This article was originally published on Lawfare, by The Lawfare Institute, in cooperation with Brookings, on August 16, 2016. To view this article on Lawfare click HERE. I want to publicly thank Susan Hennessey and Quinta Jurecic of Lawfare for their editing of my work. It is once again a great honor to have my ideas featured on Lawfare.
Two broad themes emerge when viewing 20th century national security history through a military capability lens: (1) Deterrence works and (2) Competitors adapt. This second phenomenon requires that the US and its allies adapt as well.
The cycle of deterrence and adaptation is particularly clear in the evolution of US-Russia military competition. During the Cold War, the US and fellow members of the North Atlantic Treaty Organization (NATO) built up a nuclear arsenal that deterred[i] the United Soviet Socialist Republics (USSR) from taking nuclear action. The USSR is no more, but the US and NATO still maintain both a credible nuclear deterrent and a conventional deterrent[ii] as a check against large-scale Russian adventurism. In response to this successful deterrence, Russia has—depending on the preferred heuristic—adapted to wage “Irregular Warfare[iii],” “Asymmetric Warfare[iv],” or to operate in the “Gray Zone[v].” While useful, those terms demonstrate the limitations of a military-centric discussion and fail to capture activities beyond the military context or risk misinterpreting them.
A more nuanced understanding is needed if the US is going to address these activities, which are far from limited only to Russia. Competitors might be better understood to be engaging in “Below Established Threshold Activities” (BETA) as an adaptive response to US nuclear and conventional deterrence.
BETA are conducted to change the behavior of others[vi], to gain an advantage, or maintain an existing state of affairs using methodologies that aim to stay below the thresholds established by international order. Examples of calculated below threshold efforts emerge in numerous contexts. Russia conducted BETA in Crimea with a desire to stay below the NATO Article 5 threshold[vii]. China’s activities in the South China Sea, while aggressive, still fall below the threshold of a strong response by interested parties[viii]. There China operates under the shadow of both military competition and political resolve, as some ask “Who wants to die fighting over rocks[iv]?” North Korea’s hack of Sony[x] did not meet the threshold to be considered an act of war[xi] nor could the equipment destroyed in this incident be described as critical infrastructure[xii].
Beyond those publicly or formally established thresholds, there are thresholds privately held by political leaders. While President Obama publicly established a threshold[xiii] whereby the US would intervene in Syria if the Assad regime used chemical weapons, it appears as though President Assad viewed the actual threshold[xiv] as somewhat different and decided to act accordingly.
Pushing competitions to below threshold activities is a mark of successful deterrence, and the BETA examples above are certainly preferable to nuclear war or large-scale conventional war. However, there is still a significant need to respond to BETA, and in order to do so effectively the US needs to adapt in the areas of mindset, law, monitoring, and knowledge management.
The first adaptation is mindset. Academic, think tank, and practitioner communities must accept that activities to address BETA will not fit neatly into the authorities established in Title 10, Title 22, Title 50 of US Code[xv] or elsewhere. Instead, addressing BETA requires a near-simultaneous use of all three authorities all the time, which can be a source of discomfort. There has been some evolution towards this mindset adaptation in the context of counterterrorism, but a larger sea change is needed to fully respond to BETA. Once implemented, the first adaptation will enable interested parties to begin thinking beyond defending their own equities and instead on how to address BETA.
The mindset adaptation drives the second required adaptation: changes to existing law. BETA legislation would enable the appointment of Interagency Mission Managers[xvi] empowered to work across government with enhanced ability to transfer funds between Executive Branch departments and agencies based on mission requirements. Congressional committees will likely need to be realigned to focus on BETA instead of the three existing specialty areas of armed services, foreign relations/foreign affairs, and intelligence. From a Congressional oversight point of view, a BETA committee would oversee portions of all three specialty areas nearly simultaneously. When implemented, the second adaptation will unify efforts across the government in strategy, planning, execution, and oversight, thus increasing the efficiency of activities conducted to address BETA.
The third adaptation entails the US Intelligence Community (IC) and other departments and agencies within the Executive Branch reassessing how they monitor events overseas. The Director of National Intelligence[xvii] should look at the National Intelligence Priority Framework[xviii] and determine how it might be used to detect discreet indications and warnings of BETA. If that framework is not suited to the purpose, then another vehicle may need to be established for IC use. Executive Branch departments and agencies will need to ensure they capture BETA concerns and proclamations when interacting with their foreign counterparts as these could warn of impending events. Once successful, this third adaptation will enable the US to better monitor BETA and determine if multiple BETA are, over time, leading to an event that could be characterized as strategic surprise[xix].
The fourth and final adaptation will be the establishment of an organization to manage BETA knowledge, study it, record best practices and lessons learned, and promulgate them across the US government. This organization would be staffed with representatives from the Executive Branch, academia, and think tanks. This fourth adaptation will ensure the US understands BETA and doesn’t forget about it. Such forgetfulness can lead to loss of knowledge and opportunistic rebranding[xx] of historical activities, neither of which are helpful to the national security community.
Notwithstanding the above, it must not be forgotten that competitors conduct BETA to avoid US superiority in both the nuclear and conventional realm. As such, if the US nuclear or conventional deterrents lapse, BETA will be less likely and large-scale conflict will increase in probability. Based upon this, the US must first and foremost ensure that its credible nuclear and conventional deterrence continues so that it can enjoy the comparative luxury of struggling to address threats posed by BETA. Today’s fiscally austere environment will require Executive Branch departments and agencies to determine if they should expand to address BETA or assume risk within their current resources to do so.
It bears noting that the US struggles with effectively addressing BETA for reasons that are psychological as well as organizational. Generally speaking, humans as a species prefer certainty[xxi], and this manifests itself with the US national security community being comfortable with peace or war, as compared to the uncertainty and uncomfortableness inherent in BETA. Also, the US in particular valorizes decisive conflict—our national anthem[xxii] is about a battle, not grand strategy or about avoiding conflict. The US has four Rambo[xxiii] films, but none about the containment[xxiv] strategy that won the Cold War. The US is, in essence, simultaneously struggling with both BETA, and its own collective national security identity. If the US fails to address BETA as effectively as it has mastered nuclear and conventional deterrence, this will result in competitors prevailing in numerous small ways[xxv]. Over time those small wins may add up to large victories.
Endnotes
[i] Colby, E. (2007, July 01). Restoring Deterrence. Retrieved August 01, 2016, from http://www.theatlantic.com/past/docs/images/issues/200707u/Restoring%2520Deterrence.pdf
[ii] Colby, E., & Solomon, J. (2016, April 20). For peace with Russia, prepare for war in Europe: NATO and conventional deterrence. Retrieved August 01, 2016, from Commentary, http://warontherocks.com/2016/04/for-peace-with-russia-prepare-for-war-in-europe-nato-and-conventional-deterrence/
[iii] DoDD 3000.07 Irregular Warfare. (2014, August 24). Retrieved August 01, 2016, from http://www.dtic.mil/whs/directives/corres/pdf/300007p.pdf
[iv] Holmes, K. (2014, May 05). Putin’s Asymmetrical War on the West. Retrieved August 16, 2016, from http://foreignpolicy.com/2014/05/05/putins-asymmetrical-war-on-the-west/
[v] Kapusta, P. (2015, October 01). The Challenge of Operating in the Gray Zone. Retrieved August 01, 2016, from http://www.soc.mil/swcs/SWmag/archive/SW2804/October%25202015%2520Special%2520Warfare.pdf
[vi] Walter, P. (2016, March 28). Reading, writing, and refining national security principles. Retrieved August 01, 2016, from https://philwalter1058.com/2016/03/28/reading-writing-and-refining-national-security-principles/
[vii] Economist, T. (2015, March 9). How NATO’s article 5 works. Retrieved August 01, 2016, from http://www.economist.com/blogs/economist-explains/2015/03/economist-explains-6
[viii] Choong, W. (2016, June 01). Why China’s salami-slicing in South China Sea is bad news. Retrieved August 01, 2016, from https://www.iiss.org/en/shangri-la%2520voices/blogsections/2016-588c/why-chinas-salami-slicing-in-south-china-sea-is-bad-news-bba7
[ix] Hyer, E. (2016, July 2). The U.S. And Japan may literally start a war over rocks in the south China Sea. Retrieved August 01, 2016, from http://nationalinterest.org/feature/the-us-japan-may-literally-start-war-over-rocks-the-south-16823
[x] Holland, S., & Chiacu, D. (2014, December 22). Obama says Sony hack not an act of war. Retrieved August 16, 2016, from http://www.reuters.com/article/us-sony-cybersecurity-usa-idUSKBN0JX1MH20141222
[xi] 18 U.S. Code § 2331 – definitions. (1992, October 29). Retrieved August 01, 2016, from https://www.law.cornell.edu/uscode/text/18/2331
[xii] Government, G. (2001, October 26). 42 U.S. Code § 5195c – critical infrastructures protection. Retrieved August 01, 2016, from https://www.law.cornell.edu/uscode/text/42/5195c
[xiii] Lombroso, D., & Goldberg, J. (2016, March 10). Obama’s “red line” that Wasn’t Retrieved from http://www.theatlantic.com/video/index/473025/syria-red-line-that-wasnt/
[xiv] Wittes, T. C. (2016, March 28). Fighting ISIS: The Slipperiest slope of them all. . Retrieved from http://www.theatlantic.com/international/archive/2016/03/obama-doctrine-goldberg-inaction/473520/
[xv] Project, A. S. (2012, August 9). Fact sheet U.S.C. Title 10, title 22, and title 50. Retrieved August 01, 2016, from National Security Strategy, http://www.americansecurityproject.org/fact-sheet-u-s-c-title-10-title-22-and-title-50/
[xvi] Lamb, C., & Marks, E. (2010, December 01). Chief of Mission Authority as a Model for National Security Integration. Retrieved August 01, 2016, from http://ndupress.ndu.edu/Portals/68/Documents/stratperspective/inss/StrategicPerspectives-2.pdf
[xvii] Office of the Deputy Director of National Intelligence for Intelligence Integration. Retrieved August 01, 2016, from https://www.dni.gov/index.php/about/organization/intelligence-integration-who-we-are
[xviii] National Intelligence Priorities Framework. (2015, January 02). Retrieved August 01, 2016, from https://www.dni.gov/files/documents/ICD/ICD%2520204%2520National%2520Intelligence%2520Priorities%2520Framework.pdf
[xix] Davis, J. (2003, January 1). Strategic warning: If surprise is inevitable, what role for analysis? — central intelligence agency. Retrieved August 16, 2016, from https://www.cia.gov/library/kent-center-occasional-papers/vol2no1.htm
[xx] Raitasalo, J. (2015, April 23). Hybrid warfare: Where’s the beef? Retrieved August 16, 2016, from Commentary, http://warontherocks.com/2015/04/hybrid-warfare-wheres-the-beef/
[xxi] Konnikova, M. (2013, April 30). Why We Need Answers. . Retrieved from http://www.newyorker.com/tech/elements/why-we-need-answers
[xxii] The Star-Spangled banner. Retrieved August 01, 2016, from http://amhistory.si.edu/starspangledbanner/the-lyrics.aspx
[xxiii] Rambo. Retrieved August 01, 2016, from http://www.rambofilm.com/
[xxiv] Containment and Cold War, 1945-1961. Retrieved August 01, 2016, from Department of State Office of the Historian, https://history.state.gov/departmenthistory/short-history/containmentandcoldwar
[xxv] Haddick, R. (2014, February 6). America has no answer to china’s salami-slicing. Retrieved August 01, 2016, from http://warontherocks.com/2014/02/america-has-no-answer-to-chinas-salami-slicing/