Nakao, Keisuke (2015): Indirect Policing: Its Theory, Mechanism, and Application to Combatting Elusive Perpetrators.
Preview |
PDF
MPRA_paper_67218.pdf Download (714kB) | Preview |
Abstract
Why do states indirectly police some kinds of transnational perpetrators by using their host governments while directly policing other kinds? We address this question by identifying the obstacles to deterring transnational perpetrators and by presenting a functional account of how indirect policing can overcome the obstacles. According to our theory, indirect policing can outperform direct policing in light of three advantages inherent in Proxy, who is induced by Defender to police Perpetrators: (a) Proxy can convince Perpetrators of punishments more credibly than Defender (communicative advantage); (b) Proxy is more likely to identify Perpetrators and detect what they hold dear (informational advantage); (c) Proxy can cripple and punish Perpetrators more effectively (offensive advantage). On the other hand, indirect policing has potential disadvantages such as: (x) difficulties with two-phase communication from Defender through Proxy to Perpetrators; (y) disincentives for policing known as moral hazard and free riding; (z) destabilization of Proxy’s regime caused by his corruption and tyranny that Defender might induce. Four forms of policing are delineated with associated incidents: proper direct policing (e.g., Combined Task Force 151); proper indirect policing (U.S. War on Drugs in Colombia and Mexico); dual policing (Operation Inherent Resolve); and reciprocal policing (INTERPOL, Budapest Convention).
Item Type: | MPRA Paper |
---|---|
Original Title: | Indirect Policing: Its Theory, Mechanism, and Application to Combatting Elusive Perpetrators |
Language: | English |
Keywords: | cracker; deterrence; indirect policing; piracy; terrorism; vicarious sanction. |
Subjects: | F - International Economics > F5 - International Relations, National Security, and International Political Economy > F51 - International Conflicts ; Negotiations ; Sanctions F - International Economics > F5 - International Relations, National Security, and International Political Economy > F52 - National Security ; Economic Nationalism F - International Economics > F5 - International Relations, National Security, and International Political Economy > F53 - International Agreements and Observance ; International Organizations H - Public Economics > H5 - National Government Expenditures and Related Policies > H56 - National Security and War K - Law and Economics > K4 - Legal Procedure, the Legal System, and Illegal Behavior > K42 - Illegal Behavior and the Enforcement of Law |
Item ID: | 67218 |
Depositing User: | Keisuke Nakao |
Date Deposited: | 15 Oct 2015 01:21 |
Last Modified: | 26 Sep 2019 17:18 |
References: | Achen, Christopher, and Duncan Snidal. 1989. “Rational Deterrence Theory and Comparative Case Studies.” World Politics. 41(2): 143-170. Almog, Doron. 2004. “Cumulative Deterrence and the War on Terrorism.” Parameters. 34(4): 4-19. Auerswald, David P. 2006/2007. “Deterring Nonstate WMD Attacks.” Political Science Quarterly. 121(4): 543-568. Bar, Samuel. 2008. “Deterring Terrorism: What Israel Has Learned.” Policy Review. 149: 29-42. At http://www.gatestoneinstitute.org/569/deterring-terrorists-what-israel-has-learned, accessed August 21, 2015. Benmelech, Efraim, Claude Berrebi, and Esteban F. Klor. 2015. “Counter-Suicide-Terrorism: Evidence from House Demolition.” Journal of Politics. 77(1): 27-43. Betts, Richard K. 2002. “The Soft Underbelly of American Primacy: Tactical Advantages of Terror.” Political Science Quarterly. 117(1): 19-36. Bowen, Wyn Q. 2004. “Deterrence and Asymmetry: Non-State Actors and Mass Casualty Terrorism.” Contemporary Security Policy. 25(1): 54-70. Buzzard, Anthony. W. 1956. “Massive Retaliation and Graduated Deterrence.” World Politics. 8(2): 228-237. Byman, Daniel. 2005. “Passive Sponsors of Terrorism.” Survival. 47(4): 117-144. Carter, David B. 2012. “A Blessing or a Curse? State Support for Terrorist Group.” International Organization. 66(1): 129-151. Chang, Chun-shu. 2007. The Rise of the Chinese Empire, Volume 1: Nation, State, & Imperialism in Early China, ca. 1600 B.C.-A.D. 8. Ann Arbor, MI: University of Michigan Press. Clarke, Richard A., and Robert K. Knake. 2010. Cyber War: The Next Threat to National Security and What to Do about It. New York: HarperCollins Publishers. Colby, Elbridge. 2008. “Expanded Deterrence: Broadening the Threat of Retaliation.” Policy Review. 149: 43-59. At http://www.hoover.org/research/expanded-deterrence, accessed July 5, 2015. Danilovic, Vesna. 2001. “Conceptual and Selection Bias Issues in Deterrence.” Journal of Conflict Resolution. 45(1): 97-125. Davis, Paul K., and Brian Michael Jenkins. 2002. Deterrence & Influence in Counterterrorism: A Component in the War on al Qaeda. Santa Monica, CA: RAND. Davis, Paul K., and Brian Michael Jenkins. 2004. “A System Approach to Deterring and Influencing Terrorists.” Conflict Management and Peace Science. 21(1): 3-15. Dutton, Yvonne M., and Jon Bellish. 2014. “Refusing to Negotiate: Analyzing the Legality and Practicality of a Piracy Ransom Ban.” Cornell International Law Review. 47(2): 299-329. Fearon, James D. 1995. “Rationalist Explanations for War.” International Organization. 49(3): 379-414. Freedman, Lawrence. 2004. Deterrence. London, UK: Polity Press. Feldman, Shai. 1982. Israeli Nuclear Deterrence: A Strategy for the 1980s. New York: Columbia University Press. Forero, Juan. 2003. “Colombia Rebels Admit Kidnapping 3 Americans After Crash.” New York Times. February 23. At http://www.nytimes.com/2003/02/23/world/colombia-rebels-admit-kidnapping-3-americans-after-crash.html, accessed July 22, 2015. George, Alexander L. 2002. “The Need for Influence Theory and Actor-Specific Behavioral Model of Adversaries.” In Barry R. Schneider and Jerrold M. Post, eds. Know Thy Enemy: Profiles of Adversary Leaders and Their Strategic Cultures. Maxwell Air Force Base, AK: United States Air Force Counterproliferation Center. George, Alexander L., and Richard Smoke. 1974. Deterrence in American Foreign Policy. New York: Columbia University Press. George, Alexander L., and Richard Smoke. 1989. “Deterrence and Foreign Policy.” World Politics. 41(2): 170-182. Gray, Colin. 2003. “The Reformation of Deterrence: Moving On.” Comparative Strategy. 22(5): 429-461. Harvey, Frank. 1995. “Rational Deterrence Theory Revisited: A Progress Report.” Canadian Journal of Political Science. 28(3): 403-436. Harvey, Frank. 1998. “Rigor Mortis or Rigor, More Tests: Necessity, Sufficiency, and Deterrence Logic.” International Studies Quarterly. 42(4): 675-707. Hechter, Michael. 1987. Principles of Group Solidarity. Berkeley, CA: University of California Press. Heymann, Philip B. 2001/02. “Dealing with Terrorism: An Overview.” International Security. 26(3): 24-38. Huth, Paul. 1988a. Extended Deterrence and the Prevention of War. New Haven: Yale University Press. Huth, Paul. 1988b. “Extended Deterrence and the Outbreak of War.” American Political Science Review. 82(2): 423-444. Huth, Paul. 1990. “The Extended Deterrent Value of Nuclear Weapons.” Journal of Conflict Resolution. 34(2): 270-290. Huth, Paul, and Bruce Russett. 1984. “What Makes Deterrence Work? Cases from 1900 to 1980.” World Politics. 36(4): 496-526. Huth, Paul, and Bruce Russett. 1988. “Deterrence Failure and Crisis Escalation.” International Studies Quarterly. 32(1): 29-46. Huth, Paul, and Bruce Russett. 1990. “Testing Deterrence Theory: Rigor Makes a Difference.” World Politics. 42(4): 466-501. Huth, Paul, and Bruce Russett. 1993. “General Deterrence Between Enduring Rivals: Testing Three Competing Models.” American Political Science Review. 87(1): 61-73. Isacson, Adam. 2005. “Failing Grades: Evaluating the Results of Plan Colombia.” Yale Journal of International Affairs. Summer/Fall: 138-154. Jervis, Robert. 1970. The Logic of Images in International Relations. Princeton, NJ: Princeton University Press. Jervis, Robert. 1976. Perception and Misrepresentation in International Politics. Princeton, NJ: Princeton University Press. Jervis, Robert. 1979. “Review Article: Deterrence Theory Revisited.” World Politics. 31(2): 289-324. Jervis, Robert, Richard Ned Lebow, and Janice Gross Stein, eds. 1985. Psychology and Deterrence. Baltimore, MD: Johns Hopkins University Press. Joint Special Operations Task Force – Philippines. 2011. “U.S. Ambassador Visits JSOTF-P in Southern Philippines.” March 24. At http://jsotf-p.blogspot.com/2011/03/us-ambassador-visits-jsotf-p-in.html, accessed July 19, 2015. Knopf, Jeffrey W. 2008. “Wrestling with Deterrence: Bush Administration Strategy after 9/11.” Contemporary Security Policy. 29(2): 248-253. Knopf, Jeffrey W. 2012. “Terrorism and the Fourth Wave in Deterrence Research.” In Andreas Wenger and Alex Wilner, eds. Deterring Terrorism: Theory and Practice. Stanford, CA: Stanford University Press. Konstam, Angus. 2002. The History of Pirates. Guilford, CT: Lyons Press. Kroenig, Matthew, and Barry Pavel. 2012. “How to Deter Terrorism.” Washington Quarterly. 35(2): 21-36. Lebow, Richard Ned. 1981. Between Peace and War: The Nature of International Crisis. Baltimore, MD: Johns Hopkins University Press. Lebow, Richard Ned. 1984. “Windows of Opportunity: Do States Jump through Them?” International Security. 9(1): 147-186. Lebow, Richard Ned. 2005. “Deterrence: Then and Now.” Journal of Strategic Studies. 28(5): 765-773. Lebow, Richard Ned, and Janice Gross Stein. 1987a. “Beyond Deterrence.” Journal of Social Issues. 43(4): 5-71. Lebow, Richard Ned, and Janice Gross Stein. 1989. “Rational Deterrence Theory: I Think, Therefore, I Deter.” World Politics. 41(2): 208-224. Lebow, Richard Ned, and Janice Gross Stein. 1990. “Deterrence: The Elusive Dependent Variable.” World Politics. 42(3): 336-369. Levinson, Daryl J. 2003. “Collective Sanctions.” Stanford Law Review. 56(2): 345-428. Levy, Jack S. 1988. “Review Article: When Do Deterrent Threats Work?” British Journal of Political Science. 18(4): 485-512. Lieberman, Elli. 1994. “The Rational Deterrence Theory Debate: Is the Dependent Variable Elusive?” Security Studies. 3(3): 384-427. Long, Jerry Mark, and Alex S. Wilner. 2014. “Delegitimizing al-Qaida: Defeating an ‘Army Whose Men Love Death’.” International Security. 39(1): 126-164. Lupovici, Amir. 2010. “The Emerging Fourth Wave of Deterrence Theory — Toward a New Research Agenda.” International Studies Quarterly. 54(3): 705-732. Mazzetti, Mark, and Dan Levin. 2015. “Obama Administration Warns Beijing About Covert Agents Operating in U.S.” New York Times. August 16. At http://www.nytimes.com/2015/08/17/us/politics/obama-administration-warns-beijing-about-agents-operating-in-us.html?_r=0, accessed August 18, 2015. Mearsheimer, John. 1983. Conventional Deterrence. Ithaca: Cornell University Press. Miller, Gregory D. 2013. “Terrorist Decision Making and the Deterrence Problem.” Studies in Conflict & Terrorism. 36(2): 132-151. Miller, Judith, and Michael Wines. 2002. “Sharon Tentatively Backs Plan for Palestinian State.” New York Times. December 5. At http://www.nytimes.com/2002/12/05/international/middleeast/05ISRA.html, accessed July 15, 2015. Morgan, Patrick M. 2003. Deterrence Now. London, UK: Cambridge University Press. Morgan, Patrick M. 2009. “Collective Actor Deterrence.” In Complex Deterrence: Strategy in the Global Age. Edited by T. V. Paul, Patrick M. Morgan, and James J. Wirtz. Chicago, IL: University of Chicago Press. Morgan, Patrick M. 2012. “Evaluating Tailored Deterrence.” In Karl-Heinz Kamp and David S. Yost, eds. NATO and 21st Century Deterrence. Rome, Italy: NATO Defense College. Mote, Frederick W. 1999. Imperial China: 900-1800. Cambridge, MA: Harvard University Press. Nakao, Keisuke. 2011. “Criminal Conflict as Collective Punishment.” Economics of Peace & Security Journal. 6(1): 5-11. Nitze, Paul. H. 1956. “Atoms, Strategy, and Policy.” Foreign Affairs. 34(2): 187-198. Olson, Eric L. and Christopher E. Wilson. 2010. “Beyond Merida: The Evolving Approach to U.S.-Mexico Security Cooperation.” Working Paper Series on U.S.-Mexico Security Cooperation. Trans-Border Institute, University of San Diego. At http://wilsoncenter.org/sites/default/files/beyond_merida.pdf, accessed July 16, 2015. Payne, Keith B. 2003. “The Fallacies of Cold War Deterrence and a New Direction.” Comparative Strategy. 22(5): 411-428. Powell, Robert. 2006. “War as a Commitment Problem.” International Organization. 60(1): 169-203. Reuter, Peter, Gordon Crawford, and Jonathan Cave. 1988. Sealing the Borders: The Effects of Increased Military Participation in Drug Interdiction. Santa Monica, CA: RAND Corporation. At http://www.rand.org/content/dam/rand/pubs/reports/2007/R3594.pdf, accessed July 16, 2015. Sageman, Marc. 2004. Understanding Terror Networks. Philadelphia, PA: University of Pennsylvania Press. Sageman, Marc. 2008. Leaderless Jihad: Terrorist Networks in the Twenty-First Century. Philadelphia, PA: University of Pennsylvania Press. Sandler, Todd, and Kevin Siqueira. “Global Terrorism: Deterrence Versus Pre-Emption.” Canadian Journal of Economics. 39(4): 1370-1387. Sartori, Anne R. 2007. Deterrence by Diplomacy. Princeton, NJ: Princeton University Press. Scahill, Jeremy. 2013. Dirty Wars: The World Is a Battlefield. New York: Nation Books. Schelling, Thomas C. 1966. Arms and Influence. New Haven, CT: Yale University Press. Schofield, Julian. 2014. Strategic Nuclear Sharing. New York: Palgrave Macmillan. Shanglin, Luan. 2006. “SCO to Intensify Fight against Cross-Border Drug Crimes.” China View. April 22. At http://news.xinhuanet.com/english/2006-04/22/content_4459199.htm, accessed June 29, 2015. Signarino, Curtis S., and Ahmer Tarar. 2006. “A Unified Theory and Test of Extended Immediate Deterrence.” American Journal of Political Science. 50(3): 586-605. Smelser, Neil J., and Faith Mitchell, eds. 2002. Discouraging Terrorism: Some Implications of 9/11. Washington D.C.: National Academies Press. Snyder, Glenn H. 1961. Deterrence and Defense: Toward a Theory of National Security. Princeton, NJ: Princeton University Press. Snyder, Glenn H., and Paul Diesing. 1977. Conflict Among Nations. Princeton, NJ: Princeton University Press. So, Kwan-wai. 1975. Japanese Piracy in Ming China During the 16th Century. East Lansing, MI: Michigan State University Press. Stein, Janice Gross. 1987. “Extended Deterrence in the Middle East: American Strategy Reconsidered.” World Politics. 39(3): 326-352. Steinberg, Gerald M. 2001. “Rediscovering Deterrence After September 11, 2001.” Jerusalem Letter/Viewpoints. No. 467(17). At http://www.jcpa.org/jl/vp467.htm, accessed July 5, 2015. Stokes, Doug. 2015. America’s Other War: Terrorizing Colombia. New York: Zed Books. Tanaka, Takeo. 2012. Wakou: Umi no Rekishi [Japanese Pirates: History of the Sea]. Tokyo, Japan: Kodansha. Trager, Robert F., and Dessislava P. Zagorcheva. 2005/06. "Deterring Terrorism: It Can Be Done." International Security. 30(3): 87-123. U.N. Security Council. 2004. Resolution 1540. At http://www.un.org/en/ga/search/view_doc.asp?symbol=S/RES/1540(2004), accessed August 22, 2015. U.S. Department of State. 2009. “Merida Initiative: Myth vs. Fact.” Fact Sheet: Bureau of International Narcotics and Law Enforcement Affairs. June 23. At. http://www.state.gov/j/inl/rls/fs/122395.htm, accessed July 15, 2015. U.S. Department of State. 2012. “U.S.-Iraqi Strategic Framework Agreement: Update on Implementation.” Fact Sheet: Office of the Spokesperson. August 15. At http://www.state.gov/r/pa/prs/ps/2013/08/213170.htm, accessed July 15, 2015. U.S. Government Accountability Office. 2008. “Plan Colombia: Drug Reduction Goals Were Not Fully Met, but Security Has Improved; U.S. Agencies Need More Detailed Plans for Reducing Assistance.” GAO-09-71. At http://www.gao.gov/new.items/d0971.pdf, accessed July 15, 2015. White House. 2012. “Fact Sheet: The U.S.-Afghanistan Strategic Partnership Agreement.” Office of the Press Secretary. May 1. At https://www.whitehouse.gov/the-press-office/2012/05/01/fact-sheet-us-afghanistan-strategic-partnership-agreement, accessed July 15, 2015. Whiteneck, Daniel. 2005. “Deterring Terrorists: Thoughts on a Framework.” Washington Quarterly. 28(3): 187-199. Wilner, Alex S. 2011. “Deterring the Undeterrable: Coercion, Denial, and Delegitimization in Counterterrorism.” Journal of Strategic Studies. 34(1): 3-37. Wohlstetter, Albert. 1959. “The Delicate Balance of Terror.” Foreign Affairs. 37(2): 211-234. At http://www.rand.org/about/history/wohlstetter/P1472/P1472.html, accessed August 23, 2015. Zacks, Richard. 2002. The Pirate Hunter: The True Story of Captain Kidd. New York: Hyperion. |
URI: | https://mpra.ub.uni-muenchen.de/id/eprint/67218 |