Can a Nuclear Iran be Deterred?

Similar documents
Nuclear Weapons. Dr. Steinar Høibråten Chief Scientist. Norwegian Defence Research Establishment. NKS NordThreat Asker, 31 Oct.

ALMOST NUCLEAR: INTRODUCING THE NUCLEAR LATENCY DATASET

SYSTEM ANALYSIS & STUDIES (SAS) PANEL CALL FOR PAPERS

Academic Year

Humanitarian problems from the use of nuclear weapons

The role of resource management and environmental factors in sustainable development

Project VI Testing Naval Artillery and other Things That Blow Up

PSC/IR 106: Nuclear Weapons. William Spaniel williamspaniel.com/classes/pscir

The Field of Life and Death: Writing about Nukes. Bruce F. Webster (Co-Author, Carthago Series) (brucefwebster.com, bfwa.com,

Nuclear Games: A Tool for Examining Nuclear Stability in a Proliferated Setting

humanitarian impact & risks

Blackout Wars. Dr. Peter Vincent Pry EMP Task Force on National and Homeland Security EMPtaskforcenhs.com

APPENDIX B. Anti-satellite Weapons Geoffrey Forden. Laser Attacks against Satellites

Blast effects and protective structures: an interdisciplinary course for military engineers

the Politics of Nuclear Weapons

Chief of Naval Operations CSIS (20 min remarks, 40 min Q&A)

Math 611: Game Theory Notes Chetan Prakash 2012

POSC 236 Global, National and Human Security --- Spring Class time: Thursday, Thursday 1:15-3:00. Weitz Center 233. Prof Greg Marfleet

Appendix A A Primer in Game Theory

Nuclear weapons: Ending a threat to humanity

Thank you for the chance to address you today. It is a sobering task

Real Numbers and the Number Line. Unit 1 Lesson 3

Statement of John S. Foster, Jr. Before the Senate Armed Services Committee October 7, 1999

2. CYBERSPACE Relevance to Sustainability? Critical Features Knowledge Aggregation and Facilitation Revolution Four Cases in the Middle East**

60th anniversary of Hiroshima bombing

60th anniversary of Hiroshima bombing

Political Science 101: Global Nuclear Politics

Don t shoot until you see the whites of their eyes. Combat Policies for Unmanned Systems

NUCLEAR ARSENALS IN 25 YEARS

Weapons of Mass Destruction in World Politics

EXPLORING THE REQUIREMENTS OF INTEGRATED STRATEGIC DETERRENCE

Connecting ephemeral and sustainable futures in scenario design: Theoretical issues and lessons from the defence field

Ultra Electronics Integrated Sonar Suite

Cover Page. The handle holds various files of this Leiden University dissertation.

Research Statement Arunesh Sinha aruneshs/

IR 342 The Politics and Strategy of Weapons of Mass Destruction

More than a dream? Obama s vision of a nuclear arms-free world

A NEW SIMULATION FRAMEWORK OF OPERATIONAL EFFECTIVENESS ANALYSIS FOR UNMANNED GROUND VEHICLE

Israel Railways No Fault Liability Renewal The Implementation of New Technological Safety Devices at Level Crossings. Amos Gellert, Nataly Kats

The Efficient Utilization of Open Source Information

Stochastic Game Models for Homeland Security

Designing for recovery New challenges for large-scale, complex IT systems

Game Design Methods. Lasse Seppänen Specialist, Games Applications Forum Nokia

Radioactivity. Lecture 28 Radioactivity and Fear

The Demand Side: Why energy users don't behave the way they are supposed to. Ronnie D. Lipschutz U.S.-DK Renewable Energy Workshop August 2016

SACT s speech at. Berlin Security Conference Future Security Challenges and the Capabilities of the Alliance SACT s vision.

1981 Vocabulary Matching

ECOSYSTEM MODELS. Spatial. Tony Starfield recorded: 2005

Formal Methods for Interactive Systems

Response to Ofcom s Consultation on Administrative Incentive Pricing

The Helen Caldicott Foundation Presents

Information Communication Technology

Computer War. Boris V. Raushenbakh

Nuclear warhead arms control research at AWE 1 Garry J. George and Martin D. Ley 2

17.181/ SUSTAINABLE DEVELOPMENT Theory and Policy

SCHMITT TRIGGER. Typical ``real world'' signals consist of a superposition of a ``noise'' signal and a

A Taxonomy of Perturbations: Determining the Ways That Systems Lose Value

Shooting War Directed by: Aeyliya Husain

Science and Technology Studies (STS)

THE MANHATTAN PROJECT 2:

Design Principles for Survivable System Architecture

Proximization Theory: Conceptual Foundations and Empirical Fields

A SYSTEMIC APPROACH TO KNOWLEDGE SOCIETY FORESIGHT. THE ROMANIAN CASE

BRIEF THOUGHTS ON DRAWING AS REVELATION

Characterizing the Frequency Response of a Damped, Forced Two-Mass Mechanical Oscillator

Stabilizing Cooperative Outcomes in Two-Person Games: Theory and Cases

Robert Aumann s Game and Economic Theory

THEME 4: FLEXIBILITY (TORRITI, READING)

1\2 L m R M 2, 2 1, 1 0, 0 B 1, 0 0, 0 1, 1

Information Systemss and Software Engineering. Computer Science & Information Technology (CS)

Forging the Future Leading NATO Military Transformation

Games in Extensive Form

The Origins of Modern Wars GOV-1732

Economic and Social Council

Protecting Our Space Capabilities: Securing the Future

ECONOMIC DECISIONS OF LATVIAN RURAL ENTREPRENEURS: INTERPRETATION OF MODERN SOCIO-ECONOMIC DISCOURSES

Science and Technology Studies (STS)

Empirical Study of the Formation Processes of Energy Scenarios

Autonomous weapons systems as WMD vectors a new threat and a potential for terrorism?

Systems. Professor Vaughan Pomeroy. The LRET Research Collegium Southampton, 11 July 2 September 2011

We Shall Not Repeat the Evil: How Japan Can Lead. us Towards a Nuclear Free World

WORD CHECK UP. Luxury. Exorbitant. Ensure

Heidi Robinson Today, I m going to talk to you about resiliency. Resiliency is not a term that is easily defined nor is it easily achievable. As I con

2 COURSES TAUGHT IN ENGLISH Eurasian National University named after L.N. Gumilyov Academic year 2015/ Autumn

SACT s REMARKS to. Alliance Revitalized. Session 3. Washington D.C., 15th December

PLS 302 Syllabus. Dr. Aspin (aspin at bradley.edu) World Security 488 Bradley ( )

Subsidiary Body 3: Prevention of an arms race in outer space. (Adopted at the 1470th plenary meeting on 5 September 2018)

Flash Duel Quick Reference Sheet Version 5.8

In teeing up today s conversation, I'll be relying upon some of my own experiences gained in the public and private sectors.

Revolutionizing Engineering Science through Simulation May 2006

Multiple input gates. The AND gate

Scientists depend on the power of reason

The future of research on safety and security in Germany - Results from an explorative Delphi study

Revisiting One World or None.

FMCT VERIFICATION THE ROLE OF NON-INTRUSIVE APPROACHES. Geneva Centre for Security Policy, Maison de la Paix, March 5, 2018

Contextual Integrity through the lens of computer science

Megacities: Strategic Influence and MDB Implications

Artificial Intelligence

Preventing harm from the use of explosive weapons in populated areas

CS 380: ARTIFICIAL INTELLIGENCE ADVERSARIAL SEARCH. Santiago Ontañón

Transcription:

Can a Nuclear Iran be Deterred? Dr. Oded Brosh Institute for Policy and Strategy Interdisciplinary Center Herzliya Eighth Herzliya Conference January 22, 2008

The terminology and conceptualization of deterrence developed in a given context, which was very different from the current one. Deterrence Theory was a-political and a- historical, the Rational Actor Model did not allow for the primacy of Cultural and Political dimensions in Decision-Making Nor for the folly, failure and frailty of human nature involved in the Decision-Making process at times of complex crises and duress 2

We are burdened and constrained by a world of abstract terminology that Deterrence Theory ingrained deep into the psyche of Strategy as a discipline This includes the complex issue of the Second Strike, which may be irrational, or even counterproductive, and the adversary may observe this to be so Capabilities and strategies to deter one adversary may be inappropriate, or insufficient to deter another (prevalent in human behavior) 3

In the Second Nuclear Age, many of the obstacles to the smooth operation of deterrence as explicated by Deterrence Theory have been identified Gray and Payne instruct us to a best possible acquaintance with the adversary s world, so as to reduce as far as possible the propensity for errors in the correct operation of deterrence Deterrence in any event cannot be ensured (Gray), its viability depends on the willingness of the deterree to be deterred (our means and measures may influence his decision, but they are not equal to his decision) 4

Rafsanjani (2001): If Israel and the Islamic Nation both have nuclear weapons, then one nuclear weapon can destroy Israel, but the Islamic Nation can not be destroyed revealing Today: UK MoD White Paper of December 2006 on Minimum Deterrence + Final Report of Project Daniel (January 2003, published April 2004) + Tony Cordesman Iran, Israel and Nuclear War (November 2007) UK White Paper analyses challenges and threats, and recommends the appropriate remedy (renew sub fleet) 5

Project Daniel report makes recommendations for Deterrence, i.e., on Israel s Second Strike capability develop capability to target 15 countervalue targets (from Libya to Iran) of major significance + Conventional Deterrence to inhibit escalation in the first place + Pre-Emption, based on Bush Doctrine of 2002 6

Cordesman describes nuclear war, including graphs and illustrations of nuclear hits in the countries involved Cordesman: Israel has the advantage, because of larger yield warheads ( Yield Matters ), and a more developed infrastructure to survive and recover; Iran has lower yield warheads and a backward infrastructure for survival and recovery Cordesman s conclusion: Israel could theoretically survive and recover, Iran can not Ipso facto: no side should initiate nuclear war 7

Problem is: how to design and construct deterrence in light of Gray and Payne s recommendations Iranian response may be dismissive ( our sources tell us otherwise ), may view Second Strike issue in different culturally-based terms Interim finding: UK Paper + Project Daniel Final Report + Cordesman are about Sufficiency = how much deterrence do you need to deter adversary n? We may need to amplify deterrence to increase the chances of its success Too much deterrence could be dangerous The flip-side is that insufficient or inappropriate deterrence could lead to catastrophic failure 8

Conclusions: Deterrence is unlikely to work well if based on Deterrence Theory Assumptions Deterrence can work if it is designed and constructed to exactly fit the specific adversary For that, Gray and Payne s assertions stand: deterrence can work, but only subject to a superb knowledge of the adversary We need to develop the design, architecture and construction of a New Deterrence, different from previous models 9