Hostname: page-component-89b8bd64d-mmrw7 Total loading time: 0 Render date: 2026-05-10T13:10:28.393Z Has data issue: false hasContentIssue false

Hacking Nuclear Stability: Wargaming Technology, Uncertainty, and Escalation

Published online by Cambridge University Press:  02 August 2023

Jacquelyn Schneider*
Affiliation:
Hoover Institution, Stanford University, Stanford, CA, USA
Benjamin Schechter
Affiliation:
Naval War College, Newport, RI, USA
Rachael Shaffer
Affiliation:
Naval War College, Newport, RI, USA
*
*Corresponding author. Email: jacquelyn.schneider@stanford.edu

Abstract

How do emerging technologies affect nuclear stability? In this paper, we use a quasi-experimental cyber-nuclear wargame with 580 players to explore three hypotheses about emerging technologies and nuclear stability: (1) technological uncertainty leads to preemption and escalation; (2) technological uncertainty leads to restraint; and (3) technological certainty leads to escalation through aggressive counterforce campaigns. The wargames suggest that uncertainty and fear about cyber vulnerabilities create no immediate incentives for preemptive nuclear use. The greater danger to strategic stability lies in how overconfidence in cyber exploits incentivizes more aggressive counterforce campaigns and, secondarily, how vulnerabilities encourage predelegation or automation. Both of these effects suggest worrisome relationships between cyber exploits and inadvertent nuclear use on one hand and cyber vulnerabilities and accidental nuclear use on the other hand. Together, these findings reveal the complicated relationship between pathways to escalation and strategic stability, highlighting the role that confidence and perhaps-misplaced certainty—versus uncertainty and fear—play in strategic stability.

Information

Type
Research Article
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution, and reproduction in any medium, provided the original work is properly cited.
Copyright
Copyright © The Author(s), 2023. Published by Cambridge University Press on behalf of The IO Foundation
Figure 0

TABLE 1. Treatment groups

Figure 1

FIGURE 1. Scenario 1 situation map (not to scale)

Figure 2

FIGURE 2. Scenario 2 situation map (not to scale)

Figure 3

FIGURE 3. Treatment examples

Figure 4

TABLE 2. Game iterations by location and date

Figure 5

FIGURE 4. Response plan form

Figure 6

FIGURE 5. Frequency of use of various means in games

Figure 7

FIGURE 6. Propensity to use cyber or nuclear options, scenario 1

Figure 8

FIGURE 7. Propensity to use cyber or nuclear options, scenario 2

Figure 9

FIGURE 8. Responses to “What role did having an NC3 vulnerability play in your response plan?”

Figure 10

FIGURE 9. Responses to “Why did you use your NC3 exploit?”

Figure 11

FIGURE 10. Responses to “Why didn't you use your NC3 exploit?”

Supplementary material: PDF

Schneider et al. supplementary material

Schneider et al. supplementary material

Download Schneider et al. supplementary material(PDF)
PDF 10.2 MB