The viability of deterrence strategies in the 21st century
In more quotidian terms, the underlying question is: are deterrence strategies appropriate for the 21st century global security environment? The short answer: yes, but not really. Deterrence strategies can be viable for the 21st century global security environment, but, unlike the Cold War period, they should not represent the back- bone of todays national securities. Deterrence strategies are extremely circumstantial and vary from case to case. Precisely due to this reason, deterrence strategies have do be constantly updated and re-conceptualised in order to meet the current security threats. If tailored appropriately, deterrence strategies are very much viable in the 21st century. Providing a comprehensive answer first and foremost require identify- ing the 21st century global security environment and defining deterrence strategies. I start by outlining the most relevant characteristics of todays security arena, and move on to discuss deterrence strategies. In sustaining my argument, I specifically employ the example of terrorism and discuss why are deterrence strategies consid- ered inefficient in this case. I argue there is a need for a greater intellectual effort to contextualise relations between states and non-state actors, and to understand how should deterrence be tailored to meet this threat. I move on to analyse deterrence of terrorism by punishment and by denial and provide the appropriate examples to vali- date my statement.
The 21st century global security environment - the novelty
While the post-World War II security environment was characterised by a great power dyad, the end of the Cold War left the world unipolar. Many argued that the 21st century would see emerging great powers, comparing it to the Congress of Vienna world order. But now this comparison seems difficult to digest. In addition to emerging powers, what strongly characterises the current global security environment is the multi-dimensional and non-conventional aspects of conflicts and their horizon- tal proliferation (Harknett, 2008). Todays global security environment accommo- dates states, non-state actors, international institutions, conventional warfare, nuclear build-up, terrorism, piracy, cyberwar etc. States find non-state actors irrational and illegitimate, and condemn their warring tactics for being unconventional. Both in ac- ademia and in policymaking circles, the emergence of these unconventional actors G1400263H
and theatres of war points out a wide conceptual and analytical gap. There seems to be an urgent need to acknowledge these unconventional threats and adapt current se- curity strategies to these new patterns.
Deterrence - the basics
Deterrence, both as a practical and theoretical concept, emerged during the Cold War. It was conceived in response to nuclear threats, but it also became useful in the context of conventional force. Deterrence as a strategy is coercive in nature, but it is different from coercion itself (Freedman, 2004). According to the dictionary, it implies the action of deterring, which is instilling doubt or fear of implications in order to discourage a particular course of action (Oxforddictionaries.com, 2014). The most widely employed strategies are deterrence by punishment and deterrence by de- nial. The first one implies threatening to inflict same or higher costs on the aggressor than he would benefit from following a specific course of action (Kroenig and Pavel, 2012, p. 23). The second one focuses on deterring the aggressor by denying the bene- fits of him following a specific course of action (Kroenig and Pavel, 2012, p. 23). As a theoretical concept, deterrence developed to incorporate specific structural charac- teristics. The strategies address costs and benefits for both the aggressor and the de- terrer and so rationality is deemed imperative (Harknett, 2008). Further, there has to be shared accurate information about each other in order to successfully approximate the real costs and benefits. Incomplete communication could lead to a misevaluation of the costs and benefits and might lead to ineffective deterrence. The good flow of information will lead to each side determining the others capability, which is of par- amount importance when formulating or carrying credible deterrence (Mearsheimer, 1983, p.46). These structural units underpin the circumstantial character of the deter- rence. Jeffrey Knopf summarises best the theoretical development of the concept as the four waves in deterrence research (Knopf, 2010). During the first wave, in the immediate aftermath of the Second World War, deterrence emerged as a strategy to efficiently respond to the threat posed by the atomic bomb. In the 1950s and the 1960s, the second wave of research approached nuclear strategy from a game theory perspective. During the third wave, which emerged in the 1970s, deterrence strategy became a more sophisticated concept which employed statistical and case-study methods on conventional deterrence (Knopf, 2010, p.1). The first three waves of de- terrence consisted in the academic and theoretical efforts to conceptualise the strate- gy which was the backbone of the US national security against the Soviet threat G1400263H
(Betts, 2013). Deterrence as we know it today is a contextualised concept. The forth wave of deterrence research focuses on deconstructing its contextualisation, as it is a direct response to real-world developments (Knopf, 2010, p.1). As opposed to the previous waves, now it is the academia which tailors deterrence to meet the contem- porary asymmetric threats. It is precisely this fourth wave of research which seems to bridge the gap between yesterdays security and todays insecurities.
Preconditions for viably deterring terrorism contextualising relations and strategic culture
One relevant example of 21st centurys security threats is terrorism. Needless to mention, there are obvious reasons why deterrence seems inappropriate in the con- text of terrorism. Terrorist groups are said to be un-deterrable because they are irra- tional actors who lack a return address for retaliation and do not fear death (Betts, 2013). However, I argue that these remarks are based on a very rigid understanding of conventional deterrence. One mistake, I believe, is that deterrence strategies are expected to work against Al Qaeda in the same fashion they worked against the Sovi- et Union. However, contextualising the relationship between targeted states and ter- rorist groups will reveal why deterrence cannot be the main strategy against terror- ism, but still be viable.
In conventional relations, states acknowledge each other as legitimate units of the international system. Contrary, in unconventional relations such as terrorism, tar- geted states do not acknowledge terrorist groups and, in fact, wish to eradicate them. In conventional relations, states use deterrence to maintain a status quo marked by no military or nuclear conflict. However, applying deterrence in unconventional rela- tions implies that states would be content on maintaing the status quo of terrorist groups. But what about suicide bombers whose status quo is by default carrying an explosion? Deterring the terrorist groups from carrying attacks does not imply the eradication of the organisation and so further counterterrorism policies are required to achieve this end. But this does not rule out the viability of deterrence against terror- ism completely. Drawing on Knopfs fourth wave of deterrence research, a more broadly conceptualised deterrence becomes one viable strategy in countering terror- ism. Efforts have been made towards bridging the conceptual and analytical gap be- tween deterrence and terrorism.
G1400263H
Deterring terrorists by limiting calculations of costs and benefits to material aspects resulted in failure. Labelling terrorists irrational lies in the inability to under- stand the fundamental strategic logic of terrorism and the sources of their motiva- tion (Lantis, 2009, p. 477). Terror tactics translate in the strategical use of limited re- sources to achieve a cause. An example which supports the strategic employment of terror tactics is Ayman al-Zawahiris letter to Abu Musab al-Zarkawi, the former be- ing second most important person in Al-Qaeda and the latter being the head of Al- Qaeda in Iraq. In 2006 Al-Zawahiri warned Al-Zarkawi that his indiscriminate use of violence will result in counterproductive consequences (Knopf, 2010, p.18). Ac- knowledging this as a valid type of warfare provides incentives for rational en- gagement with non-state actors.
Moreover, even religious interpretations behind Al-Qaedas behaviour or be- hind martyrdom can most certainly be rationally approached and deterred. In these cases, for a deterrence strategy to be viable, it must take into into consideration im- material aspects such as identity, motivation, norms etc (Lantis, 2009). Therefore constructivists plead for the incorporation of strategic culture in deterrence analysis. Approaching these groups with a reasonable amount of respect and recognition, as well as positive incentives to address historic grievances reveals a wider range of costs and benefits (Lantis, 2009, p. 478). Tailoring deterrence to address non-state ac- tors requires a broader conceptual horizon which moves beyond the rationale of na- tion-states. I will assess the two most relevant deterrence strategies, by punishment and by denial, respectively, and show how they are relevant in countering terrorism.
Deterring terrorism by punishment
Accurate knowledge on the location of terrorists safe havens can sometimes make retaliation by force possible. There can and have been cases when terrorist groups have been directly punished, with the best examples being George W Bushs operational war on terror or Israels offensives against Hamas. Nevertheless, direct violent engagements are strongly discouraged (Kroenig and Pavel, 2012, p. 26). Show of force can trigger strategic victimisation which might, in fact, act as an incen- tive for some groups to radicalise and join forces (Trager and Zagorcheva, 2006, p. 101) (Knopf, 2010, p.12). Current research toys with the idea of directly punishing terrorists themselves, but not through massive use of force. Such deterrence strategies imply attacking high-value targets, such as demolishing houses of suicide bombers families post-martyrdom or attacking families and supporters. While most of them G1400263H
are subject to debate due to obvious reasons such as domestic liberal constrains, other have already been proven inefficient. Israels demolition of martyrs houses during the Second Intifada has, in fact, seen the number of suicide bombers increase from 167 to 225 in 2003 (Vira, 2011, p. 6).
When engaging with groups such as Al-Qaeda it is important to bear in mind that, unlike nation-states, they are not single entities (Knopf, 2010, p.10). Nowadays terrorist groups represent systems or networks which incorporate actors performing specific functions. In this case, deterring terrorism by punishment requires a deep un- derstanding of the internal organisation of such networks. While it is true that terror- ist groups are extremely difficult to be punished because they do not have a return address, there are many actors in the system which do (Betts, 2013). For instance, for Al-Qaeda to function it requires leaders, lieutenants, financiers, logisticians, fa- cilitators, foot soldiers, recruiters, supporting population segments, and religious or otherwise ideological figures (Knopf, 2010, p.10). In the case of non-state actors ef- fective deterrence by punishment is unlikely to target the group itself.
There are many functional parts of a terrorist system which can be successfully deterred from participating in or supporting terrorist activities. Because non-state ac- tors lack legitimate financial sources, they are partly dependent on external financiers to support them. In most cases, financiers are not eager to sacrifice their lives, so they will be more prone to deterrence. Punishment in such cases can vary from imprison- ment to financial sanctions, depending on their legal status (Knopf, 2010, p.10). In the aftermath of 9/11 in Saudi Arabia, enhanced scrutiny on donors has led to suc- cessfully deterring financing of some terrorist activity (Kroenig and Pavel, 2012, p. 26).
Deconstructing non-state actors might reveal that some states are greatly in- volved in finance and support networks. In this case, it is easier for targeted states to apply conventional deterrence strategies against state supporters of terrorism. Bushs famous statement after the 9/11 event, youre either with us or against us, made it a lot easier for the US to punish or deter states which were actively supporting terrorist networks (Edition.cnn.com, 2001). One very relevant example in this case is Paki- stan, which post-9/11 started cooperating with the US in fighting Al Qaeda (Quinlan, 2012). Taking action against a state could also imply toppling existing regimes which are outspokenly supportive of terrorist organisation, such as the overthrow of the Tal- iban regime in Afghanistan (Knopf, 2010, p. 11). A relevant concern in todays secu- G1400263H
rity agenda is nuclear terrorism and efforts are increasingly being made to deter nu- clear states from providing terrorist with nuclear arsenals. Although this debate is far too expansive to be covered in the current paper, one interesting deterrent states came up with is nuclear forensics. The ability to determine the general isotopic composi- tion and age of the fissile materials used to make a bomb would carry severe conse- quences for states which turn out to be involved in the potential attack (Knopf, 2010, p. 21). This technique provides strong incentives for states to abstain from providing terrorists with nuclear assets.
Furthermore, radical clerics represent a fundamental part of jihadi groups in both gaining legitimacy for their actions and as recruitment means. In such cases, ef- fectively punishing radical clerics could successfully deter further mass radicalisa- tion. One example which proves the deterrent effect of such practices is UKs stern decision to ban the glorification of terrorism after the 2005 London bombings (Kroenig and Pavel, 2012, p.26). In fact, it turns out that after the successful imple- mentation of imprisonment policies against radical clerics, very prominent ones have left the UK or renounced the radical overtones (Kroenig and Pavel, 2012, p.26). However, dealing with the non-rational elements of terrorist groups will require more than imprisonment of radical clerics. Strategic deterrence which focuses on long-term results require more in-depth engagements with terrorist actors.
Deterring terrorism by denial
I will assess two main ways by which targeted states can deny terrorists the benefits of their action. The first one implies preventing individual attacks from being carried and the second one is achieving their delegitimisation as groups by denying their political objectives. States can successfully deter terrorism by persuading terror- ists that their attacks are likely to fail (Kroenig and Pavel, 2012, p. 29). Deterrence by denial in the operational and tactical sphere can be successfully achieved by means of strengthened homeland security. Based on glaring mistakes made by domestic securi- ty authorities, the US government has been strongly criticised in the aftermath of 9/11 for not having been able to prevent the attack. As evidence shows, the 9/11 hijack- ers took flight lessons in the US and carried tests trips on the very same flights they later hijacked in order to check the security levels (Knopf, 2010, p. 12). As it turned out, these procedures were extremely lax. Had it been otherwise, they could have been identified, arrested and the attack could have been prevented.
G1400263H
In the aftermath of 9/11, the US government focused on enhancing homeland security practices such as the improvement of domestic intelligence, hard- ening key targets, randomised screening, periodic surges in security levels at key sites etc (Kroenig and Pavel, 2012, p. 30). The main purpose of these practices is to make terrorists renounce carrying an attack based on the facts that strengthened de- fence systems will most certainly lead to failure. As an example, in 2003 an Al- Qaeda affiliate was planning to attack a US military base in Turkey, but as the base strengthened its security systems, the attack was called off (Kroenig and Pavel, 2012, p. 29). Long term, strengthened homeland security might affect the morale of terrorist networks because lack of publicity will decrease financial sponsorship and fail to attract the required amount of attention or new recruits (Kroenig and Pavel, 2012, p. 30). Short-term benefits, such as social unrest, over-sensationalisation by media out- lets and major disruption in social routines, can also be denied. For example, after an attack on a resort in the Sharm el-Sheikh, Egyptian authorities have covered the ven- ue with a white sheet (Kroenig and Pavel, 2012, p.31). As there was nothing sensa- tional to report on, the attack did not get the expected amount of attention. Although it is difficult to measure the viability of such deterrence strategies, they are likely to contribute to strategically deterring terrorism on the long term.
Strategic deterrence aims at preventing terrorists from achieving their goals. Attempting strategic deterrence thereby encourages researchers and policymakers to recognise and acknowledge that terrorism does entail rational objectives. In cases where terrorist groups are motivated by ideological rather than political factors, deter- rence strategies should concentrate on deterring the expansion and spread of the ide- ology. In other words, states should try and prevent terrorist organisations from achieving their strategic goals, while looking to delegitimise their authority. The most relevant and detailed example in this case is Al-Qaeda. Its long term political goals focus on expelling the US from the Middle East and then toppling the apostate re- gimes in order to establish a state according to Sharia (Kroenig and Pavel, 2012, p. 32). Moreover, Al Qaeda gained popularity in the Islamist world by successfully crafting and exporting a radical interpretation of the Quran and the Hadith. In this case, the most successful deterrence strategies encourage the US to resist withdrawal demands and develop stronger anti-terrorist military and strategic partnership with key states in the region, such as Saudi Arabia, Qatar, UAE, Kuwait and the UAE (Kroenig and Pavel, 2012, p. 33). Although the success of such strategies is yet to be demonstrated, they require long term commitment on convincing terrorists that they will not prevail (Knopf, 2010, p. 14). Another strategic deterrent to the long term G1400263H
success of terrorism is delegitimisation of their actions and rhetoric. In this regard, states concentrate their efforts on forging avenues for constructive dialogues with the moderate clergy and the wider Muslim public (Lantis, 2009, p. 477). While this strat- egy will most likely deter public support and discourage new recruits, it might also be the only viable option for delegitimising martyrdom.
Conclusion
The blind, straightforward comparison between past and current theatres of wars has led policymakers and analysts to conclude that deterrence strategies are by default unfit for the non-conventional threats. As the 21st century unraveled novel security threats and actors, there was a widespread belief that the emerging security environment required completely new security strategies. Moreover, there was an un- founded rejection of acknowledging, analysing and deconstructing non-conventional and emerging actors. It was only later, after failed wars and military campaigns, that researchers and policymakers started reconsidering old security strategies in light of the new security threats.
This paper looks specifically at the case of jihadi terrorism in order to argue that deterrence strategies, when tailored appropriately, remain an integral part of the counterterrorist agenda. Analytical rigidity and conceptual limitations proved detri- mental to most counterterrorist efforts. However, a fourth wave in deterrence re- search suggested the tailoring of strategies to acknowledge non-state actors as ration- al and to take into consideration their strategic culture. Researchers have focused on both deterrence by punishment and by denial from direct, indirect, tactical, operation- al and strategic perspectives. Some deterrence strategies have already turned out via- ble and examples include targeting component parts of the terrorist network, state supporters, punishing radical clerics and enhanced homeland security. Strategic de- terrence has also been forged with the main aim to delegitimise their extremist inter- pretation, but it has yet to be proven viable or not. A major downfall of deterrence strategies remains the inability to accurately measure their success. However, if prov- en right, long term deterrence strategies against terrorism might in fact lead towards its very extinction. All in all, deterrence strategies remain valid against terrorism, a vivid threat dominating the 21st century security agenda.
G1400263H
Bibliography
1. Betts, R. (2013). The Lost Logic of Deterrence. Foreign Affairs, [online] (March/April). Available at: http://www.foreignaffairs.com/articles/138846/richard-k-betts/the- lost-logic-of-deterrence [Accessed 24 Sep. 2014]. 2. Edition.cnn.com, (2001). CNN.com - 'You are either with us or against us' - November 6, 2001. [online] Available at: http://edition.cnn.com/2001/US/11/06/gen.attack.on.terror/ [Ac- cessed 25 Sep. 2014]. 3. Evron, Y. (2009). Deterrence: The Campaign against Hamas. Strategic Assessment, 1(4). 4. Freedman, L. (2004). Deterrence. 1st ed. Cambridge, UK: Polity Press. 5. Harknett, R. (2008). The Logic of Conventional Deterrence at the End of the Cold War. Security Studies, 4(1). 6. Knopf, J. (2010). The Fourth Wave in Deterrence Research. Contempo- rary Security Policy, 31(1). 7. Kroenig, M. and Pavel, B. (2012). How to Deter Terrorism. The Wash- ington Quarterly, 35(2). 8. Lantis, J. (2009). Strategic culture and tailored deterrence: bridging the gap between theory and practice. Contemporary Security Policy, 30(3), pp.467--485. 9. Mearsheimer, J. (1983). Conventional deterrence. 1st ed. Ithaca: Cornell University Press. 10. Oxforddictionaries.com, (2014). deter: definition of deter in Oxford dictionary (British & World English). [online] Available at: http://www.oxforddictionaries.com/definition/english/deter [Ac- cessed 24 Sep. 2014]. 11. Quinlan, P. (2012). Pakistan: A Conflicted Ally in the Fight Against Terrorism Since. Phillip J, 9, p.11. G1400263H
12. RAND Corporation, (2002). Deterrence and Influence in Counterter- rorism. Santa Monica: RAND Corporation. 13. RAND Corporation, (2009). Understanding the Role of Deterrence in Counterterrorism Security. New Ideas in Homeland Security. Santa Monica: RAND Corporation. 14. Trager, R. and Zagorcheva, D. (2006). Deterring terrorism: It can be done. MIT Press. 15. Vira, V. (2011). An Assessment of Israeli Deterrence against Asym- metric Threats. Small Wars Journal.