David M. Allison, Stephen Herzog, B. Green, A. Long
{"title":"Correspondence: Clandestine Capabilities and Technological Diffusion Risks","authors":"David M. Allison, Stephen Herzog, B. Green, A. Long","doi":"10.1162/isec_c_00396","DOIUrl":null,"url":null,"abstract":"Brendan Green and Austin Long make a signiacant contribution with their theoretical framework for peacetime signaling of clandestine military capabilities.1 Examining U.S. anti-submarine warfare (ASW) during the Cold War, they argue that choices to disclose capabilities depend on uniqueness (replaceability) and anticipated countermeasures (pp. 59–60). Green and Long cannot fully account for many historical cases, however, because they overlook decisionmaker concerns about the spread of technology. A modiaed framework combining their theory with fears of technological diffusion offers greater predictive power by explaining the broader dilemma of revealing military innovations during both war and peace. States conceal military capabilities to avoid two threats: nulliacation and duplication.2 Green and Long’s variables of uniqueness and countermeasures focus on the former while failing to address the latter. Green and Long argue that if the risk of countermeasures is low or if replacement capabilities exist, signaling becomes attractive for “improved general deterrence, adversary resource diversion, and diplomatic concessions or strategic adjustments” (p. 56). Duplication is a fundamentally different concern. Disclosures may provide an adversary with insights to improve their own capabilities. The fear of nulliacation identiaed by Green and Long does not preclude concerns about technological diffusion (pp. 51–52). Correspondence: Clandestine Capabilities","PeriodicalId":48667,"journal":{"name":"International Security","volume":"6 1","pages":"194-198"},"PeriodicalIF":4.8000,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Security","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.1162/isec_c_00396","RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
Brendan Green and Austin Long make a signiacant contribution with their theoretical framework for peacetime signaling of clandestine military capabilities.1 Examining U.S. anti-submarine warfare (ASW) during the Cold War, they argue that choices to disclose capabilities depend on uniqueness (replaceability) and anticipated countermeasures (pp. 59–60). Green and Long cannot fully account for many historical cases, however, because they overlook decisionmaker concerns about the spread of technology. A modiaed framework combining their theory with fears of technological diffusion offers greater predictive power by explaining the broader dilemma of revealing military innovations during both war and peace. States conceal military capabilities to avoid two threats: nulliacation and duplication.2 Green and Long’s variables of uniqueness and countermeasures focus on the former while failing to address the latter. Green and Long argue that if the risk of countermeasures is low or if replacement capabilities exist, signaling becomes attractive for “improved general deterrence, adversary resource diversion, and diplomatic concessions or strategic adjustments” (p. 56). Duplication is a fundamentally different concern. Disclosures may provide an adversary with insights to improve their own capabilities. The fear of nulliacation identiaed by Green and Long does not preclude concerns about technological diffusion (pp. 51–52). Correspondence: Clandestine Capabilities
期刊介绍:
International Security publishes lucid, well-documented essays on the full range of contemporary security issues. Its articles address traditional topics of war and peace, as well as more recent dimensions of security, including environmental, demographic, and humanitarian issues, transnational networks, and emerging technologies.
International Security has defined the debate on US national security policy and set the agenda for scholarship on international security affairs for more than forty years. The journal values scholarship that challenges the conventional wisdom, examines policy, engages theory, illuminates history, and discovers new trends.
Readers of IS discover new developments in:
The causes and prevention of war
U.S.-China relations
Great power politics
Ethnic conflict and intra-state war
Terrorism and insurgency
Regional security in Africa, Asia, Europe, and Latin America
U.S. foreign and defense policy
International relations theory
Diplomatic and military history
Cybersecurity and defense technology
Political economy, business, and security
Nuclear proliferation.