ÈÍÒÅËÐÎÑ > ¹63, 2011 > Cracks in the New Jar: The Limits of Tailored Deterrence

Sean P. Larkin
Cracks in the New Jar: The Limits of Tailored Deterrence


10 îêòÿáðÿ 2011

Deterrence is back. Although the Cold War concept lost its centrality in security policy for many years, the United States embraced a modified version of it in its 2006 and 2010 National Security Strategies.1 The original concept of deterrence—preventing an attack by credibly threatening unacceptable retaliation—has been reborn as tailored deterrence. Tailored deterrence seeks to customize whole-of-government deterrence strategies to specific actors and scenarios. Ideally, this approach would address the flaws in rational deterrence theory, which assumes that adversaries will make decisions exclusively on the basis of the expected costs and benefits of a contemplated course of action.

Colombian army special forces at Tolemaida Air Base during technical demonstration

However, the U.S. approach to tailored deterrence largely ignores decades of theoretical development and criticism of rational deterrence theory. The Department of Defense (DOD) Deterrence Operations Joint Operating Concept (DO–JOC) describes a deterministic approach that combines rational deterrence theory with effects-based operations concepts. Consequently, tailored deterrence neglects some of the most important elements of contemporary deterrence theory, including the uncertainty and cognitive biases inherent both to intelligence assessments and to international relations.

While deterrence remains relevant, the U.S. objective to "decisively influence the adversary's decision-making calculus"2 overstates tailored deterrence's potential and does not adequately acknowledge its shortfalls. The U.S. approach to tailored deterrence is flawed because of its reliance on two erroneous assumptions: that the Nation can reliably assess an adversary's decision calculus, and that it can decisively influence an adversary's choices. The United States must recognize that deterrence is a blunt instrument, not a scalpel, and modify its deterrence strategies accordingly.

Deterrence Definition and Requirements

The persistent popularity of deterrence can largely be attributed to its apparent simplicity. It is not difficult to understand the concept of intimidating or otherwise convincing an adversary not to take an action. DOD defines deterrence as "prevention from action by fear of the consequences. Deterrence is a state of mind brought about by the existence of a credible threat of unacceptable counteraction."3 Theorists further subdivide deterrence into two categories: deterrence by punishment is the threat of retaliation if an adversary takes an action; deterrence by denial is the threat of successfully defeating an adversary's action.4

Colombian army special forces at Tolemaida Air Base during technical demonstration

Most theorists and practitioners agree on deterrence's requirements. A deterring actor must communicate to an opponent a credible threat that is of sufficient magnitude to change the results of the opponent's cost-benefit analysis.5 However, agreement on deterrence's broad definition and requirements has not settled the long-running dispute over its effectiveness or proper role in national security policy. More than a half-century of debate has produced a diverse, compelling, and incomplete collection of theories that cannot reliably predict or explain deterrence success or failure.

Evolution of Deterrence Theory

The advent of the nuclear age elevated the concept of deterrence to prominence in U.S. academic and governmental circles. Deterrence was particularly attractive to many American academics since it was consistent with the Realist school of international relations to which they already subscribed.6 Although deterrence was an old concept, the incomparably destructive power of nuclear weapons and Cold War bipolarity triggered a theoretical quest for a complete understanding of the art of intimidation.

Robert Jervis adroitly categorized the development of deterrence theory into three waves.7 The first wave of deterrence theory emerged immediately after World War II as academics struggled to understand the implications of the atomic bomb for war and international relations. Bernard Brodie and others led the wave with their 1946 book, The Absolute Weapon, which presciently discussed the possibility of a nuclear arms race and remarked that in "the atomic age the threat of retaliation is probably the strongest single means of determent."8 The authors grasped the Pyrrhic nature of victory in a nuclear exchange, leading to Brodie's famous observation that the U.S. military must shift its focus from winning wars to averting them.9

Colombian army special forces at Tolemaida Air Base during technical demonstration

The second wave of deterrence theory followed in the 1950s. Confronted with the nuclear-armed superpower standoff that first-wave theorists predicted, second-wave scholars sought to define how to prevent a disarming Soviet first strike. In 1958, Albert Wohlstetter warned that a small nuclear arsenal would be insufficient for deterrence, and counseled that "to deter an attack means being able to strike back in spite of it."10 Thomas Schelling employed game theory to demonstrate that the probability of conflict between adversaries depends on their perceptions of each other's intentions and their fear of being attacked first.11 Thus, a secure second-strike capability and clearly communicating a threat to retaliate became the bedrock of second-wave theory.

These theorists also grappled with the concept of extended deterrence. Schelling considered deterrent threats to respond to an attack on the defender's homeland inherently credible, while threats to extend deterrence to allies "must be made credible."12 Second-wave theorists postulated several ways to make extended deterrence threats convincing, including maintaining a reputation of loyalty to one's allies, stationing forces in defended countries, and convincing the adversary that retaliation would be essentially automatic.13 Perhaps the most powerful aspect of second-wave extended deterrence theory was Schelling's "threat that leaves something to chance." This concept holds that ambiguous or implausible threats can still deter aggression between nuclear powers since even a conventional test of extended deterrence risks inadvertent nuclear war.14

Second-wave deterrence theory is also known as rational deterrence theory since it relies on specific assumptions about the actors involved. First, rational deterrence theory assumes that the actors are rational and that they will make choices that maximize their expected utility according to microeconomic theory. In other words, actors will always make decisions in order to maximize their gains and minimize their losses. Second, the theory relies on a principle explanatory assumption: the only difference between actors' behavior stems from differing opportunities, not other influences such as culture or norms. Third, consistent with its Realist origins, second-wave theory assumes that states will behave as if they are unitary actors—the theory does not address leadership personalities or internal politics.15

In addition to rational deterrence theory's three formal assumptions, there are several implied requirements. The theory is limited in scope since it only deals with hostile relationships between states.16 The theory requires that actors incorporate new information into their decisionmaking process, so they realize when a prospective gain has turned into a loss. Actors must also consider the probabilities of various possible outcomes when making a decision.17 Finally, the theory's principle explanatory assumption implies that all actors have the same risk tolerance.18

Second-wave theory proved persuasive, and Washington dutifully implemented many of its prescriptions.19 The United States developed a large nuclear second-strike capability, strove to establish the credibility of its extended deterrence commitments, and occasionally attempted to make Moscow doubt Washington's restraint.20 Second-wave deterrence theory provided a cost-effective way for the Nation to pursue the ends of its containment strategy.

Robert Jervis identified the third wave of deterrence theory as beginning in the 1970s with the search for evidence to support or refute the second wave.21 The third wave successfully applied both empirical analysis and psychology to question the assumptions and implications of second-wave theory.

Colombian army special forces at Tolemaida Air Base during technical demonstration

Empirical analysis, most famously Alexander George and Robert Smoke's 1974 Deterrence in American Foreign Policy, found that the history of conventional deterrence failures did not support the predictions of second-wave theory. Even when the theoretical conditions for success (that is, commitment, communication, and a credible threat) were met, deterrence often failed in the real world.22 Third-wave theory contended that the second wave failed to incorporate critical factors, including variations in the aggressors' risk-taking propensity, utility of rewards in addition to threats, and influence of domestic politics on decisionmakers.23 The third wave also focused more analytical effort on the aggressor's decisionmaking process as opposed to the second wave's nearly exclusive emphasis on the credibility of the defender's threats.24

Consequently, third-wave theorists sought to demonstrate that psychological factors often cause decisionmakers to behave in ways that contradict rational deterrence theory's assumptions. Misperception is one of the most important psychological factors—the defender may misunderstand the threat, and the aggressor may fail to appreciate the defender's resolve and/or capability to retaliate.25 Contrary to the requirements of rational deterrence theory, third-wave theory proposes that decisionmakers are not good at estimating risks and cannot make fine adjustments to cost-benefit analysis based on anything but the most drastic change in probabilities.26 Similarly, powerful cognitive biases affect both sides of the deterrence relationship. Since people prefer consistency to dissonant information, actors are likely to interpret new information in accordance with preexisting beliefs.27

Despite the success of the empirical and psychological approach in casting doubt on rational deterrence theory, third-wave theory did not resolve the deficiencies it identified.28 No grand unified theory of deterrence emerged in the decades after Jervis identified the trend. Third-wave deterrence theory did not replace rational deterrence theory, but it did create an intellectual counterweight to its influential antecedent.

Deterrence theory continued to evolve in concept and application as theorists and strategists reframed their views to reflect significant world events. The end of the Cold War shifted attention from the Soviet Union to deterring rogue states; the 9/11 attacks stimulated more discussion of deterring nonstate actors and their sponsors. Ultimately, the United States sought an approach that would apply to the entire spectrum of challenges.

U.S. Policy and Tailored Deterrence

President George W. Bush's administration introduced the term tailored deterrence into U.S. national policy documents in 2006 with the release of the administration's second National Security Strategy (NSS) and Quadrennial Defense Review (QDR). These documents represented a major shift in national security policy, as President Bush's 2002 NSS had downplayed the effectiveness of deterrence and advocated preventive war to remove threats from rogue states.29

Colombian army special forces at Tolemaida Air Base during technical demonstration

Four years and one such preventive war later, however, the Bush administration resurrected and reinvented deterrence. The 2006 QDR heralded a shift "from ‘one size fits all' deterrence to tailored deterrence for rogue powers, terrorist networks and near-peer competitors."30 The QDR offered few details on how the new brand of deterrence would operate; the 2006 DO–JOC served this purpose.

The Obama administration appears to have continued the Bush-era tailored deterrence policy unaltered. The 2010 NSS and QDR discuss tailored deterrence in much the same terms as their 2006 predecessors.31 According to the 2010 QDR: "Credibly underwriting U.S. defense commitments will demand tailored approaches to deterrence. Such tailoring requires an in-depth understanding of the capabilities, values, intent, and decision making of potential adversaries, whether they are individuals, networks, or states. Deterrence also depends on integrating all aspects of national power."32

Defining Tailored Deterrence. Despite the change in administrations, the 2006 DO–JOC remains the definitive open-source description of the U.S. approach to tailored deterrence. U.S. Strategic Command (USSTRATCOM) led the creation of the document, but it reflects a DOD-wide concept that was approved by Secretary of Defense Donald Rumsfeld.33 Since its publication, USSTRATCOM leaders have repeatedly reemphasized the DO–JOC's principles for "waging deterrence," finding them "perfectly satisfactory" as recently as 2010.34

The DO–JOC seeks to describe how DOD will work with the rest of the U.S. Government to "decisively influence the adversary's decision-making calculus in order to prevent hostile actions against U.S. vital interests."35 The Nation must identify which adversaries it wishes to deter and what actions they are to be deterred from taking, then tailor operations to the characteristics of each adversary and scenario.36

The DO–JOC assumes that adversary decisions to act or not are based on deliberate calculations of the value and probability of the outcome of alternate courses of action. It also assumes that the United States can identify and assess at least some elements of each adversary's decision calculus.37 Beyond these assumptions, the DO–JOC breaks the adversary decision calculus down into three elements: benefits of an action, costs of an action, and consequences of restraint (that is, what could happen if the adversary does not take the contemplated action).

The DO–JOC also assumes that the United States will be able to influence at least some adversary "values and perceptions relevant to their decision-making."38 It states that the methods the Nation will employ to achieve its ends will be "credibly threatening to deny benefits and/or impose costs while encouraging restraint."39 The DO–JOC envisions military deterrence operations as part of a larger national deterrence strategy that integrates all elements of national power. These interagency activities are to be conducted on a daily basis during peacetime, crisis, and war.40

Colombian army special forces at Tolemaida Air Base during technical demonstration

The DO–JOC purports to offer "a new approach to understanding the ways and means necessary to achieve the ends of deterrence."41 Despite the document's use of an effects-based operations and transformational lexicon, however, the DO–JOC describes little that is new. When compared to its theoretical roots, tailored deterrence appears to be old wine in a new jar.

What Theory Drives the Practice? The DO–JOC approach to tailored deterrence—"credibly threatening to deny benefits and/or impose costs while encouraging restraint"42—is an amalgam of second- and third-wave deterrence theory, heavily influenced by effects-based operations concepts. Denying benefits and imposing costs are simply alternate names for deterrence by denial and deterrence by punishment, respectively. Encouraging restraint incorporates Schelling's and third-wave theorists' ideas of offering the adversary reassurance or rewards for maintaining the status quo.43

The DO–JOC relies on many second-wave assumptions but rejects others in favor of third-wave considerations. Consistent with rational deterrence theory, the DO–JOC assumes that choices are based on rational calculations of the expected costs and benefits of an action. Similarly, the DO–JOC accepts second-wave theory's implied assumption that actors will continually incorporate new information into their decision calculus. However, tailored deterrence rejects second-wave theory's principle explanatory and unitary rational actor assumptions, requiring instead that each adversary be viewed as a complex system of unique decisionmakers. The DO–JOC also uses third-wave theory by allowing for variations in adversaries' risk-taking propensities.

Nevertheless, tailored deterrence largely ignores some of the most important elements of third-wave theory. The DO–JOC pays little attention to psychological factors that undermine deterrence, including cognitive barriers to perception and decisionmaking. The DO–JOC acknowledges and discusses several areas of uncertainty, but presents these ambiguities as solvable problems rather than inescapable fog and friction. The DO–JOC's language indicates that tailored deterrence owes more to the deterministic concepts of effects-based operations than it does to the more Clausewitzian cautions of third-wave deterrence theory.

Although effects-based operations concepts were never fully incorporated into joint doctrine, two elements that were absorbed—effects and systems perspective—had a profound impact on tailored deterrence. First, the DO–JOC states that deterrence planning must include identifying what effects the United States desires to have on an adversary's decision calculus.44 The doctrinal use of effects leads the DO–JOC to seek measures of effectiveness in order to assess the success or failure of deterrent actions. The document initially acknowledges the near impossibility of measuring the contribution of deterrent actions to adversary restraint. However, the DO–JOC goes on quixotically to discuss how such elusive metrics should be constructed.45 This approach to assessment clearly emphasizes the deterministic perspective of effects-based operations over the views of both second- and third-wave deterrence theorists, who maintain that deterrence success is difficult to assess in historical retrospect, much less in real time.46

Second, and more revealing, is the DO–JOC's statement that "a systems approach to understanding the adversary and the operating environment underpins deterrence operations."47 The systems perspective in joint doctrine emphasizes understanding an adversary by constructing models of interrelated systems in order to identify effects and centers of gravity.48 As many critics have pointed out, however, the systems approach is most appropriate for understanding and predicting effects on closed systems, such as electrical powergrids. Open systems, such as societies and national leadership structures, tend to defy both the systems approach to understanding them and deterministic, effects-based attempts to influence them.49

Assessing the Adversary Decision Calculus

Tailored deterrence requires that the United States understand each adversary's decision calculus with a high level of certainty in order to design deterrent actions that will achieve decisive influence over adversaries' choices. However, tailored deterrence's assumptions oversimplify the basis on which people make decisions. People make choices based in part on their perceptions of expected utility, but they are also influenced by other factors, including their personal perspectives and cognitive biases. Many of these factors are enigmatic even to the actors themselves, making the decision calculus exceptionally difficult to assess and leaving adversaries' choices largely unpredictable.

Colombian army special forces at Tolemaida Air Base during technical demonstration

History provides many examples of deterrence failures in which the defender misunderstood the adversary's decision calculus and was therefore surprised by an "irrational" action. Keith Payne cites the Japanese attack on Pearl Harbor, China's entry into the Korean War, and the Soviet deployment of nuclear missiles to Cuba as examples in which U.S. estimates of the adversary decision calculus predicted the opposite outcome.50 Janet Gross Stein uses Egypt's 1973 surprise attack against Israel and Iraq's 1990 invasion of Kuwait as other case studies of deterrence failures.51 In all these examples, the defenders assessed that their presumably rational adversary would refrain from action because upsetting the status quo would result in a net loss.

However, the deterrence failures listed above cannot be attributed to irrationality. As Keith Payne observed, there is an often unappreciated difference between rational and reasonable decisionmaking.52 If actors are rational, they make decisions that logically link to their objectives. However, whether or not an actor's decisions are reasonable is a matter of perspective. If an outside observer does not share or understand the adversary's goals and values, the adversary's decisions may appear unreasonable, and will therefore be unpredictable.53 Second-wave theory and tailored deterrence both correctly assume that irrational actors are rare, but fail to appreciate how little this assumption matters when compared to the impact of the actors' divergent perspectives on a deterrence relationship.

The Adversary's Perspective. Opposing leaders frequently see the world uniquely because of the large differences in the leaders' individual expectations and beliefs. Cognitive psychology shows that all people develop unique belief systems, or schemata, based on their experiences, to help organize and interpret information. These schemata are necessary to functioning in a complex world, but they also "constrain and condition how and what leaders perceive."54 As a result of these differing contexts, leaders may interpret the same situation quite differently. For example, while the United States confidently concluded that China would stay out of the Korean War, Mao Zedong attacked the U.S. Eighth Army in North Korea because he probably believed China was being encircled by America.55

Leaders' perceptions are also shaped by the mental shortcuts, or heuristics, that all people use to selectively process and recall information. One of the most powerful heuristics results in the availability bias—the tendency for people to interpret events in terms of other events they can easily remember.56 This results in leaders being disproportionately influenced by historical events that they or their country experienced directly.57 Saddam Hussein's perspective on combat in the Iran-Iraq War led him to disregard U.S. airpower; he similarly concluded from the U.S. experience in Lebanon that America was casualty averse and would not be able to remove him from Kuwait.58

Third-wave theory also maintains that domestic political considerations are often a critical factor in adversaries' decisions. This factor is consistent with Jervis's observation that leaders often make a decision based on one value dimension (for example, domestic politics) without fully considering its impact on other dimensions.59 Thus, Anwar Sadat's primary concerns in 1973 were domestic politics, regaining lost honor, and the consequences of not attacking, rather than the probable military outcome.60

The Deterrer's Perspective. In its estimation of the adversary decision calculus, the United States is constrained by the same cognitive barriers that influence an adversary's viewpoint, as well as other biases that commonly undermine intelligence analysis and policymaking.

Intelligence estimates are prone to the bias of mirror-imaging, which is the assumption that the adversary thinks and operates like the analyst's country.61 Mirror-imaging is closely related to the availability heuristic, since when reliable intelligence is lacking, analysts and policymakers will tend to fill in the blanks with information that is readily recalled: their nation's capabilities, plans, and intentions. For example, Israel's emphasis on airpower drove it to judge Egypt's readiness in 1973 by an Israeli standard. Due to this mirror-imaging, Israel ignored compelling evidence of an imminent Egyptian attack, believing that Sadat would be deterred at least until Egypt reconstituted its air force.62

Analysts also tend to be biased toward viewing the adversary's actions as the result of centralized direction and to underestimate other explanations, such as coincidences, accidents, or mistakes.63 The centralized direction bias is particularly troublesome for the analysis of an adversary decision calculus since it causes analysts to "overestimate the extent to which other countries are pursuing coherent, rational, goal-maximizing policies" and to "overestimate the predictability of future events in other countries."64 The power of this bias and the unpredictability of even a well-known adversary were highlighted in 1962, shortly before the United States discovered Soviet nuclear missiles in Cuba. Washington erroneously concluded in a Special National Intelligence Estimate that the Soviet Union would not put offensive weapons in Cuba because such a move would be inconsistent with the observed patterns of Soviet behavior and American estimates of Nikita Khrushchev's decision calculus.65

Decisionmakers may also be affected by motivated biases, which result from subconscious psychological pressure that distorts perception. Motivated biases differ from cognitive biases because the source of the error is the person's fear and needs, rather than expectations or cognitive limits.66 This tendency results in defensive avoidance techniques to selectively process information that supports their favored policy to reduce anxiety. In May 1967, pressure from domestic and Arab constituencies probably motivated Egypt's overestimation of its chances of winning a war with Israel. Egypt's leaders initially assessed that war would result in low benefits and high costs. However, contrary to rational deterrence theory's requirements, Egypt's leaders reversed their estimate a few weeks later and chose war.67

Third-wave theory and case studies demonstrate that misperception and bias are the norm, not the exception, in intelligence and international relations. Given the pervasive nature of such misperceptions, the assumption that the United States can reliably assess an adversary's decision calculus is clearly in error and represents a significant flaw in tailored deterrence.

Influencing Adversary Choices

The U.S. assumption that it can decisively influence an adversary's choices is the second flaw in tailored deterrence. This assumption is erroneous for three reasons. First, misperceptions and biases limit an actor's ability to send effective deterrent messages. Second, adversaries are similarly constrained in their understanding of such signals. Third, tailored deterrence campaigns are limited by a lack of interagency unity of effort and inescapable friction in execution. These limitations suggest that only the most overt, overwhelming, and credible deterrent threats have utility, while attempts to deter gradually via precise messages are often misguided.

Challenge of Sending Effective Deterrent Messages. In addition to difficulties in understanding an adversary's decision calculus, a deterring actor is constrained by biases that accompany attempts to influence others. The egocentric bias leads people to overestimate their influence over others and to see cause-and-effect linkages that do not exist. This tendency can cause policymakers to perceive an adversary's behavior as targeted toward them or to presume that the adversary's behavior was caused by the policymaker's previous actions.68 The egocentric bias may inflate the policymaker's belief that an adversary can be deterred. Additionally, the bias can result in erroneous assessments that deterrence is working when the adversary's restraint is actually explained by other factors.69

Another common limitation on an actor's ability to send deterrence messages is a lack of empathy for how an adversary sees the world.70 Policymakers have powerful beliefs about their nations, and they spend so much time immersed in their own plans that they have trouble imagining that an adversary may have different views.71 For example, the United States failed to understand Japan's perspective before Pearl Harbor. While Washington thought that Japan would view the prospect of war with America as disastrous, Japanese leaders concluded they had no other choice but to attack.72

A third bias, which is related to the egocentric bias and lack of empathy, is overconfidence: people tend to overestimate their capacity to make complex judgments. Overconfidence leads policymakers to overestimate their ability to influence an adversary via discrete messages.73 There is probably no better example of such hubris than U.S. attempts to decisively influence North Vietnamese behavior via incremental airstrikes and carefully calibrated force deployments. Although these messages were sent from the highest levels of government in Washington, Hanoi did not notice the subtleties, nor did it receive any messages compelling enough to modify its decision calculus.74

Adversary Perceptions of Deterrent Messages. Deterrent messages that are clear and credible to the sender and impartial parties may still be missed, misunderstood, or discarded by the receiver.75 Achieving decisive influence over an adversary's choices requires that deterrent signals overcome cognitive biases and persuade the decisionmaker to change core beliefs about the likely results of a contemplated course of action. However, strongly held beliefs, such as a leader's conviction that war is necessary, are the most resistant to change.76

To change a person's attitude, new information must overcome many layers of subconscious defenses.77 A person's first defense is failing to see that new information contradicts existing beliefs. The information can be evaded by ignoring it or interpreting it to fit the person's views, particularly if the data are ambiguous. The second mechanism is to accept that the information is discrepant, but to reject its validity. A third defense is to reject the source of the information as unreliable. Subsequent defenses include acknowledging the contradiction but setting it aside and bolstering the belief by seeking a new justification for an old decision.78

The extent to which subconscious factors encourage people to cling to their beliefs makes it extremely difficult to deter an adversary gradually with discrete messages. A sufficiently motivated or confused adversary can ignore deterrent signals such as diplomatic messages or the deployment of military forces, especially if such signals are sent incrementally. Adversaries can accommodate isolated messages without changing their beliefs, but are more likely to reevaluate their convictions if a large amount of contradictory information arrives all at once.79 By this same logic, subtle signals should have more use against an adversary who is already deterred since such messages would seek only to reinforce an existing perception.

Since adversaries' beliefs are resistant to change, it follows that adversaries' perceptions of credibility and interests are dominant factors in deterrence outcomes. First, deterrence signals cannot create credibility that does not exist in the mind of the adversary. Unambiguous scenarios where survival interests are at stake, such as the superpowers' defense of their homelands during the Cold War, provide clarity that reduces the chance of misperception.80 In contrast, America's ambiguous policy toward South Korea in 1950 and Kuwait in 1990 left much more room for adversary error.

Colombian army special forces at Tolemaida Air Base during technical demonstration

Second, carefully crafted deterrence messages cannot balance an inherent asymmetry of interests. The United States and South Korea have apparently deterred a second North Korean invasion since 1953, but have been unable to deter Pyongyang from building nuclear weapons or conducting deadly attacks on South Korean forces. Despite the substantial U.S. commitment to preventing all three scenarios, North Korea clearly possessed a much greater interest in acquiring a nuclear deterrent and in manufacturing crises.

Limitations of the Whole-of-Government Approach. Even when making a clear and credible commitment, tailored deterrence requires a coherent effort that integrates all elements of national power to implement a national deterrence strategy. In 2009, then-commander of USSTRATCOM, General Kevin Chilton, called for an innovative process "to consider and include interagency deterrence courses of action, to make whole-of-government decisions on what courses of action to implement, and to coordinate their execution upon selection."81 Yet the U.S. Government's structure and bureaucratic friction ensure that the DO–JOC's vision of day-to-day, interagency deterrence campaigns will go largely unrealized. Only the highest priority issues and crises will garner a robust interagency response.

For example, the State Department would play a vital role in any interagency deterrence effort, given its primacy in diplomacy and the DOD objective of influencing adversaries' political decisions. Yet the State Department does not appear to share the military's view of tailored deterrence. State Department officials are more likely to view deterrence as intrinsic to the broad and continuous process of diplomatic engagement rather than as an isolated campaign. The Quadrennial Diplomacy and Development Review (QDDR) does not discuss tailored deterrence, and the State Department's other public statements on deterrence focus on narrower issues such as nuclear proliferation and arms control.82 Despite working closely together for shared objectives worldwide, the relationship between the State Department and DOD is typical of the entire interagency system: each department fiercely defends its own perspectives and priorities.

As a result, true interagency unity of effort is the exception, not the rule. The State Department's QDDR quoted Secretary of Defense Robert Gates's description of the interagency process as "a hodgepodge of jury-rigged arrangements constrained by a dated and complex patchwork of authorities, persistent shortfalls in resources, and unwieldy processes."83 These limitations are both structural and intentional, as the executive branch departments, National Security Council, and interagency system were organized first and foremost to advise the President's decisions. The system is intrinsically slow and deliberative unless a crisis elevates an issue to the Principals Committee or National Security Council for a decision.84 Even the imperatives of a decade of war have not transformed the interagency into the chimerical whole-of-government, as reform efforts have consistently failed to launch.85 Consequently, the United States will wage deterrence with the interagency it has—not the interagency it might want.

After reaching an interagency compromise on a deterrence course of action, the United States will also encounter friction in execution. Orders to perform specific deterrence actions may be misunderstood by subordinates or executed differently than expected, garbling the intended deterrence signals.86 As demonstrated by the Abu Ghraib scandal and the Air Force's improper transport of nuclear weapons, unauthorized actions and accidents can be more persuasive than polished strategic communications. As in all types of conflict, fog, friction, and chance are irreducible factors that will heavily influence the outcome of a tailored deterrence campaign.

Conclusion

Tailored deterrence is flawed because of its erroneous assumptions that the United States can reliably assess an adversary's decision calculus and decisively influence adversary choices. Nevertheless, deterrence remains an indispensable tool of U.S. national security policy since not all potential threats can or should be preempted. The United States should modify tailored deterrence to reflect third-wave theory in order to provide policymakers with realistic deterrence options instead of panaceas. These modifications should include accepting ambiguity, recognizing the importance of an adversary's interests, and replacing hubris with humility.

Third-wave deterrence theory and innumerable case studies demonstrate that an adversary's decision calculus will remain largely opaque regardless of the extent of the intelligence collection effort. Ubiquitous cognitive biases frequently frustrate accurate assessments and also shape adversary perceptions of their environment in idiosyncratic and often unknowable ways. Tailored deterrence should accept this irreducible uncertainty as a limitation rather than assuming that ambiguity can be removed from the equation. This intrinsic ambiguity could be tamed to a certain extent through such methods as red teaming, psychological profiling of adversary leaders, developing multiple decision calculus models, and analyzing many potential courses of adversary action. Yet the Nation should not be overly surprised when an adversary fails to follow the script.

Tailored deterrence's deterministic and effects-based foundation implies that deterrence applies in nearly all situations. However, the U.S. approach should accept that large asymmetries of interests are common in international relations and that such disparities can render deterrence irrelevant. Schelling's "threat that leaves something to chance"—the fear of nuclear escalation that overshadowed Cold War confrontations—is not credible when an adversary's actions are on the low end of the conflict spectrum and U.S. survival interests are not at stake. American attempts to sway adversaries from pursuing their interests are only credible when the United States has a commensurate interest in the status quo and when the situation is unambiguous.

Deterrent strategies have the most utility when an adversary's pondered action is an unambiguous and attributable affront to vital U.S. interests rather than an action on the margins. In such unambiguous scenarios, threats to deny benefits and impose costs should be simple, overt, and overwhelming. Deterrence by subtlety is vulnerable to misperception and betrays an egocentric bias and overconfidence that the adversary is both able and willing to decode and respond to the faintest U.S. signals.

Finally, tailored deterrence and its practitioners require humility rather than hubris. A more realistic approach would acknowledge that adversaries cannot be imagined as inert, closed systems vulnerable to decisive influence. Instead, deterrence campaigns will be based on a vague understanding of an adversary's decisionmaking process and motives. Given these uncertainties, deterrent actions will be blunt instruments that are subject to friction and misperception, and their true influence on an adversary's choices will normally remain unknown. Such a recalibrated approach reflects the reality that the United States can influence world events, but cannot dictate them. JFQ

 

Note

  1. The National Security Strategy of the United States of America (Washington, DC: The White House, March 2006), 43; National Security Strategy (Washington, DC: The White House, May 2010).
  2. Department of Defense (DOD), Deterrence Operations Joint Operating Concept Version 2.0 (DO–JOC) (Washington, DC: DOD, December 2006), 5.
  3. Joint Publication 1–02, DOD Dictionary of Military and Associated Terms (Washington, DC: The Joint Staff, November 8, 2010, as amended through May 15, 2011), 135.
  4. Jeffery W. Knopf, "Three Items in One: Deterrence as Concept, Research Program, and Political Issue," in Complex Deterrence: Strategy in the Global Age, ed. T.V. Paul, Patrick M. Morgan, and James J. Wirtz (Chicago: University of Chicago Press, 2009), 38.
  5. T.V. Paul, "Complex Deterrence: An Introduction," in Complex Deterrence, 2–3.
  6. Robert Jervis, "Deterrence Theory Revisited," World Politics 31 (January 1979), 289.
  7. Ibid.
  8. "Atomic Age: Absolute Weapon?" Time, June 10, 1946; Arnold Wolfers, "The Atomic Bomb in Soviet-American Relations," in The Absolute Weapon: Atomic Power and World Order, ed. Bernard Brodie (New York: Harcourt, Brace and Company, 1946), 134.
  9. Austin Long, Deterrence: From Cold War to Long War (Santa Monica, CA: RAND, 2008), 1.
  10. Albert Wohlstetter, The Delicate Balance of Terror (Santa Monica, CA: RAND Corporation, 1958), 3.
  11. Thomas C. Schelling, The Reciprocal Fear of Surprise Attack (Santa Monica, CA: RAND Corporation, 1958), 1; Thomas C. Schelling, The Strategy of Conflict (Cambridge: Harvard University Press, 1960), 207.
  12. Thomas C. Schelling, Arms and Influence (New Haven: Yale University Press, 1966), 36.
  13. Long, 13–15; Schelling, Arms and Influence, 39–40, 47.
  14. Schelling, The Strategy of Conflict, 188–189, 190–192.
  15. Christopher H. Achen and Duncan Snidal, "Rational Deterrence Theory and Comparative Case Studies," World Politics 41 (January 1989), 150.
  16. Jervis, "Deterrence Theory Revisited," 293.
  17. Janice Gross Stein, "Rational Deterrence against ‘Irrational' Adversaries? No Common Knowledge," in Complex Deterrence, 60–61.
  18. Richard Ned Lebow and Janice Gross Stein, "Rational Deterrence Theory: I Think, Therefore I Deter," World Politics 41 (January 1989), 209–210.
  19. Jervis, "Deterrence Theory Revisited," 290.
  20. Long, 15; Schelling, Arms and Influence, 40.
  21. Jervis, "Deterrence Theory Revisited," 289, 301.
  22. Knopf, 47–48.
  23. Jervis, "Deterrence Theory Revisited," 303–304, 312.
  24. Knopf, 48.
  25. Jervis, "Deterrence Theory Revisited," 307–308.
  26. Ibid., 308–310; Stein, "Rational Deterrence against ‘Irrational' Adversaries?" 63.
  27. Stein, "Rational Deterrence Against ‘Irrational' Adversaries?" 63.
  28. Jervis, "Deterrence Theory Revisited," 314; Amir Lupovici, "The Emerging Fourth Wave of Deterrence Theory—Toward a New Research Agenda," International Studies Quarterly 54 (2010), 708.
  29. The National Security Strategy of the United States of America.
  30. Quadrennial Defense Review Report (Washington, DC: DOD, February 2006).
  31. National Security Strategy, 22; Quadrennial Defense Review Report (Washington, DC: DOD, February 2010), 13–14.
  32. Quadrennial Defense Review Report (2010), 14.
  33. DO–JOC, ii.
  34. Kevin Chilton and Greg Weaver, "Waging Deterrence in the Twenty-first Century," Strategic Studies Quarterly (Spring 2009), 31–42; Michael Elliot, "21st Century Security Environment and Implications for Deterrence," 2010 Strategic Deterrence Symposium, Panel 5, Omaha, NE, August 12, 2010.
  35. DO–JOC, 5.
  36. Ibid., 44.
  37. Ibid., 11.
  38. Ibid.
  39. Ibid., 3.
  40. Ibid., 24, 48.
  41. Ibid., 56.
  42. Ibid., 3.
  43. Schelling, Arms and Influence, 75; Long, 10; Jervis, "Deterrence Theory Revisited," 304–305.
  44. DO–JOC, 47–48.
  45. Ibid., 48, 52–54.
  46. Achen and Snidal, 165; Lebow and Stein, 222; Morgan, 128.
  47. DO–JOC, 9.
  48. Joint Publication 3–0, Joint Operations (Change 2) (Washington, DC: The Joint Staff, September 2006, updated March 2010), II–23, IV–4.
  49. Justin Kelly and David Kilcullen, "Chaos Versus Predictability: A Critique of Effects-Based Operations," Security Challenges 2, no. 1 (2006), 66, 69–70; James N. Mattis, "USJFCOM Commander's Guidance for Effects-based Operations," Parameters (Autumn 2008), 22.
  50. Keith B. Payne, "Fallacies of Cold War Deterrence and a New Direction," Comparative Strategy 22, no. 5 (2003), 411–412.
  51. Janice Gross Stein, "Building Politics into Psychology: The Misperception of Threat," Political Psychology 2, no. 2 (1988), 249; Janice Gross Stein, "Deterrence and Compellence in the Gulf, 1990–91: A Failed or Impossible Task?" International Security 17, no. 2 (Autumn 1992), 147–149.
  52. Payne, 412–413.
  53. Ibid.
  54. Stein, "Building Politics into Psychology: The Misperception of Threat," 248–249.
  55. Payne, 411.
  56. Stein, "Building Politics into Psychology: The Misperception of Threat," 252.
  57. Robert Jervis, "Rational Deterrence: Theory and Evidence," World Politics 41 (January 1989), 196.
  58. Stein, "Deterrence and Compellence in the Gulf, 1990–91," 174–175.
  59. Jervis, "Rational Deterrence: Theory and Evidence," 196–197.
  60. Lebow and Stein, 211–212; Payne, 413–414.
  61. Richard J. Heuer, Jr., Psychology of Intelligence Analysis (Langley, VA: Center for the Study of Intelligence, Central Intelligence Agency, 1999), 181.
  62. Stein, "Building Politics into Psychology: The Misperception of Threat," 252.
  63. Jervis, "Rational Deterrence: Theory and Evidence," 196; Heuer, 131.
  64. Heuer, 131.
  65. Payne, 412.
  66. Stein, "Building Politics into Psychology: The Misperception of Threat," 257; Jervis, "Rational Deterrence: Theory and Evidence," 196–197.
  67. Lebow and Stein, 216.
  68. Stein, "Building Politics into Psychology: The Misperception of Threat," 253.
  69. Robert Jervis, Perception and Misperception in International Politics (Princeton: Princeton University Press, 1976), 346.
  70. Stein, "Building Politics into Psychology: The Misperception of Threat," 250.
  71. Robert Jervis, "Hypotheses on Misperception," World Politics 20 (April 1968), 474; Stein, "Building Politics into Psychology: The Misperception of Threat," 250.
  72. Payne, 411.
  73. Stein, "Building Politics into Psychology: The Misperception of Threat," 254.
  74. Ibid; Payne, 413.
  75. Jervis, "Rational Deterrence: Theory and Evidence," 198.
  76. Ibid., 291; Stein, "Rational Deterrence Against ‘Irrational' Adversaries?" 63.
  77. Jervis, Perception and Misperception in International Politics, 289–290.
  78. Ibid., 291–295.
  79. Jervis, "Hypotheses on Misperception," 465–466.
  80. Jervis, "Deterrence Theory Revisited," 311–312.
  81. Chilton and Weaver, 36.
  82. Department of State, The First Quadrennial Diplomacy and Defense Review: Leading Through Civilian Power (Washington, DC: Department of State, 2010), 10; Rose Gottemoeller, "Exploring the Many Facets of Deterrence," remarks to the U.S. Strategic Command 2010 Deterrence Symposium, Omaha, NE, August 12, 2010; Ellen Tauscher, remarks to U.S. Strategic Command Deterrence Symposium, Omaha, NE, July 30, 2009.
  83. Department of State, 200–201.
  84. Alan G. Whittaker, Frederick C. Smith, and Elizabeth McKune, The National Security Policy Process: The National Security Council and Interagency System (Washington, DC: Industrial College of the Armed Forces, October 2010), 27, 35–37.
  85. Lewis Irwin, "Filling Irregular Warfare's Interagency Gaps," Parameters (Autumn 2009), 65.
  86. Jervis, "Deterrence Theory Revisited," 312–313.

Âåðíóòüñÿ íàçàä