Intuitively, the crucial feature of the above
blackmail
game is that the harm is inO?
Schwarz - Committments
table war) in the future.
Indeed, consumption stream resulting from starting a war at period t is the amount xt E[xjbt]: Player A may be willing to postpone the war at time t even if the transfer that he receives at time t and immediately afterwards is substantially less than the post war consumption level would have been.
If transfers shift balance of power, an increase in transfers to A will trigger even greater demands by the potential aggressor tomorrow.
In equilibrium future transfers will increase over time to some limit denoted b1 where b1 = limt!
1 bt.
For a given probability distribution of war outcomes g(xjc) the asymptotic value of transfer is given by the non-negative root of the following equation E[xjc = b1] = b1.
23
History provides us with a number of examples illustrating that a stream of transfers could
support peace better than lump-sum transfer. For decades since the last days of Chinguiz
23Forinstance,ifE[xjc]=1+ c thensolving1+ b1 =b1weobtainb1=c=1+1p5:Alsonote c+1 b1+1 22
that E[xjc = b1] = b1 only if b1 is O? nite.
? ? ? ? ? ? ? 11
Khan, the Mongol Empire was the largest state in the history of Earth by size (and the largest of the medieval empires by population). Most of the empire parts were controlled by relatively small forces, which collected modest, but regular tributes from occupied lands. Mongols used a threat of war to extract tributes from the territories under their control. In the political domain, a concession by one party often changes the balance of powers that in turn leads to an escalating sequence of concessions. (The history of the civil-rights movement provide a vivid example of this. ) Making a small change in a political institution may shift the balance of power making an institution unstable and leading to a sequence of reforms. Laguno? (2004) investigates the set of stable political institutions in a static setting. Our model suggests that political institutions may also be in a dynamic equilibrium where stakeholders initiating reform (as well as these opposed to it) understand and correctly anticipate that the change will trigger future reforms.
Now let us turn to the case where transfers do not ina? uence the balance of power.
Proposition 3 Suppose that A and B are risk-averse, and that past transfers do not a? ect the probability distribution of war outcomes, i. e. g(xjc) = g(x) for any c: Then there exists a peaceful sub-game perfect equilibrium.
From Proposition 1, we know that there exists a peaceful equilibrium whenever E[UA(X)] UA(0). Let us consider the case when E[UA(X)] > UA(0); and hence E[X] 0 by the risk- aversion assumption. Consider the following strategy proO? le: the strategy of player B calls for B-proO? le transfer schedule, i. e. the schedule that makes A indi? erent between starting a war and waiting a little. The strategy of A is to start a war, if B ever deviates from B-proO? le. These strategy proO? les constitute a peaceful equilibrium. By construction, it is the best response for player A to start a war if B ever deviates, and to abstain from a war as long as B follows this strategy. Now let us show that Bi? s strategy is a best response to Ai? s strategy. Indeed, the transfers should be constant as they do not a? ect the balance of power: b = b1 such that UA(b1) = E[UA(Xjb1)] for all : The choice of player B is between deviating and receiving the consumption stream of x L thereafter, or receiving b1: Since B is risk-averse, Bi? s best response is indeed to follow B-proO? le transfer schedule.
The economic intuition behind the above propositions do not require the assumption that consumption proO? le is continuos. However, this assumption does have some interesting implications. For instance, in the context of Proposition 3, the following strategy proO? le
12
constitutes a Nash equilibrium: party B transfers at a rate bt = E[X] (recall that we assume here that the distribution of X; the outcome of war, does not depend on transfers), and if it ever deviates, it rapidly decreases transfer rate to zero. And party A starts a war if and only if party B deviates. It is easy to see that this strategies form an equilibrium, where no war occurs on the equilibrium path. However, this equilibrium is not sub-game perfect. Indeed, if B deviates and transfers become slightly less then E[X]; it is not in the interest of party A to carry out the threat of immediately starting a war because party A is strictly better o? not starting a war as far as transfer level stays over b1 deO? ned by UA(b1) = E[UA(X)]: Indeed, even if party A believes that B is going to reduce transfers to zero very soon, there is no reason not to wait until transfer rate would drop to b1: Consequently, continuity implies that out of a large set of Nash equilibria, only the least favorable for A survives subgame perfection. The following simple proposition generalizes this argument.
Proposition 4 In any sub-game perfect equilibrium, the expected pay-o? of A is equal to the expected pay-o? of A in the case of war at t = 0: The pre-war consumption proO? le coincides with the B-proO? le.
Propositions 2 and 3 show that a carefully negotiated treaty may be a self-enforcing peace agreements. However, for some parameter values a self-enforcing peace agreement is not feasible. Suppose both agentsi? utility functions are strictly concave. In this case when consumption is large, the marginal utility is very small, and when consumption is negative, the marginal utility of consumption is large. If transfer shift the balance of power the weaker party will have to transfer more and more resources in order to appease the potential aggressor. Due to concavity of the utility function the weaker party may O? nd the prospect of making big transfers later more painful than O? ghting the war earlier. The example demonstrates that a self enforcing peace agreement between risk averse parties may not be viable if transfers shift the balance of power.
Example 1 Let ct denote the consumption level of A at time t: Suppose that the outcome of a cona? ict is deterministic: if a war occurs at time , the strong side, A; receives post cona? ict consumption a? ow at the rate of c +2, while post cona? ict consumption of the weak side, B;is c 2 L per period, L > 0. Let instaRntaneous utility of both parties be U (c) = e c and the total utility of either player is Vi = 01 0:9tU(ci(t))dt where i = A;B: Then there does not exist a sub-game perfect peaceful equilibrium.
13
The above example shows that not only the violation of power parity may prompt a war, but the mere expectation of a future power shift may prompt a war. Indeed, a party whose relative power is expected to diminish if it were to pursue an appeasement strategy may prefer to O? ght a war sooner rather than later (provided that the discount factor is su? ciently high). 24 Fearon (1995) surveys a number of authors that support this conclusion, citing, among many others, Taylor (1954): i`Every war between the Great Powers [in the period of 1848-1918] started as a preventive war, not a war of conquesti^, and Carr (1964): i`The most serious wars are fought in order to make onei? s own country military stronger or, more often, to prevent another country from becoming military strongeri^. Within this logic, Example 1 formalizes the Hirshleifer (2001) assertion that if the opponent (A; the potential aggressor in our setup) is hostile and non-appeasable, the best possible strategy is to keep the aggressor poor, so that if he opts for a war, he has as little resources as possible.
4 Main Result: Brinkmanship and Blackmail
Unless the potential aggressor expects to beneO? t from a cona? ict, extracting any concessions from the weaker party is not subgame-perfect. In light of this, any blackmail is doomed to failure if the blackmailer su? ers some costs associated with ina? icting the damage on the victim. In this section, we demonstrate that this result hinges on the assumption that the potential aggressor has a small action set: previously, we assumed that the only possible action are peace or ending the game with an all-out war. Here, we show that the bargaining power of the potential aggressor is dramatically increased if action sets includes actions that are in between the two extremes mentioned above.
For instance, we argue that possession of nuclear weapons may not be useful for extracting concessions from weaker countries. A country with air force capable of delivering compara- ble destruction using conventional weapons may be able to extract concessions from other countries, because, unlike a nuclear bomb, conventional weapons are a i`divisible threati^. The importance of i`divisible threatsi^is not limited to international negotiations. We argue that the i`divisibility of a threati^matters as much in cona? icts and negotiations within or- ganizations as it does in international relations. The applicability of the model considered
24Formally, there are no beliefs in this model. However, it is useful to think of conditional strategies as those of based on expectations.
? 14
in this section is not limited to blackmail in international negotiations. It captures essential features of blackmail in a wide range of situations. For instance, a manager who has the power to O? re a worker at any point in time is far less powerful than a manager who has a range of punishments less severe than O? ring. In a normal usage the world i`blackmaili^ in not an appropriate description of a manager threatening a worker with O? ring unless the worker puts forth good e? ort. However, from the modeling preceptive, it is no di? erent from blackmail.
In the previous sections, we considered an inO? nite game between a potential aggressor and a victim where the aggressor can exercise the threat and end the game and the victim can make a single transfer or a sequence of transfers to the aggressor in order to appease him. If carrying out the threat is costly for the potential aggressor, the unique subgame perfect equilibrium entails no transfers (This statement is made formal in Proposition 1 and is also emphasized by Shavell and Spier, 2002). We show that a threatener is able to extract a stream of positive payments if the threat is probabilistic or inO? nitely i? divisible. i?
Before proceeding to the model let us illustrate i`probabilistic threatsi^with the story of a French diplomat Eon de Beaumont who blackmailed the French king Louis XV. 25 During his service as a diplomat in London, Eon de Beaumont found himself involved in a feud with the French ambassador. When di? Eon was asked by his superior to resign from em- bassy and return to France, he decided to resort to blackmail. Chevalier di? Eon had in his possession a copy of the diplomatic correspondence that was so secret that even the French ambassador to England did not know about its existence26. Chevalier di? Eon threatened to reveal the diplomatic correspondence to the Englishmen; among other things, the cor- respondence contained information about Louis XV secret preparation for invasion of the British Islands. di? Eon demanded from the French king money and a permission to remain in England. However, the king was not the only party who stood to loose from revelation of the secret correspondence. Publishing the correspondence could have made di? Eon the most despised traitor on both sides of the channel. At the O? rst glance di? Eon did not have a credi-
25For a complete account see Broglie (1879).
26An institution known as the i`kingi? s secreti^was a unique feature of the french diplomacy during the
reign of Louis XV. The members of the kingi? s secret, of which Chevalier di? Eon was one, received special directives from the kingi? s secret. The rest of the embassy sta? including the ambassador were not aware of the existence of this secret correspondence. A detailed account of the working of the kingi? s secret can be found in Broglie (1879).
? 15
ble threat; understandably, the crown found di? Eon demands ridiculous and was reluctant to o? er concessions.
To persuade the king of the seriousness of his intentions, di? Eon published a pamphlet that included small bits of the text from the secrete correspondence and vague hints about its existence. That prompted France to grant di? Eoni? s request: he was allowed to stay in England and received the allowance from the embassy. The bargaining power of di? Eon was enhanced by his ability to ina? ict arbitrary small amounts of harm by leaking small bits of secrete correspondence. The actions of di? Eon were a sort of brinkmanship. Each public hint about the correspondence could have tipped of the English that di? Eon stored the secret documents outside the embassy, in which case, the English might have tried to steal the documents.
To model brinkmanship, we modify the model of the previous section to allow for proba- bilistic threats. In the previous section, the only threat available to the aggressor was to start an all out war, that would impose a cost x on him and a cost x + L on the weaker party, where L > 0. We model divisible threats by allowing the aggressor, A; to use probabilistic threats. SpeciO? cally, the aggressori? s may take an observable action that leads to war with some positive probability p; p < 1:27 We will show that in this case the bargaining power of the aggressor is much greater than in the case where probabilistic threat is not available. Indeed, if the only threat the blackmailer has is to launch a war, he could not do better than extracting the expected gain from the war, which is zero if x < 0. In stark contrast to Proposition 1, with probabilistic threats, the strong side can extract the whole surplus from the victim. 28
There are two players, the blackmailer, A; and the victim, B. For the sake of simplicity, let agents be risk-neutral, and the outcome of war to be deterministic and if a war occurs, the Ai? s instantaneous consumption thereafter is x and the Bi? s is y = x L: We consider the case where war is an unambiguously bad outcome for both sides that is x < 0 and y < 0:29 As above, the time is continuous. In each period t 2 [0; +1); the victim makes a
27Alternatively, one might assumes that the blackmailer has a possibility to distribute harm between
di? erent periods instead of launching a war at once.
28The same logic applies to wars: a i? bullyi? state that has only two options to either start a large war, or
not to start a war at all has much less bargaining power than a state that can start a tiny war or a large
war or anything in between.
29In particular, this assumption means that there is no impact of transfers on balance of power.
? 16
non-negative transfer bt to the blackmailer. Prior to the cona? ict the consumption of parties A and B is bt and bt respectively. At each period party A (the blackmailer) chooses action at 2 fW; P g. If at = W; then the nature moves: with probability p a war occurs and the game ends, and with probability 1 p the game continues. 30 An important assumption is that the history of actions is fully observable. The following proposition shows that availability of a probabilistic threat allows the potential aggressor to extract a share of surplus close to one.
Proposition 5 Suppose that (1 p)y px: For any 0 < b < y there exists a sub-game perfect equilibrium where along the equilibrium path party B transfers resources to A at rate b and party A never starts a cona? ict.
Let us sketch the intuition behind this result. There exists an equilibrium where party A does not attack B as far as it receives transfers at rate b: If party B ever deviates party A takes action W to punish party B: Party A continues to repeat the punishment at frequent intervals as long as party B continues to deviate. If a deviation of party B remains unpunished then party B stops transferring resources to party A. There are no beliefs in the model because the solution concept here is a subgame perfect Nash equilibrium; however, to understand the intuition behind the equilibrium it is useful to talk in terms of beliefs. If any deviation of party B remains unpunished, party B comes to a conclusion that future deviations will not trigger punishments from party A. Thus, party A will punish deviations of B in order to make sure that party B will continue to transfer resources in the future.
Intuitively, the crucial feature of the above blackmail game is that the harm is inO? nitely- divisible. The condition px + (1 p)y 0 means that the aggressor, A; prefers gambling on war (i. e. choosing at = W ) that yields a stream of losses at rate x with probability p and a stream of transfers at rate b with probability (1 p) over receiving zero transfers from now on. Thus, it is the best response for party A to punish deviations by B and it is the best response for B to transfer resource to A at rate b:
It is worth noting that the blackmail game has multiple equilibria. A war never occurs on the equilibrium path in the equilibrium sketched above. However, there are many econom- ically plausible equilibria where wars occur with positive probability because probabilistic threats or i`brinkmanshipi^ occurs on the equilibrium path. For instance, the equilibrium strategy of player A may call for taking action W (engaging in brinkmanship) every O? ve
30We omit the formal description of the space of histories because it is analogous to the previous section. 17
? years. If party A deviates from this strategy it looses credibility as a potential aggressor and
never receives transfers in the future. There is an equilibrium where along the equilibrium
path the weak party occasionally reduces transfer level and the strong party immediately
takes action W; with subsequent resumption of transfers at the normal level. Note that ac-
tion W is not a punishment for a deviation, the victim was supposed to reduce the transfers
and the aggressor is supposed to i`punishi^this equilibrium behavior. The intuition for this
result is as following. According to Proposition 4 there exists a subgame perfect equilibrium
with transfers 9 y and there is an equilibrium with no transfers. It is easy to construct an 10
equilibrium where transfers are 1 y per period and once a year transfers by B are reduced to 2
zero for one month. At the end of that month A plays action W and B resumes transfers at rate 1y. If aggressor fails to take action W both players switch to playing the equilibrium
2
without transfers in the remaining subgame. If party B fails to reduce transfer to zero at the end of the year both parties play the equilibrium where transfers are 9 y in the remaining
10
subgame.
The model described above may shed some light on economics of terror. For decades,
the Irish Republican Army terrorizes the British government and people. A distinct feature of the IRA terror tactics is that acts of violence usually cause relatively small death toll, but, in retrospect, each attack might have caused much more human loss. The British making slow concessions and IRA engaging in occasional terrorist acts is consistent with an equilibrium path of play. Occasional bomb threats may be necessary to make the terroristsi? threat credible and thus induce more concessions from the British. Of course, there exists a more e? cient equilibrium where concessions are obtained without violence.
5 Conclusion
The bargaining game described herein captures some essential features of relationships were neither party has commitment power. A self-enforcing agreement is feasible if parties are either risk neutral or transfers do not change the balance of power. A successful peace agreement is likely to consists of a sequence of concessions. We show that if both parties are risk-averse and if transfers change balance of powers an ine? cient cona? ict may be inevitable.
The model of brinkmanship is our main contribution. We model brinkmanship as an ability to take an observable action that with large probability have no consequences and
? ? ? ? 18
with small probability ends the game with payo? s that are very undesirable for both sides. Examples of brinkmanship can be found situations ranging from international relations to Hollywood movies were gangster shoot under the feet to force a victim to cooperate. We show that if the action space of the potential aggressor allows him only two actions such as i? cooperatei? or i? go to the ultimate threat point,i? his bargaining power is far less than in a case where the potential aggressor can make probabilistic threats.
References
Acemoglu, Daron (2003) Why Not a Political Coase Theorem? Social Cona? ict, Commitment and Politics, Journal of Comparative Economics, Vol. 31, pp. 620n? 652.
Baliga, S. and Sjostrom, T. (2004) Arms Races and Negotiations, Review of Economic Studies, 71:2, 351-369.
Barzel, Y. (2002) A Theory of the State, Cambridge Univ. Press.
Becker, G. (1983) A Theory of Competition among Pressure Groups for Political Ina? uence, Quarterly Journal of Economics, 98, 371-400.
Besse, J. and Lasswell, H. (1950) Our Columnists on the A-Bomb, World Politics, 3:1, 72-87. Blainey, G. (1988) The Causes of War, 2d ed. New York: Free Press.
Broglie, Albert, duc de, (1879) The kingi? s secret: being the secret correspondence of Louis XV with his diplomatic agents, from 1752 to 1774. By the Duc de Broglie. London, New York [etc. ] Cassell, Petter & Galpin.
Carr, E. (1964) The Twenty Years Crisis, 1919-1939, New York: Harper and Row.
Coase, R. (1960) The Problem of Social Cost, Journal of Law and Economics, 1.
Coase, R. (1988) Blackmail, Virginia Law Review, 74: 4, 655-676.
Dixit, A. , Grossman, G. , and Gul, F. (2000) The Dynamics of Political Compromise, Journal of Political Economy, 108: 531-568.
Ginsburg, D. and Shechtman, P. (1993) Blackmail: An Economic Analysis of the Law, U. Penn Law Review, 141:1849-1876.
Fearon (1995) Rationalist Explanations for War, International Organization, 49 (3), 379-414. Filson, D. , and Werner, S. (2002) A Bargaining Model of War and Peace: Anticipating the Onset, Duration, and Outcome of War. American Journal of Political Science, 46, 819n? 38. Garnham, D. (1988) Power Parity and Lethal International Violence, 1969-1973, Journal of
19
Cona? ict Resolution, 20: 379-394.
Hensel, P. and Diehl, P. (1994) It Takes Two to Tango: Nonmilitarized Response in Interstate Disputes, Journal of Cona? ict Resolution, Vol. 38, No 3, 479-506.
Hirshleifer, J. (2001) Appeasement: Can it Work? American Economic Review Papers and Proceedings, v. 91, n. 2, 342-346.
Holsti, K. (1991) Peace and War: Armed Cona? icts and International Order, London: Rout- ledge.
Huth, P. (1988) Extended Deterrence and the Prevention of War, New Haven, CT: Yale University Press.
Laguno? , R. (2004) Dynamic Stability and Reform of Political Institutions, Georgetown University Manuscript
Leng, R. (1993) Interstate Crisis Behavior, 1816-1980: Realism versus Reciprocity, Cam- bridge: Cambridge University Press.
North, D. and Weingast, B. (1989) Constitutions and Commitment: The Evolution of In- stitutional Governing Public Choice in Seventeenth-Century England, Journal of Economic History.
Pillar, P. (1983) Negotiating Peace: War Termination as a Bargaining Process. Princeton: Princeton University Press.
Posner, R. (1993) Blackmail, Privacy, and Freedom of Contract, U. Penn Law Review, 141:1817-1843.
Powell, R. (2002) Bargaining Theory and International Cona? ict, Annual Review of Political Science, 5: 1-30.
Powell, R. (2004) War as a Commitment Problem, mimeo.
Powell, R. (1998) In the Shadow of Power: States and Strategies in International Politics, Princeton Univ. Press, Princeton, NJ.
Rajan, R. and Zingales, L (2000) The Tyranny of Ine? cient: An Enquiry into the Adverse Consequences of Power Struggles, Journal of Public Economics, Vol. 76, no. 3, 521-558. Schelling, T. (1966) Arms and Ina? uence. New Haven: Yale University Press.
Shavell, S. (1993) An Economic Analysis of Threats and Their Illegality: Blackmail, Extor- tion, and Robbery, U. Penn Law Review, 141:1877-1903.
Shavell, S. and Spier, K. (2002) Threats Without Binding Commitment, Topics in Economic Analysis and Policy, Vol. 2. Issue 1.
20
Shepsle, K. (1991). Discretion, Institutions and the Problem of Government Commitment in Bourdieu, Pierre and Coleman, James (eds) Social Theory for a Changing Society, Boulder: Westview Press.
Slantchev, B. (2001) Territory-Induced Credible Commitments in the European Concert System, 1815-54, mimeo.
Slantchev, B. (2003) The Power to Hurt: Costly Cona? ict with Completely Informed States, American Political Science Review, Vol. 47, No. 1. (March, 2003), pp. 123-135.
Slantchev, B. (2004) How Initiators End Their Wars: The Duration of Warfare and the Terms of Peace, American Journal of Political Science, 48:4. 813-829.
Smith, A. , and Stam, A. (2003) Bargaining and the Nature ofWar, mimeo.
Taylor, A. (1954) The Struggle for Mastery in Europe, 1848-1918, London: Oxford Univer- sity Press.
Taylor, A. (1961) The Origins of the World War Two, New York: Atheneum.
Wagner, H. (1982) Deterrence and Bargaining, Journal of Cona? ict Resolution, Vol. 2, No 6, 329-358.
Walzer, M. (1992) Just and Unjust Wars, 2d ed. , Basic Books.
Weede, E. (1976) Overwhelming Preponderance as a Pacifying Condition among Contiguous Asian Dyads, 1950-1969, Journal of Cona? ict Resolution, 20: 395-411.
Wilkenfeld, J. (1991) Trigger-response Transitions in Foreign Policy size, 1929-1988, Journal of Cona? ict Resolution, 35: 143-69.
Wittman, D. (2003) Credible Commitments and War: a Re-Evaluation, working paper, UCSC Economics Department
21
Appendix The setup
The set of players is N = fA;Bg: The set of histories is denoted H and ; 2 H. A vector function h, ht = (at; kt) belongs to the set of non-terminal histories if and only if the support ofhissomReinterval[0;T[;andforanyt2[0;T[wehaveat =Pandbt 0where bt = k0 + 0t ktdt: There is a natural interpretation of kt: we assumed that the function representing transfer proO? le is di? erentiable and thus continuous. Consequently, although player B can change the transfer level at any instant his choice must be consistent with continuity assumption, essentially, moment by moment player B chooses the derivative of transfer proO? le, which we denote kt: (We slightly abuse notation by denoting agenti? s choice of the level of transfer at time zero by k0. )
Let Z denote the set of all terminal histories. The set Z consists of two types of terminal histories: inO? nite (these where a cona? ict never occurs) and O? nite (these that end in a war). A vector function ht = (at;kt) belongs to the set of inO? nite histories if and only if h has support [0; +1[ and for all t; at = P and bt 0: A vector function ht = (at; kt) belongs to a set of O? nite terminal histories if and only if it has support [0; ], bt 0 and at = P for all t < ; and w() = W:
The choice correspondence P(h) = fA;Bg for all h 2 HnZ: In other words following any non terminal history both players take action simultaneously.
History provides us with a number of examples illustrating that a stream of transfers could
support peace better than lump-sum transfer. For decades since the last days of Chinguiz
23Forinstance,ifE[xjc]=1+ c thensolving1+ b1 =b1weobtainb1=c=1+1p5:Alsonote c+1 b1+1 22
that E[xjc = b1] = b1 only if b1 is O? nite.
? ? ? ? ? ? ? 11
Khan, the Mongol Empire was the largest state in the history of Earth by size (and the largest of the medieval empires by population). Most of the empire parts were controlled by relatively small forces, which collected modest, but regular tributes from occupied lands. Mongols used a threat of war to extract tributes from the territories under their control. In the political domain, a concession by one party often changes the balance of powers that in turn leads to an escalating sequence of concessions. (The history of the civil-rights movement provide a vivid example of this. ) Making a small change in a political institution may shift the balance of power making an institution unstable and leading to a sequence of reforms. Laguno? (2004) investigates the set of stable political institutions in a static setting. Our model suggests that political institutions may also be in a dynamic equilibrium where stakeholders initiating reform (as well as these opposed to it) understand and correctly anticipate that the change will trigger future reforms.
Now let us turn to the case where transfers do not ina? uence the balance of power.
Proposition 3 Suppose that A and B are risk-averse, and that past transfers do not a? ect the probability distribution of war outcomes, i. e. g(xjc) = g(x) for any c: Then there exists a peaceful sub-game perfect equilibrium.
From Proposition 1, we know that there exists a peaceful equilibrium whenever E[UA(X)] UA(0). Let us consider the case when E[UA(X)] > UA(0); and hence E[X] 0 by the risk- aversion assumption. Consider the following strategy proO? le: the strategy of player B calls for B-proO? le transfer schedule, i. e. the schedule that makes A indi? erent between starting a war and waiting a little. The strategy of A is to start a war, if B ever deviates from B-proO? le. These strategy proO? les constitute a peaceful equilibrium. By construction, it is the best response for player A to start a war if B ever deviates, and to abstain from a war as long as B follows this strategy. Now let us show that Bi? s strategy is a best response to Ai? s strategy. Indeed, the transfers should be constant as they do not a? ect the balance of power: b = b1 such that UA(b1) = E[UA(Xjb1)] for all : The choice of player B is between deviating and receiving the consumption stream of x L thereafter, or receiving b1: Since B is risk-averse, Bi? s best response is indeed to follow B-proO? le transfer schedule.
The economic intuition behind the above propositions do not require the assumption that consumption proO? le is continuos. However, this assumption does have some interesting implications. For instance, in the context of Proposition 3, the following strategy proO? le
12
constitutes a Nash equilibrium: party B transfers at a rate bt = E[X] (recall that we assume here that the distribution of X; the outcome of war, does not depend on transfers), and if it ever deviates, it rapidly decreases transfer rate to zero. And party A starts a war if and only if party B deviates. It is easy to see that this strategies form an equilibrium, where no war occurs on the equilibrium path. However, this equilibrium is not sub-game perfect. Indeed, if B deviates and transfers become slightly less then E[X]; it is not in the interest of party A to carry out the threat of immediately starting a war because party A is strictly better o? not starting a war as far as transfer level stays over b1 deO? ned by UA(b1) = E[UA(X)]: Indeed, even if party A believes that B is going to reduce transfers to zero very soon, there is no reason not to wait until transfer rate would drop to b1: Consequently, continuity implies that out of a large set of Nash equilibria, only the least favorable for A survives subgame perfection. The following simple proposition generalizes this argument.
Proposition 4 In any sub-game perfect equilibrium, the expected pay-o? of A is equal to the expected pay-o? of A in the case of war at t = 0: The pre-war consumption proO? le coincides with the B-proO? le.
Propositions 2 and 3 show that a carefully negotiated treaty may be a self-enforcing peace agreements. However, for some parameter values a self-enforcing peace agreement is not feasible. Suppose both agentsi? utility functions are strictly concave. In this case when consumption is large, the marginal utility is very small, and when consumption is negative, the marginal utility of consumption is large. If transfer shift the balance of power the weaker party will have to transfer more and more resources in order to appease the potential aggressor. Due to concavity of the utility function the weaker party may O? nd the prospect of making big transfers later more painful than O? ghting the war earlier. The example demonstrates that a self enforcing peace agreement between risk averse parties may not be viable if transfers shift the balance of power.
Example 1 Let ct denote the consumption level of A at time t: Suppose that the outcome of a cona? ict is deterministic: if a war occurs at time , the strong side, A; receives post cona? ict consumption a? ow at the rate of c +2, while post cona? ict consumption of the weak side, B;is c 2 L per period, L > 0. Let instaRntaneous utility of both parties be U (c) = e c and the total utility of either player is Vi = 01 0:9tU(ci(t))dt where i = A;B: Then there does not exist a sub-game perfect peaceful equilibrium.
13
The above example shows that not only the violation of power parity may prompt a war, but the mere expectation of a future power shift may prompt a war. Indeed, a party whose relative power is expected to diminish if it were to pursue an appeasement strategy may prefer to O? ght a war sooner rather than later (provided that the discount factor is su? ciently high). 24 Fearon (1995) surveys a number of authors that support this conclusion, citing, among many others, Taylor (1954): i`Every war between the Great Powers [in the period of 1848-1918] started as a preventive war, not a war of conquesti^, and Carr (1964): i`The most serious wars are fought in order to make onei? s own country military stronger or, more often, to prevent another country from becoming military strongeri^. Within this logic, Example 1 formalizes the Hirshleifer (2001) assertion that if the opponent (A; the potential aggressor in our setup) is hostile and non-appeasable, the best possible strategy is to keep the aggressor poor, so that if he opts for a war, he has as little resources as possible.
4 Main Result: Brinkmanship and Blackmail
Unless the potential aggressor expects to beneO? t from a cona? ict, extracting any concessions from the weaker party is not subgame-perfect. In light of this, any blackmail is doomed to failure if the blackmailer su? ers some costs associated with ina? icting the damage on the victim. In this section, we demonstrate that this result hinges on the assumption that the potential aggressor has a small action set: previously, we assumed that the only possible action are peace or ending the game with an all-out war. Here, we show that the bargaining power of the potential aggressor is dramatically increased if action sets includes actions that are in between the two extremes mentioned above.
For instance, we argue that possession of nuclear weapons may not be useful for extracting concessions from weaker countries. A country with air force capable of delivering compara- ble destruction using conventional weapons may be able to extract concessions from other countries, because, unlike a nuclear bomb, conventional weapons are a i`divisible threati^. The importance of i`divisible threatsi^is not limited to international negotiations. We argue that the i`divisibility of a threati^matters as much in cona? icts and negotiations within or- ganizations as it does in international relations. The applicability of the model considered
24Formally, there are no beliefs in this model. However, it is useful to think of conditional strategies as those of based on expectations.
? 14
in this section is not limited to blackmail in international negotiations. It captures essential features of blackmail in a wide range of situations. For instance, a manager who has the power to O? re a worker at any point in time is far less powerful than a manager who has a range of punishments less severe than O? ring. In a normal usage the world i`blackmaili^ in not an appropriate description of a manager threatening a worker with O? ring unless the worker puts forth good e? ort. However, from the modeling preceptive, it is no di? erent from blackmail.
In the previous sections, we considered an inO? nite game between a potential aggressor and a victim where the aggressor can exercise the threat and end the game and the victim can make a single transfer or a sequence of transfers to the aggressor in order to appease him. If carrying out the threat is costly for the potential aggressor, the unique subgame perfect equilibrium entails no transfers (This statement is made formal in Proposition 1 and is also emphasized by Shavell and Spier, 2002). We show that a threatener is able to extract a stream of positive payments if the threat is probabilistic or inO? nitely i? divisible. i?
Before proceeding to the model let us illustrate i`probabilistic threatsi^with the story of a French diplomat Eon de Beaumont who blackmailed the French king Louis XV. 25 During his service as a diplomat in London, Eon de Beaumont found himself involved in a feud with the French ambassador. When di? Eon was asked by his superior to resign from em- bassy and return to France, he decided to resort to blackmail. Chevalier di? Eon had in his possession a copy of the diplomatic correspondence that was so secret that even the French ambassador to England did not know about its existence26. Chevalier di? Eon threatened to reveal the diplomatic correspondence to the Englishmen; among other things, the cor- respondence contained information about Louis XV secret preparation for invasion of the British Islands. di? Eon demanded from the French king money and a permission to remain in England. However, the king was not the only party who stood to loose from revelation of the secret correspondence. Publishing the correspondence could have made di? Eon the most despised traitor on both sides of the channel. At the O? rst glance di? Eon did not have a credi-
25For a complete account see Broglie (1879).
26An institution known as the i`kingi? s secreti^was a unique feature of the french diplomacy during the
reign of Louis XV. The members of the kingi? s secret, of which Chevalier di? Eon was one, received special directives from the kingi? s secret. The rest of the embassy sta? including the ambassador were not aware of the existence of this secret correspondence. A detailed account of the working of the kingi? s secret can be found in Broglie (1879).
? 15
ble threat; understandably, the crown found di? Eon demands ridiculous and was reluctant to o? er concessions.
To persuade the king of the seriousness of his intentions, di? Eon published a pamphlet that included small bits of the text from the secrete correspondence and vague hints about its existence. That prompted France to grant di? Eoni? s request: he was allowed to stay in England and received the allowance from the embassy. The bargaining power of di? Eon was enhanced by his ability to ina? ict arbitrary small amounts of harm by leaking small bits of secrete correspondence. The actions of di? Eon were a sort of brinkmanship. Each public hint about the correspondence could have tipped of the English that di? Eon stored the secret documents outside the embassy, in which case, the English might have tried to steal the documents.
To model brinkmanship, we modify the model of the previous section to allow for proba- bilistic threats. In the previous section, the only threat available to the aggressor was to start an all out war, that would impose a cost x on him and a cost x + L on the weaker party, where L > 0. We model divisible threats by allowing the aggressor, A; to use probabilistic threats. SpeciO? cally, the aggressori? s may take an observable action that leads to war with some positive probability p; p < 1:27 We will show that in this case the bargaining power of the aggressor is much greater than in the case where probabilistic threat is not available. Indeed, if the only threat the blackmailer has is to launch a war, he could not do better than extracting the expected gain from the war, which is zero if x < 0. In stark contrast to Proposition 1, with probabilistic threats, the strong side can extract the whole surplus from the victim. 28
There are two players, the blackmailer, A; and the victim, B. For the sake of simplicity, let agents be risk-neutral, and the outcome of war to be deterministic and if a war occurs, the Ai? s instantaneous consumption thereafter is x and the Bi? s is y = x L: We consider the case where war is an unambiguously bad outcome for both sides that is x < 0 and y < 0:29 As above, the time is continuous. In each period t 2 [0; +1); the victim makes a
27Alternatively, one might assumes that the blackmailer has a possibility to distribute harm between
di? erent periods instead of launching a war at once.
28The same logic applies to wars: a i? bullyi? state that has only two options to either start a large war, or
not to start a war at all has much less bargaining power than a state that can start a tiny war or a large
war or anything in between.
29In particular, this assumption means that there is no impact of transfers on balance of power.
? 16
non-negative transfer bt to the blackmailer. Prior to the cona? ict the consumption of parties A and B is bt and bt respectively. At each period party A (the blackmailer) chooses action at 2 fW; P g. If at = W; then the nature moves: with probability p a war occurs and the game ends, and with probability 1 p the game continues. 30 An important assumption is that the history of actions is fully observable. The following proposition shows that availability of a probabilistic threat allows the potential aggressor to extract a share of surplus close to one.
Proposition 5 Suppose that (1 p)y px: For any 0 < b < y there exists a sub-game perfect equilibrium where along the equilibrium path party B transfers resources to A at rate b and party A never starts a cona? ict.
Let us sketch the intuition behind this result. There exists an equilibrium where party A does not attack B as far as it receives transfers at rate b: If party B ever deviates party A takes action W to punish party B: Party A continues to repeat the punishment at frequent intervals as long as party B continues to deviate. If a deviation of party B remains unpunished then party B stops transferring resources to party A. There are no beliefs in the model because the solution concept here is a subgame perfect Nash equilibrium; however, to understand the intuition behind the equilibrium it is useful to talk in terms of beliefs. If any deviation of party B remains unpunished, party B comes to a conclusion that future deviations will not trigger punishments from party A. Thus, party A will punish deviations of B in order to make sure that party B will continue to transfer resources in the future.
Intuitively, the crucial feature of the above blackmail game is that the harm is inO? nitely- divisible. The condition px + (1 p)y 0 means that the aggressor, A; prefers gambling on war (i. e. choosing at = W ) that yields a stream of losses at rate x with probability p and a stream of transfers at rate b with probability (1 p) over receiving zero transfers from now on. Thus, it is the best response for party A to punish deviations by B and it is the best response for B to transfer resource to A at rate b:
It is worth noting that the blackmail game has multiple equilibria. A war never occurs on the equilibrium path in the equilibrium sketched above. However, there are many econom- ically plausible equilibria where wars occur with positive probability because probabilistic threats or i`brinkmanshipi^ occurs on the equilibrium path. For instance, the equilibrium strategy of player A may call for taking action W (engaging in brinkmanship) every O? ve
30We omit the formal description of the space of histories because it is analogous to the previous section. 17
? years. If party A deviates from this strategy it looses credibility as a potential aggressor and
never receives transfers in the future. There is an equilibrium where along the equilibrium
path the weak party occasionally reduces transfer level and the strong party immediately
takes action W; with subsequent resumption of transfers at the normal level. Note that ac-
tion W is not a punishment for a deviation, the victim was supposed to reduce the transfers
and the aggressor is supposed to i`punishi^this equilibrium behavior. The intuition for this
result is as following. According to Proposition 4 there exists a subgame perfect equilibrium
with transfers 9 y and there is an equilibrium with no transfers. It is easy to construct an 10
equilibrium where transfers are 1 y per period and once a year transfers by B are reduced to 2
zero for one month. At the end of that month A plays action W and B resumes transfers at rate 1y. If aggressor fails to take action W both players switch to playing the equilibrium
2
without transfers in the remaining subgame. If party B fails to reduce transfer to zero at the end of the year both parties play the equilibrium where transfers are 9 y in the remaining
10
subgame.
The model described above may shed some light on economics of terror. For decades,
the Irish Republican Army terrorizes the British government and people. A distinct feature of the IRA terror tactics is that acts of violence usually cause relatively small death toll, but, in retrospect, each attack might have caused much more human loss. The British making slow concessions and IRA engaging in occasional terrorist acts is consistent with an equilibrium path of play. Occasional bomb threats may be necessary to make the terroristsi? threat credible and thus induce more concessions from the British. Of course, there exists a more e? cient equilibrium where concessions are obtained without violence.
5 Conclusion
The bargaining game described herein captures some essential features of relationships were neither party has commitment power. A self-enforcing agreement is feasible if parties are either risk neutral or transfers do not change the balance of power. A successful peace agreement is likely to consists of a sequence of concessions. We show that if both parties are risk-averse and if transfers change balance of powers an ine? cient cona? ict may be inevitable.
The model of brinkmanship is our main contribution. We model brinkmanship as an ability to take an observable action that with large probability have no consequences and
? ? ? ? 18
with small probability ends the game with payo? s that are very undesirable for both sides. Examples of brinkmanship can be found situations ranging from international relations to Hollywood movies were gangster shoot under the feet to force a victim to cooperate. We show that if the action space of the potential aggressor allows him only two actions such as i? cooperatei? or i? go to the ultimate threat point,i? his bargaining power is far less than in a case where the potential aggressor can make probabilistic threats.
References
Acemoglu, Daron (2003) Why Not a Political Coase Theorem? Social Cona? ict, Commitment and Politics, Journal of Comparative Economics, Vol. 31, pp. 620n? 652.
Baliga, S. and Sjostrom, T. (2004) Arms Races and Negotiations, Review of Economic Studies, 71:2, 351-369.
Barzel, Y. (2002) A Theory of the State, Cambridge Univ. Press.
Becker, G. (1983) A Theory of Competition among Pressure Groups for Political Ina? uence, Quarterly Journal of Economics, 98, 371-400.
Besse, J. and Lasswell, H. (1950) Our Columnists on the A-Bomb, World Politics, 3:1, 72-87. Blainey, G. (1988) The Causes of War, 2d ed. New York: Free Press.
Broglie, Albert, duc de, (1879) The kingi? s secret: being the secret correspondence of Louis XV with his diplomatic agents, from 1752 to 1774. By the Duc de Broglie. London, New York [etc. ] Cassell, Petter & Galpin.
Carr, E. (1964) The Twenty Years Crisis, 1919-1939, New York: Harper and Row.
Coase, R. (1960) The Problem of Social Cost, Journal of Law and Economics, 1.
Coase, R. (1988) Blackmail, Virginia Law Review, 74: 4, 655-676.
Dixit, A. , Grossman, G. , and Gul, F. (2000) The Dynamics of Political Compromise, Journal of Political Economy, 108: 531-568.
Ginsburg, D. and Shechtman, P. (1993) Blackmail: An Economic Analysis of the Law, U. Penn Law Review, 141:1849-1876.
Fearon (1995) Rationalist Explanations for War, International Organization, 49 (3), 379-414. Filson, D. , and Werner, S. (2002) A Bargaining Model of War and Peace: Anticipating the Onset, Duration, and Outcome of War. American Journal of Political Science, 46, 819n? 38. Garnham, D. (1988) Power Parity and Lethal International Violence, 1969-1973, Journal of
19
Cona? ict Resolution, 20: 379-394.
Hensel, P. and Diehl, P. (1994) It Takes Two to Tango: Nonmilitarized Response in Interstate Disputes, Journal of Cona? ict Resolution, Vol. 38, No 3, 479-506.
Hirshleifer, J. (2001) Appeasement: Can it Work? American Economic Review Papers and Proceedings, v. 91, n. 2, 342-346.
Holsti, K. (1991) Peace and War: Armed Cona? icts and International Order, London: Rout- ledge.
Huth, P. (1988) Extended Deterrence and the Prevention of War, New Haven, CT: Yale University Press.
Laguno? , R. (2004) Dynamic Stability and Reform of Political Institutions, Georgetown University Manuscript
Leng, R. (1993) Interstate Crisis Behavior, 1816-1980: Realism versus Reciprocity, Cam- bridge: Cambridge University Press.
North, D. and Weingast, B. (1989) Constitutions and Commitment: The Evolution of In- stitutional Governing Public Choice in Seventeenth-Century England, Journal of Economic History.
Pillar, P. (1983) Negotiating Peace: War Termination as a Bargaining Process. Princeton: Princeton University Press.
Posner, R. (1993) Blackmail, Privacy, and Freedom of Contract, U. Penn Law Review, 141:1817-1843.
Powell, R. (2002) Bargaining Theory and International Cona? ict, Annual Review of Political Science, 5: 1-30.
Powell, R. (2004) War as a Commitment Problem, mimeo.
Powell, R. (1998) In the Shadow of Power: States and Strategies in International Politics, Princeton Univ. Press, Princeton, NJ.
Rajan, R. and Zingales, L (2000) The Tyranny of Ine? cient: An Enquiry into the Adverse Consequences of Power Struggles, Journal of Public Economics, Vol. 76, no. 3, 521-558. Schelling, T. (1966) Arms and Ina? uence. New Haven: Yale University Press.
Shavell, S. (1993) An Economic Analysis of Threats and Their Illegality: Blackmail, Extor- tion, and Robbery, U. Penn Law Review, 141:1877-1903.
Shavell, S. and Spier, K. (2002) Threats Without Binding Commitment, Topics in Economic Analysis and Policy, Vol. 2. Issue 1.
20
Shepsle, K. (1991). Discretion, Institutions and the Problem of Government Commitment in Bourdieu, Pierre and Coleman, James (eds) Social Theory for a Changing Society, Boulder: Westview Press.
Slantchev, B. (2001) Territory-Induced Credible Commitments in the European Concert System, 1815-54, mimeo.
Slantchev, B. (2003) The Power to Hurt: Costly Cona? ict with Completely Informed States, American Political Science Review, Vol. 47, No. 1. (March, 2003), pp. 123-135.
Slantchev, B. (2004) How Initiators End Their Wars: The Duration of Warfare and the Terms of Peace, American Journal of Political Science, 48:4. 813-829.
Smith, A. , and Stam, A. (2003) Bargaining and the Nature ofWar, mimeo.
Taylor, A. (1954) The Struggle for Mastery in Europe, 1848-1918, London: Oxford Univer- sity Press.
Taylor, A. (1961) The Origins of the World War Two, New York: Atheneum.
Wagner, H. (1982) Deterrence and Bargaining, Journal of Cona? ict Resolution, Vol. 2, No 6, 329-358.
Walzer, M. (1992) Just and Unjust Wars, 2d ed. , Basic Books.
Weede, E. (1976) Overwhelming Preponderance as a Pacifying Condition among Contiguous Asian Dyads, 1950-1969, Journal of Cona? ict Resolution, 20: 395-411.
Wilkenfeld, J. (1991) Trigger-response Transitions in Foreign Policy size, 1929-1988, Journal of Cona? ict Resolution, 35: 143-69.
Wittman, D. (2003) Credible Commitments and War: a Re-Evaluation, working paper, UCSC Economics Department
21
Appendix The setup
The set of players is N = fA;Bg: The set of histories is denoted H and ; 2 H. A vector function h, ht = (at; kt) belongs to the set of non-terminal histories if and only if the support ofhissomReinterval[0;T[;andforanyt2[0;T[wehaveat =Pandbt 0where bt = k0 + 0t ktdt: There is a natural interpretation of kt: we assumed that the function representing transfer proO? le is di? erentiable and thus continuous. Consequently, although player B can change the transfer level at any instant his choice must be consistent with continuity assumption, essentially, moment by moment player B chooses the derivative of transfer proO? le, which we denote kt: (We slightly abuse notation by denoting agenti? s choice of the level of transfer at time zero by k0. )
Let Z denote the set of all terminal histories. The set Z consists of two types of terminal histories: inO? nite (these where a cona? ict never occurs) and O? nite (these that end in a war). A vector function ht = (at;kt) belongs to the set of inO? nite histories if and only if h has support [0; +1[ and for all t; at = P and bt 0: A vector function ht = (at; kt) belongs to a set of O? nite terminal histories if and only if it has support [0; ], bt 0 and at = P for all t < ; and w() = W:
The choice correspondence P(h) = fA;Bg for all h 2 HnZ: In other words following any non terminal history both players take action simultaneously.