7–50

Prediction and Judgment: Why Artificial Intelligence Increases the Importance of Humans in War

Avi Goldfarb, University of Toronto, and Jon R. Lindsay, Georgia Institute of Technology

Recent scholarship on artificial intelligence (AI) and international security focuses on the political and ethical consequences of replacing human warriors with machines. Yet AI is not a simple substitute for human decision-making. The advances in commercial machine learning that are reducing the costs of statistical prediction are simultaneously increasing the value of data (which enable prediction) and judgment (which determines why prediction matters). But these key complements—quality data and clear judgment—may not be present, or present to the same degree, in the uncertain and conflictual business of war. This has two important strategic implications. First, military organizations that adopt AI will tend to become more complex to accommodate the challenges of data and judgment across a variety of decision-making tasks. Second, data and judgment will tend to become attractive targets in strategic competition. As a result, conflicts involving AI complements are likely to unfold very differently than visions of AI substitution would suggest. Rather than rapid robotic wars and decisive shifts in military power, AI-enabled conflict will likely involve significant uncertainty, organizational friction, and chronic controversy. Greater military reliance on AI will therefore make the human element in war even more important, not less.

51–86

Defending the United States: Rethinking National Missile Defense against North Korea

Jaganath Sankaran, University of Texas, Austin, and Steve Fetter, University of Maryland, College Park

North Korea has made significant strides in its attempt to acquire a strategic nuclear deterrent. In 2017, it tested intercontinental ballistic missiles (ICBMs) and completed a series of nuclear test explosions. These may provide North Korea with the technical foundation to deploy a nuclear-armed ICBM capable of striking the United States. The Ground-based Midcourse Defense (GMD) missile defense system is intended to deter North Korean nuclear coercion and, if deterrence fails, to defeat a limited North Korean attack. Despite two decades of dedicated and costly efforts, however, the GMD system remains unproven and unreliable. It has not demonstrated an ability to defeat the relatively simple and inexpensive countermeasures that North Korea can field. The GMD system has suffered persistent delays, substantial cost increases, and repeated program failures because of the politically motivated rush to deploy in the 1990s. But GMD and other U.S. missile defense efforts have provoked serious concerns in Russia and China, who fear it may threaten their nuclear deterrents. Diplomacy and deterrence may reassure Russia and China while constraining North Korea’s nuclear program. An alternate airborne boost-phase intercept system may offer meaningful defense against North Korean missiles without threatening the Russian or Chinese deterrents.

87–127

Insurgent Armies: Military Obedience and State Formation after Rebel Victory

Philip A. Martin, George Mason University

Why do some winning rebel groups build obedient and effective state militaries after civil war, while others suffer military defections? When winning rebels face intense security threats during civil wars, rebel field commanders are more likely to remain obedient during war-to-peace transitions. Intense security threats incentivize militants to create more inclusive leadership structures, reducing field commanders’ incentives to defect in the postwar period. Intense security threats also reduce commanders’ capacity for postwar resistance by forcing insurgents to remain mobile and adopt shorter time horizons in rebel-governed territory, reducing the likelihood that field commanders will develop local ties and independent support bases. The plausibility of the argument is examined using a new list of winning rebel groups since 1946. Two case studies—Zimbabwe and Côte d’Ivoire—probe the causal mechanisms of the theory. The study contributes to debates about the consequences of military victory in civil war, the postwar trajectories of armed groups, and the conditions necessary for civil-military cohesion in fragile states.

128–162

Assessing China-U.S. Inadvertent Nuclear Escalation

Wu Riqiang, Renmin University of China

China-U.S. inadvertent escalation has been a focus of recent international relations literature. The current debate, however, has not paid sufficient attention to two important factors: the survivability of China’s nuclear forces under unintentional conventional attacks; and China’s nuclear command, control, and communication (NC3) system. Based on detailed analysis of these two variables, three potential mechanisms of China-U.S. inadvertent escalation are examined: use-it-or-lose-it, unauthorized/accidental, and damage-limitation. Although the possibility of a major China-U.S. conventional war inadvertently escalating to a nuclear level cannot be excluded, the risk is extremely low. China’s nuclear forces would survive U.S. inadvertent conventional attacks and, thus, are unlikely to be significantly undermined. Even though China’s NC3 system might be degraded during a conventional war with the United States, Chinese leadership would likely maintain minimum emergency communications with its nuclear forces. Moreover, China’s NC3 system is highly centralized, and it prioritizes “negative control,” which can help to prevent escalation. China’s nuclear retaliatory capability, although limited, could impede U.S. damage-limitation strikes to some extent. To keep the risk of inadvertent escalation low, both sides must take appropriate precautions and exercise self-restraint in their planning and operations.

163–204

A Farewell to Arms? Election Results and Lasting Peace after Civil War

Sarah Zukerman Daly, Columbia University

Why does fighting recur after some civil conflicts, whereas peace consolidates following others? The untested conventional wisdom is that—absent safeguards—postwar elections are dangerous for peace because electoral losers will reject the election results and remilitarize. New cross-national data on postwar election results and belligerent-level data on remilitarization contest this view. Citizens tend to elect peace because they engage in “security voting”; they elect the party that they deem best able to secure the state, using the war outcome as the heuristic that guides their security vote. Findings indicate that the chance of renewed war increases if there is an inversion in the military balance of power after war, and the war-loser performs poorly in the elections. If, instead, relative military power remains stable, or citizens accurately update their understandings of the postwar power balance, a civil war actor is unlikely to remilitarize if it loses the election. Knowing when and how these belligerent electoral actors choose to either sustain or break the peace informs important theoretical and policy debates on how to harness democracy’s benefits while mitigating its risks.

International Security is a peer-reviewed quarterly journal edited at the Harvard Kennedy School’s Belfer Center for Science and International Affairs and published by The MIT Press. The journal offers a combination of professional and policy-relevant articles that strives to contribute to the analysis of contemporary, historical, and theoretical questions in security studies. International Security welcomes submissions on all aspects of security affairs and aims to provide timely analyses of contemporary security issues through contributions that reflect diverse points of view and varied professional experiences.

The articles published in the journal are first circulated for doubly blind external review. To facilitate review, we ask authors to please submit their manuscripts with a cover letter and an abstract of 150–200 words online via Editorial Manager at https://www.editorialmanager.com/isec. Authors should refrain from identifying themselves in their manuscripts. A length of 10,000-15,000 words is appropriate, but the journal will consider and publish longer manuscripts. Authors of manuscripts with more than 18,000 words should consult the journal’s editors before submission.

For a fuller explanation of the submission guidelines and the review process, current contents, a cumulative index, and other useful information, please visit the journal’s website at https://www.belfercenter.org/IS. For information on subscriptions, permissions, and other details, visit the MIT Press International Security website at https://direct.mit.edu/isec. For more information on the Belfer Center for Science and International Affairs, the editorial headquarters of International Security, go to https://www.belfercenter.org/.