{"title":"Caught Red-Handed: How States Wield Proof to Coerce Wrongdoers","authors":"Cullen G. Nutt, Reid B C Pauly","doi":"10.1162/isec_a_00421","DOIUrl":null,"url":null,"abstract":"Abstract States frequently acquire proof of other states' norm violations, from nuclear proliferation to harboring terrorists to interfering in elections. Existing theories do not fully explain how states that catch others red-handed wield a form of coercive power over the wrongdoers. Discoverers may conceal proof of wrongdoing, share such proof with other actors privately, or reveal their proof to the world. States with more leverage over wrongdoers have two incentives to conceal proof of wrongdoing. They can blackmail wrongdoers by threatening to go public with proof of their guilt, and they can simultaneously allow wrongdoers to save face. States that possess proof of wrongdoing but have less leverage are more likely to share that proof with others. If a discoverer distrusts the intentions of states with more leverage, it will reveal evidence publicly, catalyzing others to act. Publicizing proof weaponizes the prospect that other states will pay reputation and hypocrisy costs if they do not follow through on punishing norm violations. Four case studies of nuclear proliferation (Taiwan, Libya, South Africa, and North Korea) probe this novel theory.","PeriodicalId":48667,"journal":{"name":"International Security","volume":"1 1","pages":"7-50"},"PeriodicalIF":4.8000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Security","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.1162/isec_a_00421","RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
引用次数: 4
Abstract
Abstract States frequently acquire proof of other states' norm violations, from nuclear proliferation to harboring terrorists to interfering in elections. Existing theories do not fully explain how states that catch others red-handed wield a form of coercive power over the wrongdoers. Discoverers may conceal proof of wrongdoing, share such proof with other actors privately, or reveal their proof to the world. States with more leverage over wrongdoers have two incentives to conceal proof of wrongdoing. They can blackmail wrongdoers by threatening to go public with proof of their guilt, and they can simultaneously allow wrongdoers to save face. States that possess proof of wrongdoing but have less leverage are more likely to share that proof with others. If a discoverer distrusts the intentions of states with more leverage, it will reveal evidence publicly, catalyzing others to act. Publicizing proof weaponizes the prospect that other states will pay reputation and hypocrisy costs if they do not follow through on punishing norm violations. Four case studies of nuclear proliferation (Taiwan, Libya, South Africa, and North Korea) probe this novel theory.
期刊介绍:
International Security publishes lucid, well-documented essays on the full range of contemporary security issues. Its articles address traditional topics of war and peace, as well as more recent dimensions of security, including environmental, demographic, and humanitarian issues, transnational networks, and emerging technologies.
International Security has defined the debate on US national security policy and set the agenda for scholarship on international security affairs for more than forty years. The journal values scholarship that challenges the conventional wisdom, examines policy, engages theory, illuminates history, and discovers new trends.
Readers of IS discover new developments in:
The causes and prevention of war
U.S.-China relations
Great power politics
Ethnic conflict and intra-state war
Terrorism and insurgency
Regional security in Africa, Asia, Europe, and Latin America
U.S. foreign and defense policy
International relations theory
Diplomatic and military history
Cybersecurity and defense technology
Political economy, business, and security
Nuclear proliferation.