Emerging technology and intra-war escalation risks: Evidence from the Cold War, implications for today

@article{Talmadge2019EmergingTA,
  title={Emerging technology and intra-war escalation risks: Evidence from the Cold War, implications for today},
  author={Caitlin Talmadge},
  journal={Journal of Strategic Studies},
  year={2019},
  volume={42},
  pages={864 - 887}
}
ABSTRACT Will emerging technologies increase the risk of conflict escalation? This paper develops a framework for evaluating the role of technology in different types of intra-war escalation. It then uses the framework to probe empirically the possible role of technology in escalation through three carefully chosen cases from Cold War. The findings largely cast doubt on the idea of emerging technologies as an independent, primary driver of otherwise avoidable escalation, suggesting instead that… 
Emerging technology and nuclear security: What does the wisdom of the crowd tell us?
ABSTRACT What is the impact of emerging technologies on nuclear security and disarmament? Current rapid technological advances are taking place against the backdrop of increased investments in
Emerging technologies and strategic stability in peacetime, crisis, and war
ABSTRACT Recent commentary has sounded the alarm about the effects of emerging technologies on strategic stability, yet the topic has received relatively little systematic scholarly attention. Will
The capability/vulnerability paradox and military revolutions: Implications for computing, cyber, and the onset of war
ABSTRACT The Information Revolution, or the rise in computing power, allowed states to leverage digital capabilities to exert conventional military dominance. But does it also create vulnerabilities
Do Emerging Military Technologies Matter for International Politics?
TLDR
Two technologies in particular, cyber and drones, feature in military and intelligence operations and in scholarship, and have significant consequences for warfare.
Wargame of Drones: Remotely Piloted Aircraft and Crisis Escalation
How do drones affect escalation dynamics? The emerging consensus from scholarship on drones highlights increased conflict initiation when drones allow decisionmakers to avoid the risks of deploying
‘Catalytic nuclear war’ in the age of artificial intelligence & autonomy: Emerging military technology and escalation risk between nuclear-armed states
This article revisits the Cold War-era concept of ‘catalytic nuclear war,’ considered by many as unworkable, and reconceptualizes it in light of technological change, as well as improved understand...
Cybersecurity policy and the Trump administration
ABSTRACT This article evaluates the conditions under which national cybersecurity policy changes or remains stable. Consistent with theories of policy and bureaucratic inertia, particularly
Disrupting Deterrence: Examining the Effects of Technologies on Strategic Deterrence in the 21st Century
In potential military applications, cyber warfare and EW capabilities arguably possess the most-direct and well-demonstrated security effects of all eight technology areas. Information security and
New Technologies and Deterrence: Artificial Intelligence and Adversarial Behaviour
Offering a critical synthesis of extant insights into technological developments in AI and their potential ramifications for international relations and deterrence postures, this chapter argues that
Asymmetric arms control and strategic stability: Scenarios for limiting hypersonic glide vehicles
ABSTRACT Can arms control incorporate emerging technology? Other articles in this special issue identify potential risks emerging technologies pose to stability and how they are intertwined with
...
...

References

SHOWING 1-10 OF 82 REFERENCES
Dangerous Thresholds: Managing Escalation in the 21st Century
Abstract : The subject of escalation has received little attention in U.S. strategic thought since the end of the Cold War. With prospects of conflict between nuclear-armed superpowers receding in
The capability/vulnerability paradox and military revolutions: Implications for computing, cyber, and the onset of war
ABSTRACT The Information Revolution, or the rise in computing power, allowed states to leverage digital capabilities to exert conventional military dominance. But does it also create vulnerabilities
Would China Go Nuclear? Assessing the Risk of Chinese Nuclear Escalation in a Conventional War with the United States
Could a conventional war with the United States inadvertently prompt Chinese nuclear escalation? The military-technical threat that such a war would pose to China's retaliatory capability—combined
Facing Off and Saving Face: Covert Intervention and Escalation Management in the Korean War
Abstract States pursue their cooperative and competitive goals using both public and private policy tools. Yet there is a profound mismatch between the depth, variety, and importance of covert
Exploding the Powder Keg Myth: Preemptive Wars Almost Never Happen
~ Concerns with preemptive war-war in which one side attacks to forestall what it sees as an impending attack on itself-have in recent years played a dominant role in discourse on the causes of war.
Escalation through Entanglement: How the Vulnerability of Command-and-Control Systems Raises the Risks of an Inadvertent Nuclear War
  • J. Acton
  • Political Science
    International Security
  • 2018
Nonnuclear weapons are increasingly able to threaten dual-use command, control, communication, and intelligence assets that are spaced based or distant from probable theaters of conflict. This form
Nuclear Deterrence in Europe: Russian Approaches to a New Environment and Implications for the United States
Through a variety of policies and actions and most recently in a new military doctrine adopted in February 2010 Russia has indicated the types of situations and threats that might cause it to resort
Grasping the Technological Peace: The Offense-Defense Balance and International Security
Offense-defense theory argues that international conoict and war are more likely when offensive military operations have the advantage over defensive operations, whereas cooperation and peace are
Dark Territory: The Secret History of Cyber War
A book that grips, informs, and alarms, finely researched and lucidly related. John le Carr As cyber-attacks dominate front-page news, as hackers join terrorists on the list of global threats, and as
Nuclear Statecraft: History and Strategy in America's Atomic Age
peace processes – such as that in Northern Ireland – succeed, whereas others – for example, that in Israel and Palestine – have yet to. Clearly, the will of the parties themselves plays an important
...
...