Abstract China-U.S. inadvertent escalation has been a focus of recent international relations literature. The current debate, however, has not paid sufficient attention to two important factors: the survivability of China's nuclear forces under unintentional conventional attacks; and China's nuclear command, control, and communication (NC3) system. Based on detailed analysis of these two variables, three potential mechanisms of China-U.S. inadvertent escalation are examined: use-it-or-lose-it, unauthorized/accidental, and damage-limitation. Although the possibility of a major China-U.S. conventional war inadvertently escalating to a nuclear level cannot be excluded, the risk is extremely low. China's nuclear forces would survive U.S. inadvertent conventional attacks and, thus, are unlikely to be significantly undermined. Even though China's NC3 system might be degraded during a conventional war with the United States, Chinese leadership would likely maintain minimum emergency communications with its nuclear forces. Moreover, China's NC3 system is highly centralized, and it prioritizes “negative control,” which can help to prevent escalation. China's nuclear retaliatory capability, although limited, could impede U.S. damage-limitation strikes to some extent. To keep the risk of inadvertent escalation low, both sides must take appropriate precautions and exercise self-restraint in their planning and operations.
{"title":"Assessing China-U.S. Inadvertent Nuclear Escalation","authors":"Riqiang Wu","doi":"10.1162/isec_a_00428","DOIUrl":"https://doi.org/10.1162/isec_a_00428","url":null,"abstract":"Abstract China-U.S. inadvertent escalation has been a focus of recent international relations literature. The current debate, however, has not paid sufficient attention to two important factors: the survivability of China's nuclear forces under unintentional conventional attacks; and China's nuclear command, control, and communication (NC3) system. Based on detailed analysis of these two variables, three potential mechanisms of China-U.S. inadvertent escalation are examined: use-it-or-lose-it, unauthorized/accidental, and damage-limitation. Although the possibility of a major China-U.S. conventional war inadvertently escalating to a nuclear level cannot be excluded, the risk is extremely low. China's nuclear forces would survive U.S. inadvertent conventional attacks and, thus, are unlikely to be significantly undermined. Even though China's NC3 system might be degraded during a conventional war with the United States, Chinese leadership would likely maintain minimum emergency communications with its nuclear forces. Moreover, China's NC3 system is highly centralized, and it prioritizes “negative control,” which can help to prevent escalation. China's nuclear retaliatory capability, although limited, could impede U.S. damage-limitation strikes to some extent. To keep the risk of inadvertent escalation low, both sides must take appropriate precautions and exercise self-restraint in their planning and operations.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80066214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract North Korea has made significant strides in its attempt to acquire a strategic nuclear deterrent. In 2017, it tested intercontinental ballistic missiles (ICBMs) and completed a series of nuclear test explosions. These may provide North Korea with the technical foundation to deploy a nuclear-armed ICBM capable of striking the United States. The Ground-based Midcourse Defense (GMD) missile defense system is intended to deter North Korean nuclear coercion and, if deterrence fails, to defeat a limited North Korean attack. Despite two decades of dedicated and costly efforts, however, the GMD system remains unproven and unreliable. It has not demonstrated an ability to defeat the relatively simple and inexpensive countermeasures that North Korea can field. The GMD system has suffered persistent delays, substantial cost increases, and repeated program failures because of the politically motivated rush to deploy in the 1990s. But GMD and other U.S. missile defense efforts have provoked serious concerns in Russia and China, who fear it may threaten their nuclear deterrents. Diplomacy and deterrence may reassure Russia and China while constraining North Korea's nuclear program. An alternate airborne boost-phase intercept system may offer meaningful defense against North Korean missiles without threatening the Russian or Chinese deterrents.
{"title":"Defending the United States: Revisiting National Missile Defense against North Korea","authors":"Jaganath Sankaran, S. Fetter","doi":"10.1162/isec_a_00426","DOIUrl":"https://doi.org/10.1162/isec_a_00426","url":null,"abstract":"Abstract North Korea has made significant strides in its attempt to acquire a strategic nuclear deterrent. In 2017, it tested intercontinental ballistic missiles (ICBMs) and completed a series of nuclear test explosions. These may provide North Korea with the technical foundation to deploy a nuclear-armed ICBM capable of striking the United States. The Ground-based Midcourse Defense (GMD) missile defense system is intended to deter North Korean nuclear coercion and, if deterrence fails, to defeat a limited North Korean attack. Despite two decades of dedicated and costly efforts, however, the GMD system remains unproven and unreliable. It has not demonstrated an ability to defeat the relatively simple and inexpensive countermeasures that North Korea can field. The GMD system has suffered persistent delays, substantial cost increases, and repeated program failures because of the politically motivated rush to deploy in the 1990s. But GMD and other U.S. missile defense efforts have provoked serious concerns in Russia and China, who fear it may threaten their nuclear deterrents. Diplomacy and deterrence may reassure Russia and China while constraining North Korea's nuclear program. An alternate airborne boost-phase intercept system may offer meaningful defense against North Korean missiles without threatening the Russian or Chinese deterrents.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80606050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Recent scholarship on artificial intelligence (AI) and international security focuses on the political and ethical consequences of replacing human warriors with machines. Yet AI is not a simple substitute for human decision-making. The advances in commercial machine learning that are reducing the costs of statistical prediction are simultaneously increasing the value of data (which enable prediction) and judgment (which determines why prediction matters). But these key complements—quality data and clear judgment—may not be present, or present to the same degree, in the uncertain and conflictual business of war. This has two important strategic implications. First, military organizations that adopt AI will tend to become more complex to accommodate the challenges of data and judgment across a variety of decision-making tasks. Second, data and judgment will tend to become attractive targets in strategic competition. As a result, conflicts involving AI complements are likely to unfold very differently than visions of AI substitution would suggest. Rather than rapid robotic wars and decisive shifts in military power, AI-enabled conflict will likely involve significant uncertainty, organizational friction, and chronic controversy. Greater military reliance on AI will therefore make the human element in war even more important, not less.
{"title":"Prediction and Judgment: Why Artificial Intelligence Increases the Importance of Humans in War","authors":"Avi Goldfarb, J. Lindsay","doi":"10.1162/isec_a_00425","DOIUrl":"https://doi.org/10.1162/isec_a_00425","url":null,"abstract":"Abstract Recent scholarship on artificial intelligence (AI) and international security focuses on the political and ethical consequences of replacing human warriors with machines. Yet AI is not a simple substitute for human decision-making. The advances in commercial machine learning that are reducing the costs of statistical prediction are simultaneously increasing the value of data (which enable prediction) and judgment (which determines why prediction matters). But these key complements—quality data and clear judgment—may not be present, or present to the same degree, in the uncertain and conflictual business of war. This has two important strategic implications. First, military organizations that adopt AI will tend to become more complex to accommodate the challenges of data and judgment across a variety of decision-making tasks. Second, data and judgment will tend to become attractive targets in strategic competition. As a result, conflicts involving AI complements are likely to unfold very differently than visions of AI substitution would suggest. Rather than rapid robotic wars and decisive shifts in military power, AI-enabled conflict will likely involve significant uncertainty, organizational friction, and chronic controversy. Greater military reliance on AI will therefore make the human element in war even more important, not less.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85173141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Why do some winning rebel groups build obedient and effective state militaries after civil war, while others suffer military defections? When winning rebels face intense security threats during civil wars, rebel field commanders are more likely to remain obedient during war-to-peace transitions. Intense security threats incentivize militants to create more inclusive leadership structures, reducing field commanders’ incentives to defect in the postwar period. Intense security threats also reduce commanders’ capacity for postwar resistance by forcing insurgents to remain mobile and adopt shorter time horizons in rebel-governed territory, reducing the likelihood that field commanders will develop local ties and independent support bases. The plausibility of the argument is examined using a new list of winning rebel groups since 1946. Two case studies—Zimbabwe and Côte d'Ivoire—probe the causal mechanisms of the theory. The study contributes to debates about the consequences of military victory in civil war, the postwar trajectories of armed groups, and the conditions necessary for civil-military cohesion in fragile states.
{"title":"Insurgent Armies: Military Obedience and State Formation after Rebel Victory","authors":"Philip A. Martin","doi":"10.1162/isec_a_00427","DOIUrl":"https://doi.org/10.1162/isec_a_00427","url":null,"abstract":"Abstract Why do some winning rebel groups build obedient and effective state militaries after civil war, while others suffer military defections? When winning rebels face intense security threats during civil wars, rebel field commanders are more likely to remain obedient during war-to-peace transitions. Intense security threats incentivize militants to create more inclusive leadership structures, reducing field commanders’ incentives to defect in the postwar period. Intense security threats also reduce commanders’ capacity for postwar resistance by forcing insurgents to remain mobile and adopt shorter time horizons in rebel-governed territory, reducing the likelihood that field commanders will develop local ties and independent support bases. The plausibility of the argument is examined using a new list of winning rebel groups since 1946. Two case studies—Zimbabwe and Côte d'Ivoire—probe the causal mechanisms of the theory. The study contributes to debates about the consequences of military victory in civil war, the postwar trajectories of armed groups, and the conditions necessary for civil-military cohesion in fragile states.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90866522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. A. Ford, J. Harvey, F. C. Miller, Keith B. Payne, B. H. Roberts, Scott D. Sagan, Allen S. Weiner
I enjoyed reading the thoughtful article by Scott Sagan and Allen Weiner.1 Yet, I write to point out some oaws in Sagan and Weiner’s assertion that the prohibition on civilian reprisals in the 1977 Additional Protocol I to the 1949 Geneva Conventions (Protocol I) applies to the United States.2 In 1987, the United States objected to the reprisal ban in Protocol I3 because it would “remove a signiacant deterrent that protects civilians and war victims on all sides of a conoict.”4 Abraham D. Sofaer, legal adviser to the U.S. Department of State, provided
我喜欢阅读Scott萨根的深思熟虑的文章和艾伦Weiner.1然而,我写指出一些oaw萨根和维纳在断言禁止平民1977附加议定书报复我1949年日内瓦公约(我)协议适用于美国States.2早在1987年,美国反对在协议I3报复禁令,因为它将“删除signiacant威慑保护平民和战争受害者conoict的各方。美国国务院法律顾问亚伯拉罕·d·索费尔(Abraham D. Sofaer)表示
{"title":"Are Belligerent Reprisals against Civilians Legal?","authors":"C. A. Ford, J. Harvey, F. C. Miller, Keith B. Payne, B. H. Roberts, Scott D. Sagan, Allen S. Weiner","doi":"10.1162/isec_c_00422","DOIUrl":"https://doi.org/10.1162/isec_c_00422","url":null,"abstract":"I enjoyed reading the thoughtful article by Scott Sagan and Allen Weiner.1 Yet, I write to point out some oaws in Sagan and Weiner’s assertion that the prohibition on civilian reprisals in the 1977 Additional Protocol I to the 1949 Geneva Conventions (Protocol I) applies to the United States.2 In 1987, the United States objected to the reprisal ban in Protocol I3 because it would “remove a signiacant deterrent that protects civilians and war victims on all sides of a conoict.”4 Abraham D. Sofaer, legal adviser to the U.S. Department of State, provided","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73562922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract States frequently acquire proof of other states' norm violations, from nuclear proliferation to harboring terrorists to interfering in elections. Existing theories do not fully explain how states that catch others red-handed wield a form of coercive power over the wrongdoers. Discoverers may conceal proof of wrongdoing, share such proof with other actors privately, or reveal their proof to the world. States with more leverage over wrongdoers have two incentives to conceal proof of wrongdoing. They can blackmail wrongdoers by threatening to go public with proof of their guilt, and they can simultaneously allow wrongdoers to save face. States that possess proof of wrongdoing but have less leverage are more likely to share that proof with others. If a discoverer distrusts the intentions of states with more leverage, it will reveal evidence publicly, catalyzing others to act. Publicizing proof weaponizes the prospect that other states will pay reputation and hypocrisy costs if they do not follow through on punishing norm violations. Four case studies of nuclear proliferation (Taiwan, Libya, South Africa, and North Korea) probe this novel theory.
{"title":"Caught Red-Handed: How States Wield Proof to Coerce Wrongdoers","authors":"Cullen G. Nutt, Reid B C Pauly","doi":"10.1162/isec_a_00421","DOIUrl":"https://doi.org/10.1162/isec_a_00421","url":null,"abstract":"Abstract States frequently acquire proof of other states' norm violations, from nuclear proliferation to harboring terrorists to interfering in elections. Existing theories do not fully explain how states that catch others red-handed wield a form of coercive power over the wrongdoers. Discoverers may conceal proof of wrongdoing, share such proof with other actors privately, or reveal their proof to the world. States with more leverage over wrongdoers have two incentives to conceal proof of wrongdoing. They can blackmail wrongdoers by threatening to go public with proof of their guilt, and they can simultaneously allow wrongdoers to save face. States that possess proof of wrongdoing but have less leverage are more likely to share that proof with others. If a discoverer distrusts the intentions of states with more leverage, it will reveal evidence publicly, catalyzing others to act. Publicizing proof weaponizes the prospect that other states will pay reputation and hypocrisy costs if they do not follow through on punishing norm violations. Four case studies of nuclear proliferation (Taiwan, Libya, South Africa, and North Korea) probe this novel theory.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79906948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Donald Grasse, Melissa Pavlik, Hilary Matfess, Travis B. Curtice
Abstract Across the globe, states have attempted to contain COVID-19 by restricting movement, closing schools and businesses, and banning large gatherings. Such measures have expanded the degree of sanctioned state intervention into civilians' lives. But existing theories of preventive and responsive repression cannot explain why some countries experienced surges in repression after states in Africa initiated COVID-19-related lockdowns. While responsive repression occurs when states quell protests or riots, “opportunistic repression” arises when states use crises to suppress the political opposition. An examination of the relationship between COVID-19 shutdown policies and state violence against civilians in Africa tests this theory of opportunistic repression. Findings reveal a large and statistically significant relationship between shutdowns and repression, which holds after conditioning for the spread and lethality of the disease within-country and over time. A subnational case study of repression in Uganda provides evidence that the increase in repression appears to be concentrated in opposition areas that showed less support for Yoweri Museveni in the 2016 elections. Opportunistic repression provides a better explanation than theories of preventive or responsive repression for why Uganda experienced a surge in repression in 2020 and in what areas. The results have implications for theories of repression, authoritarian survival, the politics of emergency, and security.
{"title":"Opportunistic Repression: Civilian Targeting by the State in Response to COVID-19","authors":"Donald Grasse, Melissa Pavlik, Hilary Matfess, Travis B. Curtice","doi":"10.1162/isec_a_00419","DOIUrl":"https://doi.org/10.1162/isec_a_00419","url":null,"abstract":"Abstract Across the globe, states have attempted to contain COVID-19 by restricting movement, closing schools and businesses, and banning large gatherings. Such measures have expanded the degree of sanctioned state intervention into civilians' lives. But existing theories of preventive and responsive repression cannot explain why some countries experienced surges in repression after states in Africa initiated COVID-19-related lockdowns. While responsive repression occurs when states quell protests or riots, “opportunistic repression” arises when states use crises to suppress the political opposition. An examination of the relationship between COVID-19 shutdown policies and state violence against civilians in Africa tests this theory of opportunistic repression. Findings reveal a large and statistically significant relationship between shutdowns and repression, which holds after conditioning for the spread and lethality of the disease within-country and over time. A subnational case study of repression in Uganda provides evidence that the increase in repression appears to be concentrated in opposition areas that showed less support for Yoweri Museveni in the 2016 elections. Opportunistic repression provides a better explanation than theories of preventive or responsive repression for why Uganda experienced a surge in repression in 2020 and in what areas. The results have implications for theories of repression, authoritarian survival, the politics of emergency, and security.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77458631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Strategic arms control is in crisis. The United States and Russia have retreated from agreements that formed the framework for post–Cold War arms cuts and strategic stability, such as the Anti-Ballistic Missile Treaty, the Treaty on Conventional Armed Forces in Europe, and the Intermediate-Range Nuclear Forces Treaty. The only strategic arms control agreement between the United States and Russia (i.e., New START) expires in 2026. The political forcefield that sustained the old framework has been altered by major technological revolutions and China's rise. Motives for strategic arms control are conventionally framed in terms of their potential to enhance stability by limiting certain weapons, avoiding costly arms races, or preserving military advantage. But states can also use strategic arms control to divide adversaries. Wedge strategy theory explains how arms control can do so by affecting adversaries' threat perceptions, their beliefs about the costs and benefits of formal commitments, and their degree of trust in one another. Three landmark strategic arms control negotiations (the Five-Power Treaty and the Four-Power Treaty at the Washington Naval Conference, the Limited Nuclear Test Ban Treaty, and the Strategic Arms Limitation Talks) show how the wedge motive informed these negotiations and influenced great power relations. The wedge logic remains relevant today. For example, the United States may employ future arms control agreements to drive a wedge between China and Russia, and it must be cautious about arms control deals with North Korea that would negatively affect its relationship with South Korea.
{"title":"Arms Control as Wedge Strategy: How Arms Limitation Deals Divide Alliances","authors":"T. Crawford, Khang X. Vu","doi":"10.1162/isec_a_00420","DOIUrl":"https://doi.org/10.1162/isec_a_00420","url":null,"abstract":"Abstract Strategic arms control is in crisis. The United States and Russia have retreated from agreements that formed the framework for post–Cold War arms cuts and strategic stability, such as the Anti-Ballistic Missile Treaty, the Treaty on Conventional Armed Forces in Europe, and the Intermediate-Range Nuclear Forces Treaty. The only strategic arms control agreement between the United States and Russia (i.e., New START) expires in 2026. The political forcefield that sustained the old framework has been altered by major technological revolutions and China's rise. Motives for strategic arms control are conventionally framed in terms of their potential to enhance stability by limiting certain weapons, avoiding costly arms races, or preserving military advantage. But states can also use strategic arms control to divide adversaries. Wedge strategy theory explains how arms control can do so by affecting adversaries' threat perceptions, their beliefs about the costs and benefits of formal commitments, and their degree of trust in one another. Three landmark strategic arms control negotiations (the Five-Power Treaty and the Four-Power Treaty at the Washington Naval Conference, the Limited Nuclear Test Ban Treaty, and the Strategic Arms Limitation Talks) show how the wedge motive informed these negotiations and influenced great power relations. The wedge logic remains relevant today. For example, the United States may employ future arms control agreements to drive a wedge between China and Russia, and it must be cautious about arms control deals with North Korea that would negatively affect its relationship with South Korea.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77625923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. Many expect cyber operations to provide independent utility in both warfare and low-intensity competition. Underlying these expectations are broadly shared assumptions that information technology increases operational effectiveness. But a growing body of research shows how cyber operations tend to fall short of their promise. The reason for this shortfall is their subversive mechanism of action. In theory, subversion provides a way to exert influence at lower risks than force because it is secret and indirect, exploiting systems to use them against adversaries. The mismatch between promise and practice is the consequence of the subversive trilemma of cyber operations, whereby speed, intensity, and control are negatively correlated. These constraints pose a trilemma for actors because a gain in one variable tends to produce losses across the other two variables. A case study of the Russo-Ukrainian conflict provides empirical support for the argument. Qualitative analysis leverages original data from field interviews, leaked documents, forensic evidence, and local media. Findings show that the subversive trilemma limited the strategic utility of all five major disruptive cyber operations in this conflict.
{"title":"The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations","authors":"Lennart Maschmeyer","doi":"10.1162/isec_a_00418","DOIUrl":"https://doi.org/10.1162/isec_a_00418","url":null,"abstract":"Abstract Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. Many expect cyber operations to provide independent utility in both warfare and low-intensity competition. Underlying these expectations are broadly shared assumptions that information technology increases operational effectiveness. But a growing body of research shows how cyber operations tend to fall short of their promise. The reason for this shortfall is their subversive mechanism of action. In theory, subversion provides a way to exert influence at lower risks than force because it is secret and indirect, exploiting systems to use them against adversaries. The mismatch between promise and practice is the consequence of the subversive trilemma of cyber operations, whereby speed, intensity, and control are negatively correlated. These constraints pose a trilemma for actors because a gain in one variable tends to produce losses across the other two variables. A case study of the Russo-Ukrainian conflict provides empirical support for the argument. Qualitative analysis leverages original data from field interviews, leaked documents, forensic evidence, and local media. Findings show that the subversive trilemma limited the strategic utility of all five major disruptive cyber operations in this conflict.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78984192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Why do modern states recruit legionnaires—foreigners who are neither citizens nor subjects of the country whose military they serve? Rather than exclusively enlist citizens for soldiers, for the past two centuries states have mobilized legionnaires to help wage offensives, project power abroad, and suppress dissent. A supply-and-demand argument explains why states recruit these troops, framing the choice to mobilize legionnaires as a function of political factors that constrain the government's leeway to recruit domestically and its perceptions about the territorial threats it faces externally. A multimethod approach evaluates these claims, first by examining an original dataset of legionnaire recruitment from 1815 to 2020, then by employing congruence tests across World War II participants, and finally by conducting a detailed review of a hard test case for the argument—Nazi Germany. The prevalence of states’ recruitment of legionnaires calls for a reevaluation of existing narratives about the development of modern militaries and provides new insights into how states balance among the competing imperatives of identity, norms, and security. Legionnaire recruitment also underscores the need to recalibrate existing methods of calculating net assessments and preparing for strategic surprise. Far from being bound to a state's citizenry or borders, the theory and evidence show how governments use legionnaires to buttress their military power and to engineer rapid changes in the quality and quantity of the soldiers that they field.
{"title":"Leaning on Legionnaires: Why Modern States Recruit Foreign Soldiers","authors":"Elizabeth M.F. Grasmeder","doi":"10.1162/isec_a_00411","DOIUrl":"https://doi.org/10.1162/isec_a_00411","url":null,"abstract":"Abstract Why do modern states recruit legionnaires—foreigners who are neither citizens nor subjects of the country whose military they serve? Rather than exclusively enlist citizens for soldiers, for the past two centuries states have mobilized legionnaires to help wage offensives, project power abroad, and suppress dissent. A supply-and-demand argument explains why states recruit these troops, framing the choice to mobilize legionnaires as a function of political factors that constrain the government's leeway to recruit domestically and its perceptions about the territorial threats it faces externally. A multimethod approach evaluates these claims, first by examining an original dataset of legionnaire recruitment from 1815 to 2020, then by employing congruence tests across World War II participants, and finally by conducting a detailed review of a hard test case for the argument—Nazi Germany. The prevalence of states’ recruitment of legionnaires calls for a reevaluation of existing narratives about the development of modern militaries and provides new insights into how states balance among the competing imperatives of identity, norms, and security. Legionnaire recruitment also underscores the need to recalibrate existing methods of calculating net assessments and preparing for strategic surprise. Far from being bound to a state's citizenry or borders, the theory and evidence show how governments use legionnaires to buttress their military power and to engineer rapid changes in the quality and quantity of the soldiers that they field.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79117252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}