Online Appendix – NOT FOR PUBLICATION
“Fear, Appeasement, and the E↵ectiveness of Deterrence”
August 24, 2016.
This Online Appendix is divided into three parts. Appendix A contains proofs of the main propositions and corollaries text, as well as notes on Figures 3 and 4. Appendix B contains an expanded version of the case study on the Turkish Straits Crisis of 1946, additional notes on the
Russo-Finnish War case study, and an additional case study on the Taiwan Straits Crisis of 1954-1955.
Appendix C analyzes model variants and proves results discussed in the Robustness section.
1 A Proofs of Main Results
Proof of Proposition 1 The defender’s strategy consists of a probability of responding to the
1 transgression with war, which we denote ↵. The challenger’s utility from not transgressing is nC , and from transgressing is ↵ w1 (✓ )+(1 ↵) max w2 (✓ ) ,n2 . The latter is strictly increasing · C C · C C C 1 ¯1 in ✓C and greater than nC for all ↵ when ✓C = ✓C . Thus, the challenger’s strategy must be to always transgress, or to transgress i.f.f her type is above a cutpoint ✓¯ ✓¯1 at which she is indi↵erent C C between transgressing and not.
The necessary and su cient conditions for existence of the two pure strategy equilibria (↵⇤ =0 the no deterrence equilibrium, and ↵⇤ = 1 the deterrence equilibrium) are described in the main text and straightforward to derive. There may also exist mixed strategy equilibria in which the defender responds with war with a strictly interior probability ↵ (0, 1). For such an equilibrium to hold, ⇤ 2 the defender must be indi↵erent between responding with war and allowing the transgression. This requires that,
P ✓ ✓¯2 ✓ ✓¯ = ¯ (1) C C | C C i.e. the defender’s posterior belief that the challenger will initiate war if allowed to transgress is equal to his threshold belief ¯. The left hand side approaches P ✓ ✓¯2 as ✓¯ approaches the C C C ¯ ¯2 lower bound of the type space, is equal to 1 at ✓C = ✓C , and is strictly increasing in between. Thus, a cutpoint satisfying (1) exists i.f.f. the no deterrence equilibrium exists (P ✓ ✓¯2 < ¯). We C C ¯ ¯2 denote this cutpoint ✓C⇤ ,whichmustbe< ✓C .
We now check conditions such that there exists some ↵ (0, 1) that induces the challenger to ⇤ 2 ¯ ¯2 play the cutpoint strategy ✓C⇤ < ✓C . A necessary condition and su cient condition is that this type be indi↵erent between transgressing and not, i.e. there exists an ↵⇤ s.t.
1 2 1 ↵⇤ w ✓¯⇤ +(1 ↵⇤) n = n . (2) · C C · C C
2 If ✓¯ > ✓¯1 P ✓ ✓¯2 ✓ ✓¯1 < ¯ (i.e. the deterrence equilibrium does not exist) then the C⇤ C () C C | C C 1 ¯ 2 1 condition cannot be satisfied since this would imply that both wC ✓C⇤ and nC are greater than nC . ¯ ¯1 Conversely, if ✓C⇤ < ✓C then an ↵⇤ satisfying (2) exists and is unique.
Thus, a unique mixed strategy equilibrium exists i.f.f. both the no deterrence and deterrence equi- ¯ libria exist, and the equilibrium strategies ↵⇤, ✓C⇤ are uniquely characterized by (1) and (2). We now show that when there are multiple equilibria, i.e. ¯ P ✓ ✓¯2 ,P ✓ ✓¯2 ✓ ✓¯1 ,the 2 C C C C | C C defender is strictly better o↵in the deterrence equilibrium⇥ than in either the no deterrence or ⇤ mixed strategy equilibrium. The defender’s utility in the deterrence equilibrium is U de = P ✓ < ✓¯1 C C · n1 + P ✓ ✓¯1 w1 . His utility in the mixed strategy equilibrium is D C C · D
ms 1 2 2 2 2 U = P ✓ < ✓¯⇤ n + P ✓ ✓¯⇤ P ✓ < ✓¯ ✓ ✓¯⇤ n + P ✓ ✓¯ ✓ ✓¯⇤ w C C · D C C · C C | C C · D C C | C C · D 1 1 = P ✓ < ✓¯⇤ n + P ✓ ✓¯⇤ w by def’n of ✓¯⇤ . C C · D C C · D C
This is less than U de since ✓¯ < ✓¯1 by construction P ✓ < ✓¯
w1 . C⇤ C ! C C⇤ C C D D Finally, his utility in the no deterrence equilibrium is
U nd = P ✓ < ✓¯2 n2 + P ✓ ✓¯2 w2 . C C · D C C · D = P ✓ < ✓¯1 P ✓ < ✓¯2 ✓ < ✓¯1 n2 + P ✓ ✓¯2 ✓ < ✓¯1 w2 C C · C C | C C · D C C | C C · D 1 1 2 1 2