Hostname: page-component-848d4c4894-wzw2p Total loading time: 0 Render date: 2024-05-30T20:50:55.244Z Has data issue: false hasContentIssue false

Costly Concealment: Secret Foreign Policymaking, Transparency, and Credible Reassurance

Published online by Cambridge University Press:  12 October 2022

Brandon K. Yoder*
Affiliation:
Lecturer (Assistant Professor), School of Politics and International Relations, Australian National University, Canberra, AUS
William Spaniel
Affiliation:
Associate Professor, Department of Political Science, University of Pittsburgh, PA, USA
*
*Corresponding author. Email: brandon.k.yoder@gmail.com
Get access

Abstract

This article presents a formal model that shows how states can credibly reassure each other simply by maintaining a cooperative outward narrative. The reassurance literature to date has focused largely on costly signaling, whereby benign states must distinguish themselves by taking specific actions that hostile types would not. The mere lack of overtly expressed hostility without costly signals has been considered “cheap talk,” on the assumption that this behavior is costless for hostile states and thus uninformative. In contrast, this paper argues that maintaining a cooperative façade while secretly formulating and executing exploitative policies carries inherent trade-offs, and thus constitutes a credible reassurance signal. Foreign policy planning and implementation requires communication among various individuals, groups, and organizations, which has some probability of being observed and punished by outside actors. Yet efforts to conceal the policymaking process and reduce this probability are costly—they require investments in internal monitoring and restrictions on internal communication that can substantially degrade policy outcomes. Thus, to the extent that a state's foreign policymaking process is transparent—that is, that concealing internal communications is difficult—the absence of positive signals of hostility is a credible signal of its benign intentions. The argument is illustrated with a case study of German reassurance signals during the July Crisis preceding World War I.

Type
Research Article
Copyright
Copyright © The Author(s), 2022. Published by Cambridge University Press on behalf of The IO Foundation

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Albertini, Luigi. 1952. The Origins of the War of 1914 (3 vols). Edited and translated by Massey, Isabelle M.. Oxford University Press.Google Scholar
Bas, Muhammet. 2012. Democratic Inefficiency? Regime Type and Suboptimal Choices in International Politics. Journal of Conflict Resolution 56 (5):799824.CrossRefGoogle Scholar
Baum, Matthew, and Potter, Philip B.K.. 2015. War and Democratic Constraint: How the Public Influences Foreign Policy. Princeton University Press.Google Scholar
Bell, Sam R. 2013. What You Don't Know Can Hurt You: Information, External Transparency, and Interstate Conflict, 1982–1999. Conflict Management and Peace Science 30 (5):452–68.CrossRefGoogle Scholar
Byrne, Malcolm. 2014. Iran-Contra: Reagan's Scandal and the Unchecked Abuse of Presidential Power. University Press of Kansas.Google Scholar
Carson, Austin. 2018. Secret Wars: Covert Conflict in International Politics. Princeton University Press.Google Scholar
Carson, Austin, and Yarhi-Milo, Keren. 2017. Covert Communication: The Intelligibility and Credibility of Signaling in Secret. Security Studies 26 (1):124–56.CrossRefGoogle Scholar
Committee, Church. 1975. Alleged Assassination Plots Involving Foreign Leaders. US Government Printing Office.Google Scholar
Coe, Andrew, and Vaynman, Jane. 2020. Why Arms Control Is So Rare. American Political Science Review 114 (2):342–55.CrossRefGoogle Scholar
Colaresi, Michael. 2014. Democracy Declassified: The Secrecy Dilemma in National Security. Oxford University Press.CrossRefGoogle Scholar
Copeland, Dale C. 2000. The Origins of Major War. Cornell University Press.Google Scholar
Debs, Alexandre, and Monteiro, Nuno P.. 2014. Known Unknowns: Power Shifts, Uncertainty, and War. International Organization 68 (1):131.CrossRefGoogle Scholar
Ekstein, Michael. 1972. Some Notes on Sir Edward Grey's Policy in July 1914. Historical Journal 15 (2):321–24.CrossRefGoogle Scholar
Fearon, James D. 1994. Domestic Political Audiences and the Escalation of International Disputes. American Political Science Review 88 (3):577–92.CrossRefGoogle Scholar
Fellner, Fritz. 1995. Austria-Hungary. In Decisions for War, 1914, edited by Wilson, Keith, 926. St. Martin's.Google Scholar
Finel, Bernard, and Lord, Kristin. 1999. The Surprising Logic of Transparency. International Studies Quarterly 43 (2):325–39.CrossRefGoogle Scholar
Fischer, Fritz. 1975. War of Illusions. Norton.Google Scholar
Florini, Ann. 1998. The End of Secrecy. In Power and Conflict in the Age of Transparency, edited by Finel, Bernard and Lord, Kristen, 1328. Palgrave-Macmillan.Google Scholar
Gaddis, John Lewis. 1972. The United States and the Origins of the Cold War: 1941–1947. Columbia University Press.Google Scholar
Geiss, Imanuel. 1965. July 1914: Selected Documents. Batsford.Google Scholar
Glaser, Charles L. 2010. Rational Theory of International Politics: The Logic of Competition and Cooperation. Princeton University Press.CrossRefGoogle Scholar
Goddard, Stacie. 2015. The Rhetoric of Appeasement: Hitler's Legitimation and British Foreign Policy, 1938–39. Security Studies 24 (1):95130.CrossRefGoogle Scholar
Gooch, G.P., and Temperley, Harold, eds. 1926. British Documents on the Origins of the War, vol. 11. His Majesty's Stationery Office.Google Scholar
Guisinger, Alexandra, and Smith, Alastair. 2002. Honest Threats: The Interaction of Reputation and Political Institutions in International Crises. Journal of Conflict Resolution 46 (2):175200.CrossRefGoogle Scholar
Haynes, Kyle. 2019. A Question of Costliness: Time Horizons and Interstate Signaling. Journal of Conflict Resolution 63 (8):1939–64.CrossRefGoogle Scholar
Jarausch, Konrad. 1969. The Illusion of Limited War: Chancellor Bethmann-Hollweg's Calculated Risk. Central European History 2 (1):4876.CrossRefGoogle Scholar
Jervis, Robert. 1978. Cooperation Under the Security Dilemma. World Politics 30 (2):167214.CrossRefGoogle Scholar
Jervis, Robert. 2010. Reports, Politics, and Intelligence Failures: The Case of Iraq. Journal of Strategic Studies 29 (1):352.CrossRefGoogle Scholar
Johnston, Alastair Iain. 2001. Treating International Institutions as Social Environments. International Studies Quarterly 45 (4):487515.CrossRefGoogle Scholar
Joseph, Michael F. 2020. A Little Bit of Cheap Talk Is a Dangerous Thing: States Can Communicate Intentions Persuasively and Raise the Risk of War. Journal of Politics 83 (1):166–81.CrossRefGoogle Scholar
Joseph, Michael F., and Poznansky, Michael. 2018. Media Technology, Covert Action, and the Politics of Exposure. Journal of Peace Research 55 (3):320–35.CrossRefGoogle Scholar
Joseph, Michael F., Poznansky, Michael, and Spaniel, William. 2022. Shooting the Messenger: The Challenge of National Security Whistleblowing. Journal of Politics 84 (2):846–60.CrossRefGoogle Scholar
Kautsky, Karl, Montegalas, Max, and Schucking, Walther, eds. 1924. Die Deutschen Dokumente zum Kreigsausbruch [German documents on the outbreak of the World War]. Translated by the Carnegie Endowment for International Peace. Oxford University Press.Google Scholar
Kennedy, Paul. 1980. The Rise of the Anglo-German Antagonism, 1860–1914. Allen and Unwin.Google Scholar
Kurizaki, Shuhei. 2007. Efficient Secrecy: Public Versus Private Threats in Crisis Diplomacy. American Political Science Review 101 (3):543–58.CrossRefGoogle Scholar
Kydd, Andrew H. 1997. Sheep in Sheep's Clothing: Why Security Seekers Do Not Fight Each Other. Security Studies 7 (1):114–55.CrossRefGoogle Scholar
Kydd, Andrew H. 2005. Trust and Mistrust in International Relations. Princeton University Press.CrossRefGoogle Scholar
Lester, Genevieve. 2015. When Should State Secrets Stay Secret? Accountability, Democratic Governance, and Intelligence. Cambridge University Press.CrossRefGoogle Scholar
Levy, Jack. 1991. Preferences, Constraints, and Choices in July 1914. International Security 15 (3):151–86.CrossRefGoogle Scholar
Levy, Jack, and Vasquez, John. 2014. Introduction. In The Outbreak of the First World War: Structure, Politics, and Decision-Making, 329. Cambridge University Press.CrossRefGoogle Scholar
Lieven, Dominik. 1983. Russia and the Origins of the First World War. St. Martin's.CrossRefGoogle Scholar
Lieven, Dominik. 2015. Towards the Flame: Empire, War and the End of Tsarist Russia. Penguin.Google Scholar
Lindsey, David. 2015. Military Strategy, Private Information, and War. International Studies Quarterly 59 (4):629–40.Google Scholar
MacMillan, Margaret. 2006. Seize the Hour: When Nixon Met Mao. John Murrey.Google Scholar
Martin, Lisa. 2017. International Institutions: Weak Commitments and Costly Signals. International Theory 9 (3):353–80.CrossRefGoogle Scholar
Mawdsley, Evan. 2005. Thunder in the East: The Nazi-Soviet War 1941–1945. Bloomsbury.Google Scholar
May, Ernest, ed. 1984. Knowing One's Enemies: Intelligence Assessment Before the Two World Wars. Princeton University Press.Google Scholar
McManus, Roseanne W. 2017. Statements of Resolve: Achieving Coercive Credibility in International Conflict. Cambridge University Press.CrossRefGoogle Scholar
Mombauer, Annika. 2013. The Origins of the First World War: Diplomatic and Military Documents. Manchester University Press.CrossRefGoogle Scholar
Moravcsik, Andrew. 1997. Taking Preferences Seriously: A Liberal Theory of International Politics. International Organization 51 (4):513–53.CrossRefGoogle Scholar
O'Rourke, Lindsey. 2018. Covert Regime Change: America's Secret Cold War. Cornell University Press.Google Scholar
Otto, Jacob, and Spaniel, William. 2021. Doubling Down: The Danger of Disclosing Secret Action. International Studies Quarterly 65 (2):500–11.CrossRefGoogle Scholar
Parry, Robert, and Kornbluh, Peter. 1987. Iran-Contra's Untold Story. Foreign Policy 72:330.Google Scholar
Poznansky, Michael. 2020. In the Shadow of International Law: Covert Action in the Postwar World. Oxford University Press.CrossRefGoogle Scholar
Quek, Kai. 2021. Four Costly Signaling Mechanisms. American Political Science Review 115 (2):537–49.CrossRefGoogle Scholar
Ramsay, Kristopher. 2004. Politics at the Water's Edge: Crisis Bargaining and Electoral Competition. Journal of Conflict Resolution 48 (4):459–86.CrossRefGoogle Scholar
Ritter, Jeffrey. 2000. Know Thine Enemy: Information and Democratic Foreign Policy. In Power and Conflict in the Age of Transparency, edited by Finel, Bernard and Lord, Kristen, 83114. Palgrave-Macmillan.Google Scholar
Roberts, Geoffrey. 2006. Stalin's Wars: From World War to Cold War, 1939–1953. Yale University Press.Google Scholar
Sagar, Rahul. 2013. Secrets and Leaks: The Dilemma of State Secrecy. Princeton University Press.CrossRefGoogle Scholar
Sartori, Anne E. 2005. Deterrence by Diplomacy. Princeton University Press.Google Scholar
Sazonov, S.D. 1928. Fateful Years, 1909–1916. Cape.Google Scholar
Schub, Robert. 2019. The Information-Secrecy Tradeoff in Covert Actions. Unpublished manuscript, University of Nebraska.Google Scholar
Schultz, Kenneth A. 2001. Democracy and Coercive Diplomacy. Cambridge University Press.CrossRefGoogle Scholar
Shimer, David. 2020. When the CIA Interferes in Foreign Elections. Foreign Affairs online, 21 June, <https://www.foreignaffairs.com/articles/united-states/2020-06-21/cia-interferes-foreign-elections>..>Google Scholar
Slantchev, Branislav. 2010. Feigning Weakness. International Organization 64 (3):357–88.CrossRefGoogle Scholar
Spaniel, William, and Poznansky, Michael. 2018. Credible Commitment in Covert Affairs. American Journal of Political Science 62 (3):668–81.CrossRefGoogle Scholar
Steiner, Zara. 2011. The Triumph of the Dark: European International History 1933–1939. Oxford University Press.Google Scholar
Steiner, Zara, and Neilson, Keith. 2003. Britain and the Origins of the First World War. Macmillan.CrossRefGoogle Scholar
Stone, Norman. 1966. Moltke-Conrad: Relations Between the Austro-Hungarian and German General Staffs, 1909–14. Historical Journal 9 (2):201–28.CrossRefGoogle Scholar
Trachtenberg, Marc. 1991. The Meaning of Mobilization in 1914. International Security 15 (3):120–50.CrossRefGoogle Scholar
Trager, Robert F. 2010. Diplomatic Calculus in Anarchy: How Communication Matters. American Political Science Review 104 (2):347–68.CrossRefGoogle Scholar
Trager, Robert F. 2016. The Diplomacy of War and Peace. Annual Review of Political Science 19 (2):205–28.CrossRefGoogle Scholar
Turner, L.C.F. 1968. The Russian Mobilization in 1914. Journal of Contemporary History 3 (1):6588.CrossRefGoogle Scholar
Van Belle, Douglas. 1997. Press Freedom and the Democratic Peace. Journal of Peace Research 34 (4):405–14.CrossRefGoogle Scholar
Wilson, Keith. 1995. Britain. In Decisions for War, 1914, edited by Wilson, Keith, 175208. St. Martin's.Google Scholar
Yarhi-Milo, Keren. 2013. Tying Hands Behind Closed Doors: The Logic and Practice of Secret Reassurance. Security Studies 22 (3):405–35.CrossRefGoogle Scholar
Yoder, Brandon K. 2019a. Retrenchment as a Screening Mechanism: Power Shifts, Strategic Withdrawal and Credible Signals. American Journal of Political Science 63 (1):130–45.CrossRefGoogle Scholar
Yoder, Brandon K. 2019b. Hedging for Better Bets: Power Shifts, Credible Signals and Preventive War. Journal of Conflict Resolution 63 (4):923–49.CrossRefGoogle Scholar
Yoder, Brandon K. 2020. Power Shifts, Multiple Audiences and Credible Reassurance. APSA Preprints. doi:10.33774/apsa-2020-cp6sf.Google Scholar
Yoder, Brandon K., Gaubatz, Kurt Taylor, and Schutte, Rachel. 2019. Political Groups, Coordination Costs and Credible Communication in the Shadow of Power. Political Science Quarterly 134 (3):507–36.CrossRefGoogle Scholar
Zubok, Vladislav. 2007. A Failed Empire: The Soviet Union in the Cold War from Stalin to Gorbachev. University of North Carolina Press.Google Scholar
Supplementary material: PDF

Yoder and Spaniel supplementary material

Appendix

Download Yoder and Spaniel supplementary material(PDF)
PDF 277 KB