12.07.2015 Views

the-evolution-of-international-security-studies

the-evolution-of-international-security-studies

the-evolution-of-international-security-studies

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>the</strong> technological imperative 77military expenditure served Keynesian purposes (i.e. <strong>the</strong> state channellinglarge sums <strong>of</strong> public money into <strong>the</strong> economy) for <strong>the</strong> US economythat it would have been ideologically difficult for US governments to dowithout making <strong>the</strong>mselves vulnerable to charges <strong>of</strong> socialism or biggovernment.In o<strong>the</strong>r words, military spending in <strong>the</strong> US played <strong>the</strong> samerole that government spending on industrial policy played in most o<strong>the</strong>rWestern states. Unlike in Europe, where <strong>the</strong>re was no ideological barrierto Keynesian state spending, this element <strong>of</strong> military Keynesianism in <strong>the</strong>US eased <strong>the</strong> politics <strong>of</strong> military budgets (Russett, 1983).But regardless <strong>of</strong> whe<strong>the</strong>r <strong>the</strong> development and acquisition <strong>of</strong> newmilitary technology was driven domestically or by arms racing, <strong>the</strong> fearwas that failure to keep up would make one’s nuclear forces vulnerableto first strike by <strong>the</strong> enemy. Any such development would neutralise <strong>the</strong>effects <strong>of</strong> mutual deterrence by fear <strong>of</strong> retaliation on which both sidesrelied. For example, if one’s missiles were liquid-fuelled, and took anhour to launch, but one’s opponent could launch a surprise attack whichwould give only thirty minutes’ warning, <strong>the</strong>n <strong>the</strong> opponent had powerfulincentives to strike first. From this foundational in<strong>security</strong> arose a hugeand elaborate body <strong>of</strong> <strong>the</strong>ory and argument about incentives to attack(or not) under various conditions <strong>of</strong> nuclear balance, and <strong>the</strong> need tocreate a ‘secure second strike’ force able to retaliate even after a major firststrike (Wohlstetter, 1959; Rosecrance, 1975; Howard, 1979; Jervis, 1979,1979/80; Art, 1980; Gray, 1980; Lodal, 1980; Weltman, 1981/2; George,1984; Allison et al., 1985). Formal <strong>the</strong>oretic ways <strong>of</strong> thinking were called into help in understanding <strong>the</strong> ‘game’ <strong>of</strong> deterrence and bipolar superpowerrivalry (Snyder, 1971; Jervis, 1978).Much <strong>of</strong> this literature was heavily dependent on <strong>the</strong> assumptions <strong>of</strong>rationality laid out above (Steinbruner, 1976; Snyder, 1978) to work out<strong>the</strong> great chains <strong>of</strong> if–<strong>the</strong>n propositions that characterised deterrence<strong>the</strong>ory: if A attacks B in a given way, what is B’s best response, and whatwould A <strong>the</strong>n do in reply, and <strong>the</strong>n . . . and <strong>the</strong>n . . . The foundationalin<strong>security</strong> here was that <strong>of</strong> being disarmed by one’s opponent in a firststrike (a so-called ‘counterforce’ strike). This fear was real in <strong>the</strong> earlyphases <strong>of</strong> <strong>the</strong> Cold War when nuclear arsenals were relatively small, slowto launch and not well protected. It diminished from <strong>the</strong> later 1960s asnuclear arsenals got larger and much harder to attack (particularly whenmissiles were put into submarines), giving an effective secure secondstrike. But it was replaced by ano<strong>the</strong>r, more subtle, fear known as <strong>the</strong>ex ante ex post dilemma (Rosecrance, 1975: 11–12; Steinbruner, 1976:231–234). This envisaged a counterforce attack by one side (B) against

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!