Deterrence theory

(Redirected from Nuclear deterrence)

Deterrence theory refers to the scholarship and practice of how threats of using force by one party can convince another party to refrain from initiating some other course of action.[1] The topic gained increased prominence as a military strategy during the Cold War with regard to the use of nuclear weapons and is related to but distinct from the concept of mutual assured destruction, according to which a full-scale nuclear attack on a power with second-strike capability would devastate both parties. The central problem of deterrence revolves around how to credibly threaten military action or nuclear punishment on the adversary despite its costs to the deterrer.[2] Deterrence in an international relations context is the application of deterrence theory to avoid conflict.

USS Growler, one of two submarines designed to provide a nuclear deterrence using cruise missiles with a 500-mile (800 km) range—placed on patrol by starting to carry the Regulus I missile (shown at Pier 86 in New York, its home as a museum ship)

Deterrence is widely defined as any use of threats (implicit or explicit) or limited force intended to dissuade an actor from taking an action (i.e. maintain the status quo).[3][4] Deterrence is unlike compellence, which is the attempt to get an actor (such as a state) to take an action (i.e. alter the status quo).[5][6][4] Both are forms of coercion. Compellence has been characterized as harder to successfully implement than deterrence.[6][7] Deterrence also tends to be distinguished from defense or the use of full force in wartime.[3]

Deterrence is most likely to be successful when a prospective attacker believes that the probability of success is low and the costs of attack are high.[8] Central problems of deterrence include the credible communication of threats[9][4] and assurance.[10] Deterrence does not necessarily require military superiority.[11][12]

"General deterrence" is considered successful when an actor who might otherwise take an action refrains from doing so due to the consequences that the deterrer is perceived likely to take.[13] "Immediate deterrence" is considered successful when an actor seriously contemplating immediate military force or action refrains from doing so.[13] Scholars distinguish between "extended deterrence" (the protection of allies) and "direct deterrence" (protection of oneself).[12][14] Rational deterrence theory holds that an attacker will be deterred if they believe that:[15]

(Probability of deterrer carrying out deterrent threat × Costs if threat carried out) > (Probability of the attacker accomplishing the action × Benefits of the action)

This model is frequently simplified in game-theoretic terms as:

Costs × P(Costs) > Benefits × P(Benefits)

History

edit

By November 1945 general Curtis LeMay, who led American air raids on Japan during World War II, was thinking about how the next war would be fought. He said in a speech that month to the Ohio Society of New York that since "No air attack, once it is launched, can be completely stopped", his country needed an air force that could immediately retaliate: "If we are prepared it may never come. It is not immediately conceivable that any nation will dare to attack us if we are prepared".[16]

Most of the innovative work on deterrence theory occurred from the late 1940s to mid-1960s.[17] Historically, scholarship on deterrence has tended to focus on nuclear deterrence.[18] Since the end of the Cold War, there has been an extension of deterrence scholarship to areas that are not specifically about nuclear weapons.[4]

NATO was founded in 1949 with deterring aggression as one of its goals.[19]

A distinction is sometimes made between nuclear deterrence and "conventional deterrence."[20][21][22][23]

The two most prominent deterrent strategies are "denial" (denying the attacker the benefits of attack) and "punishment" (inflicting costs on the attacker).[11]

Lesson of Munich, where appeasement failed, contributes to deterrence theory. In the words of scholars Frederik Logevall and Kenneth Osgood, "Munich and appeasement have become among the dirtiest words in American politics, synonymous with naivete and weakness, and signifying a craven willingness to barter away the nation's vital interests for empty promises." They claimed that the success of US foreign policy often depends upon a president withstanding "the inevitable charges of appeasement that accompany any decision to negotiate with hostile powers.[24]

Concept

edit

The use of military threats as a means to deter international crises and war has been a central topic of international security research for at least 2000 years.[25]

The concept of deterrence can be defined as the use of threats in limited force by one party to convince another party to refrain from initiating some course of action.[26][3] In Arms and Influence (1966), Schelling offers a broader definition of deterrence, as he defines it as "to prevent from action by fear of consequences."[6] Glenn Snyder also offers a broad definition of deterrence, as he argues that deterrence involves both the threat of sanction and the promise of reward.[27]

A threat serves as a deterrent to the extent that it convinces its target not to carry out the intended action because of the costs and losses that target would incur. In international security, a policy of deterrence generally refers to threats of military retaliation directed by the leaders of one state to the leaders of another in an attempt to prevent the other state from resorting to the use of military force in pursuit of its foreign policy goals.

As outlined by Huth,[26] a policy of deterrence can fit into two broad categories: preventing an armed attack against a state's own territory (known as direct deterrence) or preventing an armed attack against another state (known as extended deterrence). Situations of direct deterrence often occur if there is a territorial dispute between neighboring states in which major powers like the United States do not directly intervene. On the other hand, situations of extended deterrence often occur when a great power becomes involved. The latter case has generated most interest in academic literature. Building on the two broad categories, Huth goes on to outline that deterrence policies may be implemented in response to a pressing short-term threat (known as immediate deterrence) or as strategy to prevent a military conflict or short-term threat from arising (known as general deterrence).

A successful deterrence policy must be considered in military terms but also political terms: International relations, foreign policy and diplomacy. In military terms, deterrence success refers to preventing state leaders from issuing military threats and actions that escalate peacetime diplomatic and military co-operation into a crisis or militarized confrontation that threatens armed conflict and possibly war. The prevention of crises of wars, however, is not the only aim of deterrence. In addition, defending states must be able to resist the political and the military demands of a potential attacking nation. If armed conflict is avoided at the price of diplomatic concessions to the maximum demands of the potential attacking nation under the threat of war, it cannot be claimed that deterrence has succeeded.

Furthermore, as Jentleson et al.[28] argue, two key sets of factors for successful deterrence are important: a defending state strategy that balances credible coercion and deft diplomacy consistent with the three criteria of proportionality, reciprocity, and coercive credibility and minimizes international and domestic constraints and the extent of an attacking state's vulnerability as shaped by its domestic political and economic conditions. In broad terms, a state wishing to implement a strategy of deterrence is most likely to succeed if the costs of noncompliance that it can impose on and the benefits of compliance it can offer to another state are greater than the benefits of noncompliance and the costs of compliance.

Deterrence theory holds that nuclear weapons are intended to deter other states from attacking with their nuclear weapons, through the promise of retaliation and possibly mutually assured destruction. Nuclear deterrence can also be applied to an attack by conventional forces. For example, the doctrine of massive retaliation threatened to launch US nuclear weapons in response to Soviet attacks.

A successful nuclear deterrent requires a country to preserve its ability to retaliate by responding before its own weapons are destroyed or ensuring a second-strike capability. A nuclear deterrent is sometimes composed of a nuclear triad, as in the case of the nuclear weapons owned by the United States, Russia, China and India. Other countries, such as the United Kingdom and France, have only sea-based and air-based nuclear weapons.

Proportionality

edit

Jentleson et al. provides further detail in relation to those factors.[28] Proportionality refers to the relationship between the defending state's scope and nature of the objectives being pursued and the instruments available for use to pursue them. The more the defending state demands of another state, the higher that state's costs of compliance and the greater need for the defending state's strategy to increase the costs of noncompliance and the benefits of compliance. That is a challenge, as deterrence is by definition a strategy of limited means. George (1991) goes on to explain that deterrence sometimes goes beyond threats to the actual use of military force, but if force is actually used, it must be limited and fall short of full-scale use to succeed.[29]

The main source of disproportionality is an objective that goes beyond policy change to regime change, which has been seen in Libya, Iraq, and North Korea. There, defending states have sought to change the leadership of a state and to policy changes relating primarily to their nuclear weapons programs.

Reciprocity

edit

Secondly, Jentleson et al.[28] outlines that reciprocity involves an explicit understanding of linkage between the defending state's carrots and the attacking state's concessions. The balance lies in not offering too little, too late or for too much in return and not offering too much, too soon, or for too little return.

Coercive credibility

edit

Finally, coercive credibility requires that in addition to calculations about costs and benefits of co-operation, the defending state convincingly conveys to the attacking state that failure to co-operate has consequences. Threats, uses of force, and other coercive instruments such as economic sanctions must be sufficiently credible to raise the attacking state's perceived costs of noncompliance. A defending state having a superior military capability or economic strength in itself is not enough to ensure credibility. Indeed, all three elements of a balanced deterrence strategy are more likely to be achieved if other major international actors like the UN or NATO are supportive, and opposition within the defending state's domestic politics is limited.

The other important considerations outlined by Jentleson et al.[28] that must be taken into consideration is the domestic political and economic conditions in the attacking state affecting its vulnerability to deterrence policies and the attacking state's ability to compensate unfavourable power balances. The first factor is whether internal political support and regime security are better served by defiance, or there are domestic political gains to be made from improving relations with the defending state. The second factor is an economic calculation of the costs that military force, sanctions, and other coercive instruments can impose and the benefits that trade and other economic incentives may carry. That is partly a function of the strength and flexibility of the attacking state's domestic economy and its capacity to absorb or counter the costs being imposed. The third factor is the role of elites and other key domestic political figures within the attacking state. To the extent that such actors' interests are threatened with the defending state's demands, they act to prevent or block the defending state's demands.

Rational deterrence theory

edit

One approach to theorizing about deterrence has entailed the use of rational choice and game-theoretic models of decision making (see game theory). Rational deterrence theory entails:[30]

  1. Rationality: actors are rational[12]
  2. Unitary actor assumption: actors are understood as unitary[12]
  3. Dyads: interactions tend to be between dyads (or triads) of states
  4. Strategic interactions: actors consider the choices of other actors[12]
  5. Cost-benefit calculations: outcomes reflect actors' cost-benefit calculations[12][31]

Deterrence theorists have consistently argued that deterrence success is more likely if a defending state's deterrent threat is credible to an attacking state. Huth[26] outlines that a threat is considered credible if the defending state possesses both the military capabilities to inflict substantial costs on an attacking state in an armed conflict, and the attacking state believes that the defending state is resolved to use its available military forces. Huth[26] goes on to explain the four key factors for consideration under rational deterrence theory: the military balance, signaling and bargaining power, reputations for resolve, interests at stake.

The American economist Thomas Schelling brought his background in game theory to the subject of studying international deterrence. Schelling's (1966) classic work on deterrence presents the concept that military strategy can no longer be defined as the science of military victory. Instead, it is argued that military strategy was now equally, if not more, the art of coercion, intimidation and deterrence.[32] Schelling says the capacity to harm another state is now used as a motivating factor for other states to avoid it and influence another state's behavior. To be coercive or deter another state, violence must be anticipated and avoidable by accommodation. It can therefore be summarized that the use of the power to hurt as bargaining power is the foundation of deterrence theory and is most successful when it is held in reserve.[32]

In an article celebrating Schelling's Nobel Memorial Prize for Economics,[33] Michael Kinsley, Washington Post op‑ed columnist and one of Schelling's former students, anecdotally summarizes Schelling's reorientation of game theory thus: "[Y]ou're standing at the edge of a cliff, chained by the ankle to someone else. You'll be released, and one of you will get a large prize, as soon as the other gives in. How do you persuade the other guy to give in, when the only method at your disposal—threatening to push him off the cliff—would doom you both? Answer: You start dancing, closer and closer to the edge. That way, you don't have to convince him that you would do something totally irrational: plunge him and yourself off the cliff. You just have to convince him that you are prepared to take a higher risk than he is of accidentally falling off the cliff. If you can do that, you win."

Military balance

edit

Deterrence is often directed against state leaders who have specific territorial goals that they seek to attain either by seizing disputed territory in a limited military attack or by occupying disputed territory after the decisive defeat of the adversary's armed forces. In either case, the strategic orientation of potential attacking states generally is for the short term and is driven by concerns about military cost and effectiveness. For successful deterrence, defending states need the military capacity to respond quickly and strongly to a range of contingencies. Deterrence often fails if either a defending state or an attacking state underestimates or overestimates the other's ability to undertake a particular course of action.

Signaling and bargaining power

edit

The central problem for a state that seeks to communicate a credible deterrent threat by diplomatic or military actions is that all defending states have an incentive to act as if they are determined to resist an attack in the hope that the attacking state will back away from military conflict with a seemingly resolved adversary. If all defending states have such incentives, potential attacking states may discount statements made by defending states along with any movement of military forces as merely bluffs. In that regard, rational deterrence theorists have argued that costly signals are required to communicate the credibility of a defending state's resolve. Those are actions and statements that clearly increase the risk of a military conflict and also increase the costs of backing down from a deterrent threat. States that bluff are unwilling to cross a certain threshold of threat and military action for fear of committing themselves to an armed conflict.

Reputations for resolve

edit

There are three different arguments that have been developed in relation to the role of reputations in influencing deterrence outcomes. The first argument focuses on a defending state's past behavior in international disputes and crises, which creates strong beliefs in a potential attacking state about the defending state's expected behaviour in future conflicts. The credibilities of a defending state's policies are arguably linked over time, and reputations for resolve have a powerful causal impact on an attacking state's decision whether to challenge either general or immediate deterrence. The second approach argues that reputations have a limited impact on deterrence outcomes because the credibility of deterrence is heavily determined by the specific configuration of military capabilities, interests at stake, and political constraints faced by a defending state in a given situation of attempted deterrence. The argument of that school of thought is that potential attacking states are not likely to draw strong inferences about a defending states resolve from prior conflicts because potential attacking states do not believe that a defending state's past behaviour is a reliable predictor of future behavior. The third approach is a middle ground between the first two approaches and argues that potential attacking states are likely to draw reputational inferences about resolve from the past behaviour of defending states only under certain conditions. The insight is the expectation that decisionmakers use only certain types of information when drawing inferences about reputations, and an attacking state updates and revises its beliefs when a defending state's unanticipated behavior cannot be explained by case-specific variables.

An example shows that the problem extends to the perception of the third parties as well as main adversaries and underlies the way in which attempts at deterrence can fail and even backfire if the assumptions about the others' perceptions are incorrect.[34]

Interests at stake

edit

Although costly signaling and bargaining power are more well established arguments in rational deterrence theory, the interests of defending states are not as well known. Attacking states may look beyond the short-term bargaining tactics of a defending state and seek to determine what interests are at stake for the defending state that would justify the risks of a military conflict. The argument is that defending states that have greater interests at stake in a dispute are more resolved to use force and more willing to endure military losses to secure those interests. Even less well-established arguments are the specific interests that are more salient to state leaders such as military interests and economic interests.

Furthermore, Huth[26] argues that both supporters and critics of rational deterrence theory agree that an unfavorable assessment of the domestic and international status quo by state leaders can undermine or severely test the success of deterrence. In a rational choice approach, if the expected utility of not using force is reduced by a declining status quo position, deterrence failure is more likely since the alternative option of using force becomes relatively more attractive.

Tripwires

edit

International relations scholars Dan Reiter and Paul Poast have argued that so-called "tripwires" do not deter aggression.[35] Tripwires entail that small forces are deployed abroad with the assumption that an attack on them will trigger a greater deployment of forces.[35] Dan Altman has argued that tripwires do work to deter aggression, citing the Western deployment of forces to Berlin in 1948–1949 to deter Soviet aggression as a successful example.[36]

A 2022 study by Brian Blankenship and Erik Lin-Greenberg found that high-resolve, low-capability signals (such as tripwires) were not viewed as more reassuring to allies than low-resolve, high-capability alternatives (such as forces stationed offshore). Their study cast doubt on the reassuring value of tripwires.[37]

Nuclear deterrence theory

edit

In 1966, Schelling[32] is prescriptive in outlining the impact of the development of nuclear weapons in the analysis of military power and deterrence. In his analysis, before the widespread use of assured second strike capability, or immediate reprisal, in the form of SSBN submarines, Schelling argues that nuclear weapons give nations the potential to destroy their enemies but also the rest of humanity without drawing immediate reprisal because of the lack of a conceivable defense system and the speed with which nuclear weapons can be deployed. A nation's credible threat of such severe damage empowers their deterrence policies and fuels political coercion and military deadlock, which can produce proxy warfare.

According to Kenneth Waltz, there are three requirements for successful nuclear deterrence:[38]

  1. Part of a state's nuclear arsenal must appear to be able to survive an attack by the adversary and be used for a retaliatory second strike
  2. The state must not respond to false alarms of a strike by the adversary
  3. The state must maintain command and control

The stability–instability paradox is a key concept in rational deterrence theory. It states that when two countries each have nuclear weapons, the probability of a direct war between them greatly decreases, but the probability of minor or indirect conflicts between them increases.[39][40][41] This occurs because rational actors want to avoid nuclear wars, and thus they neither start major conflicts nor allow minor conflicts to escalate into major conflicts—thus making it safe to engage in minor conflicts. For instance, during the Cold War the United States and the Soviet Union never engaged each other in warfare, but fought proxy wars in Korea, Vietnam, Angola, the Middle East, Nicaragua and Afghanistan and spent substantial amounts of money and manpower on gaining relative influence over the third world.[42]

Bernard Brodie wrote in 1959 that a credible nuclear deterrent must be always ready.[43][a] An extended nuclear deterrence guarantee is also called a nuclear umbrella.[44]

Scholars have debated whether having a superior nuclear arsenal provides a deterrent against other nuclear-armed states with smaller arsenals. Matthew Kroenig has argued that states with nuclear superiority are more likely to win nuclear crises,[45][46] whereas Todd Sechser, Matthew Fuhrmann and David C. Logan have challenged this assertion.[47][48][49] A 2023 study found that a state with nuclear weapons is less likely to be targeted by non-nuclear states, but that a state with nuclear weapons is not less likely to target other nuclear states in low-level conflict.[50] A 2022 study by Kyungwon Suh suggests that nuclear superiority may not reduce the likelihood that nuclear opponents will initiate nuclear crises.[51]

Proponents of nuclear deterrence theory argue that newly nuclear-armed states may pose a short- or medium-term risk, but that "nuclear learning" occurs over time as states learn to live with new nuclear-armed states.[52][53] Mark S. Bell and Nicholas L. Miller have however argued that there is a weak theoretical and empirical basis for notions of "nuclear learning."[54]

Stages of US policy of deterrence

edit

The US policy of deterrence during the Cold War underwent significant variations.

Containment

edit

The early stages of the Cold War were generally characterized by the containment of communism, an aggressive stance on behalf of the US especially on developing nations under its sphere of influence. The period was characterized by numerous proxy wars throughout most of the globe, particularly Africa, Asia, Central America, and South America. One notable conflict was the Korean War. George F. Kennan, who is taken to be the founder of this policy in his Long Telegram, asserted that he never advocated military intervention, merely economic support, and that his ideas were misinterpreted as espoused by the general public.

Détente

edit

With the US drawdown from Vietnam, the normalization of US relations with China, and the Sino-Soviet Split, the policy of containment was abandoned and a new policy of détente was established, with peaceful co-existence was sought between the United States and the Soviet Union. Although all of those factors contributed to this shift, the most important factor was probably the rough parity achieved in stockpiling nuclear weapons with the clear capability of mutual assured destruction (MAD). Therefore, the period of détente was characterized by a general reduction in the tension between the Soviet Union and the United States and a thawing of the Cold War, which lasted from the late 1960s until the start of the 1980s. The doctrine of mutual nuclear deterrence then characterized relations between the United States and the Soviet Union and relations with Russia until the onset of the New Cold War in the early 2010s. Since then, relations have been less clear.

Reagan era

edit

A third shift occurred with US President Ronald Reagan's arms build-up during the 1980s. Reagan attempted to justify the policy by concerns of growing Soviet influence in Latin America and the post-1979 revolutionary government of Iran. Similar to the old policy of containment, the US funded several proxy wars, including support for Saddam Hussein of Iraq during the Iran–Iraq War, support for the mujahideen in Afghanistan, who were fighting for independence from the Soviet Union, and several anticommunist movements in Latin America such as the overthrow of the Sandinista government in Nicaragua. The funding of the Contras in Nicaragua led to the Iran-Contra Affair, while overt support led to a ruling from the International Court of Justice against the United States in Nicaragua v. United States.

The final expression of the full impact of deterrence during the cold war can be seen in the agreement between Reagan and Mikhail Gorbachev in 1985. They "agreed that a nuclear war cannot be won and must never be fought. Recognizing that any conflict between the USSR and the U.S. could have catastrophic consequences, they emphasized the importance of preventing any war between them, whether nuclear or conventional. They will not seek to achieve military superiority.".

While the army was dealing with the breakup of the Soviet Union and the spread of nuclear technology to other nations beyond the United States and Russia, the concept of deterrence took on a broader multinational dimension. The US policy on deterrence after the Cold War was outlined in 1995 in the document called "Essentials of Post–Cold War Deterrence".[55] It explains that while relations with Russia continue to follow the traditional characteristics of MAD, but the US policy of deterrence towards nations with minor nuclear capabilities should ensure by threats of immense retaliation (or even pre-emptive action) not to threaten the United States, its interests, or allies. The document explains that such threats must also be used to ensure that nations without nuclear technology refrain from developing nuclear weapons and that a universal ban precludes any nation from maintaining chemical or biological weapons. The current tensions with Iran and North Korea over their nuclear programs are caused partly by the continuation of the policy of deterrence.

Post-Cold War period

edit

By the beginning of the 2022 Russian invasion of Ukraine, many western hawks expressed the view that deterrence worked in that war but only in one way – in favor of Russia. Former US security advisor, John Bolton, said: Deterrence is working in the Ukraine crisis, just not for the right side. The United States and its allies failed to deter Russia from invading. The purpose of deterrence strategy is to prevent the conflict entirely, and there Washington failed badly. On the other hand, Russian deterrence is enjoying spectacular success. Russia has convinced the West that even a whisper of NATO military action in Ukraine would bring disastrous consequences. Putin threatens, blusters, uses the word “nuclear,” and the West wilts.[56]

When Elon Musk prevented Ukraine from carrying drone attacks on the Russian Black Sea fleet by denying to enable needed Starlink communications in Crimea,[57] Anne Applebaum argued Musk had been deterred by Russia after the country's ambassador warned him an attack on Crimea would be met with a nuclear response.[58] Later Ukrainian attacks on the same fleet using a different communications system also caused deterrence, this time to the Russian Navy.[58]

Timo S. Koster who served at NATO as Director of Defence Policy & Capabilities similarly argued: A massacre is taking place in Europe and the strongest military alliance in the world is staying out of it. We are deterred and Russia is not.[59] Philip Breedlove, a retired four-star U.S. Air Force general and a former SACEUR, said that Western fears about nuclear weapons and World War III have left it "fully deterred" and Putin "completely undeterred." The West have "ceded the initiative to the enemy."[60] No attempt was made by NATO to deter Moscow with the threat of military force, wondered another expert. To the contrary, it was Russia’s deterrence that proved to be successful.[61]

Cyber deterrence

edit

Since the early 2000s, there has been an increased focus on cyber deterrence. Cyber deterrence has two meanings:[62]

  1. The use of cyber actions to deter other states
  2. The deterrence of an adversary's cyber operations

Scholars have debated how cyber capabilities alter traditional understandings of deterrence, given that it may be harder to attribute responsibility for cyber attacks, the barriers to entry may be lower, the risks and costs may be lower for actors who conduct cyber attacks, it may be harder to signal and interpret intentions, the advantage of offense over defense, and weak actors and non-state actors can develop considerable cyber capabilities.[62][63][64][65] Scholars have also debated the feasibility of launching highly damaging cyber attacks and engaging in destructive cyber warfare, with most scholars expressing skepticism that cyber capabilities have enhanced the ability of states to launch highly destructive attacks.[66][67][68] The most prominent cyber attack to date is the Stuxnet attack on Iran's nuclear program.[66][67] By 2019, the only publicly acknowledged case of a cyber attack causing a power outage was the 2015 Ukraine power grid hack.[69]

There are various ways to engage in cyber deterrence:[62][63][64]

  • Denial: preventing adversaries from achieving military objectives by defending against them[65]
  • Punishment: the imposition of costs on the adversary
  • Norms: the establishment and maintenance of norms that establish appropriate standards of behavior[70][71]
  • Escalation: raising the probability that costs will be imposed on the adversary[72]
  • Entanglement and interdependence: interdependence between actors can have a deterrent effect[63][68]

There is a risk of unintended escalation in cyberspace due to difficulties in discerning the intent of attackers,[73][74] and complexities in state-hacker relationships.[75] According to political scientists Joseph Brown and Tanisha Fazal, states frequently neither confirm nor deny responsibility for cyber operations so that they can avoid the escalatory risks (that come with public credit) while also signaling that they have cyber capabilities and resolve (which can be achieved if intelligence agencies and governments believe they were responsible).[72]

According to Lennart Maschmeyer, cyber weapons have limited coercive effectiveness due to a trilemma "whereby speed, intensity, and control are negatively correlated. These constraints pose a trilemma for actors because a gain in one variable tends to produce losses across the other two variables."[76]

Intrawar deterrence

edit

Intrawar deterrence is deterrence within a war context. It means that war has broken out but actors still seek to deter certain forms of behavior. In the words of Caitlin Talmadge, "intra-war deterrence failures... can be thought of as causing wars to get worse in some way."[77] Examples of intrawar deterrence include deterring adversaries from resorting to nuclear, chemical and biological weapons attacks or attacking civilian populations indiscriminately.[78] Broadly, it involves any prevention of escalation.[79]

Criticism

edit

Deterrence failures

edit

Deterrence theory has been criticized by numerous scholars for various reasons, the most basic being skepticism that decision makers are rational. A prominent strain of criticism argues that rational deterrence theory is contradicted by frequent deterrence failures, which may be attributed to misperceptions.[80] Here it's argued that misestimations of perceived costs and benefits by analysts contribute to deterrence failures,[81] as exemplified in case of Russian invasion of Ukraine. Frozen conflicts can be seen as rewarding aggression.[82]

Misprediction of behavior

edit

Scholars have also argued that leaders do not behave in ways that are consistent with the predictions of nuclear deterrence theory.[83][84][85] Scholars have also argued that rational deterrence theory does not grapple sufficiently with emotions and psychological biases that make accidents, loss of self-control, and loss of control over others likely.[86][87] Frank C. Zagare has argued that deterrence theory is logically inconsistent and empirically inaccurate. In place of classical deterrence, rational choice scholars have argued for perfect deterrence, which assumes that states may vary in their internal characteristics and especially in the credibility of their threats of retaliation.[88]

Suicide attacks

edit

Advocates for nuclear disarmament, such as Global Zero, have criticized nuclear deterrence theory. Sam Nunn, William Perry, Henry Kissinger, and George Shultz have all called upon governments to embrace the vision of a world free of nuclear weapons, and created the Nuclear Security Project to advance that agenda.[89] In 2010, the four were featured in a documentary film entitled Nuclear Tipping Point where proposed steps to achieve nuclear disarmament.[90][91] Kissinger has argued, "The classical notion of deterrence was that there was some consequences before which aggressors and evildoers would recoil. In a world of suicide bombers, that calculation doesn't operate in any comparable way."[92] Shultz said, "If you think of the people who are doing suicide attacks, and people like that get a nuclear weapon, they are almost by definition not deterrable."[93]

Stronger deterrent

edit

Paul Nitze argued in 1994 that nuclear weapons were obsolete in the "new world disorder" after the dissolution of the Soviet Union, and he advocated reliance on precision guided munitions to secure a permanent military advantage over future adversaries.[94]

Minimum deterrence

edit

As opposed to the extreme mutually assured destruction form of deterrence, the concept of minimum deterrence in which a state possesses no more nuclear weapons than is necessary to deter an adversary from attacking is presently the most common form of deterrence practiced by nuclear weapon states, such as China, India, Pakistan, Britain, and France.[95] Pursuing minimal deterrence during arms negotiations between the United States and Russia allows each state to make nuclear stockpile reductions without the state becoming vulnerable, but it has been noted that there comes a point that further reductions may be undesirable, once minimal deterrence is reached, as further reductions beyond that point increase a state's vulnerability and provide an incentive for an adversary to expand its nuclear arsenal secretly.[96]

France has developed and maintained its own nuclear deterrent under the belief that the United States will refuse to risk its own cities by assisting Western Europe in a nuclear war.[97]

Ethical objections

edit

In the post cold war era, philosophical objections to the reliance upon deterrence theories in general have also been raised on purely ethical grounds. Scholars such as Robert L. Holmes have noted that the implementation of such theories is inconsistent with a fundamental deontological presumption which prohibits the killing of innocent life. Consequently, such theories are prima facie immoral in nature. In addition, he observes that deterrence theories serve to perpetuate a state of mutual assured destruction between nations over time. Holmes further argues that it is therefore both irrational and immoral to utilize a methodology for perpetuating international peace which relies exclusively upon the continuous development of new iterations of the very weapons which it is designed to prohibit.[98][99][100][101]

See also

edit

Notes

edit
  1. ^ Definition of deterrence from the Dictionary of Modern Strategy and Tactics by Michael Keane: "The prevention or inhibition of action brought about by fear of the consequences. Deterrence is a state of mind brought about by the existence of a credible threat of unacceptable counteraction. It assumes and requires rational decision makers."

References

edit
  1. ^ Wragg, David W. (1973). A Dictionary of Aviation (first ed.). Osprey. p. 108. ISBN 9780850451634.
  2. ^ Lindsay, Jon R.; Gartzke, Erik (2019). Introduction: Cross-Domain Deterrence, from Practice to Theory. Oxford University Press. p. 2. doi:10.1093/oso/9780190908645.003.0001. ISBN 978-0-19-090960-4. Archived from the original on 2021-08-30. Retrieved 2021-08-30.
  3. ^ a b c Morgan, Patrick M. (1977). Deterrence: A Conceptual Analysis. SAGE Publications. pp. 26–30. ISBN 978-0-8039-0819-2. Archived from the original on 2024-02-24. Retrieved 2021-08-30.26-30&rft.pub=SAGE Publications&rft.date=1977&rft.isbn=978-0-8039-0819-2&rft.aulast=Morgan&rft.aufirst=Patrick M.&rft_id=https://books.google.com/books?id=aNreAAAAMAAJ&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  4. ^ a b c d Gartzke, Eric; Lindsay, Jon R. (2019). Cross-Domain Deterrence: Strategy in an Era of Complexity. Oxford University Press. doi:10.1093/oso/9780190908645.001.0001. ISBN 978-0-19-090960-4. Archived from the original on 2021-08-30. Retrieved 2021-08-30.
  5. ^ Art, Robert J.; Greenhill, Kelly M. (2015). The Use of Force: Military Power and International Politics. Rowman & Littlefield Publishers. pp. 3–5. ISBN 978-1-4422-3306-5. Archived from the original on 2024-02-24. Retrieved 2021-08-28.3-5&rft.pub=Rowman & Littlefield Publishers&rft.date=2015&rft.isbn=978-1-4422-3306-5&rft.aulast=Art&rft.aufirst=Robert J.&rft.au=Greenhill, Kelly M.&rft_id=https://books.google.com/books?id=Ez8xCgAAQBAJ&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  6. ^ a b c Schelling, Thomas C. (1966). Arms and Influence. Yale University Press. doi:10.2307/j.ctt5vm52s. ISBN 978-0-300-00221-8. JSTOR j.ctt5vm52s. Archived from the original on 2022-05-19. Retrieved 2021-08-30.
  7. ^ Pape, Robert A. (1996). Bombing to Win: Air Power and Coercion in War (1 ed.). Cornell University Press. ISBN 978-0-8014-3134-0. JSTOR 10.7591/j.ctt1287f6v. Archived from the original on 2021-08-30. Retrieved 2021-08-30.
  8. ^ Mearsheimer, John J. (1983). Conventional Deterrence. Cornell University Press. p. 23. ISBN 978-1-5017-1325-5. JSTOR 10.7591/j.ctt1rv61v2. Archived from the original on 2023-04-05. Retrieved 2021-09-05.
  9. ^ Shimshoni, Jonathan (1988). Israel and Conventional Deterrence. Cornell University Press. p. 6. doi:10.7591/9781501737831. ISBN 978-1-5017-3783-1. S2CID 243305936. Archived from the original on 2021-09-06. Retrieved 2021-09-06.
  10. ^ Glaser, Bonnie S.; Weiss, Jessica Chen; Christensen, Thomas J. (2023-11-30). "Taiwan and the True Sources of Deterrence". Foreign Affairs. ISSN 0015-7120. Archived from the original on 2023-12-01. Retrieved 2023-12-01.
  11. ^ a b Heginbotham, Eric; Samuels, Richard J. (2018). "Active Denial: Redesigning Japan's Response to China's Military Challenge". International Security. 42 (4): 128–169. doi:10.1162/isec_a_00313. hdl:1721.1/118651. ISSN 0162-2889. S2CID 57570578. Archived from the original on 2024-02-24. Retrieved 2021-09-06.128-169&rft.date=2018&rft_id=info:hdl/1721.1/118651&rft_id=https://api.semanticscholar.org/CorpusID:57570578#id-name=S2CID&rft.issn=0162-2889&rft_id=info:doi/10.1162/isec_a_00313&rft.aulast=Heginbotham&rft.aufirst=Eric&rft.au=Samuels, Richard J.&rft_id=https://doi.org/10.1162/isec_a_00313&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  12. ^ a b c d e f Huth, Paul; Russett, Bruce (1984). "What Makes Deterrence Work? Cases from 1900 to 1980". World Politics. 36 (4): 496–526. doi:10.2307/2010184. ISSN 0043-8871. JSTOR 2010184. S2CID 153596965. Archived from the original on 2021-09-11. Retrieved 2021-09-11.496-526&rft.date=1984&rft.issn=0043-8871&rft_id=https://api.semanticscholar.org/CorpusID:153596965#id-name=S2CID&rft_id=https://www.jstor.org/stable/2010184#id-name=JSTOR&rft_id=info:doi/10.2307/2010184&rft.aulast=Huth&rft.aufirst=Paul&rft.au=Russett, Bruce&rft_id=https://www.jstor.org/stable/2010184&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  13. ^ a b Fearon, James (2002). "Selection Effects and Deterrence". International Interactions. 28 (1): 5–29. doi:10.1080/03050620210390. ISSN 0305-0629. S2CID 35580738. Archived from the original on 2024-02-24. Retrieved 2021-09-06.5-29&rft.date=2002&rft_id=https://api.semanticscholar.org/CorpusID:35580738#id-name=S2CID&rft.issn=0305-0629&rft_id=info:doi/10.1080/03050620210390&rft.aulast=Fearon&rft.aufirst=James&rft_id=https://doi.org/10.1080/03050620210390&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  14. ^ Lee, Do Young (2021). "Strategies of Extended Deterrence: How States Provide the Security Umbrella". Security Studies. 30 (5): 761–796. doi:10.1080/09636412.2021.2010887. ISSN 0963-6412. S2CID 246241390.761-796&rft.date=2021&rft_id=https://api.semanticscholar.org/CorpusID:246241390#id-name=S2CID&rft.issn=0963-6412&rft_id=info:doi/10.1080/09636412.2021.2010887&rft.aulast=Lee&rft.aufirst=Do Young&rft_id=https://doi.org/10.1080%2F09636412.2021.2010887&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  15. ^ Glaser, Charles L. (1990). Analyzing Strategic Nuclear Policy. Princeton University Press. p. 20. ISBN 978-1-4008-6202-3. Archived from the original on 2023-04-10. Retrieved 2021-09-18.
  16. ^ Rhodes, Richard (1995-06-11). "The General and World War III". The New Yorker. ISSN 0028-792X. Archived from the original on 2019-12-12. Retrieved 2023-11-30.
  17. ^ Art, Robert J.; Greenhill, Kelly M. (2015). The Use of Force: Military Power and International Politics. Rowman & Littlefield Publishers. p. 3. ISBN 978-1-4422-3306-5. Archived from the original on 2024-02-24. Retrieved 2021-08-28.
  18. ^ Shimshoni, Jonathan (1988). Israel and Conventional Deterrence. Cornell University Press. p. 1. doi:10.7591/9781501737831. ISBN 978-1-5017-3783-1. S2CID 243305936. Archived from the original on 2021-09-06. Retrieved 2021-09-06.
  19. ^ Rynning, Sten (2021). "Deterrence Rediscovered: NATO and Russia". In Osinga, Frans; Sweijs, Tim (eds.). NL ARMS Netherlands Annual Review of Military Studies 2020. The Hague: T.M.C. Asser Press. pp. 29–45. doi:10.1007/978-94-6265-419-8_3. ISBN 978-94-6265-418-1. PMC 7711749.29-45&rft.pub=T.M.C. Asser Press&rft.date=2021&rft_id=https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7711749#id-name=PMC&rft_id=info:doi/10.1007/978-94-6265-419-8_3&rft.isbn=978-94-6265-418-1&rft.aulast=Rynning&rft.aufirst=Sten&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  20. ^ Wirtz, James (2018). "How Does Nuclear Deterrence Differ from Conventional Deterrence?" (PDF). Strategic Studies Quarterly. Archived (PDF) from the original on 2021-10-25. Retrieved 2021-09-05.
  21. ^ Mueller, Karl (2021), Osinga, Frans; Sweijs, Tim (eds.), "The Continuing Relevance of Conventional Deterrence", NL ARMS Netherlands Annual Review of Military Studies 2020: Deterrence in the 21st Century—Insights from Theory and Practice, Nl Arms, T.M.C. Asser Press, pp. 47–63, doi:10.1007/978-94-6265-419-8_4, ISBN 978-94-6265-419-847-63&rft.date=2021&rft_id=info:doi/10.1007/978-94-6265-419-8_4&rft.isbn=978-94-6265-419-8&rft.aulast=Mueller&rft.aufirst=Karl&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  22. ^ Huntington, Samuel P. (1983). "Conventional Deterrence and Conventional Retaliation in Europe". International Security. 8 (3): 32–56. doi:10.2307/2538699. ISSN 0162-2889. JSTOR 2538699. S2CID 154133787. Archived from the original on 2021-09-05. Retrieved 2021-09-05.32-56&rft.date=1983&rft.issn=0162-2889&rft_id=https://api.semanticscholar.org/CorpusID:154133787#id-name=S2CID&rft_id=https://www.jstor.org/stable/2538699#id-name=JSTOR&rft_id=info:doi/10.2307/2538699&rft.aulast=Huntington&rft.aufirst=Samuel P.&rft_id=https://www.jstor.org/stable/2538699&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  23. ^ Mearsheimer, John J. (1982). "Why the Soviets Can't Win Quickly in Central Europe". International Security. 7 (1): 3–39. doi:10.2307/2538686. ISSN 0162-2889. JSTOR 2538686. S2CID 154732192. Archived from the original on 2021-09-05. Retrieved 2021-09-05.3-39&rft.date=1982&rft.issn=0162-2889&rft_id=https://api.semanticscholar.org/CorpusID:154732192#id-name=S2CID&rft_id=https://www.jstor.org/stable/2538686#id-name=JSTOR&rft_id=info:doi/10.2307/2538686&rft.aulast=Mearsheimer&rft.aufirst=John J.&rft_id=https://www.jstor.org/stable/2538686&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  24. ^ Logevall, Fredrik; Osgood, Kenneth (2010). "THE GHOST OF MUNICH: America's Appeasement Complex". World Affairs. 173 (2): 13–26. JSTOR 27870285.13-26&rft.date=2010&rft_id=https://www.jstor.org/stable/27870285#id-name=JSTOR&rft.aulast=Logevall&rft.aufirst=Fredrik&rft.au=Osgood, Kenneth&rft_id=https://www.jstor.org/stable/27870285&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  25. ^ See, for example, Carl von Clausewitz, On War, trans. and ed. Michael Howard and Peter Paret (Princeton, Princeton University Press, 1989)
  26. ^ a b c d e Huth, P. K. (1999), "Deterrence and International Conflict: Empirical Findings and Theoretical Debate", Annual Review of Political Science, 2: 25–48, doi:10.1146/annurev.polisci.2.1.2525-48&rft.date=1999&rft_id=info:doi/10.1146/annurev.polisci.2.1.25&rft.aulast=Huth&rft.aufirst=P. K.&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  27. ^ Snyder, Glenn H. (1966). Deterrence and Defense. Princeton University Press. ISBN 978-1-4008-7716-4. Archived from the original on 2023-04-10. Retrieved 2021-11-20.
  28. ^ a b c d Jentleson, B.A.; Whytock, C.A. (2005), "Who Won Libya", International Security, 30 (3): 47–86, doi:10.1162/isec.2005.30.3.47, S2CID 57572461, archived from the original on 2021-04-26, retrieved 2021-07-1447-86&rft.date=2005&rft_id=info:doi/10.1162/isec.2005.30.3.47&rft_id=https://api.semanticscholar.org/CorpusID:57572461#id-name=S2CID&rft.aulast=Jentleson&rft.aufirst=B.A.&rft.au=Whytock, C.A.&rft_id=https://scholarship.law.uci.edu/cgi/viewcontent.cgi?article=1752&context=faculty_scholarship&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  29. ^ George, A (1991), "The General Theory and Logic of Coercive Diplomacy", Forceful Persuasion: Coercive Diplomacy as an Alternative to War, Washington, D.C.: United States Institute of Peace Press, pp. 3–143-14&rft.date=1991&rft.aulast=George&rft.aufirst=A&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  30. ^ Achen, Christopher H.; Snidal, Duncan (1989). "Rational Deterrence Theory and Comparative Case Studies". World Politics. 41 (2): 143–169. doi:10.2307/2010405. ISSN 0043-8871. JSTOR 2010405. S2CID 153591618. Archived from the original on 2021-09-08. Retrieved 2021-09-11.143-169&rft.date=1989&rft.issn=0043-8871&rft_id=https://api.semanticscholar.org/CorpusID:153591618#id-name=S2CID&rft_id=https://www.jstor.org/stable/2010405#id-name=JSTOR&rft_id=info:doi/10.2307/2010405&rft.aulast=Achen&rft.aufirst=Christopher H.&rft.au=Snidal, Duncan&rft_id=https://www.jstor.org/stable/2010405&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  31. ^ Huth, Paul; Russett, Bruce (1990). "Testing Deterrence Theory: Rigor Makes a Difference". World Politics. 42 (4): 466–501. doi:10.2307/2010511. ISSN 0043-8871. JSTOR 2010511. S2CID 154490426. Archived from the original on 2021-09-11. Retrieved 2021-09-11.466-501&rft.date=1990&rft.issn=0043-8871&rft_id=https://api.semanticscholar.org/CorpusID:154490426#id-name=S2CID&rft_id=https://www.jstor.org/stable/2010511#id-name=JSTOR&rft_id=info:doi/10.2307/2010511&rft.aulast=Huth&rft.aufirst=Paul&rft.au=Russett, Bruce&rft_id=https://www.jstor.org/stable/2010511&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  32. ^ a b c Since the consequence of a breakdown of the nuclear deterrence strategy is so catastrophic for human civilisation, it is reasonable to employ the strategy only if the chance of breakdown is zero. Schelling, T. C. (1966), "2", The Diplomacy of Violence, New Haven: Yale University Press, pp. 1–341-34&rft.pub=Yale University Press&rft.date=1966&rft.aulast=Schelling&rft.aufirst=T. C.&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  33. ^ "A Nobel Laureate Who's Got Game" Archived 2019-09-25 at the Wayback Machine, The Washington Post, October 12, 2005.
  34. ^ Jervis, Robert (1982). "Deterrence and Perception". International Security. 7 (3): 3–30. doi:10.2307/2538549. JSTOR 2538549.3-30&rft.date=1982&rft_id=info:doi/10.2307/2538549&rft_id=https://www.jstor.org/stable/2538549#id-name=JSTOR&rft.aulast=Jervis&rft.aufirst=Robert&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  35. ^ a b "The Truth About Tripwires: Why Small Force Deployments Do Not Deter Aggression". Texas National Security Review. 2021-06-02. Archived from the original on 2021-06-02. Retrieved 2021-06-03.
  36. ^ Altman, Dan (2018). "Advancing without Attacking: The Strategic Game around the Use of Force". Security Studies. 27 (1): 58–88. doi:10.1080/09636412.2017.1360074. ISSN 0963-6412. S2CID 148987375. Archived from the original on 2024-02-24. Retrieved 2021-06-03.58-88&rft.date=2018&rft_id=https://api.semanticscholar.org/CorpusID:148987375#id-name=S2CID&rft.issn=0963-6412&rft_id=info:doi/10.1080/09636412.2017.1360074&rft.aulast=Altman&rft.aufirst=Dan&rft_id=https://doi.org/10.1080/09636412.2017.1360074&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  37. ^ Blankenship, Brian; Lin-Greenberg, Erik (2022). "Trivial Tripwires?: Military Capabilities and Alliance Reassurance". Security Studies. 31: 92–117. doi:10.1080/09636412.2022.2038662. hdl:1721.1/148673. ISSN 0963-6412. S2CID 247040733. Archived from the original on 2024-02-24. Retrieved 2022-02-21.92-117&rft.date=2022&rft_id=info:hdl/1721.1/148673&rft_id=https://api.semanticscholar.org/CorpusID:247040733#id-name=S2CID&rft.issn=0963-6412&rft_id=info:doi/10.1080/09636412.2022.2038662&rft.aulast=Blankenship&rft.aufirst=Brian&rft.au=Lin-Greenberg, Erik&rft_id=https://doi.org/10.1080/09636412.2022.2038662&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  38. ^ Sagan, Scott; Waltz, Kenneth (1995). The Spread of Nuclear Weapons: A Debate. W.W. Norton. p. 20. ISBN 978-0-393-03810-1. Archived from the original on 2023-04-10. Retrieved 2022-02-15.
  39. ^ Snyder, Glenn Herald (1965). The Balance of Power and the Balance of Terror. Archived from the original on 2023-04-05. Retrieved 2022-01-28.
  40. ^ Jervis, Robert (1979). "Why Nuclear Superiority Doesn't Matter". Political Science Quarterly. 94 (4): 617–633. doi:10.2307/2149629. ISSN 0032-3195. JSTOR 2149629. Archived from the original on 2022-01-28. Retrieved 2022-01-28.617-633&rft.date=1979&rft.issn=0032-3195&rft_id=https://www.jstor.org/stable/2149629#id-name=JSTOR&rft_id=info:doi/10.2307/2149629&rft.aulast=Jervis&rft.aufirst=Robert&rft_id=https://www.jstor.org/stable/2149629&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  41. ^ Jervis, Robert (1989). The Meaning of the Nuclear Revolution: Statecraft and the Prospect of Armageddon. Cornell University Press. ISBN 978-0-8014-9565-6. Archived from the original on 2022-10-26. Retrieved 2022-01-28.
  42. ^ Krepon, Michael. "The Stability-Instability Paradox, Misperception, and Escalation Control in South Asia (essay)" (PDF). The Henry Stimson Center. Archived from the original (PDF) on 12 August 2017. Retrieved 12 August 2017.
  43. ^ Brodie, Bernard (1959), "8", "The Anatomy of Deterrence" as found in Strategy in the Missile Age, Princeton: Princeton University Press, pp. 264–304264-304&rft.pub=Princeton University Press&rft.date=1959&rft.aulast=Brodie&rft.aufirst=Bernard&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  44. ^ "Australia | Nautilus Institute for Security and Sustainability". nautilus.org. 2011-12-19. Archived from the original on 2021-04-29. Retrieved 2021-04-29.
  45. ^ Kroenig, Matthew (2018). The Logic of American Nuclear Strategy: Why Strategic Superiority Matters. Oxford University Press. ISBN 978-0-19-084918-4. Archived from the original on 2023-04-10. Retrieved 2022-05-07.
  46. ^ Kroenig, Matthew (2013). "Nuclear Superiority and the Balance of Resolve: Explaining Nuclear Crisis Outcomes". International Organization. 67 (1): 141–171. doi:10.1017/S0020818312000367. ISSN 0020-8183. JSTOR 43282155. S2CID 155075459. Archived from the original on 2022-01-26. Retrieved 2022-05-07.141-171&rft.date=2013&rft.issn=0020-8183&rft_id=https://api.semanticscholar.org/CorpusID:155075459#id-name=S2CID&rft_id=https://www.jstor.org/stable/43282155#id-name=JSTOR&rft_id=info:doi/10.1017/S0020818312000367&rft.aulast=Kroenig&rft.aufirst=Matthew&rft_id=https://www.jstor.org/stable/43282155&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  47. ^ Sechser, Todd S.; Fuhrmann, Matthew (2013). "Crisis Bargaining and Nuclear Blackmail". International Organization. 67 (1): 173–195. doi:10.1017/S0020818312000392. ISSN 0020-8183. JSTOR 43282156. S2CID 154642193. Archived from the original on 2022-05-07. Retrieved 2022-05-07.173-195&rft.date=2013&rft.issn=0020-8183&rft_id=https://api.semanticscholar.org/CorpusID:154642193#id-name=S2CID&rft_id=https://www.jstor.org/stable/43282156#id-name=JSTOR&rft_id=info:doi/10.1017/S0020818312000392&rft.aulast=Sechser&rft.aufirst=Todd S.&rft.au=Fuhrmann, Matthew&rft_id=https://www.jstor.org/stable/43282156&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  48. ^ Sechser, Todd S.; Fuhrmann, Matthew (2017). Nuclear Weapons and Coercive Diplomacy. Cambridge: Cambridge University Press. doi:10.1017/9781316227305. ISBN 978-1-107-10694-9. S2CID 157599829. Archived from the original on 2022-03-20. Retrieved 2022-05-07.
  49. ^ Logan, David C. (2022). "The Nuclear Balance Is What States Make of It". International Security. 46 (4): 172–215. doi:10.1162/isec_a_00434. ISSN 0162-2889. S2CID 248723655. the findings reinforce a key theoretical tenet of the nuclear revolution: Once states have achieved a secure second-strike capability, nuclear superiority does not confer additional political benefits.172-215&rft.date=2022&rft_id=https://api.semanticscholar.org/CorpusID:248723655#id-name=S2CID&rft.issn=0162-2889&rft_id=info:doi/10.1162/isec_a_00434&rft.aulast=Logan&rft.aufirst=David C.&rft_id=https://doi.org/10.1162%2Fisec_a_00434&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  50. ^ Lee, Kyung Suk; Kim, James D.; Jin, Hwalmin; Fuhrmann, Matthew (2023). "Nuclear Weapons and Low-Level Military Conflict". International Studies Quarterly. 66 (5). doi:10.1093/isq/sqac067.
  51. ^ Suh, Kyungwon (2022). "Nuclear balance and the initiation of nuclear crises: Does superiority matter?". Journal of Peace Research. 60 (2): 337–351. doi:10.1177/00223433211067899. S2CID 248609130.337-351&rft.date=2022&rft_id=info:doi/10.1177/00223433211067899&rft_id=https://api.semanticscholar.org/CorpusID:248609130#id-name=S2CID&rft.aulast=Suh&rft.aufirst=Kyungwon&rft_id=https://doi.org/10.1177/00223433211067899&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  52. ^ Horowitz, Michael (2009). "The Spread of Nuclear Weapons and International Conflict: Does Experience Matter?". The Journal of Conflict Resolution. 53 (2): 234–257. doi:10.1177/0022002708330388. ISSN 0022-0027. JSTOR 20684583. S2CID 55200649. Archived from the original on 2023-08-31. Retrieved 2023-08-31.234-257&rft.date=2009&rft.issn=0022-0027&rft_id=https://api.semanticscholar.org/CorpusID:55200649#id-name=S2CID&rft_id=https://www.jstor.org/stable/20684583#id-name=JSTOR&rft_id=info:doi/10.1177/0022002708330388&rft.aulast=Horowitz&rft.aufirst=Michael&rft_id=https://www.jstor.org/stable/20684583&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  53. ^ Cohen, Michael D. (2017). When Proliferation Causes Peace: The Psychology of Nuclear Crises. Georgetown University Press. ISBN 978-1-62616-495-6. Archived from the original on 2023-12-01. Retrieved 2023-08-31.
  54. ^ Bell, Mark S.; Miller, Nicholas L. (2022), Narang, Vipin; Sagan, Scott D. (eds.), "The Limits of Nuclear Learning in the New Nuclear Age", The Fragile Balance of Terror, Deterrence in the New Nuclear Age, Cornell University Press, pp. 209–229, ISBN 978-1-5017-6701-2, JSTOR 10.7591/j.ctv310vm0j.11, archived from the original on 2023-08-31, retrieved 2023-08-31209-229&rft.date=2022&rft_id=https://www.jstor.org/stable/10.7591/j.ctv310vm0j.11#id-name=JSTOR&rft.isbn=978-1-5017-6701-2&rft.aulast=Bell&rft.aufirst=Mark S.&rft.au=Miller, Nicholas L.&rft_id=https://www.jstor.org/stable/10.7591/j.ctv310vm0j.11&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  55. ^ "The Nautilus Institute Nuclear Strategy Project: US FOIA Documents". Archived from the original on December 8, 2008.
  56. ^ "How Russia Is Beating the West at Deterrence". Time. 2022-03-09. Archived from the original on 2023-06-05. Retrieved 2023-08-11.
  57. ^ Darcy, Oliver (2023-09-12). "An explosive Elon Musk biography is just hitting shelves. But the book's acclaimed author is already walking back a major claim | CNN Business". CNN. Archived from the original on 2023-09-22. Retrieved 2023-09-15.
  58. ^ a b Applebaum, Anne (2023-09-11). "What Russia Got by Scaring Elon Musk". The Atlantic. Archived from the original on 2023-09-16. Retrieved 2023-09-12.
  59. ^ Koster, Ben Hodges, Timo S. (2022-05-05). "NATO Must Re-Learn Deterrence". CEPA. Archived from the original on 2023-07-16. Retrieved 2023-08-11.{{cite web}}: CS1 maint: multiple names: authors list (link)
  60. ^ Tavberidze, Vazha, (2022). "Former NATO Commander Says Western Fears Of Nuclear War Are Preventing A Proper Response To Putin," Radio Free Europe, April 07.
  61. ^ Bar, Shmuel, (2022). "Deterrence after Ukraine—a critical analysis," Quillette, March 24.
  62. ^ a b c Schneider, Jacquelyn G. (2019), "Deterrence in and through Cyberspace", Cross-Domain Deterrence, Oxford University Press, pp. 95–120, doi:10.1093/oso/9780190908645.003.0005, ISBN 978-0-19-090864-5, archived from the original on 2021-11-06, retrieved 2021-11-0695-120&rft.date=2019&rft_id=info:doi/10.1093/oso/9780190908645.003.0005&rft.isbn=978-0-19-090864-5&rft.aulast=Schneider&rft.aufirst=Jacquelyn G.&rft_id=https://oxford.universitypressscholarship.com/view/10.1093/oso/9780190908645.001.0001/oso-9780190908645-chapter-5&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  63. ^ a b c Nye, Joseph S. (2017). "Deterrence and Dissuasion in Cyberspace". International Security. 41 (3): 44–71. doi:10.1162/isec_a_00266. ISSN 0162-2889. S2CID 29361290. Archived from the original on 2021-01-26. Retrieved 2021-11-06.44-71&rft.date=2017&rft_id=https://api.semanticscholar.org/CorpusID:29361290#id-name=S2CID&rft.issn=0162-2889&rft_id=info:doi/10.1162/isec_a_00266&rft.aulast=Nye&rft.aufirst=Joseph S.&rft_id=http://www.mitpressjournals.org/doi/pdf/10.1162/ISEC_a_00266&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  64. ^ a b Borghard, Erica D.; Lonergan, Shawn W. (2017). "The Logic of Coercion in Cyberspace". Security Studies. 26 (3): 452–481. doi:10.1080/09636412.2017.1306396. ISSN 0963-6412. S2CID 46356854.452-481&rft.date=2017&rft_id=https://api.semanticscholar.org/CorpusID:46356854#id-name=S2CID&rft.issn=0963-6412&rft_id=info:doi/10.1080/09636412.2017.1306396&rft.aulast=Borghard&rft.aufirst=Erica D.&rft.au=Lonergan, Shawn W.&rft_id=http://dx.doi.org/10.1080/09636412.2017.1306396&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  65. ^ a b Borghard, Erica D.; Lonergan, Shawn W. (2021-08-03). "Deterrence by denial in cyberspace". Journal of Strategic Studies. 46 (3): 534–569. doi:10.1080/01402390.2021.1944856. ISSN 0140-2390. S2CID 238842794. Archived from the original on 2021-11-06. Retrieved 2021-11-06.534-569&rft.date=2021-08-03&rft_id=https://api.semanticscholar.org/CorpusID:238842794#id-name=S2CID&rft.issn=0140-2390&rft_id=info:doi/10.1080/01402390.2021.1944856&rft.aulast=Borghard&rft.aufirst=Erica D.&rft.au=Lonergan, Shawn W.&rft_id=https://www.tandfonline.com/doi/full/10.1080/01402390.2021.1944856&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  66. ^ a b Lindsay, Jon R. (2013). "Stuxnet and the Limits of Cyber Warfare". Security Studies. 22 (3): 365–404. doi:10.1080/09636412.2013.816122. ISSN 0963-6412. S2CID 154019562.365-404&rft.date=2013&rft_id=https://api.semanticscholar.org/CorpusID:154019562#id-name=S2CID&rft.issn=0963-6412&rft_id=info:doi/10.1080/09636412.2013.816122&rft.aulast=Lindsay&rft.aufirst=Jon R.&rft_id=http://dx.doi.org/10.1080/09636412.2013.816122&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  67. ^ a b Gartzke, Erik; Lindsay, Jon R. (2015). "Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace". Security Studies. 24 (2): 316–348. doi:10.1080/09636412.2015.1038188. ISSN 0963-6412. S2CID 4830861.316-348&rft.date=2015&rft_id=https://api.semanticscholar.org/CorpusID:4830861#id-name=S2CID&rft.issn=0963-6412&rft_id=info:doi/10.1080/09636412.2015.1038188&rft.aulast=Gartzke&rft.aufirst=Erik&rft.au=Lindsay, Jon R.&rft_id=http://dx.doi.org/10.1080/09636412.2015.1038188&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  68. ^ a b Farrell, Henry; Glaser, Charles L. (2017). "The role of effects, saliencies and norms in US Cyberwar doctrine". Journal of Cybersecurity. doi:10.1093/cybsec/tyw015. ISSN 2057-2085.
  69. ^ Kostyuk, Nadiya; Zhukov, Yuri M. (2019-02-01). "Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events?". Journal of Conflict Resolution. 63 (2): 317–347. doi:10.1177/0022002717737138. ISSN 0022-0027. S2CID 44364372. Archived from the original on 2022-02-25. Retrieved 2021-11-15.317-347&rft.date=2019-02-01&rft_id=https://api.semanticscholar.org/CorpusID:44364372#id-name=S2CID&rft.issn=0022-0027&rft_id=info:doi/10.1177/0022002717737138&rft.aulast=Kostyuk&rft.aufirst=Nadiya&rft.au=Zhukov, Yuri M.&rft_id=https://doi.org/10.1177/0022002717737138&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  70. ^ Finnemore, Martha; Hollis, Duncan B. (2016). "Constructing Norms for Global Cybersecurity". The American Journal of International Law. 110 (3): 425–479. doi:10.1017/S0002930000016894. ISSN 0002-9300. JSTOR 10.5305/amerjintelaw.110.3.0425. S2CID 151870657. Archived from the original on 2021-11-07. Retrieved 2021-11-06.425-479&rft.date=2016&rft.issn=0002-9300&rft_id=https://api.semanticscholar.org/CorpusID:151870657#id-name=S2CID&rft_id=https://www.jstor.org/stable/10.5305/amerjintelaw.110.3.0425#id-name=JSTOR&rft_id=info:doi/10.1017/S0002930000016894&rft.aulast=Finnemore&rft.aufirst=Martha&rft.au=Hollis, Duncan B.&rft_id=https://www.jstor.org/stable/10.5305/amerjintelaw.110.3.0425&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  71. ^ Finnemore, Martha; Hollis, Duncan B. (2016). "Constructing Norms for Global Cybersecurity". American Journal of International Law. 110 (3): 425–479. doi:10.1017/S0002930000016894. ISSN 0002-9300. S2CID 151870657. Archived from the original on 2021-11-07. Retrieved 2021-11-06.425-479&rft.date=2016&rft_id=https://api.semanticscholar.org/CorpusID:151870657#id-name=S2CID&rft.issn=0002-9300&rft_id=info:doi/10.1017/S0002930000016894&rft.aulast=Finnemore&rft.aufirst=Martha&rft.au=Hollis, Duncan B.&rft_id=https://www.cambridge.org/core/journals/american-journal-of-international-law/article/abs/constructing-norms-for-global-cybersecurity/373A149D995A12E824E2FD1E0B5E5675&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  72. ^ a b Brown, Joseph M.; Fazal, Tanisha M. (2021). "#SorryNotSorry: Why states neither confirm nor deny responsibility for cyber operations". European Journal of International Security. 6 (4): 401–417. doi:10.1017/eis.2021.18. ISSN 2057-5637. S2CID 238358851. Archived from the original on 2021-11-06. Retrieved 2021-11-06.401-417&rft.date=2021&rft_id=https://api.semanticscholar.org/CorpusID:238358851#id-name=S2CID&rft.issn=2057-5637&rft_id=info:doi/10.1017/eis.2021.18&rft.aulast=Brown&rft.aufirst=Joseph M.&rft.au=Fazal, Tanisha M.&rft_id=https://www.cambridge.org/core/journals/european-journal-of-international-security/article/sorrynotsorry-why-states-neither-confirm-nor-deny-responsibility-for-cyber-operations/85A08DAB9C058D3C2DF1DBD962BC01C5&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  73. ^ Lin, Herbert (2012). "Escalation Dynamics and Conflict Termination in Cyberspace". Strategic Studies Quarterly. 6 (3): 46–70. ISSN 1936-1815. JSTOR 26267261. Archived from the original on 2021-11-06. Retrieved 2021-11-06.46-70&rft.date=2012&rft_id=https://www.jstor.org/stable/26267261#id-name=JSTOR&rft.issn=1936-1815&rft.aulast=Lin&rft.aufirst=Herbert&rft_id=https://www.jstor.org/stable/26267261&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  74. ^ Borghard, Erica D.; Lonergan, Shawn W. (2017). "The Logic of Coercion in Cyberspace". Security Studies. 26 (3): 452–481. doi:10.1080/09636412.2017.1306396. ISSN 0963-6412. S2CID 46356854.452-481&rft.date=2017&rft_id=https://api.semanticscholar.org/CorpusID:46356854#id-name=S2CID&rft.issn=0963-6412&rft_id=info:doi/10.1080/09636412.2017.1306396&rft.aulast=Borghard&rft.aufirst=Erica D.&rft.au=Lonergan, Shawn W.&rft_id=https://doi.org/10.1080/09636412.2017.1306396&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  75. ^ Maurer, Tim (2018). Cyber Mercenaries: The State, Hackers, and Power. Cambridge: Cambridge University Press. doi:10.1017/9781316422724. ISBN 978-1-107-12760-9. Archived from the original on 2021-11-07. Retrieved 2021-11-07.
  76. ^ Maschmeyer, Lennart (2021). "The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations". International Security. 46 (2): 51–90. doi:10.1162/isec_a_00418. ISSN 0162-2889. S2CID 239770382.51-90&rft.date=2021&rft_id=https://api.semanticscholar.org/CorpusID:239770382#id-name=S2CID&rft.issn=0162-2889&rft_id=info:doi/10.1162/isec_a_00418&rft.aulast=Maschmeyer&rft.aufirst=Lennart&rft_id=https://doi.org/10.1162%2Fisec_a_00418&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  77. ^ Talmadge, Caitlin (2019). "Emerging technology and intra-war escalation risks: Evidence from the Cold War, implications for today". Journal of Strategic Studies. 42 (6): 864–887. doi:10.1080/01402390.2019.1631811. ISSN 0140-2390. S2CID 202312573.864-887&rft.date=2019&rft_id=https://api.semanticscholar.org/CorpusID:202312573#id-name=S2CID&rft.issn=0140-2390&rft_id=info:doi/10.1080/01402390.2019.1631811&rft.aulast=Talmadge&rft.aufirst=Caitlin&rft_id=https://doi.org/10.1080/01402390.2019.1631811&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  78. ^ Legro, Jeffrey (1995). Cooperation Under Fire: Anglo-German Restraint During World War II. Cornell University Press. ISBN 978-0-8014-2938-5. Archived from the original on 2023-04-05. Retrieved 2021-12-07.
  79. ^ Carson, Austin (2018). Secret Wars. Princeton University Press. doi:10.2307/j.ctv346p45. ISBN 978-0-691-18424-1. S2CID 240182441. Archived from the original on 2024-02-24. Retrieved 2021-12-07.
  80. ^ Jervis, Robert (1976). Perception and Misperception in International Politics: New Edition. Princeton University Press. ISBN 978-1-4008-8511-4. Archived from the original on 2024-02-24. Retrieved 2021-11-20.
  81. ^ Driedger, Jonas J.; Polianskii, Mikhail (2023). "Utility-based predictions of military escalation: Why experts forecasted Russia would not invade Ukraine". Contemporary Security Policy. 44 (4): 544–560. doi:10.1080/13523260.2023.2259153.544-560&rft.date=2023&rft_id=info:doi/10.1080/13523260.2023.2259153&rft.aulast=Driedger&rft.aufirst=Jonas J.&rft.au=Polianskii, Mikhail&rft_id=https://doi.org/10.1080%2F13523260.2023.2259153&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  82. ^ Jung, Karsten (2023). "A New Concert for Europe: Security and Order After the War". The Washington Quarterly. 46: 25–43. doi:10.1080/0163660X.2023.2192137.25-43&rft.date=2023&rft_id=info:doi/10.1080/0163660X.2023.2192137&rft.aulast=Jung&rft.aufirst=Karsten&rft_id=https://doi.org/10.1080/0163660X.2023.2192137&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  83. ^ Green, Brendan Rittenhouse (2020). The Revolution that Failed: Nuclear Competition, Arms Control, and the Cold War. Cambridge University Press. ISBN 978-1-108-48986-7. Archived from the original on 2024-02-24. Retrieved 2021-11-20.
  84. ^ Jervis, Robert (2021), Bartel, Fritz; Monteiro, Nuno P. (eds.), "The Nuclear Age", Before and After the Fall: World Politics and the End of the Cold War, Cambridge University Press, pp. 115–131, doi:10.1017/9781108910194.008, ISBN 978-1-108-90677-7, S2CID 244858515, archived from the original on 2024-02-24, retrieved 2021-12-17115-131&rft.date=2021&rft_id=https://api.semanticscholar.org/CorpusID:244858515#id-name=S2CID&rft_id=info:doi/10.1017/9781108910194.008&rft.isbn=978-1-108-90677-7&rft.aulast=Jervis&rft.aufirst=Robert&rft_id=https://www.cambridge.org/core/books/before-and-after-the-fall/nuclear-age/3F9C601E9D5B0283487BEFCE73913C60&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  85. ^ Sagan, Scott D. (1994). "The Perils of Proliferation: Organization Theory, Deterrence Theory, and the Spread of Nuclear Weapons". International Security. 18 (4): 66–107. doi:10.2307/2539178. ISSN 0162-2889. JSTOR 2539178. S2CID 153925234. Archived from the original on 2022-02-14. Retrieved 2022-02-14.66-107&rft.date=1994&rft.issn=0162-2889&rft_id=https://api.semanticscholar.org/CorpusID:153925234#id-name=S2CID&rft_id=https://www.jstor.org/stable/2539178#id-name=JSTOR&rft_id=info:doi/10.2307/2539178&rft.aulast=Sagan&rft.aufirst=Scott D.&rft_id=https://www.jstor.org/stable/2539178&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  86. ^ "Don't Be So Confident in Nuclear Decision-Making". Lawfare. 2023-02-26. Archived from the original on 2023-07-07. Retrieved 2023-03-04.
  87. ^ "The Psychology of Nuclear Brinkmanship". International Security. 2023. Archived from the original on 2023-03-04. Retrieved 2023-03-04.
  88. ^ Zagare, Frank C. (2004), "Reconciling Rationality with Deterrence: A Re-examination of the Logical Foundations of Deterrence Theory", Journal of Theoretical Politics, 16 (2): 107–141, CiteSeerX 10.1.1.335.7353, doi:10.1177/0951629804041117, S2CID 13900591107-141&rft.date=2004&rft_id=https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.335.7353#id-name=CiteSeerX&rft_id=https://api.semanticscholar.org/CorpusID:13900591#id-name=S2CID&rft_id=info:doi/10.1177/0951629804041117&rft.aulast=Zagare&rft.aufirst=Frank C.&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  89. ^ "Nuclear endgame: The growing appeal of zero". The Economist. June 16, 2011. Archived from the original on December 3, 2011. Retrieved January 17, 2012.
  90. ^ "The Growing Appeal of Zero". The Economist. June 18, 2011. p. 66. Archived from the original on December 3, 2011. Retrieved January 17, 2012.
  91. ^ "Documentary Advances Nuclear Free Movement". NPR.org. NPR. Archived from the original on 2023-04-05. Retrieved 2010-06-10.
  92. ^ Ben Goddard (2010-01-27). "Cold Warriors say no nukes". The Hill. Archived from the original on 2014-02-13. Retrieved 2013-11-15.
  93. ^ Hugh Gusterson (30 March 2012). "The new abolitionists". Bulletin of the Atomic Scientists. Archived from the original on 17 February 2014. Retrieved 15 November 2013.
  94. ^ Nitze, Paul. "IS IT TIME TO JUNK OUR NUKES? THE NEW WORLD DISORDER MAKES THEM OBSOLETE". washingtonpost dot com. WP Company LLC. Archived from the original on July 2, 2019. Retrieved July 2, 2019.
  95. ^ Kristensen, Hans M, Robert S Norris, and Ivan Oelrich. "From Counterforce to Minimal Deterrence: A New Nuclear Policy on the Path Toward Eliminating Nuclear Weapons Archived 2015-06-20 at the Wayback Machine." Federation of American Scientists Archived 2017-09-21 at the Wayback Machine. April 2009. Accessed July 31, 2010.
  96. ^ Nalebuff, Barry. "Minimal Nuclear Deterrence." Journal of Conflict Resolution 32, no. 3 (September 1988): p. 424.
  97. ^ Ullman, Richard H. (Summer 1989). "The Covert French Connection". Foreign Policy. 75 (75): 3–33. doi:10.2307/1148862. JSTOR 1148862.3-33&rft.date=1989&rft_id=info:doi/10.2307/1148862&rft_id=https://www.jstor.org/stable/1148862#id-name=JSTOR&rft.au=Ullman, Richard H.&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  98. ^ Meyers, Diana T. (1992). "Reviewed work: On War and Morality, Robert L. Holmes" (PDF). The Philosophical Review. 101 (2): 481–484. doi:10.2307/2185583. JSTOR 2185583.481-484&rft.date=1992&rft_id=info:doi/10.2307/2185583&rft_id=https://www.jstor.org/stable/2185583#id-name=JSTOR&rft.aulast=Meyers&rft.aufirst=Diana T.&rft_id=https://www.jstor.org/stable/pdf/2185583.pdf&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  99. ^ Rock, Stephen R. (1989). "Reviewed work: On War and Morality, Robert L. Holmes; Paths to Peace: Exploring the Feasibility of Sustainable Peace, Richard Smoke, Willis Harman" (PDF). The American Political Science Review. 83 (4): 1447–1448. doi:10.2307/1961738. JSTOR 1961738.1447-1448&rft.date=1989&rft_id=info:doi/10.2307/1961738&rft_id=https://www.jstor.org/stable/1961738#id-name=JSTOR&rft.aulast=Rock&rft.aufirst=Stephen R.&rft_id=https://www.jstor.org/stable/pdf/1961738.pdf&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  100. ^ Lee, Steven (1992). "Reviewed work: On War and Morality., Robert L. Holmes" (PDF). Noûs. 26 (4): 559–562. doi:10.2307/2216042. JSTOR 2216042.559-562&rft.date=1992&rft_id=info:doi/10.2307/2216042&rft_id=https://www.jstor.org/stable/2216042#id-name=JSTOR&rft.aulast=Lee&rft.aufirst=Steven&rft_id=https://www.jstor.org/stable/pdf/2216042.pdf&rfr_id=info:sid/en.wikipedia.org:Deterrence theory" class="Z3988">
  101. ^ Holmes, Robert L. (14 July 2014). On War and Morality. Princeton University Press. ISBN 978-1-4008-6014-2.

Further reading

edit
edit