Jump to ContentJump to Main Navigation
Cross-Domain DeterrenceStrategy in an Era of Complexity$
Users without a subscription are not able to see the full content.

Eric Gartzke and Jon R. Lindsay

Print publication date: 2019

Print ISBN-13: 9780190908645

Published to Oxford Scholarship Online: July 2019

DOI: 10.1093/oso/9780190908645.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (oxford.universitypressscholarship.com). (c) Copyright Oxford University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 18 June 2021

Cross-Domain Deterrence in American Foreign Policy

Cross-Domain Deterrence in American Foreign Policy

(p.27) 2 Cross-Domain Deterrence in American Foreign Policy
Cross-Domain Deterrence

Michael Nacht

Patricia Schuster

Eva C. Uribe

Oxford University Press

This chapter assesses the role of cross-domain deterrence in recent American foreign policy. Cross-domain deterrence is not a new phenomenon, even if our consciousness of it may be. Prominent cases from the Cold War, such as the Korean War and the Cuban Missile Crisis, can be interpreted through the lens of cross-domain deterrence and fruitfully compared with more contemporary cases, such as the Stuxnet attack on Iran. These cases illustrate the variation across domains by the adversary and U.S. responses. Considered together, the United States generally responded to these crises by initially limiting itself to the domain where a crisis started and only later expanding into other domains. The United States has typically been cautious when shifting domains and has tried to escalate in ways that would not produce adversarial retaliation.

Keywords:   deterrence, cross-domain deterrence, U.S. foreign policy, national security, Cold War history, national security policy

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .