Deterrence and Dissuasion for the 21st Century Ryan Henry Principle Deputy Under Secretary of Defense for Policy IFPA-Fletcher Conference December 14,

Slides:



Advertisements
Similar presentations
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
Advertisements

Overview An emerging challenge A belated response Debating the alternatives – Air-Sea Battle – A distant blockade – Maritime denial Conclusions.
Special Operations Center of Excellence
Army Doctrine Publication (ADP) 3-07; and Army
Saudi War Course End of Course Capstone Exercise UNCLASSIFIED THIS DOCUMENT IS FOR WARGAME AND EDUCATIONAL USE ONLY AND DOES NOT REFLECT REAL WORLD OPERATIONS.
Deterrence Deterrence is the effort by one actor to persuade another actor to refrain from some action by convincing the opponent that the costs will.
NATO’S RESPONSE TO NEW SECURITY CHALLENGES Michael Rühle Head, Energy Security Section NATO Emerging Security Challenges Division ATHENA CONFERENCE Athens,
Lecture 6: Terrorism and Asymmetric Warfare  Rupal Mehta POL 12.
April 6, NPR in Context Third comprehensive review of U.S. nuclear policies and posture –Previous reviews in 1994 and 2001 Conducted by DoD.
Sea Air Space Symposium PB16 Budget Issues RADM Barry Bruner Director, Programming Division OPNAV N8O April 2015.
Quadrennial Defense Review Results February 3, 2006.
Nuclear Weapons: From the Cold War to the Present Dr. Adam B. Lowther Research Faculty Air Force Research Institute The views expressed are solely those.
The Language of the Military Profession
Intelligence, Surveillance, and Reconnaissance
How Can Policy Research Help the Department of Homeland Security? Jack Riley November 18, 2004.
Crisis Management and Arms Control The Evolutions of Nuclear Strategy US – Soviet Security Cooperation Yi-Ren Chen | Hist 5N | May 4 th, 2004.
AMEDD C&S CAPTAINS CAREER COURSE. OUTLINE  General Reimer Concept  TRADOC Concept  US Army War College Concept  Iraq Crucible Concept  Agile Leader.
Emergency Management & Homeland Security Interface Samuel Musa National Defense University.
April 5, The President’s Nuclear Security Agenda First articulated in Prague in April 2009 –Reduce nuclear dangers and pursue the long-term goal.
China and space security National Defense University, PLA, China National Defense University, PLA, China Zhong Jing.
Campaign Planning Process Step 3B – System Center of Gravity Analysis
The U. S. National Strategy for Global Supply Chain Security Neema Khatri Office of International Affairs U.S. Department of Homeland Security.
Advanced Systems and Concepts Office 20-Sep-15 What are National Security Threats? 2 nd Annual JTAC Workshop 4 April 2006 ASCO and DTRA Update and Welcome.
Deliberative Working Document - Predecisional FOUO Supporting the Secretary’s Top Priorities Eric Coulter, Deputy Director OSD Program Analysis and Evaluation.
Fostering a ‘Whole Community’ Approach to Emergency Management David J. Kaufman Director, Office of Policy and Program Analysis 8 June 2011.
Introduction to Military History. What is War? How do we define war? What distinguishes it from other forms of armed conflict?
Foreign and Defense Policymaking Chapter 20. American Foreign Policy: Instruments, Actors, and Policymakers  Instruments of Foreign Policy  Military.
Counterterrorismvs.Anti-terrorism. ► What are the goals of counterterrorism?
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
1-1 McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved C H A P T E R SIX Targeting Attractive Market Segments 6.
Respective Roles of Nuclear and Non- Nuclear Forces as Instruments of Policy December 14, 2005 Keith B. Payne President, National Institute for Public.
0 Peter F. Verga U.S. Department of Defense 2 Definitions Homeland Security – A concerted national effort to prevent terrorist attacks within the United.
1 Quadrennial Defense Review SES APEX Orientation Program September 13, 2005.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
Joint Training Challenges of Irregular Warfare/COIN and Full Spectrum Training Requirements Brief for WJTSC LtCol John Merna, J7/9-TJ 23 September.
1. 2 USAF CONOPS & AIR AND SPACE POWER REVIEW Chap 23 & 24.
Strategic Implications of Virtual Warfare: by Captain Terry C. Pierce USN Explaining Virtual Warfare as a Strategic Disruptive Innovation Explaining Virtual.
World Conservation Congress Beyond Zoonoses: One World - One Health, The Threat of Emerging Diseases to Human Security and Conservation, and the Implications.
Security Environment During Coalition Operations.
ASYMMETRIC THREATS, TERRORISM AND THE CHANGING FACE OF WARFARE By Professor Richard Shultz Director, International Security Studies Program The Fletcher.
Office of Force Transformation Transforming National Security “A Future Worth Creating” Vision: Broad and Sustained Competitive Advantage Strategy Capabilities.
Supporting the Secretary’s Top Priorities
A Military Guide to Terrorism in the Twenty-First Century
Deliberative document: for discussion purposes only. Not subject to FOIA release. 1 Trends and Shocks 8 March 2007.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
SEMINAR FOXTROT Group 2 LTC RUFFY LTC MAGALLANES LTC DE SAGON LTC MERCADO LTC GRAYDA CDR RUIZ LTC CANDELARIO LTC LIMET CARL VON CLAUSEWITZ.
IR: The New World of International Relations Chapter 13 In Pursuit of National Security 2012, 2010, 2008 Pearson Education, Inc. All rights.
Defense Policy Making You may not be interested in war, but war is interested in you.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
PPBS Planning Programming Budgeting Systems. PPBS The Department of Defense is the only Agency to use this type of budget.budget.
Foreign and Defense Policymaking Chapter 20. American Foreign Policy: Instruments, Actors, and Policymakers Instruments of Foreign Policy – Three types.
21 st Century World Politics Continuity or Change?
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Kristian Krieger, M. Brooke Rogers Chapter 7 - Promoting Public Resilience against Chemical, Biological, Radiological.
Lecture 26: “Mission Accomplished” May 26, Bush: War on Terror (To joint session of Congress, 9/20/01)
From sending messages to reflecting diversity: Media and preventing violent extremism James Deane UNDP Preventing Violent Extremism Conference, Oslo, March.
Winning the Next War 1 Winning the Next War: Institutionalizing Lessons Learned from Today’s Regional Conflicts The American Institute of Engineers Conference.
Center of Excellence PEACE OPERATIONS COMMAND & CONTROL AND COMMAND & CONTROL AND TRANSITION ISSUES Lt Col (R) John Derick Osman Center of Excellence in.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
GOVT Module 16 Defense Policy.
Maritime Security as an Integral Part of an
International Security and Peace
U.S. Nuclear Strategy toward China
“Existing world order is being redefined.” Henry Kissinger Jan 2015
Deterrence Deterrence is the effort by one actor to persuade another actor to refrain from some action by convincing the opponent that the costs will exceed.
Deterrence: Two approaches
Quadrennial Defense Review Results February 3, 2006
Foreign and Defense Policymaking
Foreign and Defense Policymaking
S&T Main Focus Areas Linkages to 2018 NDS
Presentation transcript:

Deterrence and Dissuasion for the 21st Century Ryan Henry Principle Deputy Under Secretary of Defense for Policy IFPA-Fletcher Conference December 14, 2005 UNCLASSIFIED

POLICY 2 Overview  New security environment warrants a review of our approach Shift away from Cold War view of deterrence Develop better understanding of dissuasion and how to operationalize the concept Understand how we can effectively assure our allies  Key documents that reflect our strategic shift: Quadrennial Defense Review (2001) Nuclear Posture Review (2002) Report to Congress on Strengthening US Global Defense Posture (2004) National Defense Strategy (2005) Quadrennial Defense Review (2006)

POLICY 3 Security Challenges Irregular  Non-state and state actors employing “unconventional” methods to counter stronger state opponents—terrorism, insurgency, etc. (erode our power) (e.g., terrorism, insurgency, civil war, and emerging concepts like “unrestricted warfare”) Likelihood : very high; strategy of the weak Vulnerability : moderate, if not effectively checked. Disruptive  Competitors employing technology or methods that might counter or cancel our current military advantages. (capsize our power) (e.g., technological – bio, cyber, or space war, ultra miniaturization, directed-energy, other – diplomatic blackmail, cultural or economic war) Likelihood : low, but time works against U.S. Vulnerability : strategic surprise puts American security at risk Traditional  States employing military forces in well- known forms of military competition and conflict. (challenge our power) (e.g., conventional air, sea, and land forces, and nuclear forces of established nuclear powers) Likelihood : currently decreasing due to historic capability-overmatch and expanding qualitative lead Vulnerability : low, but only if transformation is balanced Catastrophic  Terrorist or rogue state employment of WMD or methods producing WMD-like effects against American interests. (paralyze our power) (e.g., attack on homeland, global markets, or key ally that would generate a state of shock and preclude normal behavior) Likelihood : moderate and increasing Vulnerability : unacceptable, single event can alter our way of life LIKELIHOOD VULNERABILITY Lower Higher Lower Our approach should be tailored to deter and dissuade across the challenges

POLICY 4 Deterrence: What’s New Cold War Deterrence 21 st Century Deterrence Relatively well-understood opponent Mature strategic relationship Poorly understood opponents Nascent strategic relationship Single opponent (i.e., Soviet Empire)Multiple state and non-state opponents Deterrence is the cornerstone of national strategy Deterrence is only one component of our national strategy Targets to hold at risk were easily identifiable Targets to hold at risk are difficult to identify Deterrence policy relied primarily on retaliation and less so on denial Deterrence policy emphasizes denial as well as retaliation Primarily nuclearNuclear and non-nuclear Reliable channels of communicationUncertain channels of communication

POLICY 5 Deterrence: Why and What  Deterrence is generally preferable to going to war because it: Forestalls behavior contrary to US interests Can be less expensive in terms of human, economic, and political costs Conserves national power – but requires a focus of will  Strategic interaction(s) in which a party uses threats to forestall adversaries from taking an action(s) that they otherwise would have taken had the threat not been present. The party does so by threatening to: Impose unacceptable costs upon the adversary in response to their action(s) Deny the opponent any prospect of attaining its perceived goals  Deterrence requires: The ability to identify and understand that which the adversary holds dear, how it assesses its security situation, and its decision-making processes Having or developing the perceived capabilities and credibility to impose unacceptable costs and/or to deny gains to the adversary The ability to communicate effectively with the adversary

POLICY 6 Dissuasion: Why and What  To discourage others from developing capabilities and/or adopting courses of action that are hostile to the interests of the United States  Dissuasion seeks to shape the nature of military competitions in ways favorable to the United States by: Inducing restraint in the behavior of adversaries; Channeling an opponent’s strategies and resources in less threatening directions; and Complicating an opponent’s military planning  Dissuasion could: Make deterrence easier by reducing the robustness of an adversary’s capabilities and strategies and its confidence in them “Buy time” with some adversaries

POLICY 7 Dissuasion and Deterrence DeterrenceDeterrence  Deterrence and dissuasion both hinge on understanding and influencing an opponent’s decision-making (e.g., no “mirror imaging”)  Dissuasion can be thought of as a kind of “pre-deterrence” -- preventing an adversary from developing:  Capabilities before they can be used; and  Courses of action before they can be adopted  In some circumstances, we may be trying to dissuade adversaries from expanding, improving, or transferring a capability while deterring them from using it TIME DissuasionDissuasion Example: Deterrence and dissuasion of an adversary’s capability or course of action

POLICY 8 Tailored Deterrence Deterrence and Dissuasion Violent Extremists Terrorist Networks IrregularCatastrophic TraditionalDisruptive Rogue Powers IrregularCatastrophic TraditionalDisruptive Near Peer Competitors IrregularCatastrophic TraditionalDisruptive We need to stimulate those outside of the government to think through deterrence and dissuasion in each of these categories We need to stimulate those outside of the government to think through deterrence and dissuasion in each of these categories

POLICY 9Deterring... Peer / Emerging Peer Rogue States Violent Extremists (VE) Senior Leadership Military Commanders Trigger Pullers General Populace Deterring Diverse Audiences X X X X X x x x x Volunteers from General Populace Sympathetic Patrons and Supporters Families Figureheads Tribes Cells State Sponsor Org Leaders Is there a “unified field theory” for deterrence?

POLICY 10 Deterrence and Dissuasion: Violent Extremists  Who : Actors in a violent extremist network, including foot soldiers, leaders, financiers, radical clerics, et. al.; State supporters of terrorist networks; and Elements of the population susceptible to violent extremism  Deter what: Members of the network from taking actions hostile to the United States including attacks, terrorist fund raising, preaching of incendiary fatwas, etc.; and States from supporting terrorist networks, most importantly the transfer of WMD  Dissuade what: Elements of the population susceptible to violent extremism from supporting or engaging in violent extremism

POLICY 11 Rogue Powers  Who: States that pose significant regional challenges but lack the ability to project traditional military power outside of their region  Deter what: A range of actions hostile to U.S. interests  Dissuade what: Development, modernization, and expansion of capabilities that pose a significant challenge to the US and its allies Courses of action hostile to key US interests

POLICY 12 Near-Peer Competitors  Who: States with the ability to project power globally Capabilities may include: nuclear weapons, advanced conventional military capability, and other forms of non-military power  Deter what: Use of WMD against the United States and its allies Other attacks or coercion against U.S. allies and partners  Dissuade what: Development of advanced military capabilities that pose a significant challenge to the US Modernization of existing capabilities that pose a significant challenge to the US Development of hostile courses of action

POLICY 13 Way Ahead  USG is focusing its efforts to better understand our adversaries and develop tailored deterrence and dissuasion strategies  Need to reinvigorate intellectual debate on deterrence and dissuasion Key to this debate is growing our knowledge of the world views, goals, and strategic approaches of 21 st century adversaries

POLICY 14 BACK UP

POLICY 15 Deterrence vs. Dissuasion Deterrence Forestall adversaries from taking hostile action(s) Threats made to convince adversaries that the costs of taking hostile action will outweigh any potential gains Involves threat(s) Addresses more immediate challenge Responsive to a development Enemy understanding of US intent is important for an effective strategy Dissuasion Discourage adversaries, real and potential, from developing hostile capabilities and strategies Measures taken to convince adversaries that the development of hostile military capabilities and strategies will be ineffective, too costly, and/or unattainable Involves positive and negative measures Addresses potential long-term challenge Anticipatory of possible developments Enemy understanding of US intent may be detrimental to an effective strategy

POLICY 16 Key Tools  Posture  Security Cooperation  Intelligence  Capabilities  Strategic Communications