minimum Deterrence Proposals
 
Target Fabrication Capabilities
Target Fabrication CapabilitiesTarget Fabrication Capabilities
Target Fabrication Capabilities
 
LLNL 2015 Year in Review
LLNL 2015 Year in ReviewLLNL 2015 Year in Review
LLNL 2015 Year in Review
 
Next-Generation Optical Fiber Fabrication
Next-Generation Optical Fiber FabricationNext-Generation Optical Fiber Fabrication
Next-Generation Optical Fiber Fabrication
 
All About that Bayes: Probability, Statistics, and the Quest to Quantify Unce...
All About that Bayes: Probability, Statistics, and the Quest to Quantify Unce...All About that Bayes: Probability, Statistics, and the Quest to Quantify Unce...
All About that Bayes: Probability, Statistics, and the Quest to Quantify Unce...
 
Portunus webinar: Floating port technologies could revolutionize container co...
Portunus webinar: Floating port technologies could revolutionize container co...Portunus webinar: Floating port technologies could revolutionize container co...
Portunus webinar: Floating port technologies could revolutionize container co...
 
2016 Year In Review
2016 Year In Review2016 Year In Review
2016 Year In Review
 
3 seo-fundamentals-establishing a domain strategy-slides
3 seo-fundamentals-establishing a domain strategy-slides3 seo-fundamentals-establishing a domain strategy-slides
3 seo-fundamentals-establishing a domain strategy-slides
 
The Cold War
The Cold WarThe Cold War
The Cold War
 
Practices of Deterrence [Notes]
Practices of Deterrence [Notes]Practices of Deterrence [Notes]
Practices of Deterrence [Notes]
 
Nuclear proliferation
Nuclear proliferationNuclear proliferation
Nuclear proliferation
 
Unit #4 Nuclear Proliferation Student Version
Unit #4 Nuclear Proliferation Student VersionUnit #4 Nuclear Proliferation Student Version
Unit #4 Nuclear Proliferation Student Version
 
Non proliferation treaty-23_47
Non proliferation treaty-23_47Non proliferation treaty-23_47
Non proliferation treaty-23_47
 

Similar to Cross Domain Deterrence

Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Jack Whitsitt
 
Political Science 5 – Western Political Thought - Power Point #12
Political Science 5 – Western Political Thought - Power Point #12Political Science 5 – Western Political Thought - Power Point #12
Political Science 5 – Western Political Thought - Power Point #12John Paul Tabakian
 
Catastrophic incident planning by design greer (23 may 13) (2)
Catastrophic incident planning by design   greer (23 may 13) (2)Catastrophic incident planning by design   greer (23 may 13) (2)
Catastrophic incident planning by design greer (23 may 13) (2)James Greer
 
Cyber Military Education in an Era of Change
Cyber Military Education in an Era of ChangeCyber Military Education in an Era of Change
Cyber Military Education in an Era of ChangeDr. Lydia Kostopoulos
 
Decision support systems – current state and development trends
Decision support systems – current state and development trendsDecision support systems – current state and development trends
Decision support systems – current state and development trendsElena Susnea
 
Catastrophic incident planning by design jim greer
Catastrophic incident planning by design   jim greerCatastrophic incident planning by design   jim greer
Catastrophic incident planning by design jim greerAbramsLearning-ALIS
 
The Politics of Open development
The Politics of Open developmentThe Politics of Open development
The Politics of Open developmentJohn Traxler
 
Universal Design for Learning CEC 2009 Session #1
Universal Design for Learning CEC 2009 Session #1Universal Design for Learning CEC 2009 Session #1
Universal Design for Learning CEC 2009 Session #1Skip Stahl
 
10 Trends in Capability Planning for Defence and Security
10 Trends in Capability Planning for Defence and Security10 Trends in Capability Planning for Defence and Security
10 Trends in Capability Planning for Defence and SecurityStephan De Spiegeleire
 
Intro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security DefenseIntro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security DefenseRoger Grimes
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copySara-Jayne Terp
 
Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskOsama Salah
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomDoing What I Do
 
Tabakian Pols 7 Fall/Spring 2014 Power 8
Tabakian Pols 7 Fall/Spring 2014 Power 8Tabakian Pols 7 Fall/Spring 2014 Power 8
Tabakian Pols 7 Fall/Spring 2014 Power 8John Paul Tabakian
 
Week 7 Examine the Strategic Leadership Involved with Crises Situ.docx
Week 7 Examine the Strategic Leadership Involved with Crises Situ.docxWeek 7 Examine the Strategic Leadership Involved with Crises Situ.docx
Week 7 Examine the Strategic Leadership Involved with Crises Situ.docxcockekeshia
 

Similar to Cross Domain Deterrence (20)

Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...
 
Political Science 5 – Western Political Thought - Power Point #12
Political Science 5 – Western Political Thought - Power Point #12Political Science 5 – Western Political Thought - Power Point #12
Political Science 5 – Western Political Thought - Power Point #12
 
Catastrophic incident planning by design greer (23 may 13) (2)
Catastrophic incident planning by design   greer (23 may 13) (2)Catastrophic incident planning by design   greer (23 may 13) (2)
Catastrophic incident planning by design greer (23 may 13) (2)
 
Cyber Military Education in an Era of Change
Cyber Military Education in an Era of ChangeCyber Military Education in an Era of Change
Cyber Military Education in an Era of Change
 
Pols 5 PP12
Pols 5 PP12Pols 5 PP12
Pols 5 PP12
 
Decision support systems – current state and development trends
Decision support systems – current state and development trendsDecision support systems – current state and development trends
Decision support systems – current state and development trends
 
Catastrophic incident planning by design jim greer
Catastrophic incident planning by design   jim greerCatastrophic incident planning by design   jim greer
Catastrophic incident planning by design jim greer
 
The Politics of Open development
The Politics of Open developmentThe Politics of Open development
The Politics of Open development
 
Universal Design for Learning CEC 2009 Session #1
Universal Design for Learning CEC 2009 Session #1Universal Design for Learning CEC 2009 Session #1
Universal Design for Learning CEC 2009 Session #1
 
10 Trends in Capability Planning for Defence and Security
10 Trends in Capability Planning for Defence and Security10 Trends in Capability Planning for Defence and Security
10 Trends in Capability Planning for Defence and Security
 
Intro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security DefenseIntro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security Defense
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy
 
2013 oas healing americas-1.7
2013 oas healing americas-1.72013 oas healing americas-1.7
2013 oas healing americas-1.7
 
DIIS 2010 - Bridging the Gap
DIIS 2010 - Bridging the GapDIIS 2010 - Bridging the Gap
DIIS 2010 - Bridging the Gap
 
Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information Risk
 
Viewgraphs
ViewgraphsViewgraphs
Viewgraphs
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whom
 
Tabakian Pols 7 Fall/Spring 2014 Power 8
Tabakian Pols 7 Fall/Spring 2014 Power 8Tabakian Pols 7 Fall/Spring 2014 Power 8
Tabakian Pols 7 Fall/Spring 2014 Power 8
 
strategic-intelligence-theory-to-application
strategic-intelligence-theory-to-applicationstrategic-intelligence-theory-to-application
strategic-intelligence-theory-to-application
 
Week 7 Examine the Strategic Leadership Involved with Crises Situ.docx
Week 7 Examine the Strategic Leadership Involved with Crises Situ.docxWeek 7 Examine the Strategic Leadership Involved with Crises Situ.docx
Week 7 Examine the Strategic Leadership Involved with Crises Situ.docx
 

Recently uploaded

The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...ranjana rawat
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCongressional Budget Office
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29JSchaus & Associates
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfahcitycouncil
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...Suhani Kapoor
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Call Girls in Nagpur High Profile
 
Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxtsionhagos36
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersCongressional Budget Office
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...aartirawatdelhi
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Christina Parmionova
 
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.Christina Parmionova
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...Suhani Kapoor
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related Topics
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdf
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
 
Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptx
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists Lawmakers
 
Russian Call Girls Service Ashiyana Colony { Lucknow Call Girls Service 95482...
Russian Call Girls Service Ashiyana Colony { Lucknow Call Girls Service 95482...Russian Call Girls Service Ashiyana Colony { Lucknow Call Girls Service 95482...
Russian Call Girls Service Ashiyana Colony { Lucknow Call Girls Service 95482...
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
 
How to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the ThreatHow to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the Threat
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.
 
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
 

Cross Domain Deterrence

  • 1. Cross Domain Deterrence November  18,  2014   LLNL  (Livermore)  
  • 2. Cross Domain Deterrence: Strategy in an Era of Complexity Mission:    Develop  a  theory  of  cross-­‐domain  deterrence      Humility,  but  with  opportunity  (low  expectaFons)    Complexity  is  the  challenge,  not  the  objecFve    
  • 3. Three(?) Harrison Fords of CDD •  Academics  tend  to  study  what  pracFFoners  already  know.     “That’s  all  well  in  pracFce,  but  how  does  it  work  in  theory?”     •  In  CDD  there  is  an  Inversion  of  pracFce/ideas/aTtudes:   •  Academic  perspecFve  (30,000  feet,  “too  cold”):   •  Academics  think  they  already  know  how  deterrence  works.   •  Simple  linear  argument  focusing  on  achieving  given  ends   •  CDD  skepFcism:    Not  interesFng.    “Nothing  [new]  to  see  here”   •  PracFFoner  perspecFve  (trenches,  “too  hot”?):   •  Deterrence  is  abstract,  not  always  helpful  in  formulaFng  policy.   •  Complex  process  involving  means  (“how”  to  deter)   •  CDD  defies  analysis:    really  interesFng,  but  too  complex.     •  Our  perspecFve  (“just  right”??):    Let’s  see  what’s  out  there               (Iowa:  field  of  dreams,  James  T.  Kirk  vs.  Missouri:  “show  me”).   •  This  is  the  beginning  of  a  process   •  I  will  share  iniFal  hunches  with  you  
  • 4. Agenda •  The  CDD  project     •  CDD  as  a  policy  problem   •  CDD  as  a  theoreFcal  problem  
  • 5. h^p://deterrence.ucsd.edu   DoD  Minerva  IniFaFve  Award:  “Deterring  Complex  Threats:  The  Effects  of  Asymmetry,  Interdependence,   and  MulF-­‐polarity  on  InternaFonal  Strategy”  supported  by  ONR  Research  Grant  N00014-­‐14-­‐1-­‐0071   DuraFon:  2013-­‐2018  
  • 6. Basic  research  quesFon  for  CDD:   How  does  the  increasing  number  or  “types”   of  means  available  for  poliFcal  influence   affect  deterrence  in  theory  and  pracFce?   Prior  research  interests  and  policy  concerns:   Nuclear  force  posture   GlobalizaFon  and  interdependence   Cybersecurity  and  the  RMA   Outer  space  security   Chinese  military  modernizaFon   US  Grand  Strategy  
  • 7. Agenda •  The  CDD  project     •  CDD  as  a  policy  problem   •  CDD  as  a  theoreFcal  problem  
  • 8. More types of means, linkages, threats “The  fragility  of  chokepoints  in  air,  space,   cyberspace   and   on   the   sea   enable   an   increasing   number   of   enFFes,   states   and   non-­‐state  actors  alike  to  disrupt  the  global   economy   with   small   numbers   of   well-­‐ placed,   precise   a^acks…these   strategies   and   the   weapons   that   support   them   are   also   no   longer   the   exclusive   province   of   large   states…America’s   adversaries   today   are  embracing  a  strategy  of  access  denial   to  counter  American  power  projecFon.”   Gen.  Norton  A.  Schwartz  &  Adm.  Jonathan  W.  Greenert,     “Air-­‐Sea  Ba^le:  PromoFng  Stability  in  an  Era  of   Uncertainty,”  The  American  Interest  (February  2012)  
  • 9. The “Third Offset” “The  criFcal  innovaFon  was  to  apply  and  combine  these  new   systems   and   technologies   with   new   strategic   operaFonal   concepts,  in  ways  that  enable  the  American  military  to  avoid   matching  an  adversary  “tank-­‐for-­‐tank  or  soldier-­‐for-­‐soldier.”   Secretary  of  Defense  Hagle   November  17,  Reagan  NaFonal   Defense  Forum  
  • 10. Complexity is a challenge for strategy, and even grand strategy •  Emerging  capabiliFes   •  Accessible,  omen  civilian,  technologies—e.g.,  cyber,  space,   manufacturing,  bio,  etc.—have  a  latent  capacity  to  inflict   harm,  possibly  even  commensurate  with  strategic  weapons   •  (Yet  insFtuFonal  capacity  for  weaponizaFon  and  employment   of  technologies  is  underesFmated  in  techno-­‐centric  accounts)   •  Dense  linkages   •  The  most  connected  and  technology-­‐dependent  states  are   also  the  states  that  are  most  vulnerable  to  disrupFon   •  (Yet  interdependence  is  also  thought  to  promote  restraint)   •  Empowered  actors   •  Weaker  states  or  non-­‐state  actors  are  gaining  the  ability  to   inflict  costs  on  stronger  rivals  while  avoiding  retaliaFon   •  (Yet  rich  and  experienced  states  can  exploit  the  same   technologies  to  enhance  intelligence  and  military  power)  
  • 11. What is a domain? •  DoD  war-­‐fighFng  domains:  sea,  air,  land,  space,  cyber   •  Are  these  disFnct  strategic  environments  or  bureaucraFc  turfs?   •  Space  and  cyber  are  driving  policy  concerns  about  CDD   •  There  are  other  ways  to  parse  the  means  of  influence   •  Military  vs.  non-­‐military  tools   •  Specialized  experFse,  economic  sectors,  or  jurisdicFons   •  Differences  among  domains  are  probably  more  important   analyFcally  than  defining  boundaries  between  them   •  “Cross  domain  deterrence”  is  the  use  of  one  type  of  means  to   dissuade  the  target  from  using  some  other  type  of  means  
  • 12. Agenda •  The  CDD  project     •  CDD  as  a  policy  problem   •  CDD  as  a  theoreFcal  problem  
  • 13. The Conceptual Limits of Cross-Domain Deterrence •  “Domains”  are  arFficial  constructs   •  Underlying  differences  in  capabiliFes  and  environments  are  real   •  DefiniFonal  debates  risk  becoming  “academic”  (angels  +  pins)   •  NaFons  (even  the  United  States)  don’t  just  wish  to  deter   •  Deterrence  implies  a  staFc/limited  noFon  of  influence   •  Symmetry:    if  someone  is  deterring,  others  are  compelling/conquering     •  Even  deterrence  involves  reallocaFng  security  or  influence   •  What  does  it  mean  to  “cross”  a  domain?   •  Arbitrary  boundaries  imply  arbitrary  transiFons   •  CapabiliFes/threats  may  not  be  specific  or  may  be  mulF-­‐  domain  
  • 14. CDD is not new: Actors have long combined or shifted domains for strategic advantage Yet  the  number  and  complexity   of  means  now  available  make  it   hard  to  choose  wisely.  We  need   more  explicit  a^enFon  to  the   logic  of  combinaFon  of  means.   (Deterrence  itself  was  not  new,  but  “ripened”   when  nuclear  weapons  made  it  essenFal  to   consider  security  in  the  absence  of  defense.)  
  • 15. War is politics by many means •  Strategic  bargaining  is  a  contest  between  sets  of  means   and  ends   •  TradiFonal  deterrence  theory  focuses  on  ends   •  PrioriFes,  resolve,  credibility,  mispercepFon   •  The  means  have  usually  been  assumed  to  be  nuclear,  while   consequences  were  generally  characterized  as  existenFal   •  Chicken  games:    “swerving”  is  different  in  a  steam  roller   •  CDD  focuses  on  means  (tension  between  policy/theory)   •  OpFons,  combinaFons,  tradeoffs   •  CDD  relaxes  the  assumpFons  of  tradiFonal  deterrence:    More   means  available,  more  linkages  across  them,  and  more  actors   with  different  porqolios  and  vulnerabiliFes   •  Rock,  paper,  scissors  games  
  • 16. How do means matter? •  The  proliferaFon  of  capabiliFes  for  defense:   •  “porqolio”  approach:    More  of  same  not  as  good  as  variety   •  If  defense  is  increased  by  variaFon  in  capabiliFes…   •  This  must  improve  deterrence  (det.  by  defense)   •  Can  also  produce  deficiencies   •  We  already  know  lots  about  this  tacFcally   •  Combined  arms,  air/land/sea  ba^le  (Biddle)   •  Apply  it  to  deterrence  (strategy/grand  strategy)   •  What  are  “best  response”  acFons  to  threats?   •  Can  we  develop  rules  of  thumb  (similar  to  combined  arms)?   •  Humility  moment   •  Real  limits  to  what  theory  can  do,  but…   •  Decisions  in  anFcipaFon  of  consequences  requires  theory   •  RelaFve  area  of  advantage:    “first”  is  be^er  than  “best”  
  • 17. Unpacking deterrence/TOW •  Deterrence  involves  at  least  three  objecFves:   1.  Reduce  risk  of  escalaFon/war  (accommodaFon)   2.  “Win”  policy  dispute  (internaFonal  “tug-­‐o-­‐war”)   3.  Minimize  cost  of  achieving  first  two  objecFves   •  Tradeoffs  (“speak  somly  AND  carry  a  big  sFck”)   •  If  war  is  a  product  of  different  expectaFons  about  BOP  or  BOT   –  the  informaFonal  theory  of  war   •  Then  deterrent  acFons/capabiliFes/threats  that  minimize   uncertainty  about  BOP/BOT  reduce  the  risk  of  war  (1)   •  ...  But  reducing  uncertainty  does  not  necessarily  maximize  2,  3.   •  Can  also  minimize  risk  of  war  by  conceding  policy  dispute   •  Increasing  condiFons  increases  risk  of  deterrence  failure   •  Use  of  deterrence  is  omen  response  to  low  risk  tolerance  
  • 18. Why act across domains? •  Crossing  domains  can  either:   1.  Alter  BOP/BOT  (presumably  advantage  defender)   2.  Reduce  uncertainty  about  intensions   •  First  cut:    “ComparaFve  advantage”   •  Threaten/deploy  capabiliFes  to  win  if  war  happens   •  Maximize  influence  –  max  BOP/BOT,  diplomaFc  leverage   •  Mobility  is  an  advantage  in  war  but  a  disadvantage  in  signaling   •  Threaten/deploy  capabiliFes  that  make  war  less  likely   •  “Tripwires”  are  bad  military  tacFcs  but  great  for  deterrence   •  Example:    NATO  acFons  in  response  to  Ukrainian  crisis  
  • 19. Why do actors escalate? •  EscalaFon—like  war  itself—reflects  uncertainty   •  Why  take  acFons  that  don’t  deter  in  hindsight?   •  EscalaFon  reflects  effort  to    deter/compel  at  lower  cost.       •  Cross  domain  may  lessen  or  heighten  escalaFon   •  Lessen:    deterrent/compellent  acFons  must  do  more  to   inform  opponents  about  eventual  outcome  of  conflict   •  Heighten:       •  TentaFve  a^empts  to  “win”  indicate  ambivalence   •  Increase  opponent’s  belief  that  persisFng/escalaFng  will  prevail   •  An  increase  in  opFons  _inherently_  increases  uncertainty   •  Actors  themselves  don’t  know  what  they  will  do  in  a  crisis  
  • 20. How do combinations work? •  Tough:    Can  fall  back  on  some  theory/heurisFcs   •  EffecFve  combinaFons  win  wars,  affect  BOP/BOT   •  More  costly/heighten  uncertainty  about  who  will  win   •  Removing  opFons  for  an  opponent  also  creates  a  “wedge”   •  More  likely  to  get  opponent  to  back  down   •  More  likely  to  get  opponent  to  escalate  (which  do  you  prefer?)   •  However,  “hybrid”  combinaFons  may  be  be^er   •  ComparaFve  advantage  could  be  Fed  to  signaling   •  2nd-­‐mover  advantage  (mostly  focus  on  1st  mover)   •  Power  projecFon  creates  depth   •  Especially  useful  in  period  of  status  quo/decline   •  Stability/instability  across  domains   •  No  domain  is  stable/unstable  by  itself  given  CDD  
  • 21. Cyber and space (our final frontier!) •  IniFal  work  by  project  on  cyber:   •  StuxNet  as  model  (Lindsay)   •  The  myth  of  cyber  Pearl  Harbor  (Gartzke)   •  DecepFon  as  alternaFve  strategy  (Gartzke  and  Lindsay)   •  Nature  of  cyber  coercion  (Lindsay  and  Gartzke)   •  Where  we  are  headed:   •  SubsFtutes  and  complements   •  When  is  cyber  used  instead  of  other  capabiliFes?   •  When  is  cyber  used  because  of  other  capabiliFes?   •  Interdependence—similariFes/differences  between   cyber,  nuclear  and  economic  modes  of  interdependence   •  Space—deterrence  in  space  has  never  been  in  space.  
  • 22. Some thoughts about empirics •  PreconcepFon:    cannot  measure  CDD   •  Historical  use  of  CDD/CDC  creates  basis  for  analysis   •  InternaFonal  Crisis  Database   •  Code  domains/capabiliFes  (acFons  and  outcomes  already  coded)   •  Deterrence  data  (Huth)   •  Uncertainty  and  war  project  (Gartzke  and  Kaplow   •  Nuclear  force  structure  project  (Gartzke,  Kaplow  and  Mehta)   •  Space  ISR/launch  data—informaFon  theory,  vulnerabiliFes   •  Modeling/measuring/theorizing   •  Complementarity  of  different  components   •  Caveat:    when  “general”  deterrence  works,  there  is   nothing  to  see  (Russians  not  crossing  German  border)      
  • 23. Interdependence & Multi-polarity •  Interdependence  (economic,  nuclear,  cyber)   •  Increase  consequences  for  unrestricted  warfare   •  Deterrent  effect  on  escalaFon  (fewer  big  contests)   •  Decrease  consequences  of  restricted  forms  of  conflict   •  Stability/instability  paradox  (more  lower  intensity  contests)   •  Passive  effect  of  interdep.  (PuFn:    sancFons  vs  markets)   •  MulFpolarity   •  Increased  uncertainty  (inherent  increase  in  conflicts)   •  Pivotal  paradox:    declining  US  leverage  with  enemies  actually   increases  US  leverage  with  its  (many)  friends.     •  More  and  more  circumspect  contests   •  Increased  use  of  asymmetric  capabiliFes  (on  both  sides)   •  A  “rock/paper/scissors/…  carrots/sFcks”  world   •  Worth  understanding  how  these  offsets  work,  are  exploited  
  • 24. Thank you! rock   paper   scissors   sFcks  and  carrots   cyberwar!