{"id":42,"date":"2020-11-05T09:24:23","date_gmt":"2020-11-05T14:24:23","guid":{"rendered":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/?page_id=42"},"modified":"2020-12-15T23:07:40","modified_gmt":"2020-12-16T04:07:40","slug":"expert-opinions","status":"publish","type":"page","link":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/expert-opinions\/","title":{"rendered":"Expert Opinions"},"content":{"rendered":"<h3><b>The Cold War, nuclear deterrence, and the indirect use of force<\/b><\/h3>\n<p><strong>Thomas\u00a0<\/strong><span style=\"font-weight: 400\"><strong>Schelling distinguishes between compellent and deterrent threats<\/strong> and how they are utilized as instruments of power to achieve political goals. Deterrent threats are passive and involve an actor vowing to use force should an adversary pursue a certain policy (Schelling, 1966, 71). Meanwhile, compellent threats involve initiating an action or threatening action that will be sustained until an adversary performs the desired action (Schelling, 1966, 73). As Schelling notes, deterrent threats are simpler and easier to communicate to an adversary than compellent threats. Deterrent threats are often communicated through necessary preparations for sustaining the status-quo and are, in turn, confirmed and demonstrated over time through an actor\u2019s response to their adversary\u2019s inaction (Schelling, 1966, 74). The assurances and credibility of compellent threats, as well as the consequences for non-compliance, are harder to demonstrate in advance and tend to be reactionary and less passive (Schelling, 1966, 78).<\/span><\/p>\n<p><strong>Avery\u00a0<\/strong><span style=\"font-weight: 400\"><strong>Goldstein&#8217;s typology describes how military force is used,<\/strong> the goals such force seeks to achieve, and the military means and strategies used to achieve these goals (Goldstein, 2000, 26). Goldstein argues that force can be utilized primarily in two ways: directly or indirectly. States utilize the direct use of force when they seek to achieve military objectives, for example by destroying a physical target that disadvantages their adversary (Goldstein, 2000, 26).\u00a0 When states hold their military force in reserve to change the psychological calculations of their adversary, they are employing in the indirect use of force (Goldstein, 2000, 27). In this sense, a strategy utilizing the indirect use of force is successful when the major military action or threat remains unused (Goldstein, 2000, 29). Regarding military objectives, the indirect use of force is used to either maintain the status quo through deterrence or change the status quo through compellence.<\/span><\/p>\n<div id=\"attachment_189\" style=\"width: 422px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-189\" class=\"wp-image-189\" src=\"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-content\/uploads\/sites\/492\/2020\/12\/1000-300x200.jpeg\" alt=\"\" width=\"412\" height=\"274\" srcset=\"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-content\/uploads\/sites\/492\/2020\/12\/1000-300x200.jpeg 300w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-content\/uploads\/sites\/492\/2020\/12\/1000-768x511.jpeg 768w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-content\/uploads\/sites\/492\/2020\/12\/1000-624x416.jpeg 624w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-content\/uploads\/sites\/492\/2020\/12\/1000.jpeg 1000w\" sizes=\"auto, (max-width: 412px) 100vw, 412px\" \/><p id=\"caption-attachment-189\" class=\"wp-caption-text\">A nuclear missile at a military parade in Pyongyang, North Korea (AP Photo\/Wong Maye-E, File)<\/p><\/div>\n<p><span style=\"font-weight: 400\">For example, nuclear weapons are used as deterrent threats to maintain the status quo and are most successful when they are not used for solely physical destruction (Goldstein, 2000, 28). In contrast, states may use conventional military force to change the status quo by relying on threats to inflict unacceptable punishment if their adversary does not swiftly comply (Goldstein, 2000, 31).<\/span><\/p>\n<p><span style=\"font-weight: 400\"><strong>Richard Smoke delineates the intricacies of the Cold War<\/strong> and the beginning of great powers amassing military capabilities in times of peace. These two topics have important considerations for understanding contemporary nuclear deterrence and international security strategies. In the aftermath of World War II, Soviet aggression and heightened influence triggered the U.S. to pass the National Security Act of 1947 which established the Department of Defense, the Joint Chiefs of Staff, the Central intelligence Agency and the National Security Council. Smoke says that this represents the first period of large, continuous military expenditures in times of peace in order to ensure national and international security (Smoke, 1991, 45). Additionally, the U.S. had to provide economic and military assistance to Western Europe in order to deter possible Soviet invasions which was previously supplied by America\u2019s status as the sole nuclear power (Smoke, 1991, 58). After the Soviet\u2019s successful atomic test, America knew it would soon be faced with a nuclear counterpart that could ensure mutually assured destruction (Smoke, 1991, 58). Any American or Allied attack on Soviet cities could trigger a nuclear strike which changed traditional military and international security strategies.<\/span><\/p>\n<hr \/>\n<h3><b>4GW &amp; Trends Since the Cold War<\/b><\/h3>\n<p><span style=\"font-weight: 400\"><strong>Thomas Hammes offers an overview of the generations of warfare,<\/strong> emphasizing how \u201ceach succeeding generation reached deeper into the enemy\u2019s territory in an effort to defeat him\u201d (2006, 31). Currently, the fourth-generation warfare (4GW) climate has meant that traditional military capabilities are less effective. Rather, the ability to \u201c[attack] the minds of enemy decision makers to destroy the enemy\u2019s political will\u201d is of increased importance (2006, 2). The ability to persuade, then, relies on the indirect use of force to coerce adversaries and achieve political and military objectives. Hammes credits Mao with outlining the fundamentals of 4GW and insurgent strategy during the Chinese Civil War. Mao emphasized civilian support, as they would provide an \u201cintelligence network, a constant source of manpower, and resources in the form of food and labor\u201d (47). Mao&#8217;s three phases of an insurgency emphasize the slow and categorized consolidation of power, wherein flexibility between phases is required when battling a more advantaged conventional power (54). While 4GW emerged during the Cold War, and whose elements of insurgency were present prior to the Cold War, the emergence of increased non-state actors, state actors, and the \u201cgrowth of international organizations\u201d like the UN and World Bank, complicates war and thus, de-incentivizes our resort to military conflict (33). Since \u201call sectors of society are becoming networked on an international scale\u201d the increased actors during international conflict guarantees that countries enter into military conflicts with adversaries who already have access to your internal networks in some capacities (42).<\/span><\/p>\n<p><strong>Andrew Mack outlines the difficulties modern\u00a0armies\u00a0face when engaged in &#8216;small wars&#8217;. \u00a0<\/strong>The Vietnam War further helps us understand how insurgencies are fundamental ways of fighting in 4GW. The rising success of insurgencies are a result of the increased involvement of civilians in international warfare. 4GW is defined by asymmetric warfare, where \u201cthe war is \u2018total\u2019\u201d for one side, \u201cwhile for the external power it is necessarily \u2018limited\u2019\u201d (181). Not only were the insurgents less likely to give up, but they garnered more public support out of an \u201casymmetry in resource power,\u201d which created a \u201ccommon hostility felt towards the external enemy\u201d (182). Asymmetric warfare also negatively impacts support for military intervention in the population of the foreign state: \u201cA war with no visible payoff against an opponent who poses no direct threat will come under increasing criticism as battle casualties rise and economic costs escalate\u201d (185).<\/p>\n<div id=\"attachment_196\" style=\"width: 557px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-196\" class=\" wp-image-196\" src=\"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-content\/uploads\/sites\/492\/2020\/12\/190222-warren-cia-vietnam-war-hero_vfonri-300x169.jpeg\" alt=\"\" width=\"547\" height=\"308\" srcset=\"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-content\/uploads\/sites\/492\/2020\/12\/190222-warren-cia-vietnam-war-hero_vfonri-300x169.jpeg 300w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-content\/uploads\/sites\/492\/2020\/12\/190222-warren-cia-vietnam-war-hero_vfonri-1024x576.jpeg 1024w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-content\/uploads\/sites\/492\/2020\/12\/190222-warren-cia-vietnam-war-hero_vfonri-768x432.jpeg 768w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-content\/uploads\/sites\/492\/2020\/12\/190222-warren-cia-vietnam-war-hero_vfonri-1536x864.jpeg 1536w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-content\/uploads\/sites\/492\/2020\/12\/190222-warren-cia-vietnam-war-hero_vfonri-624x351.jpeg 624w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-content\/uploads\/sites\/492\/2020\/12\/190222-warren-cia-vietnam-war-hero_vfonri.jpeg 1566w\" sizes=\"auto, (max-width: 547px) 100vw, 547px\" \/><p id=\"caption-attachment-196\" class=\"wp-caption-text\">Larry Burrows<\/p><\/div>\n<p>The involvement of the domestic public in supporting the foreign intervention, while the foreign public limits their ability to mobilize, echoes the trend in warfare where the \u201cpolity and social institutions\u201d are \u201cultimately more decisive\u201d in a side\u2019s victory (177).<\/p>\n<p><span style=\"font-weight: 400\"><strong>John Nagl argues that conventional military intervention, such as the use of \u201cfield artillery\u201d is less important in warfare today<\/strong> (2009, 20). Instead, the army should continue to \u201clearn and adapt to counterinsurgency\u2026 warfare\u201d (21). Adapting recognizes that fourth-generation warfare requires a very flexible strategy as we transition into a form of warfare that is constantly changing: \u201cstate and nonstate enemies will seek more asymmetric ways to challenge the United States\u201d (25). The need to adapt also arises out of the \u201cdoctrinal and organizational rigidity\u201d of our own military, which has \u201cfailed to begin institutionalizing counterinsurgency learning until\u2026 2006\u201d (22-23). Therefore, while the United States has been more successful in conventional strategies even after the Cold War, today those strategies are no longer sufficient.<\/span><\/p>\n<p><span style=\"font-weight: 400\"><strong>Polyakova and Boyer argue that although technology is not solely responsible for bringing about 4GW,<\/strong> it has since yielded cheaper and more efficient ways to infiltrate an adversary\u2019s society. More specifically, \u201ccyberattacks and disinformation campaigns\u201d typically target the public sphere in order to stir disorder in democratic societies (2018, 1). The anonymity that cyber-attacks allow, also leaves less accountability for \u201cunintended consequences and ambiguous results\u201d which further accentuates the increased need for adaptability in 4GW (2). Lastly, while cyber-attacks are still a concern, the introduction of information war further echoes the increased public participation in war, as it recognizes that public unrest will make military decisions more difficult for leaders.<\/span><\/p>\n<hr \/>\n<h3><b>Terrorism<\/b><\/h3>\n<p><span style=\"font-weight: 400\">The strategic model asserts that terrorism can be defined as violence or the threat of violence \u201cdirected in pursuit of\u2026 a political aim\u201d (Hoffman, 2015, 15). According to this logic, terrorists are rational actors who use the indirect use of force expressly to achieve \u201cconsistent political goals\u201d that are formally adopted as part of their organization\u2019s platform (Abrahms, 2008, 80). A more thorough analysis, however, reveals the strategic model\u2019s contradictions, including its coercive ineffectiveness, the reality that \u201cterrorist attacks on civilians have historically empowered hard-liners\u201d who effectively become committed to blocking terrorists from achieving their political goals (Abrahms, 2008, 83). Evidently the ultimate aim of terrorists is not to achieve prescribed political goals. In other words, the strategic model is flawed.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Instead, a consideration of empirical evidence and the natural systems model of organization theory reveals that \u201cpeople participate in terrorist organizations\u2026 to develop strong affective ties with fellow terrorists\u201d (Abrahms, 2008, 103). While the prevailing assumption by policymakers and scholars has been that terrorists and would-be terrorists are uneducated and impoverished, in reality the overwhelming majority of Salafi terrorists have received some post-secondary education and are from middle or upper class families (Sageman, 2013, 521).<\/span><\/p>\n<p><span style=\"font-weight: 400\">That terrorists recruits are often lonely and seek social solidarity\u2014 as opposed to being uneducated and impoverished\u2014 has profound implications for international security and states\u2019 efforts to curb terrorist recruitment. Since rank and file members of terrorist organizations seek affective community ties (unlike their leaders who may well have political motivations in line with the strategic model), states should pursue policies that \u201creduce the demand for at-risk populations to turn to terrorist organizations in the first place\u201d (Abrahms, 2008, 105). In the case of Salafi terrorism, rather than democracy promotion or erroneously relying on education, this would involve countering \u201cMuslims\u2019 sense of alienation from democratic societies\u201d by fostering inclusivity and encouraging moderate civil society organizations (Abrahms, 2008, 105). Such policies would provide at-risk populations with the community and sense of belonging that they otherwise seek by joining terrorist organizations.<\/span><\/p>\n<hr \/>\n<p><b>Power in international\u00a0security<\/b><\/p>\n<p><span style=\"font-weight: 400\">Joseph Nye provides a contemporary analysis of power in the international arena. Nye consolidates modern power into three types. First, hard power is a function of coercion and uses top-down force to attain political ends. Second, soft power is a function of influence and attraction that persuades other international actors to act a certain way.<\/span><\/p>\n<div id=\"attachment_201\" style=\"width: 426px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-201\" class=\" wp-image-201\" src=\"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-content\/uploads\/sites\/492\/2020\/12\/1_16a08347b77.1549698_1290919884_16a08347b77_large-300x178.jpg\" alt=\"\" width=\"416\" height=\"247\" srcset=\"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-content\/uploads\/sites\/492\/2020\/12\/1_16a08347b77.1549698_1290919884_16a08347b77_large-300x178.jpg 300w, https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-content\/uploads\/sites\/492\/2020\/12\/1_16a08347b77.1549698_1290919884_16a08347b77_large.jpg 538w\" sizes=\"auto, (max-width: 416px) 100vw, 416px\" \/><p id=\"caption-attachment-201\" class=\"wp-caption-text\">Luis Vazquez\/Gulf News<\/p><\/div>\n<p><span style=\"font-weight: 400\">Lastly, Nye coins the term smart power to describe the combination of both soft and hard power (Nye, 2011, xv). In an increasingly globalized world, Nye argues that power must be thought in terms of the ability to accomplish goals that involves power <\/span><i><span style=\"font-weight: 400\">with <\/span><\/i><span style=\"font-weight: 400\">other international actors rather than power <\/span><i><span style=\"font-weight: 400\">over<\/span><\/i><span style=\"font-weight: 400\"> others (Nye, 2011, xvii). This change is also due in part to an increasingly crowded international arena with non-state actors and the polarized divide between western powers and eastern powers. Nye argues that the U.S., though rich in economic resources and hard power, has a problem with power conversion or the ability to translate resources into effective influence and soft power (Nye, 2011, 198). The U.S. has continually relied on conventional military force and hard power (i.e., the Defense Department) rather than diplomacy and soft power (i.e., the State Department) to accomplish its political and national security objectives (Nye, 2011, 153). Nye\u2019s assessment entails several considerations for contemporary international security, mainly how the U.S. must improve the conventional tactics it used to confront the Soviet Union during the Cold War to address the current rise of China.<\/span><\/p>\n<p><span style=\"font-weight: 400\">G. Ikenberry adjusts the realist perspective on the global power competition between the U.S. and China arguing that the international order China confronts is substantially different that those previously confronted by emerging powers like the Soviet Union (Ikenberry, 2008, 24). Since multiple states have nuclear striking capabilities, conventional military conflicts amongst great powers have become increasingly unlikely forcing international actors to exert influence and power through novel pathways. Ikeneberry argues that the United Sates\u2019 \u201cunipolar moment\u2019 as the sole superpower will inevitably end but this event does not ensure that China will be its replacement (Ikenberry, 2008, 25). Rather, Ikenberry argues that China is in competition with the Western order and its liberal-democratic institutions that are extremely durable and able to accommodate rising powers (Ikenberry, 2008, 31). Furthermore, due to the importance of western institutions like the World Trade Organization, Ikenberry argues that China\u2019s path to becoming a global power runs through the Western order which the United States could use to its advantage if it rejects isolationism, traditional assumptions of global power struggles and enforces the existing frameworks (Ikenberry, 2008, 32). Ikenberry\u2019s assessment of U.S. China relations is especially valuable in light of the incoming Biden administration who, he argues, must renew its support for multilateral institutions and strengthen its ties with western allies.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cold War, nuclear deterrence, and the indirect use of force Thomas\u00a0Schelling distinguishes between compellent and deterrent threats and how they are utilized as instruments of power to achieve political goals. Deterrent threats are passive and involve an actor vowing to use force should an adversary pursue a certain policy (Schelling, 1966, 71). Meanwhile, compellent [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-42","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-json\/wp\/v2\/pages\/42","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-json\/wp\/v2\/comments?post=42"}],"version-history":[{"count":0,"href":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-json\/wp\/v2\/pages\/42\/revisions"}],"wp:attachment":[{"href":"https:\/\/courses.bowdoin.edu\/government-legal-studies-2680-fall-2020-yellow-jackets\/wp-json\/wp\/v2\/media?parent=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}