Beruflich Dokumente
Kultur Dokumente
Cambridge University Press and Trustees of Princeton University are collaborating with JSTOR to digitize,
preserve and extend access to World Politics.
http://www.jstor.org
Jerviss
article
under
"Cooperation
the Security
re
in international
is among the most
important works
ar
two
lations of the past few decades.
In it, Jervis develops
essential
is
he
the
the key to
that
dilemma
First,
guments.
security
explains
states
in an anarchic
with
how
international
fun
system
understanding
Dilemma"
ROBERT
a state tries
means
exists when
security dilemma
"many of the
by which
to increase its
the
of
decrease
others."1
It
the
security
security
provides
for what Jervis termed
the "spiral model,"
which
rational foundation
describes
how
can fuel
competition
explains that the magnitude
curity
on
two variables:
ferentiation.3
As
ness of
cooperative
states
between
the offense-defense
a result,
states
time. Although
that does not vary,
and
interaction
the
balance
and offense-defense
across
can vary
the security dilemma
exist in a condition
of international
dif
space
anarchy
can be
variation
in the attractive
significant
a
or
the prospects
for achieving
means,
competitive
there
*
For comments on earlier drafts Iwould like to thank Lynn Eden, Colin Elman, Matt Evangelista,
and Steve
Jim Fearon, Lloyd Gruber, Chaim Kaufmann, Andy Kydd, Joseph Lepgold, Jim Morrow,
Walt.
1
World Politics 30 (January 1978), 169.
under the Security Dilemma,"
Robert Jervis, "Cooperation
see John H. Herz, "Idealist Internationalism
and the
For earlier discussions of the security dilemma,
identifies the basic concept, but does not
Security Dilemma," World Politics 2 (January 1950), which
Relations (London: Collins,
1951).
develop it extensively; and Herbert Butterfield, History and Human
2
in International Politics (Princeton: Princeton University
Robert Jervis, Perception andMisperception
Press, 1976), chap. 3, esp. 62-76; these pages provide a more thorough discussion of the basic workings
For an early discussion
of the security dilemma than does "Cooperation under the Security Dilemma."
see J. David
and the Armament-Tension
of this type of interaction,
Singer, "Threat-Perception
Dilemma," Journal of 'Conflict Resolution 2 (March 1958); for a recent discussion, see Charles L. Glaser,
and Refining
the Spiral and Deterrence
of Military
"Political Consequences
Strategy: Expanding
similar arguments are developed by George Quester, Offense and Defense in the International
Many
to
1977). See also Marion William
Boggs, Attempts
Define and Limit 'Ag
System (New York: Wiley,
of Missouri,
and Strategy (Columbia: University
1941); and Marlies Ter Borg, "Re
gressive" Armament
of 1932," Journal of Peace Research 29, no. 2 (1992).
ducing Offensive
Capabilities: The Attempt
172
WORLD POLITICS
These arguments laid the foundation for amajor debate within real
ism,which iswidely considered the dominant paradigm in international
Jervis s analysis rests on the same basic assumptions?anar
of goals?that
structural
underlie
chy and fundamental
compatibility
relations. As
re
are
of his argument
different from the stan
implications
dramatically
dard structural-realist
since the latter does not focus
analysis, however,
on the
a
envisions
dilemma
and
security
consistently
consequently
more
and
world.4
the
debate over
competitive
dangerous
Although
these formulations
of
of structural realism has evolved since publication
to
matter
is
be
the
resolved.5
Jervis's article,
yet
can also
We
and impact
the importance
of security
appreciate
dilemma
have
and offense-defense
now
most
policy,
sources
employed
important
these
questions
the
including
of moderation
constraints,8
alliance
that scholars
by recognizing
to
address
many of the
arguments
effectively
of international
relations theory and security
arguments
effectiveness
in Soviet
behavior,9
of deterrence
policy,7
military
the severity
doctrine,10
and
reassurance,6
of relative gains
imperial
expan
4
The major statement of the standard structural-realist
analysis is Kenneth N. Waltz,
Theory of In
ternational Politics (Reading, Mass.: Addison-Wesley,
the State
1979); also important are idem, Man,
and War (New York: Columbia University Press, 1959), esp. chaps. 6,7; and idem, "Reflections on The
toMy Critics,"
in Robert O. Keohane,
ed., Neorealism and Its
ory of International Politics: A Response
Critics (New York: Columbia University
Press, 1986).
5
as
See Charles L. Glaser, "Realists as Optimists:
Cooperation
Self-Help," International Security 19
and Stephen Van Evera, Causes ofWar, vol. 1, The Structure of Power and the Roots
(Winter 1994-95);
(Ithaca, N.Y.: Cornell University
Press, forthcoming).
ofWar
6
not framed in terms of the security dilemma, see, for
Although
example, Richard Ned Lebow and
Janice Gross Stein, "Beyond Deterrence," Journal of SocialIssues 43 (Winter 1987). See also Stein, "De
terrence and Reassurance,"
et al., Behavior,
in Philip E. Tetlock
Society and Nuclear War, vol. 2 (New
to the se
York: Oxford University
Press, 1991), esp. 17; this essay gives somewhat greater prominence
curity dilemma. On the more general question of resolving political rivalries, see Sean Lynn-Jones,
in International Politics" (Ph.D.
between Adversaries
Accommodation
"Rivalry and Rapprochement:
in process).
diss., Harvard University,
7
et al. (fn. 6),
Matthew
in Soviet Security Policy," inTedock
"Sources of Moderation
Evangelista,
and Disarmament
in the 1950s," World Pol
esp. 290-96; and idem, "Cooperation Theory
Negotiations
see Deborah Welch
itics 42 (July 1990). On the Soviet use of concessions,
Larson, "Crisis Prevention
41 (Winter 1987).
and the Austria State Treaty," International Organization
8
in International Relations Theory," American Politi
Robert Powell, "Absolute and Relative Gains
cal Science Review 85 (December
1991); Powell casts the argument in terms of the costs of war, not in
terms of the offense-defense
balance. And see Glaser
(fn. 5), 79.
9
see
On balancing versus bandwagoning,
(Ithaca, N.Y.:
Stephen M. Walt, The Origins ofAlliances
see Thomas
Cornell University
On the tightness of alliances,
Press, 1987), esp. 24-25,165-67.
J.
Christensen
and Jack Snyder, "Chain Gangs and Passed Bucks: Predicting Alliance Patterns inMul
44
tipolarity," International Organization
"Perceptions and
(Spring 1990); and Thomas J. Christensen,
in Europe, 1865-1940,"
International Organization
is James D.
Allies
51 (Winter 1997); disagreeing
47
"Arms versus Allies: Trade-offs
in the Search for Security," International
Morrow,
Organization
see Karl Mueller,
"Patterns of Alliance: Align
(Spring 1993). On the alliance choices of small powers,
ment Balancing
and Stability in Eastern Europe," Security Studies 5 (Autumn 1995).
10
Barry R. Posen, The Sources ofMilitary Doctrine: France, Britain and Germany between the World
Wars (Ithaca, N.Y.: Cornell University
236-39;
Press, 1984), esp. 67, 74, 221-22,
Jack Snyder, The
SECURITYDILEMMA REVISITED
sion,11
revolution
and war,12
ethnic
conflict,13
173
conventional
arms
con
nuclear
and arms
trol,14 U.S.
policy
of
the escalatory
conventional
dangers
for peace in
the prospects
Europe
an examination
itations of space unfortunately
here of the
preclude
are
in
which
dilemma
and
offense-defense
ways
arguments
security
first sections
discuss work
of this article
dilemma
can, without
sirable outcomes.
states
suffering
misperceptions,
generate
unde
see Scott D.
Press, 1984); for disagreements,
Ideology of the Offensive (Ithaca, N.Y.: Cornell University
and Instability," International Security 11 (Fall 1986); the corre
Sagan, "1914 Revisited: Allies, Offense
and Elizabeth Kier,
spondence between Sagan and Snyder, International Security 11 (Winter 1986-87);
"Culture and Military Doctrine:
France between theWars," International Security 19 (Spring 1995).
11
(Ithaca, N.Y.: Cornell
Jack Snyder, Myths
of Empire: Domestic Politics and International Ambition
Press, 1991), 21-26.
University
12
Press, 1996), esp. 33-45,
Stephen M. Walt, Revolutions and War (Ithaca, N.Y.: Cornell University
334-38.
13
in Ethnic Conflict,"
Survival 35 (Spring
Barry R. Posen, "The Security Dilemma
to Ethnic Civil Wars," International
Chaim Kaufmann,
"Possible and Impossible Solutions
1993);
and
Security 20
1996).
(Spring
14
Conventional
Forces: Soviet Proposals andWestern
Jack Snyder, "Limiting Offensive
Options,"
see also
International Security 12 (Spring 1988), esp. 67-71;
Stephen Duane Biddle, "The Determi
nants of Offensiveness
in Conventional
Land Warfare"
and Defensiveness
(Ph.D. diss., Harvard Uni
the basic approach of offense-defense
theory, although apparendy not direcdy
versity, 1992). Following
influenced by it, is the nonprovocative
defense literature. See, for example, the special issue of the Bul
letin of theAtomic Scientists A4 (September 1988); and Anders Boserup and Robert Neild, The Founda
tions ofDefensive Defense (New York: St. Martins,
1990).
15
Nuclear Policy (Princeton: Princeton University Press, 1990).
Charles L. Glaser, Analyzing
Strategic
16
Shai Feldman, Israeli Nuclear Deterrence: A Strategy for the 1980s (New York: Columbia University
Press, 1982).
17
and NATO's Northern
Flank," International
Barry R. Posen, "Inadvertent Nuclear War? Escalation
Security 7 (Fall 1982); and idem, Inadvertent Escalation: Conventional War and Nuclear Risks (Ithaca,
a different
N.Y.: Cornell University
is Jeffrey W. Legro, "Military
Press, 1992). Offering
explanation
inWorld War II," International Security 18 (Spring 1994).
Culture and Inadvertent Escalation
18
"The Case for Finite Containment:
U.S. Grand Strategy," Interna
Analyzing
Stephen M. Walt,
tional Security 14 (Summer 1989), esp. 22-30.
19
Stephen Van Evera, "Primed for Peace: Europe after the Cold War," International
Security 15
A Demand
for Behav
(Winter 1990-91),
esp. 11-17; Ted Hopf,
"Managing Soviet Disintegration:
International
and Clifford A.
ioral Regimes,"
1992); Charles A. Kupchan
Security 17 (Summer
Security, and the Future of Europe," International Security 16 (Summer
Kupchan, "Concerts, Collective
1991), esp. 133-37; and Charles L. Glaser, "Why NATO Is Still Best: Future Security Structures for
Europe,"
International
Security 18 (Summer
1993),
esp. 26-33,
38-47.
WORLD POLITICS
174
The
section
following
argues
ex
variables?the
adversary's
unit-level
of the
knowledge
state s motives?influence
security
seekers
or instead
posits
some
greedy
states
is a pivotal
choice. In the latter case, the role of the security dilemma is diminished
and
competitive
policies
on unit-level
states can
rely
are more
These variables, for example, establish the divide between the spiral
model andwhat Jervis termed the "deterrencemodel," which applies to
secure
states
greedy
The final section
and offense-defense
greedy
states, not
and therefore
addresses
the security
dilemma,
source of interna
tional conflict; (2) the security dilemma does not really exist, because its
or because
are
over
its constraints
always
logic is flawed,
or because
secu
states construct
whelmed
other
the
considerations,
by
can choose not to; and (3) offense-defense
dilemma
and
therefore
rity
I argue that the greedy-states
criticism poses a serious
theory is flawed.
internal
challenge
The
are based
on
or flawed
incomplete
as a situation
analysis.
It Lead to
in which
"the means
reaction will
in turn reduce the state's secu
logic the adversary's
not this action-reaction
But
does
leave the
process
rity.
why
simply
state's security unchanged,
since the adversary's
reaction could j'ust off
set the state's action?
This
versary
section
identifies
less secure
three distinct
can be
self-defeating,
ways
inwhich
leaving
one's ad
making
the state worse off than
SECURITYDILEMMA REVISITED
175
before its initial action: (1) by setting inmotion a process that reduces
the state's own military capability, that is, its ability to perform military
missions;
(2) by increasing
the value
the adversary
places
on
expansion,
how
Thus,
happen without
misperceptions.
stems from
that
the
"heart
of
the
dilemma"
security
although
"the anarchic context of international
relations," Jervis leaves some key
to
is intended
discussion
The
arguments
following
underdeveloped.20
explain
he stresses
close
some
states
why
a brief discussion
section ends with
gaps. This
cannot avoid these undesirable
outcomes.
sometimes
of these
of
are to determine
how much
of the conditions
it faces
product
come when
misperceptions
Reducing
the
The
could
is really the
insecurity
worse
relations be
do occur.
State's Military
of a state's
and how much
reduce
Capability
capabilities
might
seem
self-contra
capability.22At first glance, itmight appear that the net effect of this
be to leave both countries' military
process would
forces would
since
additional
each
country's
unchanged,
the other's.23
action-reaction
bilities
offset
20
Jervis (fn. 2), 76.
21
On the advantages
capa
simply
176
WORLD POLITICS
duced,
missiles
their
for deterrence.
If, however,
requirements
an innovation
that favors defensive
missions
and
the net result would
it, then
the state de
its adversary
in the state's capa
be an increase
For
example,
equal
can result in an in
can
forces
increase
both
countries'
retaliatory
capabilities,
In such cases, an action
their deterrent
thereby enhancing
capabilities.
reaction process
increases security.
of the possibility
that arms
Appreciation
both
countries'
competition
Jervis's work
can reduce
on the secu
military
capabilities
precedes
In fact, the complementary
observation
that adversaries
rity dilemma.
can have a mutual
arms
interest in reciprocating
restraint is one of the
core
insights
of modern
arms control
theory, which
was
developed
in the
late 1950s and the early 1960s.26 Setting this insight within the broader
framework of the security dilemma, however, highlights an important
issue that arms control
the
intrinsic
goals
to
theory tends
gloss over?the
of the states involved. The
security
of
compatibility
dilemma makes
explicit the possibility that both states in the competition are interested
only
24
in security,
John J.Mearsheimer,
chap. 7.
25
This
and
it deepens
Conventional
our
Deterrence
understanding
(Ithaca, N.Y.:
of how
Cornell
this compe
University
Press,
1983),
177
SECURITYDILEMMA REVISITED
can arise.
tition
In addition,
Jervis
recent
in terms of Prisoners'
matrices
and exploring
how the
in the relative size of coun
game-theory
prospects
tries'
payoffs
for more
theorists
cooperation
have used game theory to establish amore rigorous foundation for the
core findings of arms control theory; they frequendy use the repeated
Prisoners'
arms
to model
Dilemma
competition.28
danger
of the
the
Increases
insecurity
adversary's
an
can reduce the state's own
a
security in
adversary's
security
Reducing
second way?by
the value the adversary places on expansion,
increasing
an
more
to deter.
insecure
it
harder
Making
adversary
thereby making
will
often
increase
pansion
increase
its interest
can often
since expansion
in expansion,
a more
insecure adversary will find ex
secure borders,
strate
gic depth, or control of resources that are valuable for building military
capabilities.29
Consequendy,
net result
ity, the
the state will
enjoy
a state's
military
arming increases
capabil
in its security. On the one hand,
be a reduction
the enhanced
deterrent
and defense
pro
capabilities
even when
could
is now harder
to deter,
itmay
not be deterred
en
by these
military
capabilities.
states that can achieve
Thus,
military
answer
is no general
seek them. There
advantages
to whether
should
sustainable
not
always
military
27
that can lead to arms competition
For earlier use of game theory to explore the different motives
see Thomas C. Schelling,
Pro
"A Framework
for the Evaluation
of Arms-Control
and cooperation,
contribution
of
104 (Summer 1975). While
remaining positive about the potential
posals," Daedulus
in "Realism, Game Theory,
and Co
formulations,
Jervis explores their shortcomings
game-theoretic
World Politics 40 (April 1988).
operation,"
28
The Evolution
Robert Axelrod,
1984). For a focus on
(New York: Basic Books,
of Cooperation
see George W. Downs, David M. Rocke, and Randolph M. Siverson,
"Arms
questions of arming,
in Kenneth A. Oye, ed., Cooperation under Anarchy
Races and Cooperation,"
(Princeton: Princeton
Press, 1986).
University
29
as
se
Jervis (fh. 1), 168-69. Although
Jervis identifies this phenomenon
being separate from the
it as an integral part of the security dilemma. On the resource value of ter
curity dilemma, I describe
International Security 18 (Fall 1993); and idem,
"The Spoils of Conquest,"
ritory, see Peter Liberman,
Societies (Princeton: Princeton University
Does
of Occupied Industrial
Conquest Pay? The Exploitation
Press, 1996).
WORLD POLITICS
178
advantages
crease the
that
state's
find
trade-off
leave one's
that
adversary
but policy
security,
sometimes
more
less
secure will
increase
or de
this
that grapple with
analyses
to
or restraint
is
preferable
cooperation
In the current debate over NATO expansion,
competitive
policies.
into Central
for example,
argue that even though expansion
opponents
increase
it
would
also
increase
NATO's
military
capability,
Europe would
invasion of its neighbors
Russian
insecurity and therefore make Russian
more
likely.30
its adversary
the state's
less
secure
buildup
in two
can reduce
the state's
buildup
can
reaction
are
seeking
more
term
I will
type of action
greed.32 This
in which
countries
that
of the spiral model,
are
their
motives
that
conclude
adversary's
only security
than previously
believed.33 Although
that is, greedier,
security,31 which
is the focus
process
than
other
malign,
more
can make
spirals
misperceptions
stresses that both the security dilemma
tional
30
foundation.34
Survival
37
E. Brown,
"The Flawed Logic of NATO Expansion,"
See, for example, Michael
a security dilemma-based
argument against nuclear superiority, see Glaser (fh. 15),
(Spring 1995). For
5.
chap.
31
The adversary could also become less secure if it concludes that the state places a higher value on
state harder to deter. For
a
security or demands
higher level of security, both of which could make the
on the
assessment of the state's greed.
adversary's
simplicity, I focus
to
321 use the term "greedy" because states can be motivated
expand for two fundamentally different
more common terms
are blurred
and greed?which
types of reasons?security
by the
"expansionist" and
states can be defined in terms of greed and security seeking; see Glaser (fh. 2),
"aggressive." Four types of
501-3. In referring to states as greedy, I do not mean to imply that they do not also seek security.
33
inAlliance Pol
Jervis (fh. 2), chap. 3, esp. 62-76. See also Glenn Snyder, "The Security Dilemma
can generate re
itics," World Politics 36 (July 1984), 468-70;
Snyder argues that firm alliance policies
actions that are comparable to a spiral generated by an arms buildup.
34
In addition to the passage cited in fn. 20, see, for example, Jervis (fn. 2), 62.
SECURITYDILEMMA REVISITED
Nonetheless,
a
179
puzzle.
could
convince
the possibility
But this claim overlooks
ers, since they are unobservable.
can communicate
because
that certain
actions
valuable
information
they
a
to be taken
state and a pure se
by
greedy
equally likely
a state launches
a
seeker. Therefore,
for example, when
military
are not
curity
a
buildup that ismore likely to be taken by a greedy state than by pure
an
that is making
sound inferences will up
security seeker,
adversary
date its assessment
of the state's motives,
that the state is
concluding
size
type, different
types of states prefer different
more
a
to add forces
is
than
seeker
security
likely
greedy
for adequate
defense
of its territory.
Even
those
required
In the first
a
state
a state
than would
35
On signaling, see Robert Jervis, The Logic of Images in International Relations
(Princeton:
ton University
Press, 1970); and James D. Fearon, "Threats to Use Force: The Role of Cosdy
in International Crises" (Ph.D. diss., University
of California, Berkeley, 1992).
Prince
Signals
WORLD POLITICS
180
that
The
sound
that makes
is, can an adversary
logically
about the
reach incorrect
conclusions
that remains
question
inferences
nevertheless
the interaction
between
pure
to pro
seekers
security
quired
This
a
to generate
spiral.
of
interaction
type
be yes. Otherwise,
can occur
would
be re
are uncertain
about
misperceptions
if the states
a
the size or type of forces required to maintain
given level of security.
case
some pure se
inwhich
consider
the simple
this uncertainty,
Given
a lower level of forces and some
be satisfied with
curity seekers would
with a higher level, but all greedy stateswould require a higher level.A
pure security seeker that builds to the higher levelwill then convince its
adversary
that
it is more
to be
greedy,
likely
since
only
some
security
seekers but all greedy states would build to this level. Similar interac
tions can occur
if there
about whether
is uncertainty
security
seekers
re
is adequate.38
believe
seekers
result
from
an
of its motives.
state's understanding
about the
uncertainty
adversary's
the adversary
For example, when
believes that the state believes there is only a small probability that the
that the state does not fear it, the ad
is greedy and, therefore,
adversary
for
is largely unnecessary
state's
that
the
will
conclude
versary
buildup
of the probability
in its assessment
is fearful
is greedy
shows
that under
awide
range of conditions
a rational
adver
is sensitive
to
prior
expectations
about
36
is an oversimplification,
This
however, since a pure security seeker might want the capability to
take territory for a variety of reasons. See fh. 57 below for qualifications.
37
states can
Jervis identifies the types of buildups, he does not really explain how rational
Although
notes that states often cannot accurately infer motives from others'
spiral; Jervis (fn. 1), 199-201. He
to assume the worst; Jervis (fh. 2), 64-65. This would clearly
military forces and therefore they tend
additional information
is logically flawed, since without
generate increased hostility, but the judgment
states should not assume the worst in the face
should remain unchanged. Moreover,
states' assessments
since this can support policies that are too competitive/provocative.
of uncertainty,
38
see Jervis (fn. 1),
of related issues concerning
For discussion
subjective security requirements,
174-76.
39
and the Spiral Model," World Politics 49 (April 1997). Kydd notes
Andrew Kydd, "Game Theory
the extreme cases in which bias leads the adversary to
(p. 373) that Jervis explores this dynamic for
SECURITYDILEMMA REVISITED
181
rection?a
to reduce
the adversary's
concern
use restraint
about
in
building
its greediness.40
forces
military
A greedy state
misrepresent
its motives,
security
seeker
can communicate
in
less cosdy
state.
a lack of
a
communicate
offensive missions
greed, since
perform
a pure secu
state sees greater value in offensive missions
than
does
greedy
a state may be able to
rity seeker. Second,
adopt unilateral defense, choos
a
even if its
to protect
its country with
defensive
doctrine,
ing
adversary
one. When
to pursue an offensive
continues
offense has the advantage,
ity
to
maintaining
were
it not considering
the effects of signaling.
set in motion
is primarily
restraint
tactical?to
One use of
a process of
re
unilateral
if not reciprocated,
restraint.42 Even
however,
reciprocated
straint can succeed by communicating
that the state is not greedy and is
to
relations. Thus,
the state's ability to
committed
although
improving
is reduced, the net effect can be an increase in its security. There
the state's re
the danger that the adversary will misinterpret
is, however,
a
a
in
lack
this case, re
of
lack
of
resolve
instead
straint, seeing
greed;
state.
to
the
The
dual
straint encourages
the adversary
dangers
challenge
states re
of their resolve make
of military
shortfalls and underestimates
restraint.
of unilateral
luctant to pursue ambitious
policies
defend
secure. For pure security seekers, however, all that is necessary to gener
some
that the state is secure. See also
is
for
the
adversary to believe there is
possibility
spiral
and David M. Rocke, Tacit Bargaining, Arms Races, and Arms Control (Ann Arbor
George W. Downs
of Michigan
Press, 1990), chap. 4.
University
40
a formal treatment.
Kydd (fn. 39) provides
41
Glaser
(fh. 5), 67-70; and idem (fh. 2), 526-33; for related points, see Downs, Rocke, and Siver
son (fn. 28). On reassurance more generally, see Stein (fn. 6); on the inhibiting effect of appearing
in Crisis Bargaining," International
with Linkage
weak, see James D. Morrow,
"Signaling Difficulties
Studies Quarterly 36 (June 1996).
42
to
This approach, often referred to as GRIT, was developed by Charles E. Osgood, An Alternative
of Illinois, 1962).
War or Surrender (Urbana: University
assume
ate a
WORLD POLITICS
182
MISPERCEPTIONS
also discusses
hostile
overly
cused
on bureaucratic
sources
and domestic
political
as alternative
processes
of bias.
do not understand
who
Statesmen
the security
dilemma
and
there
infer
incorrectly
that
the adversary's
reflects
buildup
greedy
mo
tives.A state is likely tomake errors that build on each other: a key ini
is for a state to assume
tial mistake
that others
it is interested
know
only
in security; the state is then likely to assume that others will not be
threatened by its buildup. Consequendy, the state is inclined to see the
arms
adversary's
as a
buildup
spiral, described
when
about
motives;
tainty
cure and
will
competition
rational
be more
intense
than
is predicted
by
dilemma.
security
Attribution
make
of interpret
the mistake
reasoning.44 Leaders
commonly
even
terms of their
in
countries
the
behavior
of
other
ing
goals/motives,
flawed
they face. As
face a security
countries
as
others
have
acted
Recent
a result,
dilemma
even
greed,
reflecting
the same way.
work on misperceptions
leaders
fail
to
and therefore
though
provides
pure
appreciate
interpret
security
alternative
that other
the actions
of
seeker might
explanations,
lo
cating these analytic flaws at the level of the state instead of at the level
of the
individual.
and domestic
This
work
uses
theories
to
of organizational
behavior
states often exaggerate
explain why
are inclined
to exaggerate
the of
dynamics
political
adversary's
hostility.45 Militaries
inten
of the adversary's forces and to impute malign
fensive potential
are
even
of
when
the
the
tions,
purposes
ambiguous.
adversary's forces
an
43
in "Cooperation under the Security Dilemma"
receives far less discussion
(but see
Misperception
than in Jervis (fh. 2), 67-76.
pp. 181-83)
44
On attribution theory, see Jervis (fn. 2), esp. 35-48; Deborah Welch
Larson, Origins of Contain
ment: A
and
Press, 1985), esp. 34-42;
(Princeton: Princeton
University
Psychological Explanation
Press, 1996).
Jonathan Mercer, Reputation and International Politics (Ithaca, N.Y.: Cornell University
45
see
For an emphasis on organizational
Stephen Van Evera, "Causes ofWar" (Ph.D.
perspectives,
of California, Berkeley, 1984), pt. 2; and Snyder (fn. 10). Snyder (fh. 11) emphasizes
diss., University
domestic political dynamics.
SECURITYDILEMMA REVISITED
183
that exag
often advance
strategic arguments
expansion
self-serving
or
motives.
the
threat
the
Fur
gerate
posed by
adversary's
capabilities
are
states
to create
about the unthreatening
inclined
thermore,
myths
nature
which
makes
adversaries
appear
still more
dangerous.46
a state's
In sum,
rational updating
(or re
military
buildup
through
to alter its assessment
of the state's mo
straint) can lead an adversary
on
states are inclined to do
cautions
tives. Research
that
misperceptions
others. When
security
Simply Wastes
act as
though
the
Money
The
results
less, the security dilemma
no
more
state less prosperous,
yet
in self-defeating
secure.47
and engaging
arming
be self-defeating,
why
undesirable
under
efforts
to Avoid
in competitive
cannot rational
more
policies
generally
states cooperate
to avoid
of international
relations
Jervis's formulation
raises this question
since
Hunt
cooper
starkly,
Stag
outcomes?
anarchy
as a
(fn. 45), chap. 8; and idem, "Why States Believe Foolish Ideas: Non-Self-Evaluation
Political Sci
of the American
and Society" (Paper presented at the annual meeting
by Government
ence Association,
D.C.,
1988).
Washington,
47
is
resources; he argues (p. 462) that alliance formation
Snyder (fh. 33), 461, emphasizes wasted
similar to arming, in that all states would be better off remaining outside an alliance; action and reac
tion nevertheless
generate alliance blocks that are cosdy but fail to increase security.
48
and related games, see Kenneth A. Oye, "Explaining Cooperation
under Anar
On Stag Hunt
chy: Hypotheses
and Strategies,"
inOye
(fn. 28).
184
WORLD POLITICS
lies in appreciating
that states are uncertain
confidence
that others are pure
motives,
lacking
means
motives
about
that states cannot be
seekers. Uncertainty
The
about
their adversaries'
security
confident
tainty
are in a
they
Stag Hunt,
the type of game can make
that
about
even
if they
are. This
uncer
the state's
competition/arming
its motives
about the adversary?both
and
uncertainty
of one's own motives?is
the fundamental
ingredient
for understanding
model
game-theory
This
competition.50
of how uncertainty
subsection
about
the prospects
for productive
cooperation.
to
two
It is usefid
by
considering
why
begin
be in a Stag Hunt.51
the one hand, a pure
On
describes
the adversary
a
simple
could re
duce
security
security
of not being attacked has no reason to expand:
it controls
the territory
and does not see instrumental
confident
with
ditional
territory,
because
including
how
it does
It could
seekers might
seeker that is
it is satisfied
value
prefer
in ad
the ter
or
to govern
the additional
territory
costly it is
an
norm
state
violates
international
that the
values.
expansion
the state values
its own
territory,
it could
prefer fighting
to pro
the other
49
see Downs, Rocke, and Siverson (fn. 28), 134-37.
For discussion of their impact on a Stag Hunt,
50
In addition, a type of uncertainty
that is not explored in the text is also important?uncertainty
an
about whether
adversary will become greedier. This uncertainty cannot be eliminated because lead
ers cannot bind themselves and their successors to current goals; see Jervis (fh. 1), 168.
51
can be devel
over territory, a
focuses on competition
my discussion
Although
parallel analysis
arms
for
oped
competition.
52
If facing a greedy adversary, however, a pure security seeker would now see instrumental value
state would
in expansion,
if this would
increase its security. The
then have Prisoners' Dilemma
SECURITYDILEMMA REVISITED
185
Offense-Defense
Variables: Variation
Security Dilemma
in the
is his
of how the
Jervis's second major contribution
explanation
magni
on two variables?the
tude and nature of the security dilemma
depend
balance and offense-defense
differentiation.
offense-defense
In consid
ering
how
these variables
influence
he generates
a vari
ety of hypotheses,
the prospects
for competition,
pressures
state behavior,
for
international
cooperation,
the offense-defense
balance
ease
at
of holding
ing territory
compared
territory when
tacked:
the advantage
of defense
increases with
the ease of holding
a way of
then proposes
the relative
territory
measuring
(p. 187). He
ease of offense
and defense:
"Does the state have to spend more or less
than one dollar on defensive
forces to offset each dollar spent by the
with
the
as the offense-de
decreases
severity of the security dilemma
defense
balance
shifts toward greater defense
advantage. When
a status quo
in
the advantage,
the forces deployed
power will
by
more
its security
than they decrease
the adversary's
security. Both
states will achieve reasonable
levels of security from action and reaction
has
crease
cycles,
and arms
races will
great,
sufficiendy
international
anarchy
By contrast, when
the advantage
to
of defense
is
thus rendering
impossible,
(p. 187).
relatively unimportant''
it is
offense
has the advantage,
for
impossible
arms
size to enjoy high levels of security simultaneously;
states of
equal
be intense
races will
because
when
one
country
adds forces,
its adver
186
WORLD POLITICS
sary will
Jervis
to make
have
argues
that offense
to restore its
to defend.54
larger addition
ability
war more
a
makes
for
advantage
likely
variety
advantage,
attacks
emptive
will be
states will
makes
be more
war more
ex
insecure, making
to
states
attractive
seek
the probability
via pre
of crises escalating
wars
are
arms
races
and accidents.55
(4) Because
likely,
still more
increases
intense,
influences
The
second
extent
to which
weapons
that influences
the security dilemma
is the
key variable
are differentiated,
and defense
offense
that is, "whether
and policies
that protect
provide
the capability
can then
are usefid
its
deploy forces that
only for protecting
not
to
reduce its adversary's
does
defend
itself.
territory, which
ability
differentiation
enables a country to signal its
offense-defense
Moreover,
a
to take
type, since only
country that wants
territory will buy forces that
have offensive potential.57 Pure security seekers can therefore reduce con
cern about whether
in turn increases
they harbor greedy motives, which
their own security. The differentiation
of offense and defense makes pos
that ban weapons
sible arms control agreements
that are usefid for of
fensive missions,
54
For related analysis,
thereby
seeMalcolm
increasing
W.
Hoag,
both
countries'
"On Stability
ability
in Deterrent
to defend.58
13
1961).
(July
55
security
dilemma
In contrast, when
offense
to
forces
try buying
protect
its territory
revisited
and defense
187
can
a coun
that re
security
seekers
states will
and greedy
buy
the
adds hypotheses
courages
styles
offense
of diplomacy
advantage
that increase
war
fuels preventive
the probability
and en
of war. Of
to use fait
for preventive war. States are more
likely
tactics when
offense has the
dis
because winning
accompli
advantage
more
is
is
when
which
scarce,
putes
encourages
security
important
states to overlook
States negotiate
less and
negotiable
compromises.
increases
incentives
less successfiilly,
because
makes
offense
it more
advantage
important
more
that agreements
be carefiilly balanced, which makes
negotiations
and
increases
because
offense
the
of vi
difficult,
advantage
advantages
which makes
riskier. In addition,
of
agreements,
agreements
olating
states more
secretive,
advantage makes
can increase their
forces
military
vulnerability.
fense
since
information
Secrecy
about
in turn increases
and of states'
interests.59
hypotheses
has gone
attackers
should face countervailing
advantage,
potential
them more
make
when
cautious,
especially
considering
war
which
could sometimes
make
less likely.60
Van Evera
hypotheses,
has performed
even
although
the most
these
are
extensive
pressures
that
large wars,
tests of offense-defense
preliminary.61
Focusing
on
Europe
since 1798, he finds strong support for the theory's basic hypothesis:
war
ismore
likely when
tage. Examining
offense
has
(or is perceived
to have)
the advan
59
Van Evera (fn. 5), chap. 5.
60
49 (Summer
forWar," International
James D. Fearon, "Rationalist Explanations
Organization
1995), 402-3. And see the following papers prepared for the annual meeting of the International Stud
iesAssociation,
Balance andWar since 1648";
Chicago, February 1995: Fearon, "The Offense-Defense
of Offense-Defense
and Charles Glaser and Chaim Kaufmann,
"Inspecting the Foundations
Theory:
Can They Bear theWeight?"
61
Van Evera (fh. 5), chaps. 5,6; and idem, "The Cult of the Offensive
and the Origins
of the First
War," International
"Polarity, the Offense-De
Security 9 (Summer 1984). See also Ted Hopf,
Political Science Review 85 (June 1991); and Fearon (fn. 60, Febru
fense Balance, andWar,"American
ary 1995), who argues that the frequency of war in broad historical periods runs counter to standard
offense-defense
predictions.
World
188
WORLD POLITICS
port for the broad range of hypotheses about the dangers generated by
offense advantage.62Many of these findings about the FirstWorld War
have been challenged by Trachtenberg, who is especially critical of as
sertions
sion,
about
and
also
incentives
preventive
doubt
on
in bringing
Offense-Defense
Theory
Realism
Structural
in fueling German
expan
of first-strike
and
importance
dominance
the
about
the war.63
structural-realist
archy.64In part, this is because Jervis did not explicidy frame his analysis
a critical
theory. Nevertheless,
by proposing
improve
a
from
within
structural
Jervis's analysis poses
major
challenge
toWaltz's
in turn
widely
accepted version of the theory, which
in terms of realist
ment,65
realism
transforms
the standard
predictions
of structural
realism.66
on
is the
military missions
preferable
approach because
on
to achieve
its goals depends
its ability to use military
that is, to accomplish
the military missions
that are nec
a
essary to achieve security and possibly nonsecurity
goals. For example,
on the
can deter, and if
that
its
state's security depends
forces
probability
to focus on mil
defeat, an adversary's offensive. The decision
necessary
in offense-defense
vari
itary capabilities
essentially
requires bringing
in combination
it is these variables
with power, not power
ables, because
a
to
that
influence
alone,
country's ability
perform military missions.67
62
SECURITYDILEMMA REVISITED
189
and/or
by theories
contradicted
on
power to ex
a
remains
anarchy
in
leads to variation
that focus
solely
state
behavior.
Most
plain
generally,
although
variation
in the offense-defense
variables
constant,
or
to which
states should compete
the extent
cooperate
of war. There
probability
are many
more
and
differences.
specific
in the
For exam
strongly
defense,
If offense
states.
weapons
as it does
in a world
and defense
of
advanced
are differentiable,
states
nuclear
should
and many
tural realism.
others
run counter
to standard
power-based
struc
more
between
structural
realists have become
disagreements
the
"offensive
labels
realists"
and
"defensive
realists"
sharply defined,
have come to be used to
favor the standard,
distinguish
analysts who
from
those
who
believe
that
structural
realism
competitive
predictions
As
variation
greater
predicts
in countries'
to focus
is whether
disagreement
and, therefore, on offense-defense
offensive
realists do not address whether
vantage,
but
power-based
behavior.68
on power
variables.
or on
Since
offense
At
the heart
of the
military
capabilities
on power,
they focus
an ad
has
generally
that competitive
they do conclude
policies flow from their
formulation
of structural
realism. Defensive
realists are
focus
have
the alternative
suggested
label of "contingent
realism."69
Two Additional
Variables: Greed and Unit-Level
of Motives
Knowledge
In addition to the two offense-defense variables that Jervis highlights,
there
security
the adversary's
variables
the extent
unit-level
of the
knowledge
that
influence
of the
the magnitude
extent of
and
the
greed
adversary's
about the state's motives,
in par
WORLD POLITICS
190
and
appropriately,
curity dilemma.
do not
are not
play
structural
variables
and therefore,
quite
in Jervis's discussion
of the se
these variables
is also valuable
it
because
a central
Considering
us
place the security dilemma
helps
ternational
relations
theory.
role
within
still broader
over
debates
in
Greed
In a world
basic
there
of pure
puzzle?that
is competition
In a world
with
one
the puzzle
the incompatibility
largely disappears:
a
for competition
provides
straightforward
explanation
not
The
does
become
security dilemma
unimportant
states,
helps
benign
or more
solve a
goals,
greedy
of states' goals
and conflict.70
in aworld
with
the focus
of recent work
the importance
of the se
states
between
that seek only
security.
that
this
"status
bias"
leaves
neorealism
unable to
argues
quo
to
in modern
"most great-power
behavior
history." According
of
Schweller
explain
Schweller,
the
interaction
its
realist theory more effective
requires broadening
making
to include at least some states that are
motives
states'
about
assumptions
in nonsecurity
that is, that are greedy.72 As I ex
interested
expansion,
are
conclusions
somewhat
because
exaggerated,
plain below, Schweller's
he believes
explanatory
70
seekers as well as greedy states?
Another
basic puzzle still exists, however why states?security
do not compromise
instead of incurring the cost of fighting; see Fearon (fh. 60, Summer 1995).
71
For related points, see Robert Jervis, "Arms Control,
Stability, and Causes ofWar," Political Science
a
L. Schweller argues otherwise,
holding that when
Quarterly 108 (Summer 1993), 244-45. Randall
state exists there is no security dilemma; see Schweller, "Neorealisrr?s Status-Quo
Bias: What
greedy
Security Dilemma?"
Security Studies 5 (Spring 1996).
72
about the relative importance of greed and inse
Schweller
(fn. 71), quote at 106. Disagreement
formulations
offered by realists, see, for
curity is long standing. For a comparison of the contending
Discord and Collaboration: Essays on International Politics (Baltimore: Johns
example, Arnold Wolfers,
Press, 1962), esp. 83-84.
Hopkins University
SECURITYDILEMMA REVISITED
states'
matter
because
191
different poli
a
seeker
will
under
cies;
when,
security
a
state will choose
stan
the same conditions,
The
greedy
competition.
dard structural-realist
this point by mistakenly
pre
analysis obscures
in
that
seekers
will
pursue competitive
dicting
security
general
policies.
realism
the importance
of
suggests
By contrast,
defensive/contingent
a
motives
that under
range of conditions
by explaining
security seekers
goals
in these
helpfid
potentially
disastrous.
For
example,
arms control
resolve
to
restraint
of offense?is
are more
fensive
more
likely
option
Although
likely
to conclude
makes
to weaken
deterrence,
that the defender's
states
because greedier
lack of a retaliatory
of
acceptable.74
variables
still play a role in
states, offense-defense
explaining
on
most
the
security seekers,
focusing
interesting
security
concern how offense
dilemma
increases
mutual
explanations
advantage
creates conflicts of interest. In contrast, when
and
fo
insecurity
thereby
on
are
most
offense-defense
variables
cusing
greedy states,
important for
war.
to
of
the
the benefits
At least according
standard argu
explaining
with
greedy
war. When
offense
still increases
that probability
of war, but in
ment,
advantage
are greater and/or be
this instance because
of winning
the prospects
cause its costs are lower, which makes
states harder.
deterring
greedy
Unit-Level
The
Knowledge
of the
State's Motives
The
about whether
is driven
security dilemma
by the adversary's
secu
the state is in fact motivated
purely by
may not be ill-advised, however, since for a greedy insecure adversary the reduction in its
the net effect re
insecurity could still offset the reduction in the state's military capabilities. Assessing
more
and a detailed model of interaction. By contrast, unilateral concessions
quires
specific assumptions
are
as described
always misguided when one is facing a secure greedy state,
by the deterrence modeL
74
see fn. 57.
On the deterrent value of counteroffensive
capabilities,
WORLD POLITICS
192
concerns.
If the adversary were certain that it faced a pure security
rity
then
the state would
face a gready reduced
seeker,
security dilemma.75
tain about
on
not
the
internal
states do
posits
of other
in which
of the policies
that would
theory
characteristics
uncer
be at least somewhat
aworld
The
states?for
rely
example,
or economic
their type of political
divine
their motives.
In
system?to
states
to
actions
motives.
their
adversaries'
infer
their
stead,
interpret
can
from acting in
The
however,
prevent adversaries
security dilemma,
above, when
ways that would
entirely clarify their motives. As discussed
states face a
security
dilemma,
many
necessary military
about
For example,
their motives.
tirely differentiated,
when
offense
provide
information
and defense
are not en
dangerous
than alternatives
that do not
reduce
uncertainty
about
states
can
rely
allows,
on
sources
of
information
beyond
those
to reduce
uncertainty
they may be able
The
dilemma.
result can be a
the
security
thereby mitigate
that democ
the argument
shift to more
policies. Consider
cooperative
were
are
to
not
If this
the case,
have greedy motives.
racies
believed
further
realism
and
to its adversaries
than a similar
buildup
launched
by
an authoritar
75
seem to eliminate the security dilemma,
at first glance this might
this need not be the
Although
war to increase its security; consequendy,
case. A state motivated
the
entirely by security might choose
the security dilemma would re
stated insecurity should lead the adversary to fear it.Thus, eliminating
not only that the state was a pure security seeker but also that the state
quire that the adversary know
are overstated.
some
did not fear it. Consequendy,
points in this paragraph
security
dilemma
revisited
a result, the
faces
democracy
regime.76 As
and interactions
democracies
between
dilemma;77
instead
mocratic
intense
of
peace
competition,
create a severe
conditions
security dilemma.
ian
Unit-level
information
more
that mitigates
policies. This
193
a less
could
severe
security
in a de
result
even when
structural
can also
remains
competitive
of an adversary's motives
but believes
unit-level
information
to
its
that it is a pure security seeker. Com
adversary
appreciate
now become more
since they do not suffer
desirable,
policies
support
uncertain
enables
petitive
from a key shortcoming identified by the security dilemma; that is, they
do not
This
a central
role
in the "deterrence
model,"
suming
Combining
the adversary
knows
the state is a pure security
seeker.78
this with
the assumption
is greedy, the
that the adversary
entirely greedy reasons and knew that they had nothing to fear from the
United
States.
a
In short, examining
of key nonstructural
variables
high
couple
on certain
the
fact
that
the
role
of
the
dilemma
lights
security
depends
basic theoretical
realism is built on assumptions
Structural
assumptions.
a
that guarantee
central role for the security dilemma.
If, however, we
start from different
or the sources of
about states' motives
assumptions
information
security
about
dilemma
state's motives,
can decrease.
the
importance
and
severity
of the
76
In this spirit, see Bruce Bueno de Mesquita
and David Lalman, War and Reason: Domestic and In
ternational Imperatives (New Haven: Yale University
Press, 1992), chap. 5. A different argument is that
the openness
that characterizes mature democracies
results in domestic debate that cannot be manip
ulated simply to deceive an adversary, and therefore provides valuable information about motives.
See
Andrew Kydd, "Signaling and Structural Realism" (Manuscript
1996); and Kenneth A. Schultz, "Do
mestic Political Competition
and Bargaining
in International Crises" (Ph.D. diss., Stanford University,
1996). Schultz develops this type of argument for crisis interactions.
77
and the Escalation
Arguing
along these lines is James D. Fearon, "Domestic Political Audiences
a
of International Disputes," American Political Science Review 88
(September 1994), 587. If, however,
case and it is not, then we get the kind of
described
democracy believes this to be the
misperception
above: the democracy believes that it doe not face a security dilemma and therefore does not moderate
its building; its adversary, not confident that the democracy
is a pure security seeker, then responds to
the buildup; and the democracy
then increases its estimate of the adversary's greediness because it be
lieves that its adversary knew that a response was unnecessary
its security.
for maintaining
78
See Jervis (fn. 2), chap. 3; and Glaser (fn. 2).
WORLD POLITICS
194
States, Not
the
Security
and
Dilemma,
First World
criticizes
al
and much
empires,
on states'
on
than
greed
as
those analyses
flawed
fundamentally
on the
offense ad
security dilemma,
arms
that they miss
and the
races, arguing
com
ambitions.
The
military
hegemonic
that focus
vantage, German
insecurity,
the real problem?Germany's
"the very
nature
of German
in the same
ambitions
antagonism
spirit that "the political
is
via arms control...
for alleviation
states
that
explains
is, join
bandwagon,
the gains of expansion.82
Although
is obviously
states
in which
the frequency
of alliances
to
status quo and share
the
together
change
two
general
points
deserve
79
Patrick Glynn
focuses on Van Events arguments; see Glynn, Closing Pandoras Box: Arms Races,
at 21. For
Arms Control and the
History of the Cold War (New York: Basic Books, 1992), chap. 1, quote
a more nuanced but at least
see
(fn. 63), chap. 2, esp.
Trachtenberg
partially sympathetic discussion,
49-57.
80
Press of Kansas, 1993), 174. A
Colin S. Gray, Weapons Dont Make War (Lawrence: University
similar theme runs through idem, House of Cards:
Arms Control Must Fail (Ithaca, N.Y.: Cornell
Why
Press, 1992).
University
81
see
Jervis (fn. 2), chap. 3. Douglas
Seay reviews the debate among Soviet specialists;
Seay "What
inTheir Foreign, Military,
Are the Soviets' Objectives
and Arms Control Policies?" in Lynn Eden and
Steven E. Miller,
eds., Nuclear Arguments
(Ithaca, N.Y.: Cornell
82
Randall L. Schweller, "Bandwagoning
for Profit: Bringing
national Security 19 (Summer 1994).
Press, 1989).
University
the Revisionist
State Back
In," Inter
SECURITYDILEMMA REVISITED
to be
emphasized.
adversaries' motives
makers
decision
above, we
noted
arguments
also that the most
that security-dilemma
and offense
in a world with
but
apply
greedy states,
and satisfying aspects of these arguments
remember
to
continue
penetrating
less important.
become
2:The
Critique
the
defense
security
195
Security
dilemma
Dilemma
is logically
Does Not
Exist
flawed
flawed. Given
not real,"
is then
the security dilemma
ualways apparent,
but instead the re
and because conflicts of interest are then not genuine,
which
"violates realism's most basic tenet."84
sult of misunderstanding,
are off the mark because
to
the
criticisms
These
they fail
appreciate
because
both
core assump
role that uncertainty
plays in structural realism. A
states will be at least
is that under most
conditions
tion of the theory
states are
uncertain
about others' current motives:
somewhat
imagined
as black boxes that
no information
about
internal
differences,
provide
of their international
except for the observable
outputs
policy choices.
central
As
discussed
about
of uncertainty
the combination
formulation
In the structural-realist
can
between
and anarchy
pure security seek
generate
incompatibility
ers. States'
but they reflect the incom
interests are genuine,
conflicting
not ends.85
of
means,
patibility
DILEMMA
AREUNINHIBITEDBYTHE SECURITY
SECURITYSEEKERS
Some
structural
ers. Mearsheimer,
relative
power
realists
for
argue
example,
position_The
is simple:
83
Jervis (fh. 2), 112-13; Glaser (fh. 2), 505-6.
84
Schweller
(fn. 71), 117-20, quotes at 117 and 118.
85
Jervis (fn. 2) deals with precisely this issue (pp. 75-76).
the greater
the military
196
WORLD POLITICS
one has over other states, the more secure it is."86 States maxi
advantage
mize relative power "in order to maintain
the means
for self-defense."87
dilemma
secure
are we
in this
parity than engaging
accepting
competition.
to understand Mearsheimer's
assertion? One
possibility
is that he simply rejects the logic of the security dilemma but has not
spelled out why. A second possibility is that he ismaking an unstated
states face conditions
under which
the coop
judgment?that
empirical
erative possibilities
identified by security-dilemma
and offense-defense
are too
be the case when
the security
arguments
dangerous. This might
it turns out that even then arms racing is
is severe, although
a state's best
not
In any event, Mearsheimer
does not
option.
clearly
but notes only that states
claim that states face such a severe condition
dilemma
some offensive
"possess
vides neither deductive
military
capability." In short, Mearsheimer
nor
for his claim.
rationales
empirical
pro
THE SECURITY
DILEMMAISCONSTRUCTED(ORNOT) BY STATES
are not
or na
argues that "security dilemmas
given by anarchy
of intersub
"is a social structure composed
ture";88 a security dilemma
states are so distrustfid
in
which
that
they make
jective understandings
worst-case
each
others'
intentions."89
Because
the
about
assumptions
Wendt
86
"The False Promise of International
Institutions," International Security 19
John J.Mearsheimer,
seeWaltz
structural realists reject this position;
11-12. Other prominent
(fn. 4,
(Winter 1994-95),
1979), 118,126,127.
87
"Back to the Future: Instability in Europe after the Cold War," International
John J.Mearsheimer,
"Realism and Domestic
Politics: A Review
Security 15 (Summer 1990), 12. See also Fareed Zakaria,
Essay," International
Security 17 (Summer 1992), 190-96.
88
of Power Poli
States Make of Ir.The Social Construction
Alexander Wendt,
"Anarchy IsWhat
46 (Spring 1992), quote at 407, and also 401-2; and idem, "Con
tics," International
Organization
1995), 77. For a very different
Politics," International
structing International
Security 20 (Summer
focuses on the offense-defense
constructivist
balance, instead of the security dilemma,
critique, which
see Kier (fn. 10).
89
73.
Wendt
(fn. 88,1995),
197
SECURITYDILEMMA REVISITED
is created
dilemma
security
by states'
reassurance?that
states
interactions,
will avoid
can choose
policies?for
example,
to
realists overlook
ing Wendt,
dilemmas
conceive
because
they
disagreements
ismost
level of analysis
important.90
the results
of states'
interaction, whereas
Jervis and the literature
to
refer to a situation created by
"security dilemma"
use
he has spawned
the material
conditions
states,
facing
such as geography
and prevailing
terminology, then,Wendt
confusion.
are the
significant
the extent to which
important
exaggerates
policies
and,
substantive
the extent
therefore,
First,
disagreements.
realism calls for com
structural
to which
it leads
to security
the international
believe
the
structural
petitive
policies,
tance on the
security
that under a range of conditions
problem
themselves
states
is that
the assumptions
either controversial
should
that Wendt
or
Part
cooperate.
of the
to realism
assigns
flawed.
Instead
are
of seeing
realists envision
logically
with
the
security of others,
negatively
identifying
as indifferent
as
to others'
states as
therefore
and
security, except
egoists
it directly
influences
their own security.91 The
dilemma
then
security
states
explains
why
egoists might
in other
increases
being equal,
s claim
rity.Wendt
on worst-case
see a
that
interaction;
positive
increase
states' security
commonly
defend
it). The
that realists
core
logic
of the
security
dilemma
makes
clear
that
90
72.
Wendt
396; see also idem (fn. 88,1995),
(fn. 88,1992),
91
This said, some realists have argued otherwise.
See, for example, Joseph M. Grieco, Cooperation
is because they have conflated
(Ithaca, N.Y.: Cornell University
Press, 1990). This
among Nations
means and ends. See Charles L. Glaser, "Correspondence: When
Cumulative
Relative Gains Matter,"
International Security 21 (Spring 1997). See also Robert
can Political Science Review 87 (March 1993), 127.
Powell,
"Guns, Butter,
198
WORLD POLITICS
can be
since forces that are larger or
self-defeating,
can lead to reduced
than necessary
military
threatening
capabili
ties and/or negative
In fact,
spirals in beliefs about adversaries' motives.
states
Wendt's
how
motives
of
about
the
description
facing uncertainty
to the realist
of others should interact?his
alternative
prescription?is
worst-case
analysis
more
knowl
Wendt
mas.93 The
too
believes the se
it
of states, he overlooks
the constraints
curity
can
too
is
about the general ability
impose and consequendy
optimistic
to avoid
of states to change their practices
and use signaling
competi
states may be able to over
tive relations.94 As I have already
explained,
come these constraints
on unit-level
of others'
by relying
knowledge
motives.
is cast
is the creation
Critique
3: Offense-Defense
Theory
of offensive
indistinguishability
undermines the theory
is
arguing,
analysis.
Is Flawed
and defensive
weapons
cannot be
and defense
since
argue that offense
distinguished
can
all
be
used
for
both
and
offense
defense.
There
weapons
virtually
cannot be measured
the balance
and the policy
fore, they continue,
Critics
guidance
sheimer
of offense-defense
argues,
for example,
cannot be
Mear
theory
implemented.95
that determining
the offense-defense
bal
and defensive
weapons."96
92
Wendt
404-5.
(fn. 88,1992),
93
Ibid., 407.
94
turns to the existence of
406. Wendt
See especially Wendt
(fn. 88,1992),
predatory (greedy) states
a
to
realm (pp. 407-9). However,
the weaker structural-re
explain how anarchy becomes
competitive
in combination with a security dilemma,
is sufficient.
alist assumption of uncertainty
about motives,
95
This section draws on Kaufmann
and Glaser
addresses a number of additional
(fn. 25), which
and Its Critics," Security Studies 4
"Offense-Defense
criticisms, as does Sean M. Lynn-Jones,
Theory
(Summer 1995). Jack S. Levy provides some of the early criticisms; see Levy, "The Offensive/Defen
sive Balance of Military Technology:
28 (June 1984).
Quarterly
96
Mearsheimer
(fn. 86), 23.
A Theoretical
and Historical
Analysis,"
International
Studies
SECURITYDILEMMA REVISITED
line of criticism,
This
however,
reflects
two fundamental
199
misunder
spective
defender
in the
may or may not result
of the same types of weapons.
the balance
then requires
measuring
This
some
attacker
and
Either
way,
deploying
a
given these forces,
performing
net
kind of
the ability of the attacker's forces to
assessment?analyzing
defeat the defender's
forces.
the size of the attacker's forces to
Adjusting
determine
how large they must be to succeed provides
the information
cost
to
that determines
the
ratio of offense
defense.97
in
Second,
on whether
focusing
a weapon
can be used
by both
the
focus
balance.
For
instead
on how
example,
the weapon
influences
the offense-defense
concludes
that "weapons may
Huntington
be
by comparative
net assessment,
that
is, by comparing
the offense
defense balance when both sides deploy the weapon with the balance
when neither deploys it. If deploying theweapon shifts the balance to
ward
offense
(defense),
then
the weapon
can be classified
as offensive
Critics
or other biases
balance accurately, political, psychological,
can still
serious
the "objective"
generate
misperceptions.
Consequendy,
is not useful for
balance
offense-defense
states'
behavior.99
predicting
fense-defense
97
For a different response, see also Lynn-Jones
(fn. 95), 674-77.
98
Samuel P. Huntington,
"U.S. Defense
Strategy: The Strategic Innovations of the Reagan Years,"
in Joseph Kruzel, ta., American Defense Annual,
1987-1988
Books,
(Lexington, Mass.: Lexington
28.
1987), 36. See also Gray (fn. 80,1993),
99
See, for example, Levy (fn. 95), 222. For related discussion of this criticism, see Lynn-Jones
(fn.
95), 677-82.
WORLD POLITICS
200
Although
the
offense-defense
theories,
theory. Like all structural
are mediated
structure
must
of
the
effects
that
ory
through
recognize
or not. Nevertheless,
accurate
whether
offense
states' perceptions,
to enable us to
defense
predict states' behavior given
theory is necessary
In addition,
balance.
of the offense-defense
their actual perception
fense-defense
when
misperceptions
as a,baseline
necessary
the offense-defense
do occur,
against
and their consequences.
misperceptions
Research
article
This
to assess
which
leave
should
remains
balance
the seriousness
of the
Agenda
under
that "Cooperation
little doubt
the Se
the security
large and
and offense-defense
dilemma
impressive
literature. What
work
a
theory and spawned
remains to be done? I sug
Security
variety
offense-defense
of angles,
Greed
a
From
we
have
seen
and
the security dilemma
when
and insightful
important
that
are less
arguments
secure
states,
greedy states,
greedy
especially
that helps determine
tional conflict. Research
of interna
and inten
the frequency
states
In
valuable.
be
therefore
would
addition,
quite
sity of greedy
concern
for theory building:
about greedy states poses a basic challenge
a reasonable
theories
that deal adequately
be to develop
goal would
as well
states'
of
and varying
the mixture
with
motives?greed
intensity
as
security.
Empirical
Given
Testing
of Offense-Defense
Hypotheses
warrants
hypotheses
can be made
contributions
testing. Valuable
empirical
states assess their
in
whether
(1) that examines
security
further
by research
terms of power ormilitary capability, (2) that explores how the balance
be measured,
cases.
to
specific
should
Caution
As
further
and
applies
these measures
versus Competition
empirical
testing
proceeds,
the time
considerations
not moderate
the
impact
of offense
SECURITYDILEMMA REVISITED
advantage?
For
example,
if offense
advantage
means
201
as
that attackers
well as defenders could lose big in amajor war, then why does offense
advantage
not
sometimes
states more
make
Rational
The
on
versus Biased
and war
then why
do states not
less
States
and predictive
explanatory
to which
states
the extent
dangerous,
so on.
cautious
value
suffer
of the security
dilemma
depends
from
bureaucratic,
psychological,
most
the
pre
important,
theory's optimistic
be cooperative
when
the security dilemma
is
to exaggerate
to
the advantages
of offense,
ignore
or
to
overlook
others'
restraint,
security dilemma,
then the opportunity
created by objective
conditions
will be squan
a
amount
dered. Although
substantial
of research has focused on mis
states
that others
perceptions,
important
face
answers
to critical
have misperceptions
remain wide
open. How
questions
been in fueling competition
and war?
100
See fn. 60 for work
arguments
is likely
to