Coercion: The Power To Hurt in International Politics 1st Edition Kelly M. Greenhill Download
Coercion: The Power To Hurt in International Politics 1st Edition Kelly M. Greenhill Download
https://textbookfull.com/product/coercion-the-power-to-hurt-in-
international-politics-1st-edition-kelly-m-greenhill/
https://textbookfull.com/product/coercion-in-community-mental-
health-care-international-perspectives-1st-edition-andrew-
molodynski/
https://textbookfull.com/product/tweeting-to-power-the-social-
media-revolution-in-american-politics-1st-edition-jason-gainous/
https://textbookfull.com/product/rough-justice-the-international-
criminal-court-in-a-world-of-power-politics-1st-edition-david-
bosco/
https://textbookfull.com/product/curve-ball-an-m-m-hurt-comfort-
sports-romance-homeruns-book-2-1st-edition-quinn-ward-ward/
Liberty Power Antislavery Third Parties and the
Transformation of American Politics 1st Edition Corey
M. Brooks
https://textbookfull.com/product/liberty-power-antislavery-third-
parties-and-the-transformation-of-american-politics-1st-edition-
corey-m-brooks/
https://textbookfull.com/product/management-vs-employees-how-
leaders-can-bridge-the-power-gaps-that-hurt-corporate-
performance-1st-edition-hayes-drumwright/
https://textbookfull.com/product/neoclassical-realist-theory-of-
international-politics-1st-edition-norrin-m-ripsman/
https://textbookfull.com/product/pioneers-in-forensic-science-
innovations-and-issues-in-practice-1st-edition-kelly-m-pyrek/
https://textbookfull.com/product/the-politics-of-genetically-
modified-organisms-in-the-united-states-and-europe-1st-edition-
kelly-a-clancy-auth/
Coercion
Coercion
The Power to Hurt in International
Politics
Peter Krause
1
1
Oxford University Press is a department of the University of Oxford. It furthers
the University’s objective of excellence in research, scholarship, and education
by publishing worldwide. Oxford is a registered trade mark of Oxford University
Press in the UK and certain other countries.
9 8 7 6 5 4 3 2 1
Paperback printed by WebCom, Inc., Canada
Hardback printed by Bridgeport National Bindery, Inc., United States of America
CONTENTS
Acknowledgments vii
List of Contributors ix
Introduction xi
Kelly M. Greenhill and Peter Krause
Conclusion 331
Kelly M. Greenhill and Peter Krause
Index 349
vi | Contents
ACKNOWLEDGMENTS
T his book grew from a shared realization that the foundational scholar-
ship on coercion that we regularly read, taught, and utilized was no longer
adequate to explain much of the behavior we observed in the world around us.
From forced migration in the Middle East and North Africa to cyber threats
from Russia (and targeted sanctions on Russia), and from drone strikes in
South Asia to terrorist attacks across the globe, understanding contemporary
coercive dynamics clearly requires an expansion of our analytical toolbox to
include new concepts, theories, and analyses. We are enormously gratified to
be joined in this endeavor by a diverse array of experts who offer innovative
and penetrating contributions on a diverse array of coercive tools, actors, and
environments. Our editor, David McBride of Oxford University Press, offered
enthusiastic encouragement from the outset, and his and the external review-
ers’ sharp insights helped shape the final product into a more cohesive and
powerful book.
We thank the faculty and researchers of the MIT Security Studies Program,
where we first rigorously studied coercion and learned to appreciate its myriad
shades and manifestations. Kelly M. Greenhill further thanks Tufts University
and the International Security Program (ISP) at Harvard University’s Belfer
Center for their intellectual and financial support of her research and, in the
case of ISP, for its support of the Conflict, Security and Public Policy Working
Group, out of which a number of contributions to this volume grew. She also
thanks her besheryt for providing inimitable daily reminders that effective
persuasion and influence also come in noncoercive packages. Peter Krause
would like to thank all members of his research team, the Project on National
Movements and Political Violence, especially Eleanor Hildebrandt. He also
thanks his colleagues and administrators at Boston College, who provided aca-
demic and financial support for this volume. Finally, he thanks his parents and
sisters who, in addition to a great deal of love, gave him his very first lessons in
the causes, strategies, and effectiveness of coercion.
CONTRIBUTORS
Phil M. Haun is Professor and Dean of Academics at the US Naval War College.
Jon R. Lindsay is Assistant Professor of Digital Media and Global Affairs at the
University of Toronto’s Munk School of Global Affairs.
x | Contributors
INTRODUCTION
Coercion: A Primer
The volume opens with an introductory essay by Robert J. Art and Kelly M.
Greenhill that lays the groundwork for the chapters that follow by offering
an analytical overview of the state of the art in the study of coercion. Their
chapter is loosely organized around the three key questions that motivate this
volume. Art and Greenhill systematically interrogate the premises that under-
gird our assumptions about coercion and explore issues of continuity, change,
and innovation in our understanding of coercion in the twenty-first century.
In addition to identifying foundational insights from the traditional (state-to-
state, Cold War–focused) coercion literature, the authors also highlight more
recent, post–Cold War contributions as well as particular questions and hereto-
fore underexplored topics examined by the contributors to this volume.
xii | Introduction
In chapter 2, Austin Long extends Art and Greenhill’s discussion of coer-
cion by analyzing its understudied yet integral connections with intelligence.
Drawing upon evidence from Iraq to illustrate his key propositions, Long
identifies three central ways in which intelligence and coercion are inextri-
cably linked. First, intelligence provides a coercer with an understanding of
a target’s values, resolve, and capabilities, and thus the capacity to evaluate
whether coercion is feasible. Second, intelligence effectively directs the tools of
coercion—whether military force or economic sanctions—at specific elements
of a target’s political, economic, or military assets. Third, intelligence provides
a discrete mechanism of influence—covert action—that lies between the overt
use of military force and other nonviolent mechanisms of coercion. In addition
to highlighting the underappreciated role of intelligence, Long sets the stage
for subsequent contributions that focus on the importance of information in
effecting successful coercion.
Introduction | xiii
own behavior in response to target concessions, strong states provide (weaker)
targets no incentive to sustainably modify their behavior, leading to coercion
failure, even by the most powerful of states. In such cases, states may accept
coercion failure as the price for an ongoing, successful containment strategy.
In chapter 5, Alexander B. Downes explores the puzzle of why compel-
lent threats that demand foreign leaders concede power seem to succeed so
often. Drawing upon data from the Militarized Compellent Threat (MCT) data
set, Downes argues that demands for regime change succeed so often (about
80 percent of the time) because, historically, such threats have largely been
made against highly vulnerable targets, namely when the coercer possesses
crushing material superiority, is geographically proximate to the target, and
the target is diplomatically isolated. However, Downes cautions that before
one concludes that regime change is easy, one should keep in mind that the
conditions that made regime change successful in the past are not features
of most recent attempts to persuade foreign leaders to step down. Thus in an
era in which leaders have grown more willing to issue such demands, they
have grown correspondingly less likely to engender the desired response and
coercive success.
xiv | Introduction
makes nonstate coercion by national movements and insurgencies succeed
or fail. The balance of power within a movement drives its outcome, Krause
contends, and groups’ positions within that balance of power drive their behav-
ior. Although all groups prioritize their organizational strength and survival,
hegemonic groups that dominate their movements are more likely to pursue
the shared strategic objective of regime change and statehood because victory
moves them from the head of a movement to the head of a new state. The hege-
monic group’s dominance enables its movement to successfully coerce the
enemy regime by delivering a single clear, credible message about its objective,
threats, and guarantees that is backed by a cohesive strategy. Krause demon-
strates the viability of his generalizable argument with a longitudinal analysis
of the Eritrean national movement and its decades-long insurgency against the
Ethiopian government from 1960 to Eritrean independence in 1993.
In chapter 8, James Igoe Walsh evaluates the efficacy of drones as instru-
ments of deterrence and compellence, especially in the context of counter-
insurgency operations. Drawing upon evidence from a variety of theaters,
including Pakistan, Afghanistan, and Iraq, Walsh argues that the use of drones
can be a double-edged sword. On one hand, they offer noteworthy technologi-
cal, force-protection-related, and collateral-damage-limiting advantages. On
the other hand, the employment of drones often also catalyzes retaliatory and
signaling counterattacks by insurgents and other VNSAs, which can in turn
exercise deleterious effects on counterintelligence campaigns and undermine
efforts at coercion.
Introduction | xv
potential for deception expand opportunities to inflict minor harms, even as
the prospect of retaliation and imperatives to maintain future connectivity
limit the political attractiveness of major harms.
In chapter 10, Kelly M. Greenhill explains how, why, and under what con-
ditions (the threat of) unleashing large-scale movements of people can be
used as an effective instrument of state-level coercion. This unconventional
yet relatively common coercion-by-punishment strategy has been used by both
state and nonstate actors as a tool of both deterrence and compellence. After
outlining the precepts of the theory, Greenhill illustrates this unconventional
instrument in action with a longitudinal study of its serial use by the former
Libyan dictator Muammar Gaddafi against the EU, from 2004 until his deposi-
tion in 2011. The chapter concludes with a discussion of theoretical and policy
implications, observations about how this tool appears to be used increasingly
as an alternative to or complement of military force, and what such develop-
ments might portend both for the future and for its real victims, the displaced
themselves.
Timothy W. Crawford further expands our understanding of the dynam-
ics of coercion in chapter 11 with the introduction of the concept of “coercive
isolation.” Coercive isolation refers to an oft employed but undertheorized
nonmilitary instrument of coercive diplomacy that relies on manipulation and
exploitation of shifts in a target state’s alignments and alliances to influence
its cost-benefit calculations and, by extension, the probability of coercive suc-
cess. After presenting the theory of coercive isolation and the logic that under-
girds it, Crawford offers a plausibility probe of six historical cases, from before
World War I through the end of the Cold War, that illustrate the logic of the
model and its key propositions. The chapter concludes with a discussion of
contemporary theoretical and policy implications of the role played by coercive
isolation in diplomacy in the post-post–Cold War world.
In chapter 12, Daniel W. Drezner examines the state of the literature on the
coercive power of economic sanctions, with a particular emphasis on the use
of targeted sanctions. Drezner argues that the development of smart sanctions
has solved many of the political problems that prior efforts at comprehensive
trade sanctions created. In many ways, these sanctions are, as advertised,
“smarter,” but there is no systematic evidence that smart sanctions yield bet-
ter policy results vis-à-vis the targeted country. When smart sanctions work,
they work because they impose significant costs on the target economy. It
would behoove policymakers and scholars to look beyond the targeted sanc-
tions framework to examine the conditions under which different kinds of
economic statecraft should be deployed.
In chapter 13, Jonathan N. Markowitz asks why some states coercively com-
pete militarily over the governance and distribution of natural resources, while
others favor reliance on market mechanisms. In this hypothesis-generating
contribution, Markowitz argues that the choices states make lie in their domes-
tic political institutions and economic interests, which in turn determine their
foreign policy interests. Specifically, he posits that the more economically
xvi | Introduction
dependent on resource rents states are and the more autocratic their political
institutions, the stronger their preference to seek direct control over stocks
of resources. Conversely, the less economically dependent on resource rents
states are and the more democratic their political institutions, the weaker their
preference to directly control stocks of resources. He presents and demon-
strates the viability of his argument using a combination of deductive theoriz-
ing and historical analysis of recent jockeying over control of maritime seabed
resources in the East and South China Sea, Arctic, and Eastern Mediterranean.
Conclusion
The concluding chapter by Greenhill and Krause underscores the volume’s
key findings and their theoretical import, identifies policy implications and
prescriptions highlighted by the contributions to the volume, and points to
unanswered questions and directions for further research.
Introduction | xvii
Suggested Ways to Use This Volume
xviii | Introduction
dynamics of multilateral and multilevel coercion (Crawford, Drezner, Fraiman,
Greenhill, and Krause). Finally, in addition to being an effective stand-alone
overview of coercion, Art and Greenhill’s introductory essay can be usefully
assigned with any and all of the aforementioned units as a bridge from Cold
War precepts to twenty-first-century applications.
In sum, Coercion combines classic tenets with contemporary innovations
and applications. It is intended to connect and synergize scholarship on a
broad array of exciting and timely topics and, in the process, help reinvigorate
a crucial subfield of security studies and foreign policy. The volume has been
designed to appeal to scholars, practitioners, and instructors who engage with
coercion and foreign policy generally and with diplomacy, terrorism, sanc-
tions, protest, refugees, nongovernmental organizations, and proliferation
more specifically.
Introduction | xix
PART I Coercion
A Primer
chapter 1 Coercion
An Analytical Overview
Robert J. Art and Kelly M. Greenhill
Just as the Cold war spawned a great deal of scholarly study about deterrence,
so too has the unipolar era spawned a great deal of study of compellence.1 The
Cold War featured a nuclear standoff between two superpowers, one in which
the survival of both countries was thought to be at stake. It is not surprising
that deterrence of war, the avoidance of escalatory crises, and the control of
escalation were paramount in the minds of academic strategists and political-
military practitioners during this period. The bulk of the innovative theoretical
work on deterrence, especially nuclear deterrence, was produced from the late
1940s through the mid-1960s. Most of the creative works during the subse-
quent years were, and continue to be, refinements of and elaborations on those
foundations.2
With the advent of the unipolar era, the United States found itself freed
from the restraints on action imposed by another superpower and began more
than two decades of issuing military threats against or launching conventional
military interventions into smaller countries, or both: Iraq (1990–91), Somalia
(1992–93), Haiti (1994), North Korea (1994), Bosnia (1995), Kosovo and Serbia
(1998–99), Afghanistan (2001), Iraq again (2003–11), Libya (2011), Syria (2014–),
and Iraq yet again (2015–). Unsurprisingly, strategists and practitioners dur-
ing the unipolar era became focused on various forms of compellence—
compellent threats, coercive diplomacy, and the limited and demonstrative
uses of force—and especially on the reasons those forms of compellence, when
employed by the United States, more often than not failed and subsequently
1
We thank Victoria McGroary for invaluable research assistance.
2
For an excellent overview of the state of knowledge about deterrence through the 1970s, see Robert
Jervis, “Deterrence Theory Revisited,” World Politics 31 (1979): 289–324. For a representative view
of the nature of deterrence today, see Patrick M. Morgan, “The State of Deterrence in International
Politics Today,” Contemporary Security Policy 33 (2012): 85–107.
required more robust military action for the United States to prevail. As a con-
sequence of the unipolar era’s change of focus, the literature on compellence
burgeoned.3
More recently, and particularly in the aftermath of the game-changing ter-
rorist attacks on September 11, 2001, there has also been a heightened focus on
nonstate actors (NSAs). Academic works have focused on how NSAs employ
coercion against states and against other NSAs (see, for instance, chapter 7);
how states can most effectively deter and compel NSAs (and how such strat-
egies may differ from coercion wielded by states; see chapter 6); and how
NSAs attempt to compensate for their relative weaknesses through the use of
asymmetric means (see chapters 8–10). In this period, there has been a nearly
simultaneous increase in the nuance and breadth of scholarship that examines
how coercion works when using tools other than (or in addition to) traditional
military force and by actors other than the unipole. Such tools include targeted
sanctions (see chapter 12), cyber weapons (see chapter 9), migration or demo-
graphic bombing (see chapter 10), and drones (see chapter 8). There has also
been a growth in research that examines how coercive tools in one domain (for
instance, cyber) can be used to influence outcomes in another (for instance,
military capabilities), which Erik Gartzke and Jon Lindsay refer to as cross-
domain coercion.4
While not providing a comprehensive review of all the theoretical and
empirical scholarship on deterrence and compellence to date, this chapter does
highlight the big findings about coercion, and by extension the big gaps in our
understanding of it, as well as summarizes the contributions that the essays in
this volume make to our understanding of coercion. The chapter proceeds as
follows: Part one briefly defines coercion to include both deterrence and com-
pellence, and shows why it can be hard to distinguish between the two in prac-
tice. Part two highlights salient points about deterrence, distinguishes among
four types of deterrence, and discusses why deterrence can fail. Part three out-
lines the key contributions to our understanding of compellence that the past
three decades of scholarship have revealed. Finally, Part four concludes with
two sets of propositions about coercion—one that summarizes the state of our
current collective knowledge and one that highlights new contributions prof-
fered in this volume.
Coercion
Coercion is the ability to get an actor—a state, the leader of a state, a terror-
ist group, a transnational or international organization, a private actor—to do
something it does not want to do. Coercion between states, between states
and nonstate actors, or between nonstate actors is exercised through threats or
3
For a partial list of works on compellence, see note 18.
4
Erik Gartzke and Jon Lindsay, eds., Cross-Domain Deterrence, unpublished manuscript.
4 | Coercion: A Primer
through actions, or both, and usually, but not always, involves military threats
or military actions. Threats can be implicit or explicit. Coercive action may
also utilize positive inducements. Offering such inducements may increase
chances of success, but coercion is not coercion if it consists solely of induce-
ments. Coercion always involves some cost or pain to the target or explicit
threats thereof, with the implied threat to increase the cost or pain if the target
does not concede.
Is It Deterrence or Compellence?
Defining the analytical distinction between deterrence and compellence is
easy; applying the distinction in practice can be more difficult, for two rea-
sons. First, in confrontational situations, there is the eye-of-the-beholder prob-
lem; second, particularly during crises, the deterrer may resort to compellent
actions to shore up its deterrent posture.
5
Thomas Schelling coined the term compellence. See Thomas C. Schelling, Arms and Influence (New
Haven, CT: Yale University Press, 1966), 71.
P. 86. Answer.
This is of course by Richard Parkes, as is noted in the first edition (p.
59; 1604, no. 7). “1604 A” is twice an error for “1604 P.”
P. 89. Colmore, l. 3.
For Saactpavl read Sanctpavl.
P. 95. Smith, l. 5.
For 1684. S. read 1617 S.
1614.
P. 95. Benefield.
The date of the imprint should be 1614, not 1613.
P. 99. Rainolds, l. 8.
For Pica English read Pica Roman.
1615.
P. 111. Flavel, l. 9.
For Long Primer English read Long Primer Roman.
1620.
P. 115. Burton.
An edition of the Anatomy of Melancholy has been issued in 1893, in
which the editor claims to have verified most of Burton’s quotations.
See also 1640 F (Ferrand).
1622.
P. 118. Oxford.
The date of the book (1622) has been accidentally omitted.
P. 118. Rawlinson, l. 4.
For 1662 read 16212.
1623.
P. 119. Panke.
The words “See 1613 P” are a reference to 1613 in this Supplement.
1625.
P. 123. Carpenter, l. 7.
For Water read Water.
P. 126. Pemble.
A reference to the 2nd edition, 1629, should have been inserted.
1628.
P. 150. Hakewill, l. 2.
For PER=|PETVALL read PER=|PETUALL.
P. 151. Pemble, l. 6.
For Impr. 84 b read Impr. 84 a.
P. 151. Insert:—
Stanley, Henry. [device] | APPENDIX | AD LIBROS OMNES TAM
| VETERIS QVAM NOVI TESTAMENTI. | HENRICUS [device] STANLEY |
OXONIÆ. | M.DC.XXX. |
P. 155. Felix, l. 1.
For Felıx read Felix.
P. 168. Gerhardus, l. 5.
For Long Primer English read Long Primer Roman.
P. 183. Chaucer, l. 6.
In English Roman Italic the word Roman is superfluous.
P. 189. Carpenter.
At the end of the technical description a ] should be added.
P. 194. Prideaux, l. 5.
For 40o P. 50 Th. read 4o P. 50 Th.
1637.
P. 197. Cowper.
The date of the imprint (1637) is accidentally omitted.
P. 212. Dugres.
The date of the imprint (1639) is accidentally omitted.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com