Deterring Non-State Actors (Davis)
Deterring Non-State Actors (Davis)
POSTGRADUATE
SCHOOL
MONTEREY, CALIFORNIA
September 21,2009
by
MAJ Ian S. Davis
Deterring Non-state Actors 2
The 2009 National Intelligence StrategyADDIN RW.CITE{{74 Art,Robert J. 2009}} noted that the
states (states), non-state actors (NSAs), and transnational forces (TNFs). The first mission
objective in the strategy is to combat violent extremism. To do that, U.S. national security policy
must be a comprehensive plan to address any security threat, regardless of its sponsor. In order
to be effective, the policy must be part of a multi-dimensional strategy. Before the rise of
terrorism by violent extremist, states used a variety of strategies that drove negotiation aimed at
promoting parsimony and deterring war. Although deterring violent extremists appears to be a
complex problem, traditional state to state deterrence theories are still applicable and can be
adapted deter NSAs and TNFs. For the purpose of this essay TNFs will be included a NSA.
NSAs that espouse violent extremism can be deterred by denying their capacity to conduct
operations. To deny their capacity to conduct operations, states must influence a NSA’s freedom
of movement, support and legitimacy. The factors are part of a cyclical in interdependent
relationship. Although they are presented in a sequential manner, the effects of one hinges on
the effects of the others. To support the argument, this essay will use the following structure.
First, we will explore deterrence theory and how it applies to deterring NSAs. Next, we will
show how to influence freedom of movement, support, and legitimacy to deny NSA operational
capability. Finally, we will review concepts for denying operational capacity that were presented
in the essay and recommended policy to deter NSAs that espouse violent extremism.
Deterrence Theory
Davis-2
Deterring Non-state Actors 3
Cold War deterrence theories, such as Brody’s (1959)ADDIN RW.CITE{{74 Art,Robert J. 2009}} writing’s
on the fear of nuclear annihilation and Kahn’s (1965)ADDIN RW.CITE{{74 Art,Robert J. 2009}} escalation ladder
of scaled response, were pivotal for shaping concepts for deterrence and coercion. The same
concepts of rationality and expected utility that are used for state-state relations can be used for
state-NSA relations. Jervis (1989),ADDIN RW.CITE{{74 Art,Robert J. 2009}} found that although Rational
Deterrence Theory (RDT) shows actors will attempt to maximize their expected utility, but RDT
did not show how actors will behave. He further found that rational actors will seek conflict if it
would yield benefits or prevent a loss in the actor’s current status quo. Fearon’s Rationalist
Explanations for WarADDIN RW.CITE{{74 Art,Robert J. 2009}} used RDT to show how leaders decide to go to
war by weighing the ex ante (pre-war) and ex post (after war) costs and how they apply in a
bargaining model. If a threat is not credible, then it will not affect the target’s decision cycle.
For a threat to be credible, it must be back by capacity and will to execute the threat should the
target decide to not comply with the threat. Based on the credibility of the threat, actors
calculate their expected utility of compliance or dissention and act accordingly. Rationality and
expected utility are relative to the actor’s point of view, culture, and norms. The loss of lives,
territories, and relative power in the international community generally drives the rationally of
states. Although terrorist acts, especially suicidal terrorist acts perpetrated by NSAs, may appear
to be irrational, they are actually the outcome of a rational thought process of the NSA based on
ideology, values, norms, and to achieve particular goals. PapeADDIN RW.CITE{{74 Art,Robert J. 2009}} showed
Davis-3
Deterring Non-state Actors 4
that terrorist acts followed a strategy based on their timing, goals, and target selection. Although
states and NSAs have different views on the means to achieve their goals, they both weigh the
costs verses the benefit of their actions and commit their acts based on their expected utility.
Studies by Davis and JenkinsADDIN RW.CITE{{74 Art,Robert J. 2009}} and Trager and
ZagorchevaADDIN RW.CITE{{74 Art,Robert J. 2009}}( that concludes that traditional deterrence theories based
on state-state competition can be adapted and applied to deterrence of NSAs. The remainder of
the essay is based on the findings of the two aforementioned studies. While it is inconceivable
that Osama bin Laden will ever make peace with the U.S. and stop sponsoring terrorist acts, the
international community can increase the costs of him doing business. By influencing the
environment, states can deny the NSA’s freedom of movement, support, and legitimacy.
The first goal is to influence the environment to deny NSA’s freedom of movement. FOM is
shaped by the influencing the legitimacy and support mechanisms that are necessary for NSAs to
operate. This is done internationally, nationally, and at the local level. Internationally, this can
be done by global information dominance, universal jurisdiction and cooperation, and rewards
and reprimands. The same way that NSAs leverage technology to reach a global audience, so
can states leverage technology to illuminate networks and institute a global system to monitor
exchange denied freedom of movement and is necessary to find, fix, and finish threats.
Geospatial and temporal tracking tools based on developments in network analysis are can be
used to find threats. Technology to collect and disseminated biometric data, analyze and monitor
ADDIN RW.CITE{{74 Art,Robert J. 2009}}
Paul K. Davis and Brian Michael Jenkins, Deterrence and Influence in
Counterterrorism : A Component in the War on Al Qaeda (Santa Monica, CA: Rand, 2002), 86,
http://www.rand.org/publications/MR/MR1619/.
ADDIN RW.CITE{{74 Art,Robert J. 2009}}
Robert F. Trager and Dessislava P. Zagorcheva, "Deterring Terrorism: It can be done,"
International Security 30, no. 3 (Winter, 2005), 87, http://libproxy.nps.edu/login?
url=http://proquest.umi.com/pqdweb?did=999302541&Fmt=7&clientId=11969&RQT=309&VName=PQD.
Davis-4
Deterring Non-state Actors 5
operational patterns, and to Tag, Track, and Locate (TTL) targets enable states to fix threats.
The refined targeting data based on a multiple sources as part of global network of information
collection and dissemination provides states more options to finish the that would otherwise slip
through the cracks of the international system. Universal jurisdiction and cooperation between
states will is a form of extended deterrence that prevent NSAs from slipping the cracks in the
international system and lends credibility to directly and indirectly..The NSA’s resulting freedom
cooperation and denying the NSA the ability to hide in plain sight. Rewards and reprimands are
effective tools for rewarding those elements who deny NSAs freedom of movement and for
punishing those who support their freedom of movement. These changes in expected utility will
drive international politics and the state-state competition. Nationally (FOM) is denied by
dominance is also critical at the national level to deny NSAs freedom of movement. The 9/11
Commission Report found that the failure of effective coordination and synchronization of
intelligence between U.S entities charged with internal and external security was the major factor
that contributed to the failure of the U.S. to prevent the 9/11 attacks. The elimination of
bureaucracy and greater coordination within all levels of a state’s society are essential to
identify, monitor, and eliminate threats. Increased civil liberties empower the people, promote
legitimacy of the state, and help mitigate the factors that allow the NSA to gain popular support.
If the state provides a legitimate mechanism that educates and enables the people to achieve their
goals, then the people will be less likely to permit the acquiescence of the NSA. Prosperity, be it
economical or spiritual, is the manifestation of the benefits of supporting the state or the NSA. A
state fosters prosperity allowing society to create social norms and standards that frame right and
Davis-5
Deterring Non-state Actors 6
wrong by consistently punishing bad behavior and rewarding good behavior. States, NSAs, and
citizens that operate within the boundaries established by the system are reward and allowed to
prosper that leads to an increased the expected utility for cooperation. Those that operate outside
of the established boundaries are punished and lead to a decreased expected utility for
cooperation. Actions at the national level will deny freedom of movement by indentifying and
preventing threats, removing the likelihood of the populace’s acquiescence to NSAs that espouse
extremism, and influencing the environment by diminishing the expected utility of supporting
targeted NSAs. Locally, the denial of NSA FOM is similar to counter-insurgency strategy and
Information balances FOM for the state and the NSA. The actions for denying the NSA FOM at
the local level can be viewed as the success or failure at the international and national level. The
outcome of the efforts affects the population’s susceptibility to both the state’s and the NSA’s
their rationality based on the expected utility of cooperation with the state or the NSA. If the
benefits for cooperating with the state outweigh the cost of coopering with the NSA, the people
will give information to the state and deny FOM to the NSA. Oppositely, if the state is not
considered legitimate, or can not increase the peoples’ expected utility for cooperation with the
state, the people will passively or actively give information, safe haven, and FOM to the NSA
and deny the same to the state. Local population control measures influence the environment
and deny FOM through a system of accountability and monitoring. ID cards, checkpoints,
curfews, and entitlements are all effective methods of controlling the populace and rewarding
compliance. The directly denies FOM and operational capability by establishing a series of
control gates and indirectly denies FOM by rewarding those that participate through
Davis-6
Deterring Non-state Actors 7
entitlements. Cooperation with the measures increases benefits, while cooperation with the NSA
decreases benefits. This denies safe haven and FOM within and through the local community.
Controlling the NSA’s operational assets at the local level by security forces and governmental
agencies is critical to deny FOM and is achieved through identification, monitoring, and
interdiction. Hardening targets and increasing operational difficulty increases requirements and
time necessary to plan and conduct operations. Interdiction of mission essential assets to execute
operations disrupts the operational cycle denies FOM and influences the NSA’s operational
cycle.
Support
Influencing a NSA’s support structure is the next method to deny operational capability.
NSAs generally have three mechanisms for support: organic, outside, and popular. According to
CroninADDIN RW.CITE{{74 Art,Robert J. 2009}} ,the majority of al Qaeda’s operations rely on a minimal
amount of startup money from the organization then it is supplemented by operatives in the field.
Means of organic financial and logistic support are illicit activities, commercial activities, and
operational recovery. Money generated by the drug trade is a major source of funding for
that are subsequently diverted to fund terrorist operations. Tighter regulations and cooperation
between states will help to identify and freeze the assets that support violent extremists.
Improved physical security controls and material management will limit pilferage of equipment.
Denying the NSA the capacity to generate resources organically will drive up the cost of doing
business and force the organization to look for outside support. As the organization looks for
outside support, the organization becomes vulnerable to observation. Outside support to NSAs
comes from state sponsors, Non-governmental organizations (NGOs), and private donors. These
ADDIN RW.CITE{{74 Art,Robert J. 2009}}
Art and Waltz, The use of Force : Military Power and International Politics, 552
Davis-7
Deterring Non-state Actors 8
sources of outside support are susceptible to influence by punishment for their associations with
NSAs that are determined to be a threat by the state or the international community.
Enforcement of laws for those who support terrorist organizations, such as criminal punishment,
seizing of assets, and sanctions, will make threats credible and dissuade active support. Popular
support comes in the form of membership, information, and acquiescence derived from
propaganda. CroninADDIN RW.CITE{{74 Art,Robert J. 2009/pas stated in /s552;}} found that NSAs can evolve from a
terrorist group to a social movement. In the case of al-Qaeda, members look to join the group
rather than being recruited. Most of the groups in the network have loose connections that are
linked through ideology instead of command or logistical support structures. Use of the internet
and other media outlets to send propaganda is an affective tool to increase popular support.
Since these messages do not go through any vetting process, such as religious leaders or subject
matter experts, they are effective at stirring emotions in the uneducated or disenfranchised.
Since the targets of the propaganda do not have any incentive to continue with the status quo,
they begin to support the NSA either actively or passively. By influencing the conditions that
make people susceptible to the propaganda and wanting to support the NSAs,
Legitimacy
Legitimacy is the glue that holds an organization together. NSAs are not just a single
actor, but are elements of a system. All of the elements of the system are working together to
achieve a common goal. While deterrence of a NSA’s radical leadership may not be feasible, it
is easier to influence the sub-elements of the system. The NSA’s legitimacy is critical to hold
the group together. If the members do not have confidence in the leadership or the cause, the
organization will crumble. By influencing the rationality and expected utility of actors in the
system, reducing legitimacy will cause an organization to implode. Cronin’s explanations for the
ADDIN RW.CITE{{74 Art,Robert J. 2009/pas stated in /s552;}}
Ibid.
Davis-8
Deterring Non-state Actors 9
decline and ending of terrorist groups in the modern era showed the importance of legitimacy to
the survival of an organization. They were: capture or killing of the leader, failure to transition
to the next generation, achievement of the group’s aims, transition to a legitimate process,
undermining a popular support, repression, and transition from terrorism. Davis and
JenkinsADDIN RW.CITE{{74 Art,Robert J. 2009}} viewed NSAs as a system. By decomposing the system, they
created an escalation ladder similar to Kahn’s that facilitates targeting of the sub-elements of the
system that are susceptible to influence to set conditions for implosion stated by Cronin. The
organization’s leadership, ideology, and perception are all vulnerable to influence and can
diminish its legitimacy. Inept leadership that is viewed as criminalistic instead of heroic will
diminish popular support and cause infighting within the organization. Organizational ideology
that is not attainable or is inconsistent with the desires of the membership will decrease the
appeal to its members. Discrediting of the organizations activities by respected peers will
decrease popular perception and cause isolation and containment of the group. By influencing
the environment to reduce the NSA’s legitimacy, the states can deny the NSA’s capacity to
conduct operations by diminishing the sub-elements expected utility for remaining affiliated with
Conclusion
State-state deterrence theories are still suitable to deter NSAs with adaptation by
influencing the NSA’s operational environment to deny their operational capability to conduct
operations. To be effective, the strategy requires global cooperation and unity of effort. The
environment through efforts at the international, national, and local levels. By influencing the
NSA’s legitimacy, support, and freedom of movement, operational capability will be denied, the
ADDIN RW.CITE{{74 Art,Robert J. 2009}}
Davis-9
Deterring Non-state Actors 10
costs of conducting operations will increase, and the expected utility of executing an operation
will have a deterrent effect against NSAs. Although costs and benefits may be weighted
differently, both states and NSAs use a rational method to weigh costs and benefits operations.
While terrorist acts, sponsored by dogmatic zealots that espouse violent extremism, are unlikely
to stop, they can be decreased by influencing the environment and denying a NSA’s operational
capability. The way ahead is for states to enact and enforce policies and regulations that: foster
international cooperation and information sharing; promote moderate views and denounce
violence; remove oppression and ignorance; and promote rights and prosperity. This may seem
like a lofty goal, but any movement forward is a step in the right direction
Davis-10
Deterring Non-state Actors 11
Works CitedXArt, Robert J. and Kenneth Neal Waltz. The use of Force : Military Power and
International Politics. 7th ed. Lanham, Md: Rowman & Littlefield Publishers, 2009.
Brodie, Bernard. "The Anatomy of Deterrence." World Politics 11, no. 2 (Jan., 1959): 173-191.
Davis, Paul K. and Brian Michael Jenkins. Deterrence and Influence in Counterterrorism : A
Component in the War on Al Qaeda. Santa Monica, CA: Rand, 2002.
Fearon, James D. "Rationalist Explanations for War." International Organization 49, no. 3
(Summer, 1995): 379-414, http://www.jstor.org/stable/2706903 (accessed August 4, 2009).
Jervis, Robert. "Rational Deterrence: Theory and Evidence." World Politics 41, no. 2 (Jan.,
1989): 183-207, http://www.jstor.org/stable/2010407 (accessed August 4, 2009).
Kahn, Herman. On Escalation: Metaphors and Scenarios. Hudson Institute Series on National
Security and International Order, no. 1. New York: Praeger, 1965.
Davis-11