{"id":42,"date":"2020-11-05T09:24:23","date_gmt":"2020-11-05T14:24:23","guid":{"rendered":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/?page_id=42"},"modified":"2020-12-21T17:00:04","modified_gmt":"2020-12-21T22:00:04","slug":"expert-opinions","status":"publish","type":"page","link":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/expert-opinions\/","title":{"rendered":"Expert Opinions"},"content":{"rendered":"<h2><strong>Nuclear deterrence and compellence during and after the Cold War<\/strong><\/h2>\n<p><strong>Thomas Schelling argues that\u00a0while methods of war during and after the Cold War are fundamentally different as a result of their different tools, the principles of deterrence and compellence still underlie all conflict and operate in the same ways now as they did before and during the Cold War.<\/strong> In basic terms, Schelling defines compellence as \u201cA threat intended to make an adversary do something\u201d while deterrence is \u201ca threat intended to keep him from starting something.\u201d<sup>1\u00a0<\/sup>Deterrence is based on &#8220;<em>estimating <\/em>enemy intentions [as well as]\u00a0<em>influencing <\/em>them.\u201d<sup>2<\/sup>\u00a0The method of influencing actions relies on the fundamental choice that the state being deterred must make &#8211; go forward and I get punished, or retreat and I do not &#8211; and either side of that choice must be credible.<sup>3<\/sup>\u00a0Compellence and deterrence underlie the actions of the Cold War as well as military actions in the post-war period. Just like actors could deter enemies by nuclear weapons, they can deter enemies using the threat of cyberattacks and 4GW.<\/p>\n<p><strong>Avery Goldstein argues that\u00a0<span style=\"font-size: 1rem\">Pre-Cold War strategies <\/span><\/strong><span style=\"font-size: 1rem\"><strong>like dissuasion by deterrence still apply in the post-Cold War period.<\/strong> <img loading=\"lazy\" decoding=\"async\" class=\"wp-image-173 alignleft\" style=\"margin-top: 0.857143rem;margin-right: 1.71429rem;margin-bottom: 0.857143rem\" src=\"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-content\/uploads\/sites\/491\/2020\/12\/20201217T0745-NUCLEAR-WEBINAR-GALLAGHER-1011181-e1608227168867-1300x788-1-300x182.jpg\" alt=\"\" width=\"271\" height=\"164\" srcset=\"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-content\/uploads\/sites\/491\/2020\/12\/20201217T0745-NUCLEAR-WEBINAR-GALLAGHER-1011181-e1608227168867-1300x788-1-300x182.jpg 300w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-content\/uploads\/sites\/491\/2020\/12\/20201217T0745-NUCLEAR-WEBINAR-GALLAGHER-1011181-e1608227168867-1300x788-1-1024x621.jpg 1024w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-content\/uploads\/sites\/491\/2020\/12\/20201217T0745-NUCLEAR-WEBINAR-GALLAGHER-1011181-e1608227168867-1300x788-1-768x466.jpg 768w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-content\/uploads\/sites\/491\/2020\/12\/20201217T0745-NUCLEAR-WEBINAR-GALLAGHER-1011181-e1608227168867-1300x788-1-624x378.jpg 624w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-content\/uploads\/sites\/491\/2020\/12\/20201217T0745-NUCLEAR-WEBINAR-GALLAGHER-1011181-e1608227168867-1300x788-1.jpg 1300w\" sizes=\"auto, (max-width: 271px) 100vw, 271px\" \/>Like a nuclear bomb, a cyberattack could be used to \u201cthreaten to punish the adversary in ways so terrifying he dares not initiate a challenge, regardless of his ability to actually achieve narrow military objectives&#8230;\u00a0 [but] the means of punishment are not essential to the strategy.\u201d<sup>3<\/sup> Goldstein reminds us that, \u201cThere is no principle reason why conventional, chemical, or biological weapons cannot be the chosen means for fulfilling this dissuasive strategy\u2019s requirements.\u201d<sup>5<\/sup> Likewise, there is no reason why cyberwarfare cannot be the chosen means for fulfilling dissuasion by deterrence. Dissuasion by defense is another tactic that can be applied using modern techniques of warfare. A cyberattack could be used to \u201cdiscourage the adversary from challenging the status quo by threatening to co<\/span><span style=\"font-size: 1rem\">nfront him with insurmountable obstacles to achieving his military objectives.\u201d<sup>6<\/sup> While the core fundamentals of deterrence, compellence, dissuasion by deterrence, and dissuasion by defense are applicable in modern warfare today, the U.S. should keep in mind that \u201cThe military technology available to states in every historical era shapes decisions about how resources can best be employed to pursue national interests.\u201d<sup>7<\/sup> Thus, while the U.S. can rely on these<\/span><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-210 alignright\" style=\"font-size: 1rem\" src=\"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-content\/uploads\/sites\/491\/2020\/12\/image1-1-300x169.jpg\" alt=\"\" width=\"266\" height=\"150\" srcset=\"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-content\/uploads\/sites\/491\/2020\/12\/image1-1-300x169.jpg 300w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-content\/uploads\/sites\/491\/2020\/12\/image1-1.jpg 480w\" sizes=\"auto, (max-width: 266px) 100vw, 266px\" \/><span style=\"font-size: 1rem\">underlying principles, it should expect there to be significant differences in the tactics of war and the specifics of how war is carried out. Like \u201cthe advent of nuclear weapons drastically changed the military-strategic environment,\u201d<\/span><sup>8<\/sup><span style=\"font-size: 1rem\"> in a parallel way, so did the switch from nuclear weapons to the advent of cyberwarfare.<\/span><\/p>\n<h2>Setting the Stage for the Cold War and the Future of U.S. Security<\/h2>\n<p><strong>In contrast to earlier years where threats were mostly based on the strength of classically defined armies, 1947 represented a fundamental shift into a world where threats were less predictable, were ever-moving targets, and often had no satisfactory solutions.<\/strong> Smoke describes the changed state of international security as of 1947, saying that &#8220;threats could appear across a wide and growing spectrum of violence, could appear very suddenly in a military strike; could evolve into new technological forms quickly; and could be coupled with thoroughly intolerable political demands.<sup>9\u00a0<\/sup>Increasing ideological differences heightened the security risk brought on by new weapons and a changed security rulebook. The\u00a0overall political situation was not a calm one, and there were increasing concerns about impending disaster on both sides. By 1947, increasing fears about capitalism versus communism were beginning to rise, brought forward by the Marshall Plan. The U.S.S.R. began to feel threatened by what they saw as an &#8220;intervention&#8221; of capitalism into the European social order.<sup>10\u00a0<\/sup>Likewise, the &#8220;security question&#8221; of the U.S.S.R. began to intrude into the collective American psyche as well as into the U.S. government. As Goldstein puts it, &#8220;the concept of &#8216;collective security'&#8221; had failed, and the doctrine of Soviet containment was introduced, ultimately leading to a restructuring of the U.S. government to make a plan for dealing with this new risk.<sup>11\u00a0<\/sup><\/p>\n<h2><strong>Cyberwarfare and Cybersecurity Threats<\/strong><\/h2>\n<p><strong>Singer and Friedman point out that in the realm of cyber warfare, the basic principles of offense and defense no longer apply.<\/strong> Unlike in the Cold War, the strength of an offense is closely tied to its resources. Whereas Israel or Iran may be able to make or obtain a nuclear bomb, neither is able to build a complex cyberwarfare artillery capable of staging hacks into the servers of the global superpowers. Likewise, while defense by deterrence only requires that you have a nuclear bomb (which can be obtained as easily as another state giving it to you during a period or act of nuclear proliferation), defense in the cyberwarfare realm requires that you \u201cactually [have] a good defense.\u201d<sup>12<\/sup>\u00a0Singer and Friedman point out that cybersecurity defense employs the \u201ctraditional offense-defense balances\u201d whereas nuclear defense involves far less predictability and allows for more deterrence of the strong by the weak, whereas it is clear that large-scale cyberwarfare is a tool of the wealthy.<\/p>\n<h2><strong>4GW in the Cold War and Beyond<\/strong><\/h2>\n<p><span style=\"font-size: 1rem\"><strong>Hammes shows us how inferior military powers can overcome superior ones through the use of 4GW. Fourth-generation warfare uses its &#8220;firm political base among the masses of people&#8230; to wear down an enemy\u2019s superior military power.\u201d<sup>13<\/sup><\/strong>\u00a0<\/span><span style=\"font-size: 1rem\">As we\u2019ve learned from the Vietnam War, the principles of 4GW are very effective and are often essential to a particular side&#8217;s success. Superpowers should\u00a0 invest in understanding and learning the tactics of 4GW, as \u201cpolitical, demographi<\/span><span style=\"font-size: 1rem\">c, and religio<\/span><span style=\"font-size: 1rem\">us trends since World War II indicate that the future wars w<\/span><span style=\"font-size: 1rem\">ill be complex, confusing, and nasty 4GW struggles rather than the simpler conflicts of earlier generations.<sup>14\u00a0<\/sup>The transition to 4GW that took place during the Cold War represents an important shift that is expected to continue in the future and that the U.S. should not ignore in its current and future military planning.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-192 aligncenter\" style=\"margin: 0.857143rem 1.71429rem\" src=\"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-content\/uploads\/sites\/491\/2020\/12\/S3678-1024x677-1-300x198.jpg\" alt=\"\" width=\"331\" height=\"218\" srcset=\"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-content\/uploads\/sites\/491\/2020\/12\/S3678-1024x677-1-300x198.jpg 300w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-content\/uploads\/sites\/491\/2020\/12\/S3678-1024x677-1-768x508.jpg 768w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-content\/uploads\/sites\/491\/2020\/12\/S3678-1024x677-1-624x413.jpg 624w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-content\/uploads\/sites\/491\/2020\/12\/S3678-1024x677-1.jpg 1024w\" sizes=\"auto, (max-width: 331px) 100vw, 331px\" \/><\/p>\n<p><strong>Nagl argues that in the post-Cold War\u00a0period, it is essential that the U.S. military pay attention to irregular warfare.<\/strong>\u00a0Nagl points out that\u00a0the wars in Iraq and Afghanistan &#8220;have spurred long-overdue changes in the way the U.S. military prepares for and prioritizes irregular warfare.&#8221;<sup>15<\/sup> Not making such changes has costed the U.S. money and the lives of American soldiers. Nagl reminds us that, enemies are not likely to &#8220;play to America&#8217;s strengths by fighting conventionally rather than through proven, cost-effective, insurgent-like&#8230;strategies.&#8221;<sup>16<\/sup> Thus, it would be strategically advantageous &#8211; saving cost and American soldiers&#8217; lives &#8211; to prepare military strategies that can fight insurgents head-on rather than try to overpower them with tanks, which will likely fail in the modern warfare era.<\/p>\n<h3><strong>Just War Theory in the Cold War and Beyond<\/strong><\/h3>\n<p><strong>Walzer\u00a0shows that \u00a0war efforts in the post-Cold War era should rely on the principle of Just War Theory.<\/strong> Walzer describes that from a moral as well as political standpoint, \u201conce we have acted in ways that have significant negative consequences for other people, we cannot just walk away. \u201d<sup>17<\/sup> Indeed, morality can have practical utility, because &#8220;a successful\u00a0and extended intervention brings benefits of an important kind: not only gratitude and friendship, but an increment of peace and stability in a world where the insufficiency of both is costly&#8221;<sup>18<\/sup> to both the victims and the helpers. After conflicts in Libya, Iraq, Syria, and Afghanistan, it is clear that, from a strategically pragmatic standpoint as well as a moral one, in order\u00a0for the U.S. to succeed militarily, it must commit to the principles of just war theory espoused by Walzer.<\/p>\n<div class=\"page\" title=\"Page 4\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<ol>\n<li>Schelling, Thomas. Arms and Influence, (Yale University Press, 1966) pp. 69.<\/li>\n<li>Schelling, Thomas, 69.<\/li>\n<li>Schelling, Thomas, pp. 74-75.<\/li>\n<li>Goldstein, Avery. Deterrence and Security in the 21st Century, (Stanford, 2000) 28.<\/li>\n<li>Goldstein, Avery, 28.<\/li>\n<li>Goldstein, Avery, 29.<\/li>\n<li>Goldstein, Avery, 41.<\/li>\n<li>Goldstein, Avery, 41.<\/li>\n<li>Smoke, Richard. <i>National Security and the Nuclear Dilemma<\/i> (McGraw Hill, 1992), 21.<\/li>\n<li>Smoke, Richard, 36.<\/li>\n<li>Smoke, Richard, 37<\/li>\n<li>Singer, W.P. and Allen Friedman. Cybersecurity and Cyberwar: What Everyone Needs to Know, (Oxford University Press, 2014), 155.<\/li>\n<li>Hammes, Thomas X.\u00a0<em>The Sling and the Stone<\/em>, (Zenith Press, 2006), pp. 53.<\/li>\n<li>Hammes, Thomas X, 75.<\/li>\n<li><span style=\"font-weight: 400\">Nagl, John A. \u201cLet\u2019s Win the Wars We\u2019re In,\u201d <\/span><i><span style=\"font-weight: 400\">JFQ: Joint Force Quarterly, <\/span><\/i><span style=\"font-weight: 400\">No. 52 (1st Quarter 2009), 20.<\/span><\/li>\n<li>Nagl, John A., 26.<\/li>\n<li>Walzer, Michael. \u201cThe Triumph of Just War Theory (and the Dangers of Success).\u201d <i>Social Research <\/i>69:4 (Winter 2002): 940.<\/li>\n<li>Walzer, Michael, 940.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>Image Sources<\/p>\n<ol>\n<li>\u201cNuclear Deterrence Gives \u2018False Sense of Security,\u2019 Vatican Official Says,\u201d Catholic Philly, accessed December 19, 2020, https:\/\/catholicphilly.com\/2020\/12\/news\/world-news\/nuclear-deterrence-gives-false-sense-of-security-vatican-official-says\/.<\/li>\n<li>Hugh Oliver, \u201cNuclear Deterrence and Profit Maximisation &#8211; Economics Student Society of Australia (ESSA) Economics Student Society of Australia (ESSA),\u201d ESSA, August 10, 2013, http:\/\/economicstudents.com\/2013\/08\/nuclear-deterrence-and-profit-maximisation\/.<\/li>\n<li>Christina Knight, \u201cVietnam War Questions Answered | THIRTEEN &#8211; New York Public Media,\u201d Thirteen &#8211; Media Impact, August 29, 2018, https:\/\/www.thirteen.org\/blog-post\/vietnam-war-questions-answered\/.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Nuclear deterrence and compellence during and after the Cold War Thomas Schelling argues that\u00a0while methods of war during and after the Cold War are fundamentally different as a result of their different tools, the principles of deterrence and compellence still underlie all conflict and operate in the same ways now as they did before and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-42","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-json\/wp\/v2\/pages\/42","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-json\/wp\/v2\/comments?post=42"}],"version-history":[{"count":0,"href":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-json\/wp\/v2\/pages\/42\/revisions"}],"wp:attachment":[{"href":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-red-bull\/wp-json\/wp\/v2\/media?parent=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}