Sei sulla pagina 1di 8

Strategic Forum

No. 225
January 2007
Institute for National Strategic Studies
National Defense University
http://www.ndu.edu/inss

Can Deterrence Be Tailored?


by M. Elaine Bunn

North Korea’s nuclear weapons test is only tion. That said, there is nothing immutable
Key Points the latest illustration of how dramatically the about how the concept should be applied in
international security environment has changed the face of an evolving security environment.
Deterrence, the hallmark of Cold War–era over the last 15 years. Given the wider variety of To comprehend the tailored deterrence con-
security, needs to be adapted to fit the more
volatile security environment of the 21st century.
actors that could inflict mass casualties upon cept fully and the challenges of implementing
The Bush administration has outlined a concept the United States, its allies, or its interests, it it effectively, three facets critical to assessing its
for tailored deterrence to address the distinctive makes sense to explore whether and how deter- viability must be explicated:
challenges posed by advanced military com- rence could be adapted, adjusted, and made to ■ Tailoring to specific actors and specific sit-
petitors, regional powers armed with weapons fit 21st-century challenges. uations: Some believe the primary contribution of
of mass destruction (WMD), and nonstate In its 2006 Quadrennial Defense Review the tailored deterrence concept is that the differenti-
terrorist networks—while assuring allies and (QDR) Report, the Bush administration set forth ation among deterrees would emphasize the need to
dissuading potential competitors. understand each potential adversary’s decision calcu-
a vision for tailored deterrence, continuing a
The goal of deterrence is to prevent ag-
shift from a one-size-fits-all notion of deterrence lus. As one analyst put it, tailored deterrence is “con-
gressive action or WMD use by ensuring that,
in the mind of a potential adversary, the risks of toward more adaptable approaches suitable for text specific and culturally sensitive.”2
the action outweigh the benefits, while taking advanced military competitors, regional weap- ■ Tailoring capabilities: Some draw attention

into account the consequences of inaction. ons of mass destruction (WMD) states, as well as to the need for clarity regarding what kinds of capa-
Deterrence requires detailed knowledge nonstate terrorist networks, while assuring allies bilities—either broadly or narrowly defined—would
of the society and leadership that we seek to and dissuading potential competitors.1 be needed for tailored deterrence, a question that
influence. U.S. decisionmakers will need a con- raises potentially large programmatic (that is, new
The QDR was the first official U.S. pub-
tinuing set of comprehensive country or group or modified weapons and platforms) and resource
deterrence assessments, drawing on expertise
lic document to use the term tailored deter-
rence. But the QDR did not explain in much implications. The precise capabilities for any par-
in and out of government, in order to tailor deter-
detail what the newly coined term means or how ticular adversary and scenario would be tailored by
rence to specific actors and specific situations.
choosing a particular mix among all those available.
The capabilities needed for tailored deter- it might be achieved. This has led to a number
rence go beyond nuclear weapons and the stra- ■ Tailoring communications: Others focus
of questions: How does tailored deterrence dif-
tegic capabilities of the so-called New Triad, to fer from previous strategies? Whom is the United on the distinctive problem of communicating
the full range of military capabilities, presence, intent—specifically the kinds of messages the United
States trying to deter, from doing what, and in
and cooperation, as well as diplomatic, infor- States would send in its words or actions that con-
mational, and economic instruments.
what circumstances? What does one need to
tribute to (or detract from) its efforts to deter specific
The clarity and credibility of American know in order to deter in each case? How should
actors, in both peacetime and crisis situations.
messages in the mind of the deterree are capabilities be tailored for deterrence? How can
The QDR was only one step in the hard
critical to tailoring deterrence threats. U.S. the United States tailor deterrence when, given
work needed to flesh out the concepts and capa-
policymakers need mechanisms to assess how global communications, messages tailored to
their words and actions are perceived, how they bilities underlying tailored deterrence. Defense
one audience will be received by all?
affect each adversary’s deterrence calculations, Department leaders have emphasized the need
Deterrence aims to prevent a hostile action
and how they might mitigate misperceptions to reinvigorate intellectual debate on deterrence
(for example, aggression or WMD use) by ensur-
that undermine deterrence. and dissuasion and to stimulate those outside of
ing that, in the mind of a potential adversary,
government to think through these issues.3
the risks of action outweigh the benefits, while
This essay looks in greater detail at each of
taking into account the consequences of inac-
these three aspects: who is being deterred; what

No. 225, January 2007 Strategic Forum   


capabilities are needed in order to deter; and either through increasing the costs or decreas- path, such as acquiring, enhancing, or increas-
how messages are communicated for deterrence ing the gains. ing threatening capabilities.9 For instance, one
purposes. While specialists can and do give dif- Although tailored deterrence is a new deters WMD use but dissuades acquisition of
ferent weight to these variables, only by answer- term, the concepts underlying it—the need WMD. More broadly, one deters aggression but
ing all three of these questions can the efficacy to adjust deterrence to each of a wide range of dissuades acquisition (or improvement) of the
of the concept of tailored deterrence be judged. potential opponents, actions, and situations, means of aggression. However, both are focused
and a wider range of capabilities that contrib-
Past and Future ute to deterrence—are not new and have been
both deterrence and
evolving for some time.5 The most cogent cur-
The evolution of American thinking about dissuasion require
rent definition of deterrence is in the Deterrence
deterrence can be characterized, in broad terms,
as moving from deterring one actor during the
Operations Joint Operating Concept (DO JOC),6 “getting into the
written in 2004 and revised in 2006. The DO JOC
Cold War to multiple actors now; and from an heads” of others
states that the objective of deterrence operations
emphasis on deterrence by threat of punishment
is “to decisively influence the adversary’s deci-
(imposing costs/risks) in the Cold War, to an
sion-making calculus in order to prevent hos- on influencing the decisions of others, and both
emphasis today on deterrence by denial (deny-
tile actions against U.S. vital interests.7 . . . An require “getting into the heads” of these others.
ing the gains of the aggressive action) in addi-
adversary’s deterrence decision calculus focuses The types of information and the understanding
tion to deterrence by the threat of punishment.
on their perception of three primary elements”: of a country or group and its leaders necessary
In the Cold War, the main target of U.S.
the benefits of a course of action; the costs of for deterring that actor would also be useful for
deterrence was a single actor, the Soviet Union.
a course of action; and the consequences of developing dissuasion strategies for that actor.
American deterrence policy focused on increas-
restraint (that is, costs and benefits of not tak- Without influencing an opponent’s deci-
ing the costs/risks of Soviet aggression through
ing the course of action we seek to deter).8 sion, we could still try to prevent or disrupt his
the threat of punishment—popularly under-
This definition returns to the basic prin- acquisition of threatening capabilities, or defeat
stood to mean mutual assured destruction—
ciples underlying deterrence—before it was or defend against use of them. But in those
and strategic deterrent forces were largely con-
applied to the particular case of the Soviet cases, we may have physically kept the potential
sidered synonymous with nuclear weapons
Union and the application of the theory (and its aggressor from taking action, but we have not
(although Cold War deterrence was actually
emphasis in that particular case on increasing changed his mind; thus, our actions are not dis-
more subtle and nuanced than that).4
the risks through the threat of punishment, pri- suasion or deterrence. That is not to say that the
Beginning in the early to mid-1990s, some
marily with nuclear weapons) became conflated United States should stint on its efforts to pre-
strategic analysts turned their attention to deter-
with the underlying theory of deterrence. What vent, deny, disrupt, or defeat; those are valuable
rence of WMD-armed regional adversaries. They
is needed is a reexamination of the underlying capabilities in and of themselves, since some
argued that rogue states would try to deter U.S.
theory and a determination of how to apply it to adversaries may not be dissuaded from acquir-
intervention in their region, intimidate U.S.
modern cases of concern, without the irrelevant ing or improving capabilities or deterred from
allies, and make intrawar threats to limit Amer-
attributes of Cold War deterrence. using them. Indeed, U.S. ability to do those
ican aims in case of war. They pointed out that
During the Cold War, deterrence was the things (prevent, deny, defeat, disrupt) may well
regional deterrence is more problematic for the
dominant goal of U.S. security policy. Now, while influence the calculations of the adversary and
United States for several reasons: regional adver-
it remains an important goal, deterrence inter- contribute to dissuasion and deterrence.
saries may be less risk-averse, and they may
acts closely with the equally important security Likewise, the United States must con-
have considerable resolve because crises often
policy goals of assurance, dissuasion, and defeat. sider the requirements of extended deterrence
involve their core interests, whereas U.S. interests
The distinction between deterrence and in the evolving security environment: how to
are peripheral.
dissuasion is often confused. If, as a proverb assure allies and friends that the United States
After September 11, 2001, another set of
posits, the beginning of wisdom is calling things will meet its security commitments to them, so
players was added to the debate about deter-
by their right name, then it may help illumi- they will not feel the need to develop their own
rence: nonstate actors or terrorists. Initially, con-
nate the issue of deterrence to distinguish it nuclear weapons or other capabilities that the
ventional wisdom was that terrorists were unde-
from dissuasion. While deterrence is focused on United States would view as counterproductive.
terrable. However, that view is evolving, at least
convincing an adversary not to undertake acts Just as U.S. views on deterrence are evolving,
to the point that those both inside and outside
of aggression, dissuasion is aimed at convinc- so may those of our allies—including whom
government are asking whether there may be
ing a potential adversary not to compete with they are concerned about deterring, as well as
ways to deter various parts of terrorist networks,
the United States or go down an undesirable the role of offenses and defenses, and the role of
U.S. capabilities versus their own capabilities to
underpin deterrence.
M. Elaine Bunn is a Senior Research Fellow in the Institute for National Strategic Studies at the Just as deterrence and dissuasion require
National Defense University. Comments may be addressed to Ms. Bunn at bunne@ndu.edu. tailoring, so too does assurance. What reassures

   Strategic Forum No. 225, January 2007


one ally may frighten another. If U.S. allies are
The Calculus of Tailored Deterrence
to be reassured, they need to have confidence in
American judgment and reliability; if they do ■ What are the nation’s or group’s values and priorities? How are these affected by its history
not, the specific capabilities do not really mat- and strategic culture?
ter. Both assurance and deterrence are in the ■ What are their objectives in the particular situation?

eye of the beholder. ■ What factors are likely to influence their decisionmaking?
■ Who makes decisions, how does the leadership think, what is their view of the world and their
experience with and view of the United States?
Deterring Each Actor ■ How do they calculate risks and gains?
■ What do they believe their stakes to be in particular situations (stakes may vary depending on
If deterrence is about influencing the per- the scenario)?
ceptions—and ultimately, the decisions and ■ What is the likely credibility of U.S. deterrence options to this adversary—for both imposing
actions—of another party, it is logical that the costs and denying gains?
requirements for deterrence will differ with each ■ How risk-taking—or risk-averse—is the leadership?

party that we might try to deter and may well ■ How much latitude does the leadership have to either provoke or conciliate?
■ What are their alternative courses of action?
differ in each circumstance or scenario.
■ What do they believe the costs and benefits of restraint to be? Do they think they are worse
During the Cold War, the United States off if they do not take the aggressive action? Do they see any positive benefits in not taking the action
spent enormous amounts of time, energy, in question?
resources, and effort trying to understand how ■ What do they perceive as America’s answers to the questions above—for example, U.S.
objectives, stakes, or risk-taking propensity?
the Soviets thought and what might deter
them. The United States acquired consider-
able knowledge and insight into the thinking of
Soviet leaders with respect to how they viewed Since deterrence is about influencing the per- side in most cases;14 and they are less likely to
the United States, how they might use mili- ceptions—and ultimately, the actions—of be concerned that the United States believes it
tary force, and their doctrine for nuclear weap- another party, deterrence is really the ultimate could impose a regime change, and thus place
ons. However, such knowledge was not obtained mind game. It requires detailed knowledge of the deterree in a fatalistic frame of mind where
easily, and there often were differences of view many aspects of the society and leadership that deterrence is difficult. U.S. confidence in deter-
about Soviet thinking. we seek to deter—that is, what makes them tick. rence will be less for regional rogue states, given
Regarding other states that the United Deterrence must take into account each terror- the asymmetry in stakes, with existential risk
States might confront in the future, our knowl- ist group, each rogue state leader, each potential to the rogue state but not to the United States;
edge base and expertise are far more rudimen- major power adversary we face. To deter a coun- the greater risks the rogue leaders may be will-
tary. The application of deterrence with respect try or entity, the United States needs to under- ing to take, especially if they fear regime change
to the Soviet Union will not be the same as in stand a number of factors about each one12—the in any event; and the unfamiliarity of U.S. deci-
future situations where we might seek to deter adversary’s values, objectives in a particular sce- sionmakers with their strategic calculus and vice
other states or nonstate actors. Three categories nario, decisionmaking, perceptions of the stakes versa. Terrorists are the category in which the
of actors could be objects of tailored deterrence: of a situation, how averse to or accepting of risk United States will have the least confidence in
near-peer competitor/advanced military power; they are in that situation, and so forth, as well deterrence, although that is not to say that it is
rogue power/regional WMD state; and terrorist as the adversary’s perception of America’s objec- not worth the attempt.
network/nonstate terrorist.10 However, the specif- tives, values, decisionmaking and risk tolerance.13 The issue of deterring terrorists is worth
ics within each category are important if deter- The answers to some of these questions further consideration here. Some would say
rence is to be tailored. In the near-peer compet- are difficult to discern, and others may never that deterring terrorists is an oxymoron, given
itor/advanced military power category, Russia be answered, but reducing one’s ignorance as the appeal of suicide or “martyrdom” opera-
and China are the obvious candidates. The much as possible is desirable when it comes to tions for some kinds of terrorists. As recently
current “usual suspects” in the rogue power/ deterrence, especially if the United States ends as May 2006, President George W. Bush said,
regional WMD state category are North Korea up having to learn to live with a nuclear-armed “The terrorists have no borders to protect, or
and Iran (the former now a nuclear state if North Korea or a nuclear-armed Iran—or capital to defend. They cannot be deterred—
its own declarations and U.S. intelligence are WMD-armed terrorists. but they will be defeated.”15 However, it is also
believed; the latter seen by the United States as While each deterree must be assessed on a true that even terrorists with suicidal incli-
an aspiring nuclear state, although Iran denies specific basis, there may be some general dis- nations want to die to accomplish something
it). The most prominent in the terrorist net- tinctions that can be made among the three cat- and that defensive deterrence—that is, deny-
work/nonstate terrorist category is al Qaeda,11 egories of actors to be deterred. The U.S. level ing them the accomplishment, or the “benefits”
although there are others, such as Hezbollah. of confidence in deterrence will likely be great- of their actions—may, over time, be the more
What do we need to know about each est for major powers because major powers are effective way to think about deterring terrorists.
potential adversary in order to tailor deterrence? likely to be more risk-averse; they are likely to Indeed, in the case of some terrorists, an over-
view the stakes as approximately equal for each whelming response may be precisely what they

No. 225, January 2007 Strategic Forum   


are trying to goad the United States into, if they to prevent nuclear use. In that case, in order to anthropologists, psychologists, linguists, or others
believe it would advance their objectives, such as prevent the war, it may have been preferable to who may have first-hand knowledge of a coun-
increasing animosity toward the United States to emphasize in peacetime that the United States try, leader, or group through contact as part of
enhance recruitment and drive wedges between and South Korea could deny Pyongyang suc- a nongovernmental organization or business. It
the United States and its partners. cess in its objective—for example, unifying the also requires deterrence strategy functionalists
The tenets of deterrence almost certainly peninsula under North Korean control. to assist the other experts in determining what
apply to state sponsors of terrorism, and while information is relevant to deterrence. The same
traditional deterrence through the threat of some would say that types of knowledge are needed not only for deter-
retaliation is less likely to be effective with ter- rence but also for dissuasion, compellance, esca-
rorists than with state actors, it is worth further
deterring terrorists lation control, and war termination. Thus, an
study to assess which terrorists or groups may be is an oxymoron effort to understand these factors for deterrence
deterrable and by what methods. purposes will pay dividends in other areas as well.
Focusing on the components and enablers As the foregoing suggests, the most chal- Some scattered efforts have been made in
of a terrorist network—operatives, leaders, lenging aspect of tailored deterrence is not so and outside of government to assess the deci-
financiers, state supporters, the general popu- much the problem of deterring direct attacks sionmaking calculus of specific opponents.
lace—may also provide insights about where upon the United States, which in all likelihood However, much more needs to be done, includ-
costs can be imposed, or benefits denied, in would be a regime-ending act for a nation-state ing competing analyses of each actor. The U.S.
order to effect deterrence.16 perpetrator. Rather, it is the problem of deterring Government will need to assess the current
Whether for terrorists, rogue states, or lesser, more localized acts of aggression against a state of the art in understanding each potential
major powers, the United States must be clear third party in cases where a WMD-armed adver- adversary and what the gaps are in our knowl-
about not only whom it is trying to deter, but sary believes that its capabilities could effectively edge. It will also need to assess which gaps can
also what action it is trying to deter them from checkmate a local U.S. response. More than any- be filled through a concerted information-gath-
taking. One deters someone from doing some- thing else, the problems of precluding this kind ering effort and which are unknowable and thus
thing. The United States may seek to deter gen- of localized deterrence deficit—implicit in, for will need to be treated as variables in U.S. plan-
eral aggression and coercion; or, if conflict example, the unleashing of Hezbollah against ning. Some type of national-level activity, either
begins, intrawar escalation (horizontal and ver- Israel by a nuclear-armed Iran, or a nuclear- virtual or bricks-and-mortar, may be needed to
tical); or, more specifically, WMD use. armed North Korean attack to reunify the Korean bring together deterrence planners, governmen-
It is not sufficient to say, for example, “The Peninsula—are what have animated U.S. con- tal analysts, and nongovernmental experts to
United States wants to deter North Korea”; it cerns about rogue state proliferation. assess such questions and to develop guidelines
must be specified what it wants to deter (or dis- With regard to what actions are to be for the development of operational plans and
suade) them from doing: providing nuclear deterred, the term deterrence is used implic- policies.18 As one defense official said in discuss-
weapons or materials to terrorists? Invading itly and explicitly in a variety of ways in ing the need to reinvigorate intellectual debate
South Korea? Using nuclear weapons? It may current U.S. Government documents. It is on deterrence and dissuasion, the “key to this
be that the United States would like to deter all sometimes used very broadly (deterring all debate is growing our knowledge of the world
those actions; however, what it takes to deter aggression) and other times in a much nar- views, goals, and strategic approaches of 21st-
each may be very different. What the United rower way to focus on deterring WMD use. century adversaries.”
States might say it would do in each case, and However, the latest QDR takes a broad view of
the credibility of our options to increase risks what actions the United States is attempting Tailoring Capabilities
and deny gains, probably will vary in each to deter, including “WMD employment, ter-
The 2006 QDR also posits the need for tai-
case—as would the way North Korea would rorist attacks in the physical and information
lorable capabilities. It is clear to most that
likely weigh the risks and gains. domains, and opportunistic aggression.”17
capabilities for deterrence are not limited to
For example, there is a difference between It is important for the U.S. Government to
nuclear weapons, as many thought was the case
focusing on preventing war from starting in have a continuing process to develop compre-
during the Cold War. But which military or non-
the first place and preventing intrawar escala- hensive country or group deterrence assessments
military capabilities play in deterrence? Just as
tion—that is, nuclear use during war. If the that include such factors as those described above
there are variations in emphasis about whom
primary objective were the former, the United in order to provide the information and analysis
and what actions the United States is trying to
States might say, “If you cross the 38th paral- needed for tailoring deterrence to specific actors
deter, there are also variations about the breadth
lel, your regime is over.” If, however, the focus is and situations. To assess all the factors impor-
of the set of capabilities needed for, and applica-
on deterring nuclear use, and the United States tant to deterrence requires experts, outside as well
ble to, deterrence.
had already said the regime is at risk for start- as inside the Intelligence Community, knowl-
The narrow view, expressed in the 2006
ing the (conventional) war, then the adversary edgeable about the particular country or group
QDR, is that the New Triad capabilities are the
would be in a go-for-broke position once he or leader. It is also useful to have the perspec-
primary ones for deterrence. The 2001 Nuclear
begins the war, and there is little leverage left tives of a wide range of specialists; for example,
Posture Review (NPR)19 described the New

   Strategic Forum No. 225, January 2007


Triad as composed of offensive strike systems— nuclear arsenal, the more likely it will be that adversary’s decision calculus, and those that
nuclear and nonnuclear, kinetic and nonkinetic, some adversaries will not be deterred by it. enable such decisive influence. Direct means
such as cyber attack; defenses of all types, both For others, New Triad tailored deterrence include force projection; active and pas-
active and passive; and a revitalized and respon- capabilities mean a wider range of capabil- sive defenses; global strike (nuclear, conven-
sive defense infrastructure. This New Triad is ities other than nuclear: improved options tional, and nonkinetic); and strategic commu-
bound together by enhanced command and for conventional global strike or nonkinetic nication. Enablers include global situational
control, intelligence, and planning. The concept options (such as computer network attack), awareness; command and control; forward
of the New Triad was developed during the NPR as well as defenses of all kinds. For exam- presence; security cooperation and military
to expand “strategic” capabilities beyond just ple, the Bush administration has proposed integration and interoperability; and deter-
nuclear weapons.20 adding a conventional option to the subma- rence assessment, metrics, and experimenta-
From the deterrence standpoint, the capa- rine-launched Trident missile. It has been tion. Thus, the Deterrence Operations Joint
bilities of the New Triad can be seen as affect- reported that such a capability would be able Operating Concept goes beyond the capabilities
ing different sides of an adversary’s calculus. to strike distant targets—such as terrorist explicitly, or even implicitly, included in the
Offensive forces, broadly defined, increase poten- camps, enemy missile sites, suspected caches New Triad, particularly by including overseas
tial risks to aggressors; defensive forces decrease of biological, chemical, or nuclear weapons, presence and allied/coalition military coopera-
potential gains by denying the aggressor the and other potentially urgent targets—within tion and integration.
political or military objectives they hoped to an hour.21 Currently, the only capability to do For tailored deterrence, the capabili-
achieve. The 2001 NPR was, in essence, an early so is nuclear. The proposed conventional Tri- ties emphasized and the specific mix will vary
attempt to tailor capabilities for the multiple dent modification has been explicitly linked by the actor and situation; that is, how much
deterrees and situations of the 21st century. by administration officials to tailored deter-
Credibility has long been viewed as a key rence.22 Some believe that its use is more credibility has long
aspect of deterrence: to deter, the adversary must credible, and therefore more deterring, than
a nuclear weapon in some situations. How-
been viewed as a key
perceive the ally as having both the capabil-
ity and the will to carry out threatened actions, ever, the conventional Trident has run into aspect of deterrence
whether to impose costs or deny benefits. To problems in Congress, largely because of
strengthen the credibility of U.S. threats to act concerns about the possibility of miscalcula- one relies on defenses versus offenses (proba-
against an adversary, it needs to develop capa- tion by nations such as Russia and China.23 bly more reliance on defenses, broadly defined,
bilities across the spectrum and develop a range If the ability to threaten conventional pre- in the case of rogue states and terrorists than
of deterrence options. The NPR recognized that cision strikes, which could target individuals in the case of major powers) and how much
large-scale nuclear attacks in response to some and small groups—and their assets—discrim- one emphasizes nuclear versus nonnuclear
actions taken by some adversaries are simply inately and with relatively little or no collat- or kinetic versus nonkinetic. The role of for-
not credible. eral damage, is part of the New Triad and tai- ward-deployed forces in deterrence will vary by
For some, New Triad tailored capabilities is lored deterrence, then the corollary ability to deteree, as will the role of allies.
code for new nuclear weapons with niche capabili- locate and track individuals and assets in order One caution in thinking about capabili-
ties—optimized for specific characteristics, such as to strike them promptly on a global scale can ties for deterrence is the tendency to confuse
low yield, earth penetration, reduced residual radi- also strengthen the credibility of U.S. deterrence the instrument with the effect—the means
ation, or biological agent defeat. Proponents argue efforts—if adversaries see it this way, given the with the end. As Colin Gray put it, one of the
that specialized nuclear capabilities are more mixed American record of success. In addition, sins against sound thinking is “the assertion
deterring either because hostile regional powers even if the United States develops a good track that any military capability (or, indeed, any-
believe the United States would be “self-deterred” record of finding and precisely targeting adver- thing else) inherently is deterring.” He con-
by the relatively large-yield, high-collateral-dam- saries, the history of military technology indi- tinues, “People in the mental habit of refer-
age nuclear weapons it has, or because adversar- cates that we should expect that their ability to ring to long-range and nuclear-armed forces
ies may think they can make their highly valued hide, conceal, and deceive will improve as well. as the deterrent are vulnerable to the errone-
assets (for example, leadership or WMD) immune Other analysts rightly take a much ous belief that deterrence is secured by buy-
from attack by putting them in hard and deeply broader view of capabilities needed for tai- ing and maintaining incremental quanti-
buried facilities. The United States, therefore, needs lored deterrence—that is, not just the New ties of the great deterrent” and that “to secure
new or modified capabilities to address those Triad, but also forward presence, force pro- more deterrence, we just need to buy more of
shortcomings for deterrence purposes. However, it jection, and allied cooperation, which are all the deterrent.”24
is difficult to know whether adversaries—and if capabilities widely spread across U.S. military Where does the concept of tailored deter-
so, which adversaries—view the U.S. nuclear arse- forces. The 2006 Deterrence Operations Joint rence fit into capabilities-based planning, and
nal as less deterring. But the more Americans talk Operating Concept breaks down the capabili- how does it fit in the planning construct in
about being self-deterred given the current U.S. ties needed for deterrence into two categories: the 2006 QDR? While capabilities-based plan-
those that directly and decisively influence an ning “focuses more on how an adversary might

No. 225, January 2007 Strategic Forum   


fight rather than who an adversary might be,”25 industrial relationships, can reinforce deter- to be tailored so that our policy statements and
the who is important for deterrence. Capabili- rence of aggression against allies by convinc- our operational capabilities work together to
ties-based planning does not mean ignoring ing adversaries that U.S. stakes are high. send the same message and to strengthen deter-
the who; it may simply mean looking at a wider rence.”27 Whether through words or actions,
range of possible adversaries and scenarios. Tailoring Messages? shaping decisions of opponents does not begin
For assessing capabilities to acquire or with the crisis; their perceptions may already be
Tailoring communication—that is, the
maintain, capabilities-based planning may be well entrenched by then, and it may be difficult
messages the United States sends in its words
appropriate and yield a range of types of capabil- to communicate new messages to leaders in pro-
and actions, and the ways those are perceived by
ities that can be mixed and matched depending tective bunkers. Communications in peacetime
opponents—can contribute to (or detract from)
on the specifics of the deterrence situation. But are probably more important than words said or
U.S. efforts to deter. Given the multiple actors
capabilities-based planning has proven less effec- actions taken in times of tension.
that the United States is now trying to deter,
tive in illuminating how much of a capability is Ideally, planning for crisis or peace-
we need to think consciously about how words
needed. The force planning construct introduced time deterrence actions and declaratory pol-
and actions are perceived, how they affect each
in the 2006 QDR lays out a framework intended icy all need to be specific to who and what.
adversary’s deterrence calculations, and how the
to guide both the appropriate size of the force But everyone sees and hears all of it: what we
United States might try to mitigate mispercep-
(capacity) and the types of capabilities (forces say to Iranian president Mahmoud Ahma-
tions that undermine deterrence.
and equipment) needed across a range of sce- dinejad is heard by North Korean leader Kim
Messages can take the form of specific
narios. It attempts to account both for activities Jong-Il and Osama bin Laden, as well as Rus-
actions, sometimes referred to as flexible deter-
that the Department of Defense conducts contin- sia and China. Is there a universal deterrence
rent options—deploying forces in times of ten-
uously (steady state) as well as those that it con- message and set of actions? Rather than send-
sion or building crisis to send a message to an
ducts episodically (surge). One can assume that ing blanket messages that could be counter-
opponent that the United States is willing and
deterrence of multiple actors is part of the day- productive for some deterrees, how does one
able to take action to counter the action (for
to-day steady state, although the United States tailor deterrence messages that go out to all
example, deploying a carrier battlegroup to the
may have to surge forces for deterrence purposes through the globalized media, especially if
Taiwan Strait in 1996 when China fired missiles
in a building crisis (this would include what there are different deterrence messages we
toward the island prior to its elections, or visibly
have traditionally been called flexible deterrent want to send to different actors? How can the
deploying B–52s to Guam).
options). This steady state and surge dichotomy
Words—declaratory policy or official state-
should prove useful for thinking about deter-
rence in peacetime and crisis, since the peace-
ments—are another form of deterrence mes- U.S. words and
saging. An example of what was intended to actions can contribute
time needs for deterrence have traditionally been
be nonpublic declaratory policy is then-Presi-
undervalued in operational and programmatic
dent George H.W. Bush’s letter to Saddam Hus- to—or detract from—
planning (it is difficult to build deterrence into
sein prior to the 1991 Gulf War, which stated efforts to deter
computer models and simulations, which tradi-
that if Iraq used chemical or biological weap-
tionally focus on the more easily measured defeat
ons, “you and your country will pay a terrible
mission). But it is still unclear how this construct United States best communicate with a partic-
price.”26 Many have credited that threat—inter-
will be applied to tailored deterrence. ular leadership? To whom do they listen? Even
preted to be a threat to use nuclear weapons—
In reality, more than just military capa- in one country or group, there may be multi-
with deterring Saddam from using chemical
bilities are involved in deterrence. For exam- ple targets for U.S. messages. How do they fil-
weapons during the first Gulf War. There is no
ple, nonmilitary homeland security efforts, ter information? How can the United States
way to know for certain whether it did. However,
such as the ability to sustain economic activ- reduce the possibility of misperception?
such a threat in the future is likely to be less
ity, may reinforce deterrence by denying adver- Some messages are clear. For instance,
effective; a number of then-senior officials, from
sary objectives in attacks on the American sending carriers to the Taiwan Strait in 1996 was
Secretary of State James Baker, to Chairman of
economy or infrastructure. U.S. diplomatic or clearly aimed at China and deterring it from act-
the Joint Chiefs of Staff Colin Powell, to Presi-
economic sanctions can impose costs, while ing against Taiwan. Others are more ambigu-
dent George H.W. Bush all said in subsequent
economic aid in the context of an adversary ous and open to interpretation. For example,
published memoirs that they never would have
not taking an action can reinforce the benefits deploying missile defenses in Europe may seem,
responded with nuclear weapons had Iraq used
of restraint. Legal capabilities, such as threats to the United States, to be clearly about deterring
chemicals against U.S. troops, which makes the
of war crimes prosecution for any commander a nuclear-armed Iran (or even dissuading Iran
threat less credible in the future and therefore
involved in the use of WMD, may affect the from becoming a nuclear weapons state), but the
less deterring.
decisionmaking calculus of lower-level adver- Russians may see the deployment as a message
How to combine words and deeds in each
sary leaders. Diplomatic commitments to to them. The message that is intended by our
case in order to deter is the key question. As one
allies, embodied in treaties and agreements actions and statements is less important than the
defense official said, “Tailored deterrence also
and reinforced by a web of economic and message that is received.
means that our declaratory statements will need

   Strategic Forum No. 225, January 2007


What the United States says about regime threats. This perception is shaped by an adver- to convey that message. Everything the United
change is a case in point. If a rogue state sary’s national and cultural attributes as well States says, everything it does, and every capa-
believes the only way to deter the United States as its unique history of dealing with and study- bility it has impacts the way the United States is
from regime change is to have nuclear weap- ing the United States. It is also shaped, in part, by perceived by potential adversaries.
ons or other WMD to deter intervention, then the lessons that each adversary takes away from The United States can only undertake intel-
a declared U.S. policy of regime change—or U.S. policy and actions toward others. Further- ligence assessments, probings, and informed
intentional ambiguity—may have the oppo- more, the perception of U.S. credibility shifts as guesses to try to ascertain how adversaries will
site effect from the desired U.S. objective of dis- perceive the messages that it tries to send. It may
suading WMD acquisition. Some argue that the message intended is be that a pattern of interaction—as the United
after the American invasion of Iraq, North Korea States and Soviet Union developed in the last
less important than the
and Iran became more, not less, determined to several decades of the Cold War—will be neces-
acquire nuclear weapons.28 On the other hand, message received sary for tailored communications to best support
Libya may have been influenced in the opposite tailored deterrence. But in the end, there are no
direction, and the scale weighed in favor of giv- each adversary reassesses America’s standing and guarantees that the message intended to be sent
ing up nuclear capability 29 in order not to risk power in the world. For example, U.S. threats to to each deterree will be the message received.
being “Saddamized.” Some analysts have sug- take actions against states probably had more The United States will need a more refined and
gested that it may be prudent for the United credibility in October 2002, before the Iraq war, systematic process for gauging and assessing
States to give security guarantees not to seek than in December 2006, when some perceive the the effectiveness of its deterrence message and
regime change in exchange for North Korea or United States as bogged down and overextended. adapting it to the situation as it evolves. But
Iran giving up its pursuit of nuclear weapons.30 But again, other factors also shape this percep- deterrence is inherently hard to measure: how
Another consideration for the United tion of credibility. Therefore, understanding U.S. do U.S. leaders know if deterrence is success-
States is the need to calibrate what it says credibility (or lack thereof) in the eyes of each ful—that is, that the reason for the adversary’s
and does, or threatens to do, in two dimen- deterree is critical to how we tailor deterrence inaction is that it was successfully deterred by
sions: it must deter an opponent, and it must threats to adversaries. In many cases, a declara- influencing his decision—rather than his never
be morally acceptable to its own society. The tory policy simply will not work, as some adver- having intended to take the aggressive action in
same messages that the United States sends saries might view it as a hollow threat. the first place?
to adversaries will be heard by the Ameri- As discussed above, having a range of capa- The United States also needs to assess
can public, as well as allies. A message sent to bilities could provide the United States with the deterrence (or dissuasion) effects not only in
underscore resolve and willingness to inflict ability to tailor its deterrence options to the par- the proximate or primary case in which we are
pain on an adversary—in order to deter— ticular actions threatened by particular adversar- seeking to deter but also in the secondary cases,
may come across as bellicose, repugnant, or ies. However, there is a major caveat: the adver- which may be the primary case next month or
immoral to the U.S. public and allies. For sary has to perceive the option as effective and next year. Or it may mean prioritizing who the
example, it would not be acceptable for the credible. For example, while the United States main deterrence targets are, tailoring our mes-
United States to threaten terrorists’ families can talk about locating, tracking, and target- sages for them, and letting the chips fall where
or Islamic holy sites, even if it were judged to ing individuals, its success has been mixed, they may with regard to perceptions of other
be effective for deterring terrorists. So declara- and, therefore, U.S. credibility to threaten preci- potential deterrees.
tory policy intended for deterrees must be con- sion strikes against adversaries suffers as well.31
sistent with the values, system of government, So part of this depends on how adversaries per- Conclusion
and national character of the United States. ceive U.S. capability to target them and their
Ultimately, the jury is still out on how fea-
A sustained and massive deception campaign assets discriminately, given the mix of successes
sible the implementation of tailored deterrence
(certainly if it is known to be a deception) as and failures. Demonstrations of U.S. capabil-
really is. To be sure, the concept as a whole has
part of deterrence or dissuasion efforts prob- ity to do so could strengthen its credibility over
a certain self-evident logic in a world of diverse
ably would not be effective, given our open time. (The same issue applies to other capabili-
threats. But some big questions are still out
society as well as the likelihood of leaks. ties—for example, missile defense, since it cur-
there and unresolved.
On the other hand, declaratory policy that rently lacks credibility in the eyes of many, given
As this analysis suggests, a more refined
includes having a cacophony of voices saying the less-than-stellar test results of some parts of
understanding of each of the actors that the
diverse and contradictory things—creating the system.)
United States is trying to deter is essential to tai-
uncertainty in the mind of potential aggres- In addition, the United States may try to
lored deterrence, and how to gather the pertinent
sors—plays to America’s strengths. bring specific, select capabilities to bear in order
information (from both governmental and non-
A key reason we need to learn as much to have a deterring effect in a specific situa-
governmental sources) and make it relevant for
as we can about each adversary’s decision cal- tion, yet our watching adversaries may be read-
deterrence planning will be a challenge. Some
culus is that each adversary may have a dif- ing some kind of message into any of the other
of the applicable capabilities of the New Triad
ferent perception of the credibility of American steps we take, whether or not we intend them
are neither operational nor near completion,

No. 225, January 2007 Strategic Forum   


7 19
and there is only an incomplete understanding The Deterrence Operations Joint Operating Concept (DO See the Secretary of Defense’s foreword to the Nuclear
JOC) uses the term vital interests consistent with the National Posture Review, available at <www.defenselink.mil/news/Jan2002/
of all the other capabilities, military and non- Security Strategy. See DO JOC, 8. d20020109npr.pdf>. The report itself remains classified (despite
military, that play in deterrence. Communicat- 8
USSTRATCOM, 5. the fact that excerpts were leaked and posted on the Internet).
20
ing deterrence messages to potential adversaries 9
This definition is influenced by the discussion of dissua- In fact, the 2001 Nuclear Posture Review was misnamed;
sion in the 2001 and 2006 Quadrennial Defense Reviews, as well as it should have been called the Strategic Posture Review, since it
that are clear and differentiated according to the addressed more than just nuclear capabilities.
Andrew Krepinevich’s work on dissuasion at the Center for Security
circumstances and the deterree—when all will and Budgetary Affairs. 21
See, for example, Michael R. Gordon, “Pentagon Seeks
get the messages intended for others, each may 10
In each category, both terms listed are used in the 2006 Nonnuclear Tip for Sub Missiles,” The New York Times, May
29, 2006, 1.
perceive different lessons from prior U.S. actions, Quadrennial Defense Review’s discussion of tailored deterrence; the
22
first term in each category is used in the introduction on page iv; Peter Flory, Assistant Secretary of Defense for Interna-
and some may also get mixed messages from the the second is used on pages 4 and 49. tional Security Policy, testimony before the Subcommittee on Stra-
cacophony of voices in the American system— 11
While the United States is already at war with al tegic Forces, Senate Armed Services Committee, March 29, 2006.
23
poses another challenge to tailored deterrence. Qaeda—and some would therefore argue that deterrence has While some believe Russia’s early warning system (and
failed—it could seek to deter other actions, such as WMD use or in the future, China’s) may pick up the launch of a conventional
However, as difficult as these steps may additional attacks on the United States. Trident and assess it as a nuclear attack on them, there are poten-
be, falling back upon old conceptions of deter- 12
The unit of analysis may also vary, depending on whom tial notification mechanisms that could eliminate or reduce the
rence is not a real option. For the United the United States is seeking to deter: it may be the nation’s govern- risk of such miscalculation—and procedures need to be worked
ing bodies writ large, or the leadership council of a regime, or an out in any event for possible missile defense interceptor launches
States, it makes eminent sense to embark individual leader, depending on the nature of decisionmaking for against rogue states that could be misinterpreted by Russia and
upon a major effort to adapt its deterrence that deterree. China as a ballistic missile attack.
24
13 Colin S. Gray, “Deterrence and the Nature of Strategy,” in
concepts to today’s volatile security environ- Adapted and expanded from a similar list in Keith
B. Payne, The Fallacies of Cold War Deterrence and a New Deterrence in the 21st Century, ed. Max G. Manwaring (London:
ment and complex range of threats. The spec- Direction (Lexington: The University Press of Kentucky, 2001); Frank Cass and Company Limited, 2000), 18–19.
ter of a nuclear-armed North Korea, Iran, or see particularly chapter 5, “The Dilemma of Popular Usage and 25
2001 Quadrennial Defense Review Report, iv.
26
transnational terrorist group demands no less. a New Direction.”
14
Marlin Fitzwater, statement on President George
A major exception to this generalization would likely be H.W. Bush’s letter to President Saddam Hussein of Iraq, Jan-
China’s view of a Taiwan scenario. uary 12, 1991, available at <http://bushlibrary.tamu.edu/
Notes 15
President George W. Bush, commencement address at the papers/1991/91011201.html>.
1 27
Department of Defense, Quadrennial Defense Review U.S. Military Academy at West Point, May 27, 2006, available at Flory testimony.
(QDR) Report (Washington, DC: Department of Defense, February <www.whitehouse.gov/news/releases/2006/05/20060527-1.html>. 28
For an analysis of the inherent conflict between threat-
6, 2006), 2. Additional discussion of tailored deterrence in the 2006 16
For the French approach on deterring terrorists, see ening regime survival while preventing nuclear proliferation, see
QDR can be found on pages 4, 27, and 50–51. Jacques Chirac, speech at The Strategic Air and Maritime Forces Robert S. Litwak, “Non-proliferation and the Dilemmas of Regime
2
Ronald F. Lehman II, Director of the Center for Global at Landivisiau/L’Ile Longue/Brest (Finistère), January 19, 2006, Change,” Survival, Winter 2003–2004, available at
Security Research at Lawrence Livermore National Laboratory, available at <www.globalsecurity.org/wmd/library/news/france/ <www.wilsoncenter.org/topics/pubs/survival2.pdf>.
address at Institute for Foreign Policy Analysis–Fletcher Confer- france-060119-elysee01.htm>. 29
Judith Miller, “How Gadhafi Lost His Groove,” The Wall
ence, December 14, 2005. 17
2006 Quadrennial Defense Review Report, 49. Street Journal, May 16, 2006, A14.
3 18 30
Ryan Henry, Principal Deputy Under Secretary of Defense, USSTRATCOM has established a Strategic Deterrence Thomas L. Friedman, “A Choice for the Rogues,” The
briefing, “Deterrence and Dissuasion for the 21st Century,” Insti- Assessment Laboratory at its headquarters in Omaha to con- New York Times, August 2, 2006.
tute for Foreign Policy Analysis–Fletcher Conference, December 14, duct analysis in support of deterrence planning by all relevant 31
For instance, on one hand is the failed decapitation strike
2005, available at combatant commands, consistent with the Deterrence Opera- on Saddam at Dora Farms in the opening hours of Operation Iraqi
<www.ifpafletcherconference.com/oldtranscripts/2005/Ryan_ tions Joint Operating Concept. The lab is a good beginning, but Freedom, and the long-time inability of the United States to locate
Henry.ppt#283,1>. a coordinated interagency effort in Washington may also be and target Osama bin Laden; on the other hand is the successful
4
This is a simplified summary of Cold War deterrence; how- needed to bring together the Intelligence Community, Depart- 2002 precision strike in Yemen by a Predator drone that killed Abu
ever, during the Cold War, there was a role for conventional weap- ment of Defense (including the Office of the Secretary of Defense, Ali al-Harithi, the alleged al Qaeda mastermind behind the bomb-
ons and forward-deployed forces in Europe (under the doctrine of the Joint Staff, and the combatant commands), the Department ing of the USS Cole. On the Dora Farms strike, see Bob Woodward,
flexible response) and Asia in addition to nuclear weapons. Deter- of State, and other U.S. Government agencies—as well as outside “U.S. Aimed for Hussein as War Began,” The Washington Post,
rence by denial (making clear to the Soviets that they would not experts, including academics who may be reluctant to work with April 22, 2004, A1; on the Abu Ali al-Harithi strike, see Walter Pin-
accomplish what they hoped to accomplish in any aggression) USSTRATCOM or the Intelligence Community but may have great cus, “U.S. Strike Kills Six in Al Qaeda; Missile Fired by Predator
also played a role in U.S. deterrence thinking. But deterrence by the insights into the strategic cultures of potential adversaries. Drone; Key Figure in Yemen Among Dead,” The Washington Post,
threat of punishment and nuclear weapons dominated the analysis November 5, 2002, A1.
of Cold War deterrence. In addition, there were actually other poten-
tial deterrees during the Cold War—that is, deterring North Korea
from a conventional invasion of South Korea, post-1952; and at
some points in the Cold War, deterring China from attacking Tai-
wan. But the Soviet Union was by far the predominant direct object The Institute for National Strategic Studies (INSS) is a policy The Strategic Forum series presents original research by members
of U.S. deterrence efforts. research and strategic gaming organization within the National of NDU as well as other scholars and specialists in national security
5
This evolution is reflected in many official documents. Defense University (NDU) serving the Department of Defense, affairs from this country and abroad. The opinions, conclusions,
For example, the 1995 Secretary of Defense Annual Report to Con- its components, and interagency partners. The institute provides and recommendations expressed or implied within are those of
senior decisionmakers with timely, objective analysis and gaming the contributors and do not necessarily reflect the views of
gress discusses the need to deter WMD-armed regional powers and
events and supports NDU educational programs in the areas of the Department of Defense or any other agency of the Federal
“to continually assess the strategic personalities of countries with
international security affairs and defense studies. Through an Government. For information on NDU Press visit the Web site at
these weapons.” More recently, the 2001 and 2006 Quadrennial active outreach program, including conferences and publications, http://www.ndu.edu/inss/nduhp. INSS also produces Joint Force
Defense Review Reports, 2002 Nuclear Posture Review, 2002 and INSS seeks to promote understanding of emerging strategic Quarterly for the Chairman of the Joint Chiefs of Staff; the journal
2006 National Security Strategies, 2005 National Defense Strategy, challenges and policy options. can be accessed at www.ndupress.edu.
and 2004 National Military Strategy discussed “deterrence” but did
not define it. I nstitute f o r N ati o na L S trategic S tudies
6
U.S. Strategic Command (USSTRATCOM), “Deterrence Stephen J. Flanagan
Operations Joint Operating Concept,” final draft, version 2.0, August James A. Schear Director David H. Gurney
2006, available at <www.dtic.mil/futurejointwarfare/concepts/do_ Director of Research Director, NDU Press
joc_v20.doc>.

   Strategic Forum No. 225, January 2007

Potrebbero piacerti anche