Homeland Security Watch

News and analysis of critical issues in homeland security

March 19, 2008

Deterrence Makes a “Comeback.”

Filed under: Cybersecurity,Strategy — by Jonah Czerwinski on March 19, 2008

Eric Schmitt and Tom Shanker wrote in the New York Times about current government efforts to adapt deterrence — described in the article as a hold-over strategy of the Cold War — to the terrorist threat of today. Deterrence, the effect of dissuading an adversary from taking a certain approach, strategy, or measure at your expense — is a strategy as old as war itself. Even Sun Tzu explained over 2000 years ago that “‘The supreme act of war is to subdue the enemy without fighting.” And while the President and many other pundits said in the wake of 9/11 that terrorists could not be deterred, policy makers and practitioners have never set aside deterrence as a component of anti- and counter-terrorism programs.

The difference between Cold War deterrence, when threat of retaliation was the currency of dissuasion, and today is that terrorists are difficult to retaliate against if they die in the attack or go underground. (We’ll probably never again have the opportunity we had after 9/11 to route them in a discrete geographic domain like Afghanistan.) Terrorists today respond instead to a fear of failure.

Policy options to pursue deterrence against terrorists is the subject of work done by the Council on Foreign Relations, RAND, and others, including the Nuclear Defense Steering Committee and the Nuclear Defense Working Group from 2004 to today. Schmitt and Shanker show how deterrence never really left the scene after the Cold War’s end, even at the local level. Paul Browne, the New York City Police Department’s chief spokesman is quoted explaining how deterrence helped to prevent a 2003 attempted attack on the Brooklyn Bridge. Indeed, everyone from CENTCOM to SpecOps to the State Department invest in deterrence.

The article points out some of the more recent applications of deterrence in cyberspace. Cyberspace represents a unique challenge and opportunity. The ubiquity of anonymous social hubs throughout the net offer those seeking support, recruits, and sympathy for terrorist attacks an advantage only available in cyberspace: It is hard to capture or kill someone on the Internet. However, the cyber domain also offers us an advantage: We can track and observe the behavior of terrorist groups on the Internet without their knowing, and use the information we gain to disrupt and even deter them.

I had the opportunity to visit a nondescript office building outside of DC in 2005 where several floors were filled with government experts tracking and analyzing radical and fanatic traffic on the web. They had Arabic and Farsi translators, tech specialists, hackers, counter-terrorism experts, and cultural analysts observing targeting activity all over on the Internet that represented likely threats or threatening groups and individuals. I asked why they didn’t just shut down the sites that clearly fostered anti-American or anti-Western sentiment, or those that flat out called for recruits to attack the U.S. They told me that it was better to know where these people were (a la Afghanistan) rather than run them underground only to pop up somewhere unknown (a la Waziristan) on the net. We use information gathered from activities like this to interrupt terrorist efforts through a number of means, including disinformation. Sowing doubt among terrorists and their supporters can be as effective in gaining a deterrent value as aiming nuclear weapons at a superpower.

In a sense, the cyber domain is the closest thing we have to what Afghanistan offered in the weeks and months that followed 9/11. It is the only place we can identify an active domain for us to target.

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print
  • LinkedIn

3 Comments »

Pingback by the end

March 19, 2008 @ 12:57 am

[...] they had invested in their company’s stock plan. On the same day, THE NEW Ylawandmore.typepad.comDeterrence Makes a ???Comeback.??? Eric Schmitt and Tom Shanker wrote in the New York Times about current government efforts to adapt [...]

Comment by William R. Cumming

March 19, 2008 @ 10:48 am

Deterrance should never be overlooked even with sub-state actors. Finances and family connections must be traced if possible. Civil liberty issues and privacy must be carefully managed so that the end does NOT justify the means. I would argue that by the 2028 election there will be at least 30 fully ballistic missile nuclear capable countries and this argues for a long term investment in thinking and strategizing about deterrance and up-grading the technical skills of the diplomatic community a great deal. I think an equivalent of the Arms Control And Disarmament Agency specializing in WMD and BNICE (Biological, nuclear, Incendiaries, Chemicals, and Explosives should be established with locations in STATE, DOD and HOMELAND Security with a White House Coordination Unit. The war on drugs and DEA should be moved to DHS and recognized that skills and knowledge in WMD arena and deterrance and prevention is more important than WAR ON DRUGs which while important does not typically threaten societal cohesion and stability on a generalized basis. Civil defense (non-military defense) will play out for the next 40-100 years as the key arena for brain power, now that most countries seem to have abandoned the notion that military victory can be achieved with relative simplicity. Amatuer night should end. Time for the experts and the military-industrial-academic complex needs total upgrade to defend the United States. Not really about money so much as brain power, knowledge and skills. Speaking the language (whatever the technical or geographic arena also crucial).

Pingback by farsi

March 20, 2008 @ 3:14 am

[...] over. A new post will be up soon, promise. The consistant number 1 keyword searc99sense.blogspot.comDeterrence Makes a ???Comeback.??? Eric Schmitt and Tom Shanker wrote in the New York Times about current government efforts to adapt [...]

RSS feed for comments on this post. TrackBack URI

Leave a comment

XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>