Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-wg55d Total loading time: 0 Render date: 2024-05-18T10:11:53.869Z Has data issue: false hasContentIssue false

9 - What to Do about Useability

Published online by Cambridge University Press:  05 June 2012

David A. Koplow
Affiliation:
Georgetown University Law Center
Get access

Summary

“We knew that no single bomb would win the war, but also that one wayward bomb could lose it.” That melancholy insight, from an anonymous senior instructor at a 2002 U.S. Air Force training course, neatly summarizes the warfighter's current conundrum, and it encapsulates much of the unsettling motivation animating the American pursuit of “useable” weapons. In contemporary combat – even as the “global war on terror” morphs into “the long war” – no one battle, no single engagement, still less any individual bomb, can decisively turn the campaign in our favor. But one erroneous munition – inaccurately placed, too large in its effects, lasting too long, or otherwise failing to discriminate between valid targets and protected civilians – could potentially so poison the political atmosphere that the support of the population (at home, in the theater of battle, and around the world) could be irretrievably compromised, sacrificing an indispensable element in winning the war. That spirit – driving the military to be, in equal measure, both effective and deft – is responsible for the current fascination with weapons that are less deadly, less destructive, and less powerful than their predecessors.

Still, a skeptical reader might ask, “What's the big deal here? The Pentagon always buys new weapons – for offense and for defense; for air, sea, and land. If ever there were a ‘dog bites man’ story, it would be a recital about the U.S. Department of Defense trying to develop new generations of advanced armaments.”

Type
Chapter
Information
Death by Moderation
The U.S. Military's Quest for Useable Weapons
, pp. 216 - 258
Publisher: Cambridge University Press
Print publication year: 2009

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

The Admiral's Agenda (interview with JCS Chairman Michael Mullen), National Journal, June 21, 2008
Angell, Norman, Peace Theories and the Balkan War, 1912
Bacevich, A.J., The Use of Force in Our Time, 19 Wilson Quarterly No. 1, Winter 1995, p. 50Google Scholar
Bain, Ben, Number of Reported Cyber Incidents Jumps, Federal Computer Week, February 17, 2009
Ballard, Kyle M., Convention in Peril? Riot Control Agents and the Chemical Weapons Ban, 37 Arms Control Today No. 7, September 2007, p. 12Google Scholar
Blair, Dennis C., Annual Threat Assessment of the Intelligence Community, March 10, 2009
Boot, Max, War Made New: Technology, Warfare, and the Course of History, 1500 to Today, 2006
Brookes, Peter, The Newest Trends in Terror, New York Post, June 3, 2008
Bruno, Greg, Backgrounder: The Evolution of Cyber Warfare, New York Times, February 27, 2008
Bush, George W., Commencement address at West Point, June 1, 2002, 38 Weekly Comp. Pres. Docs. 944
Chairman of the Joint Chiefs of Staff, The National Military Strategy for Cyberspace Operations, December 2006
Cirincione, Joseph, Wolfsthal, Jon, and Rajkumar, Miriam, Deadly Arsenals: Nuclear, Biological, and Chemical Threats (2nd ed.), 2005
Collins, John M., How Military Strategists Should Study History, Military Review, August 1983, p. 32
CSIS Commission on Cybersecurity for the 44th Presidency, Security Cyberspace for the 44th Presidency, December 2008
Drell, Sidney D. and Goodby, James E., What Are Nuclear Weapons For? Recommendations for Restructuring U.S. Strategic Nuclear Forces, An Arms Control Association Report, October 2007
Dunlap, Jr. Charles J., Technology: Recomplicating Moral Life for the Nation's Defenders, 29 Parameters No. 3, Autumn 1999, p. 24Google Scholar
Epstein, Keith and Elgin, Ben, Network Security Breaches Plague NASA, Business Week, November 20, 3008
Fabey, Michael, NGA Chief Says Cyberspace Intel Faces Growing Security Threat, Aerospace Daily & Defense Report, September 27, 2007
Fulghum, David A., Cyber-Attack Operations Near, Aviation Week, January 18, 2009
Gaddis, John Lewis, The Long Peace: Inquiries into the History of the Cold War, 1987
Garamone, Jim, Rumsfeld Details DoD Goals, Objectives in Testimony, Armed Forces Press Service, January 12, 2001
Gardner, Nikolas, Resurrecting the ‘Icon’: The Enduring Relevance of Clausewitz's On War, 3 Strategic Studies Quarterly No. 1, Spring 2009
Gates, Robert M., A Balanced Strategy: Reprogramming the Pentagon for a New Age, Foreign Affairs, January/February 2009
General Order 100, Lieber Code, Instructions for the Government of Armies of the United States in the Field, April 24, 1863
Gorman, Siobhan, NSA to Defend Against Hackers, Baltimore Sun, September 20, 2007
Gray, Colin S., Strategy for Chaos: Revolutions in Military Affairs and the Evidence of History, 2002
Grimmett, Richard F., Conventional Arms Transfers to Developing Nations, 2000–2007, Congressional Research Service Report for Congress RL 34723, October 23, 2008
Grossman, Elaine M., Senior U.S. General Sees High Nuclear Threshold, Global Security Newswire, October 22, 2007
Hambling, David, Blast Reduction, Defense Technology International, September 2007, p. 54
Harris, Shane, China's Cyber-Militia, National Journal, May 31, 2008Google Scholar
Hart, B.H. Liddell, The Revolution in Warfare, 1946
Hittle, J.D. (ed.), Jomini and His Summary of the Art of War, 1947, 1958
Holmes, Erik, Donley Sets Out Structure for Cyber Command, Air Force Times, February 25, 2009
Human Rights Watch, Off Target: The Conduct of the War and Civilian Casualties in Iraq, December 11, 2003, http://www.hrw.org/en/reports/2003/12/11/target-0
International Institute for Strategic Studies, Strategic Survey 1995–1996
Kagan, Frederick W., Finding the Target: The Transformation of American Military Policy, 2006
Kash, Wyatt, Details Emerge about President's Cyber Plan, Government Computer News, November 21, 2008
Khalilzad, Zalmay M. and White, John P. (eds.), The Changing Role of Information in Warfare, 1999
Krepinevich, Andrew F., Cavalry to Computer: The Pattern of Military Revolutions, National Interest, Fall 1993–1994
Lord, William T., USAF Cyberspace Command: To Fly and Fight in Cyberspace, Strategic Studies Quarterly, Fall 2008, p. 5
Lyall, Jason and Wilson, Isaiah, Rage Against the Machines: Explaining Outcomes in Counterinsurgency Wars, 63 International Organization No. 1, Winter 2009, p. 67CrossRefGoogle Scholar
Marching Off to Cyberwar, Economist, December 4, 2008
Markov, David R., The Russians and Their Nukes, 80 Air Force Magazine No. 2, February 1997Google Scholar
McIvor, Anthony D. (ed.), Rethinking the Principles of War, 2005
McNab, Robert M. and Scott, Richard L., Non-lethel Weapons and the Long Tail of Warfare, 20 Small Wars and Insurgencies No. 1, March 2009, p. 141CrossRefGoogle Scholar
Melikishvili, Alexander, Recent Events Suggest Cyber Warfare Can Become New Threat, WMD Insights, December 2008/January 2009
Milne, A.A., Peace with Honor: An Enquiry into the War Convention, 1934
Montgomery, Dave, Military Planners Mull Possibility of Cyber War, Kansas City Star, November 26, 2007, p. 1
Morgan, Patrick M., Deterrence Now, 2003
Mueller, John, Retreat from Doomsday: The Obsolescence of Major War, 1989
Mullen, Michael G., CJCS Guidance for 2008–2009, November 17, 2008
,National Intelligence Council, Global Trends 2025: A Transformed World, November 2008
Obama, Barack, Remarks on Securing Our Nation's Cyber Infrastructure, May 29, 2009, available at http://www.whitehouse.gov/the_press_office/Remarks-by-the-President-on-Securing-Our-Nations-Cyber-Infrastructure/
Owens, William A., Dam, Kenneth W., and Lin, Herbert S. (eds.), Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyber Capabilities, National Research Council, 2009
Pape, Robert A., Pape Replies, 83 Foreign Affairs No. 5, p. 162
Pictet, Jean, Development and Principles of International Humanitarian Law, 1985
Pincus, Walter, The New Art of War, Washington Post, March 3, 2008, p. A15
Record, Jeffrey, Back to the Weinberger-Powell Doctrine?Strategic Studies Quarterly, Fall 2007, p. 79Google Scholar
Richter, Walter E., The Future of Information Operations, Military Review, January–February 2009, p. 103Google Scholar
Roblyer, Dwight A., Beyond Precision: Issues of Morality and Decision Making in Minimizing Collateral Casualties, Program in Arms Control, Disarmament, and International Security, University of Illinois, April 28, 2003
Rollins, John and Henning, Anna C., Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations, Congressional Research Service Report for Congress, March 10, 2009
Sapolsky, Harvey M. and Shapiro, Jeremy, Casualties, Technology, and America's Future Wars, 26 Parameters No. 2, Summer 1996, p. 119Google Scholar
Singer, P.W., Military Robots and the Laws of War, New Atlantis, Winter 2009, p. 25Google Scholar
Singer, P.W., Robots and the Rise of ‘Tactical Generals,’ Defense News, March 9, 2009
Smith, Rupert, The Utility of Force: The Art of War in the Modern World, 2007
Solzhenitsyn, Alexander, address at Harvard University Class Day Afternoon Exercises, June 8, 1978
Tannenwald, Nina, The Nuclear Taboo: The United States and the Normative Basis of Nuclear Non-Use, 53 International Organization No. 3, Summer 1999, p. 433CrossRefGoogle Scholar
Thomas, Ward, The Ethics of Destruction: Norms and Force in International Relations, 2001
Top Brass Launch Manpower Study for Cyberspace Operations, Inside the Pentagon, March 5, 2009
U. S. Army, Counterinsurgency, Field Manual 3–24, December 15, 2006
U.S. Army, Center for Law and Military Operations, Forged in the Fire: Legal Lessons Learned During Military Operations 1994–2006, September 2006
U.S.–China Economic and Security Review Commission, Report to Congress, November 2008
U.S. Department of Defense, News Transcript, Secretary Rumsfeld Town Hall Meeting in Kuwait, December 8, 2004
U.S. Department of Homeland Security, Fact Sheet: Protecting Our Federal Networks Against Cyber Attacks, April 8, 2008
U.S. Government, Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, 2009, available at http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf
U.S. Government, National Strategy to Secure Cyberspace, February 2003
U.S. Joint Chiefs of Staff, Information Operations, Joint Publication 3–13, February 13, 2006
Creveld, Martin, The Transformation of War, 1991
Creveld, Martin, Technology and War: From 2000 B.C. to the Present, 1989
Vedantam, Shankar, Don't Send a Lion to Catch a Mouse, Washington Post, March 5, 2007, p. A3
Clausewitz, Carl, On War (Michael Howard and Peter Par, eds. and trans.) 1984
Waxman, Mathew C., International Law and the Politics of Urban Air Operations, 2000
The White House, The Agenda: Homeland Security, http://www.whitehouse.gov/agenda/homeland_security/2009
Wingfield, Thomas C., The Law of Information Conflict: National Security Law in Cyberspace, 2000
Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on Their Destruction, concluded in Paris, January 13, 1993, entered into force April 29, 1997, S. Treaty Doc. No. 103–21, 31 I.L.M. 800 (United States is a party) [CWC]
1997 Convention on the Prohibition of the Use, Stockpiling, Production and Transfer of Anti-Personnel Mines and on Their Destruction, signed December 3, 1997, entered into force July 3, 1998, 36 I.L.M. 1507, 1997 [Ottawa Mine Ban Treaty]
Convention on Prohibitions or Restrictions on the Use of Certain Conventional Weapons Which May Be Deemed to Be Excessively Injurious or to Have Indiscriminate Effects, Oct. 10, 1980, 1342 U.N.T.S. 137, 19 I.L.M. 1523 [CCW], Protocol II
Boot, Max, War Made New: Technology, Warfare, and the Course of History, 1500 to Today, 2006, p. 455Google Scholar
Bush, George W., Commencement address at West Point, June 1, 2002, 38 Weekly Comp. Pres. Docs.944, 946Google Scholar
Lyall, Jason and Wilson, Isaiah, Rage Against the Machines: Explaining Outcomes in Counterinsurgency Wars, 63 International Organization No. 1, Winter 2009, p. 67CrossRefGoogle Scholar
U.S. Department of Defense, News Transcript, Secretary Rumsfeld Town Hall Meeting in Kuwait, December 8, 2004, p. 3
Hambling, David, Blast Reduction, Defense Technology International, September 2007, p. 54Google Scholar
Brookes, Peter, The Newest Trends in Terror, New York Post, June 3, 2008Google Scholar
Ballard, Kyle M., Convention in Peril? Riot Control Agents and the Chemical Weapons Ban, 37 Arms Control Today No. 7, September 2007, p. 12Google Scholar
Sapolsky, Harvey M. and Shapiro, Jeremy, Casualties, Technology, and America's Future Wars, 26 Parameters No. 2, Summer 1996, p. 119Google Scholar
Bacevich, A.J., The Use of Force in Our Time, 19 Wilson Quarterly No. 1, Winter 1995, p. 50, 62Google Scholar
Pincus, Walter, The New Art of War, Washington Post, March 3, 2008, p. A15
Richter, Walter E., The Future of Information Operations, Military Review, January-February 2009, p. 103Google Scholar
Melikishvili, Alexander, Recent Events Suggest Cyber Warfare Can Become New Threat, WMD Insights, December 2008/January 2009Google Scholar
Lord, William T., USAF Cyberspace Command: To Fly and Fight in Cyberspace, Strategic Studies Quarterly, Fall 2008, p. 5Google Scholar
Bruno, Greg, Backgrounder: The Evolution of Cyber Warfare, New York Times, February 27, 2008Google Scholar
Harris, Shane, China's Cyber-Militia, National Journal, May 31, 2008Google Scholar
Fulghum, David A., Cyber-Attack Operations Near, Aviation Week, January 18, 2009Google Scholar
Epstein, Keith and Elgin, Ben, Network Security Breaches Plague NASA, Business Week, November 20, 2008Google Scholar
Chairman of the Joint Chiefs of Staff, The National Military Strategy for Cyberspace Operations, December 2006, p. 1, 2
Kash, Wyatt, Details Emerge about President's Cyber Plan, Government Computer News, November 21, 2008Google Scholar
Montgomery, Dave, Military Planners Mull Possibility of Cyber War, Kansas City Star, November 26, 2007, p. 1Google Scholar
Bain, Ben, Number of Reported Cyber Incidents Jumps, Federal Computer Week, February 17, 2009Google Scholar
Rollins, John and Henning, Anna C., Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations, Congressional Research Service Report for Congress, March 10, 2009
Holmes, Erik, Donley Sets Out Structure for Cyber Command, Air Force Times, February 25, 2009Google Scholar
Owens, William A., Dam, Kenneth W., and Lin, Herbert S. (eds.), Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyber Capabilities, National Research Council, 2009, pp. 1–19
Record, Jeffrey, Back to the Weinberger-Powell Doctrine?Strategic Studies Quarterly, Fall 2007, p. 79, 80Google Scholar
Collins, John M., How Military Strategists Should Study History, Military Review, August 1983, p. 32, 38Google Scholar
Grossman, Elaine M., Senior U.S. General Sees High Nuclear Threshold, Global Security Newswire, October 22, 2007Google Scholar
Krepinevich, Andrew F., Cavalry to Computer: The Pattern of Military Revolutions, National Interest, Fall 1993–1994
Dunlap, Jr. Charles J., Technology: Recomplicating Moral Life for the Nation's Defenders, 29 Parameters No. 3, Autumn 1999, p. 24Google Scholar
Markov, David R., The Russians and Their Nukes, 80 Air Force Magazine No. 2, February 1997Google Scholar
McNab, Robert M. and Scott, Richard L., Non-Lethal Weapons and the Long Tail of Warfare, 20 Small Wars and Insurgencies No. 1, March 2009, p. 141, 143CrossRefGoogle Scholar
Garamone, Jim, Rumsfeld Details DoD Goals, Objectives in Testimony, Armed Forces Press Service, January 12, 2001

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×