Sie sind auf Seite 1von 8

The

Stanley policy dialogue brief


Foundation Critical thinking from Stanley Foundation Conferences

A Joint Symposium by
The Stanley Foundation
Future Weapons of Mass Destruction
and the Potomac
Institute for Policy The 20th century walked a well-trodden path for each of the current categories of
weapons of mass destruction (WMD)—nuclear, chemical, biological, and radio-
Studies logical. Albeit at varying speeds and not necessarily in a straight progression, this
lifecycle passes through the phases of conception, invention, development, deploy-
ment, stockpiling, stigmatization, rules creation, limitation framework develop-
December 11, 2006
ment, stockpile reduction, and, theoretically at least, destruction. These phases can
be more fully defined as (with accompanying analogues in the US nuclear realm):

• Conception. The creative process that foresees new processes building on the
underlying existing knowledge base or that considers developed technologies in
new and inventive manners and contexts (Einstein’s letter to President Franklin
Delano Roosevelt)

• Invention. The transformation of conception into physical, if prototypical, form


(Trinity, Little Boy, Fat Man)

• Development. Qualitative improvements in weapons design, increased focus on


delivery systems, beginning of doctrine integration (hydrogen bomb)

• Deployment. The regularization and institutionalization of weapons, delivery


system(s), infrastructure, and doctrine into military planning (Mk-3, Mk-4)

• Stockpiling. The industrialization of weapons programs and the associated


quantitative buildup of weapons and related assets (>3,000 W76 warheads)

• Stigmatization. Military, political, and public assessments of negative character-


istics of weapons start to factor into doctrine and decision making (Hiroshima,
Cuban Missile Crisis, MAD)

• Rules creation. National and international limitations on doctrine, development,


or stockpiling of weapons or related assets (“nuclear football,” SALT)

• Limitation framework development. Initial rules creation is refined, codified,


This brief summarizes the primary and enhanced, likely with international actors participating in monitoring and
findings of the conference as inter- verification (START, IAEA Additional Protocol)
preted by the project organizers.
Participants neither reviewed nor
approved this brief. Therefore, it • Stockpile reduction. Either due to independent action or within the requirements
should not be assumed that every of international agreements, quantitative reductions are made in weapons, deliv-
participant subscribes to all of its
recommendations, observations, and ery systems, or infrastructure. May or may not be accompanied by qualitative
conclusions. (e.g., doctrinal) reductions (Trident)
2
• Destruction. The physical demolition/dismantle- such a group. Over the course of the day, participants
ment of weapons, delivery systems, and/or infra- discussed the potential development and conse-
structure. Knowledge base is likely maintained, quences of “future weapons of mass destruction”
but scale of weaponization process allows mean- from three distinct vectors—technical, strategic, and
ingful verification of destruction to be possible ethical—in an attempt to capture perspectives from
(Peacekeeper retirement) the hard sciences, the social sciences, and philosophi-
cal human endeavors. We present this summary brief
Will this century witness a similar inventive pursuit as an invitation to break from the current and histor-
of new types of WMD, perhaps along similar life- ical strictures imposed on thinking surrounding long-
cycle paths? Several factors point to the affirmative. standing, mature WMD lines and to consider
The human desire to push the boundaries of knowl- potential long-range impacts of today’s cutting-edge
edge has not diminished and a number of potential technology and political environments.
pathways toward new forms of WMD have begun
to emerge. Globalization and the rate of technolog- A Preliminary Definitional Discussion
ical evolution in today’s world have dramatically An interesting, overarching line of discussion ran
changed the rules of the game. Scientific knowledge throughout the symposium. Weapons of mass
and expertise are spreading to all corners of the destruction, as an umbrella term, is often defini-
globe; the infrastructure needed to create, stockpile, tionally enlarged or constricted, depending on the
and employ WMD may become more difficult to situation and context, but it is useful to engage in
detect and prevent. Smaller groups and nonstate a brief consideration of how and why we define
actors now play a growing role in international WMD as we do. The current American Heritage
political affairs. Our mechanisms for limiting or New Dictionary of Cultural Literacy (Third
preventing proliferation and enforcing internation- Edition), defines WMD as “[w]eapons that can
al standards are decreasing in their effectiveness; produce devastating results when delivered in a
the need, not just to redouble our efforts but recon- single strike.” Wikipedia offers “a term used to
ceptualize our modes of thinking in these areas, is describe a massive weapon with the capacity to
becoming increasingly clear. indiscriminately kill or incapacitate. The phrase
broadly encompasses several areas of weapon
While some particular lines of investigation have synthesis, including nuclear, biological, chemical
already been opened (e.g., nanotechnology), and (NBC) and, increasingly, radiological weapons.”1
certain audiences have already begun to consider Combining these with a survey of the literature
their potential use, ethical concerns, or strategic reveals some common characteristics: (1) a
impact (i.e., the defense research and development weapon that causes massive casualties and/or
agencies and the niche media), little cross-cutting physical devastation; (2) a characteristic indis-
dialogue has brought the divergent areas together criminate nature; (3) a compositional make-up
for comprehensive consideration. Yet such a con- that is beyond conventional explosives; and (4) a
versation is needed in order to foster further con- defined categorization of particular weapons con-
sideration among and across experts, including forming to these traits—nuclear, chemical, bio-
technocrats, military strategists, philosophers, arms logical, and radiological.
control experts, sociologists, and political leaders.
As we look to the future, there is rising interest in
In an attempt to understand and positively influence separating the methods of achieving these charac-
future development of these potentially existential teristics from the results themselves. Historically,
threats, a wise beginning might be to survey both the the focus has been on the method, leading to a strict
current and foreseeable future landscapes, analyze categorization of WMD (and a continual discussion
past lessons, and then project analogous nascent per- over how narrowly to draw those lines) of specific
mutations into future scenarios. One means of technologies. However, as technologies advance, as
accomplishing this would be to bring together prac- information and capabilities expand, and as poten-
titioners, academics, and policymakers to consider tial power diffuses to broader and smaller subsets
the directionalities and implications of these conflu- of actors, it may be more useful to consider WMD
ences on defense and international security policy. from the perspective of results. In short, what
“weapons” (i.e., able to inflict massive, indiscrimi-
In December 2006, the Stanley Foundation and the nate casualties and/or devastation) may develop,
Potomac Institute for Policy Studies brought together shift, and/or mutate, depending on circumstances
3
and opportunity? Flexibility in defining WMD may attacks occurring through our air system. Is pre-
lead to better understanding and abilities to adapt venting another 9/11 the most pragmatic way to
to new challenges. When the malfunction of an utilize US defense resources?
electric substation creates a ripple effect that cuts
off power to the entire US Northeast and when Technical Issues
malicious computer code can cripple the Internet Pure and applied science, engineering, and overall
providers who provide access to the Internet for technical advancement are the most likely path-
millions of users, perhaps disruption may be a more ways toward the development of future types of
suitable term than destruction; maybe the defini- WMD. Furthermore, new confluences or juxtapo-
tion of weapon needs to be rethought. sitions of existing technologies may contribute to
new types of weapons or new dispersion meth-
An attack that disrupts a society’s infrastructure ods. For this reason, one symposium panel was
and sows chaos within the society will have greater dedicated to the discussion of technical issues and
consequences as the global community becomes their implications.
increasingly complex and interdependent. Future
adversaries will likely be able to take advantage of Until recently, strategic analysts forecast the devel-
this progressively varied menu of WMD as “social” opment of technology as a linear path, with nan-
WMD promises to reap larger havoc for a smaller otechnology and info-technology leading to
cost than traditional WMD. biotechnology, which would then lead to the
advancement of nanobiotechnology and neu-
During World War II, the firebombing of European rotechnology. However, as a function of our post-
cities and the atomic bombings in Japan normal- modern, synthesizing experience, technology is
ized the practice of attempting to destroy the will now moving in a more compressed, non-linear
and resources of a society during wartime, not sim- manner with rapid and simultaneous develop-
ply the military of the enemy state. According to ments across subject areas.
this rationale, the ultimate consequences of WMD
will best be measured equally in terms of survivors Technological advances in the next decades will be
and victims, as domestic survivors’ experiences and driven not simply by new developmental vistas of
fears disproportionately influence domestic and invention and convergence but also by sociopolit-
international security policy. ical trends, such as the next “Age Wave” in the
United States and other post-industrialized coun-
As a consequence, threat and risk analyses play an tries. As the percentage of the working population
increasingly important role as the WMD threat drops precipitously, new technologies that aid in
diversifies into innumerable possibilities from the care and support of the aging population will
wide-ranging sectors including satellite communi- be in high demand. Much of this biotechnology—
cations and neurotechnology—the convergence of including disease detection/prevention, injury
nanotechnology, biotechnology, and information healing, and disability reduction—will have
technology. In order to utilize defense resources weapons applications.
most efficiently, it is necessary to analyze which
envisioned future weapons and technologies are As an example, new scientific breakthroughs in
most likely to come to fruition; a new field of com- the understanding of the human body are one
putational societal dynamics using computer simu- likely basis for new WMD. WMD could utilize
lations that can model these non-linear transitions the new discoveries in the mechanisms of the
may assist risk analysts. neuro-spectrum, including the functions of stress,
trauma, attention, sleep, peer pressure, decision
Balancing the need to defend against existing making, learning, trust, and religious feeling,
threats with the need to research and develop whether to extend and enhance the quality of life
defenses against these possible future threats will be or to create more warfighting capabilities.
a challenge for international defense policy and the
defense budget. After the bombing of Pearl Harbor, Although many conference participants empha-
the United States worked diligently to fortify its sized the vast number of new technologies that
harbors against any type of attack. Again, after could be weaponized, they also stressed the
September 11, 2001, the United States has made importance of developing more advanced, effec-
considerable efforts to mitigate the risk of terrorist tive mechanisms for choosing which technologies
4
represent the greatest threat. Technologies that ments—such as radical Islam—have shown that the
are most likely to be weaponized include: United States can no longer rely on Cold War ideol-
ogy. Clinging to a Cold War-era security paradigm
• Robotics (small, cheap, mobile robots that utilize does not prepare the United States to analyze or deal
swarm behavior) Reconnaissance, Surveillance, effectively with these new threats.
and Target Acquisition (RSTA) and attack ops,
sensors, and weapons on the battlefield. Technical experts agree that it is a nontrivial chal-
lenge to assess the technological advances most like-
• Hypersonics and stealth. ly to be weaponized or pose a threat to national
security. From a strategic angle however, while offen-
• Directed beams as weapons for defense and sive weapons are based on new technologies, defen-
offense; e.g., lasers, high-powered microwave sive strategies often rely far more heavily on the
(HPM), and particle beams. architecture of security policy and agreements rather
than on actual weaponry. Therefore, although new
Strategic Implications: Defense, technologies and weapons development will contin-
Deterrence, and Coalitions ue to challenge efforts to curb the WMD threat, a
flexible international nonproliferation regime and
The second symposium panel dealt with the strate-
other international arrangements will still constitute
gic considerations regarding potential new forms of
an important portion of the US security posture.
WMD, from development to dissuasion. Technical
potentials without implementation remain just
In the past, international agreements have been legal-
that—potential. The way in which states choose to
ly binding in theory but difficult to maintain in prac-
direct and react to developments in future WMDs
tice, when they lack sufficient formal structures for
may greatly impact the global security environment
enforcement and implementation. This failure to
of the coming decades. Whether or not the tradi-
agree and implement consequences and repercus-
tional cycle of the existing WMDs will be perpetu-
sions seriously limits the utility of such agreements.
ated in future cases or whether decision makers can
Furthermore, ongoing political disagreements on the
chart a new course is a central question.
nature of compliance (for instance, the state of com-
pliance of the United States and the other nuclear
The United States has traditionally utilized overlap-
weapon states vis-à-vis their Article VI obligations
ping strategies of defense, deterrence, military
within the Nuclear Non-Proliferation Treaty) and on
force, and coalitions to manage WMD threats. The
the underlying philosophies surrounding the role of
United States’ strategic posture is still based on
formal multilateral agreements in achieving US secu-
World War II and Cold War thinking, assuming
rity create instability and uncertainty.
that identifiable and discrete entities that can be
traced to sovereign actors constitute the greatest
The nonstate actor phenomenon is most-often rec-
threat to the United States. The assumption that all
ognized among potential threat-sets: terrorists and
transnational and international groups or individu-
those who actively or passively support them. A
als are politically and materially equipped by an
second, indicative perspective on the growing influ-
identifiable military state leads to a national securi-
ence of nonstate actors is to recognize the contin-
ty strategy which seeks to prepare the United
ued and expanding sway of domestic determinants.
States’ military to fight and win wars.
Particularly important in fractionated, multistate
democracies where strong minority opinions can
Sixteen years on, Cold War assumptions—particu-
create and break domestic coalitions, interest
larly the continued commitment to large-scale offen-
groups play larger roles than in the past. As an
sive platforms supporting a conventional triad of
example, the European Union may decide on a par-
land, air, and water power-projection—still garner
ticular policy, but whether or not individual gov-
the lion’s share of military doctrine and funding.
ernments can persuade their citizens may ultimately
Notwithstanding this entrenched system, realities
determine actual implementation. This power shift
on the ground such as globalization, the rise of non-
may lead to greater accountability, responsiveness,
state actors, instability in the global system, and the
and transparency within governments; it is certain-
growing influence of domestic constituencies have
ly a widening departure from past practices that
changed the concept of international security and
warrants further examination on the impacts it will
how to achieve it. Rather than largely cohesive state
have on the international security environment.
actors, both individuals and mass social move-
5
Ethical Considerations Conclusion
Ethics in international security are often relegated to At the Stanley Foundation/Potomac Institute con-
secondary tiers of consideration. Yet for a variety of ference, experts and strategists painted a disturbing
reasons, there may be diminishing utility in such picture of the future of WMD: countless new tech-
approaches. First, as General David Petraeus, com- nologies with the potential to be weaponized con-
mander of Multinational Force Iraq wrote to US verging with political and strategic trends that bend
troops in May 2007, “Our values and the laws gov- toward capability dispersion and sometimes chaos.
erning warfare teach us to respect human dignity, But such dystopian fears should not lead to deter-
maintain our integrity, and do what is right. ministic thinking. The major powers of the 20th
Adherence to our values distinguishes us from our century were the prime creators and movers behind
enemy.”2 Second, a clear ethical articulation that is the development, deployment, and regularization
widely accepted among our friends and allies bolsters of the current forms of WMD; they undoubtedly
our support and increases our ability to lead others. will play a major role on all sides of the issue for
Finally, in an era of worldwide instant communica- future WMD—creating, dissuading, promoting,
tion, actions widely perceived as breaches in ethics preventing, embracing, and proscribing.
will be used by our foes as propaganda to inflame
larger and more ardent opposition to our policies. It has been said that if you don’t know where
you’re going, any road will get you there. Recent
But there are other wrinkles to the ethical compo- experiences with agenda-setting initiatives for
nent of future WMD issues. The United States has corollary technology-based fields (e.g., stem cell
the tendency to exhibit a parochial absolutism that research, genetically modified foods) reveal signifi-
only seriously considers those positions that can be cant challenges to long-term policy planning, but
understood through our outlook and perspective. If also point out considerable level of interest and
the United States continues to resist serious analy- engagement, particularly once an issue moves
sis of Islamic fanaticism, with a presumption that it beyond the purely theoretical and into the realisti-
is unintelligible through the US worldview, the cally potential. Further comparative analysis across
United States may fail to address the concerns and these fields may lead to the outlining of successful
problems that make Islamic fanaticism attractive to strategies for future WMD thinking.
very large immigrant populations in the Western
world and populations in the Middle East and Asia. Endnotes
1
http://en.wikipedia.org/wiki/Weapons_of_Mass
Moreover, recent political discourse has demon- _Destruction.
strated an increased political, if not popular,
acceptance of preventive actions to mitigate threats. 2
http://www.mnf-iraq.com/images/stories/CGs_Cor
In his 2002 West Point commencement address, ner/values_message_%2810_may_07%29.pdf.
President George W. Bush stated, “If we wait for
threats to fully materialize, we will have waited too 3
“President Bush Delivers Graduation Speech at
long.”3 The 2002 National Security Strategy elabo- West Point,” United States Military Academy,
rated this position, stating, “We must be prepared West Point, New York, http://www.whitehouse
to stop rogue states and their terrorist clients before .gov/news/releases/2002/06/20020601-3.html.
they are able to threaten or use weapons of mass
destruction against the United States and our allies 4
The National Security Strategy of the United
and friends.”4 Under the preventive discourse, a States of America, http://www.whitehouse
foreign government is effectively forced to prove its .gov/nsc/nss.pdf.
innocence or else be considered guilty, in sharp con-
trast to the American domestic legal system. In the
2003 case of Iraq and Saddam Hussein, it became
incumbent on Hussein to show how and where his
WMD were destroyed and to be entirely coopera-
tive and transparent in facilitating inspections. His
defiance in the face of these demands gave room for
international suspicion and doubt, making interna-
tional intervention more acceptable from the stand-
point of the United States and its allies.
6
Participants Participants
Parney Albright, Managing Director, Civitas
Project Chairs Group
Matt Martin, Program Officer, The Stanley
Omar Altalib, Professor, University of Mary
Foundation
Washington
Dennis McBride, President, Potomac Institute for
Rod Azama, Managing Director, The Chancellor
Policy Studies
Group
Technical Issues Panel Presenters
Bill Bandas, Retired Attorney
Michael S. Swetnam, Chairman and Chief
Executive Officer, Potomac Institute for Policy
Derrick Busse, Navy Federal Executive Fellow,
Studies
Potomac Institute for Policy Studies
Sharon Weinberger, Editor in Chief, Defense
Diane Carnevale, Captain, US Navy (Retired)
Technology International
Paul Chatelier, Senior Research Fellow, Potomac
Gerold Yonas, Principal Scientist and Vice
Institute for Policy Studies
President, Sandia National Laboratories
Christopher F. Chyba, Professor of Astrophysical
Strategic Issues Panel Presenters
Sciences and International Affairs, Woodrow
Nancy Gallagher, Associate Director for Research,
Wilson School of Public and International Affairs
Center for International and Security Studies at
Maryland
Avner Cohen, Senior Research Fellow, Center for
International Security Studies at Maryland,
Michael Kraig, Director, Policy Analysis and
University of Maryland
Dialogue, The Stanley Foundation
Tracy Cronin, Systems Analyst, Joint Improvised
Gordon Oehler, Senior Fellow, Potomac Institute
Explosive Devise Defeat Organization, Ideal
for Policy Studies
Innovations, Inc.
Ethical Issues Panel Presenters
Stephen Cunnion, Medical Director, National
John Langan, Joseph Cardinal Bernardin Professor
Security Health Policy Center, Potomac Institute
of Catholic Social Thought, Georgetown
for Policy Studies
University
Steve Czuchlewski, Engineering and Diplomacy
Dennis McBride, President, Potomac Institute for
Fellow, Institute of Electrical and Electronics
Policy Studies
Engineers, Inc., US Department of State
Albert C. Pierce, Professor of Ethics and National
Bob Debell, Consultant, DeBell Associates, Inc.
Security, National Defense University
Peter Dees, Office of the Coordinator for
Luncheon Presentation
Counterterrorism, US Department of State
David Kay, Senior Fellow, Potomac Institute for
Policy Studies
Jennifer Douglas, Consultant, Henderson’s Global
Voices
Rapporteur
Ashley Calkins, Program Associate, The Stanley
Lee Dunbar, Intern, The Henry L. Stimson Center
Foundation
Gerald Epstein, Senior Fellow, Science and
Security, Homeland Security Program, Center for
Strategic and International Studies
7
Tony Fainberg, Senior Analyst, Institute for Alan Pearson, Director, Biological and Chemical
Defense Analyses Weapons Control Program, Center for Arms
Control and Non-Proliferation
Janelle Gatchalian, Research Assistant, Potomac
Institute for Policy Studies Charles Perkins, Assistant Director, Policy and
Government Affairs, American Israel Public
Harlan Geer, National Security Policy Advisor, Affairs Committee
Third Way: A Strategy Center for Progressives
Raphael Perl, Specialist, International Terrorism
Jackie Gravell, Senior Research Fellow, Potomac Policy, Foreign Affairs, Defense and Trade
Institute for Policy Studies Division, Congressional Research Service

John Hassenblug, Consultant John Retelle, Director of Studies, Potomac


Institute for Policy Studies
Jo Husbands, Senior Project Director, Program on
Development, Security and Cooperation, The Dennis Reutter, Program Manager, Science and
National Academies Technology Directorate, US Department of
Homeland Security
Carol A. Kalinoski, Principal, Carol A. Kalinoski
& Associates, Inc. Debra Rolison, Head, Advanced Electrochemical
Materials, Naval Research Laboratory
Daphne Kamely, Principal Assistant, Office of the
Deputy Assistant Secretary of the Army, Fred Saalfeld, Senior Fellow, Potomac Institute for
Environment, Safety, and Occupational Health Policy Studies

Joe Kelley, Research Fellow, Potomac Institute for Kathryn Schiller, Research Assistant, Potomac
Policy Studies Institute for Policy Studies

Maggie Kosal, Science and Technology Advisor, Gary G. Sick, Senior Research Scholar, Adjunct
Office of the Science Advisor Liaison to Defense Professor of International Affairs, Columbia
Threat Reduction Agency, Chemical and University
Biological Technologies
David Siegrist, Senior Research Fellow, Potomac
Peter LeJeune, Fellow, Potomac Institute for Policy Institute for Policy Studies
Studies
Stephanie Tennyson, Director of Communications
Edward Levine, Professional Staff Member, Senate and Government Relations, Potomac Institute for
Committee on Foreign Relations Policy Studies

Gabrielle Mazurek, Senior Research Associate, Michael Treder, Cofounder and Executive
Potomac Institute for Policy Studies Director, Center for Responsible Nanotechnology

Janne Nolan, Research Associate, Institute for the Elizabeth Turpen, Senior Associate, The Henry L.
Study of Diplomacy, Georgetown University Stimson Center

Ivan Oelrich, Vice President, Strategic Programs, Sohaib Waseem, Nonproliferation Intern, US
Federation of American Scientists Civilian Research and Development Foundation

Thomas O’Leary, Executive Vice President, You-ying Whipple, Senior Analyst, Analytic
Potomac Institute for Policy Studies Services, Inc.

Sima Osdoby, Consultant Ralph Wipfli, Research Assistant, The Brookings


Institution
8
The Potomac Institute for Policy Studies peace. Its work aims to connect people from different
The Potomac Institute for Policy Studies is an inde- backgrounds, often producing clarifying insights and
pendent, 501(c)(3), not-for-profit public policy innovative solutions.
research institute. The Institute identifies and
aggressively shepherds discussion on key science, The foundation frequently collaborates with other
technology, and national security issues facing our organizations. It does not make grants.
society. From these discussions and forums, the
Institute develops meaningful policy options and Stanley Foundation reports, publications, pro-
ensures their implementation at the intersection of grams, and a wealth of other information are avail-
business and government. able on the Web at www.stanleyfoundation.org.

The Stanley Foundation The Stanley Foundation encourages use of this


report for educational purposes. Any part of the
The Stanley Foundation is a nonpartisan, private
material may be duplicated with proper acknowl-
operating foundation that seeks a secure peace with
edgment. View this report online at reports.stanley
freedom and justice, built on world citizenship and
foundation.org.
effective global governance. It brings fresh voices
and original ideas to debates on global and region-
Production: Amy Bakke and Margo Schneider
al problems. The foundation advocates principled
multilateralism—an approach that emphasizes
The Stanley Foundation
working respectfully across differences to create
209 Iowa Avenue
fair, just, and lasting solutions.
Muscatine, IA 52761 USA
563-264-1500
The Stanley Foundation’s work recognizes the essen-
563-264-0864 fax
tial roles of the policy community, media profession-
info@stanleyfoundation.org
als, and the involved public in building sustainable

The Stanley Foundation Nonprofit Org.


209 Iowa Avenue US POSTAGE
Muscatine, IA 52761 USA PAID
Cedar Rapids, IA
Permit 174
Address Service Requested

Printed on
recycled paper
4/07

Das könnte Ihnen auch gefallen