Cognitive Theory of War: Why Do Weak States Choose War Against Stronger States?

Total Page:16

File Type:pdf, Size:1020Kb

Cognitive Theory of War: Why Do Weak States Choose War Against Stronger States? University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Doctoral Dissertations Graduate School 12-2004 Cognitive Theory of War: Why Do Weak States Choose War against Stronger States? Sang Hyun Park University of Tennessee - Knoxville Follow this and additional works at: https://trace.tennessee.edu/utk_graddiss Part of the Political Science Commons Recommended Citation Park, Sang Hyun, "Cognitive Theory of War: Why Do Weak States Choose War against Stronger States?. " PhD diss., University of Tennessee, 2004. https://trace.tennessee.edu/utk_graddiss/2346 This Dissertation is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a dissertation written by Sang Hyun Park entitled "Cognitive Theory of War: Why Do Weak States Choose War against Stronger States?." I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Doctor of Philosophy, with a major in Political Science. Robert A. Gorman, Major Professor We have read this dissertation and recommend its acceptance: Mary Caprioli, Donald W. Hastings, April Morgan, Anthony J. Nownes Accepted for the Council: Carolyn R. Hodges Vice Provost and Dean of the Graduate School (Original signatures are on file with official studentecor r ds.) To the Graduate Council: I am submitting herewith a dissertation written by Sang-Hyun Park entitled “Cognitive Theory of War: Why Do Weak States Choose War against Stronger States?” I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the requirements for the degree of Doctor of Philosophy, with a major in Political Science. Robert A. Gorman Major Professor We have read this dissertation and recommend it acceptance Mary Caprioli Donald W. Hastings April Morgan Anthony J. Nownes Accepted for the Council: Anne Mayhew Vice Chancellor and Dean of Graduate Studies (Original Signatures are on file with official student records) COGNITIVE THEORY OF WAR: WHY DO WEAK STATES CHOOSE WAR AGAINST STRONGER STATES? A Dissertation Presented for the Doctor of Philosophy Degree The University of Tennessee, Knoxville Sang-Hyun Park December 2004 Dedication This dissertation is dedicated to my father, Jae-Cho Park for inspiring me and encouraging me to have a dream of social scientist. ii Acknowledgements I thank God who has guided me. I would like to thank Dr. Baek, Jong-gook (Kyung Sang National University, Jinju Korea), my spiritual and scholastic mentor. I would like to thank Dr. Choi, Young-Soo (Hankuk University of Foreign Studies, Seoul, Korea) for showing me the way a good scholar should do. I would like to thank Dr. Jeff Berejikian (University of Georgia, Athens) for introducing me to Prospect Theory. I would also like to all my committee Dr. Gorman, Dr. Hastings, Dr. Nownes, Dr. Morgan, and Dr. Caprioli who gave a good advises. Lastly I would like to thank my family and friends who did not stop believing me when they were hard to do. Their encouragements made this work possible. iii Abstract The key question to be addressed in this paper is why weaker states with a slight chance of winning do not avoid war against stronger states. Even though most war theory does offer a few insights about the conditions under which weak states choose war when there is only a slight possibility of winning, explanations based on either emphasis on rationality or ignorance of “interacting structure” of international relations leave many practical remedies unexplained. This paper explains asymmetric conflict on the combination of Prospect theory and Game theory. The interacting game structure of asymmetric conflicts can be summarized. Under the threat of massive retaliation by a strong state, a weak state is forced to choose between war (defection) and withdrawal (cooperation). In asymmetric conflicts, defection (war against a strong state with a slight chance of winning) is a risky gamble, and cooperation is safe choice. In contrast to Expected Utility theory, this paper argues that weak states in a loss frame chooses risky war (defection) against a superior adversary in the hope of recovering from their crisis. This paper follows crisis analyses of other Prospect theorists. The nature and seriousness of the crisis of a weak state are analyzed. The rare occurrence and deviant characteristics of a weak state’s war choice make it suitable to use a qualitative structured analysis. The research hypothesis is applied to three case studies: the Gulf War between Iraq and the United States-led alliance in 1990, the Falkland/Malvinas Island war between Argentina and the United Kingdom in 1982, and the Middle East War between Egypt and Israel in 1973. The implication of this study is that enforcing strategy based on superior capability is not a reasonable means to prevent a weak state in a loss frame from choosing war against superior adversary. iv Table of Contents I. Introduction…………………………………………………………………………….1 II. Literature Review…………………………………………………..………………… 5 II-1. International Level of Analysis: Power Transition and Window of Opportunity……………………………..………………….…..……………..6 II-2. Domestic Level of Analysis: Diversionary Theory………..………………...10 II-3. Individual Level of Analysis: Rational Choice Theories ......………………..12 II-4. Individual Level of Analysis: Misperception and By-Product Theory……....21 III. Method of Analysis ………………………………………………………………… 25 III-1. Prospect theory……………………………………..…………………...….. 27 III-2. Game Structure of Asymmetric Conflict………………......………………. 31 III-3. Weak State in a Loss Frame under the Chicken Game ..………………….... 38 III-4. Cognitive Theory of Asymmetric War Initiation………………………….... 42 III-5. Scope and Method of Research……………………………………………... 44 IV. Desert Storm………………………………………………………………………... 51 IV-1. Iraq in a Loss Frame…………………………………………………….. 53 IV-2. The Kuwait Card……………………………………………………………. 60 IV-3. Imposition of Chicken Game by Coalition Forces………………………….. 63 IV-4. Game Structure in Desert Storm……………………………………………..68 IV-5. Iraqi Risk Calculation………………………………………………………. 73 IV-5-1. Benefits of Successful Annexation…………………………………... 73 IV-5-2. Deterring Coalitions………………………………………………….. 75 IV-5-3. Slim, but Still Remaining Chance to Win over Coalition……………. 77 IV-5-4. Peaceful Retreat from Kuwait Territory……………………………... 81 IV-6. Conclusion………………………………………………………………….. 83 V. The Falklands War…………………………………………………………………... 86 V-1. Argentina in a Loss Frame…………………………………………………... 87 V-1-1. Economic Crisis……………………………………………………….. 88 V-1-2. Political Difficulty…………………………………………………….. 95 V-2. Argentina’s Falklands Card……………………………………………....... 104 V-3. Imposition of Coercive Diplomacy by Great Britain………………………. 109 V-4. Game Structure of the Falklands War…………………………………........ 110 V-5. Argentina’s Risky Calculations…………………………………………….. 115 V-5-1. Safe Choice of Peaceful Withdrawal from the Falklands……………. 115 V-5-2. Costs and Benefits of Staying in the Falklands……..……………….. 118 V-5-3. Slim, but Still Remaining Chance to Win Over Great Britain……..... 119 V-6. Conclusion…………………………………………………………..……… 126 VI. The Middle East War in 1973 …………………………………………………….. 128 VI-1. Egypt in a Loss Frame ……………………………………………………. 130 VI-1-1. The Delayed Recovery of Lost Territory …………………………... 130 VI-1-2. Economic Difficulties …………………………………………......... 133 VI-1-3. Popular Discontents ………………………………………………… 137 v VI-2. Israeli Deterrence and Sadat’s Dilemma…………………………………... 140 VI-3. Game Structure before the 1973 October War ………………………......... 144 VI-4. Sadat’s Risky Calculation ………………………………………………… 148 VI-4-1. Risky Choice of War Initiation (Defection) ………………………... 148 VI-4-2. Safe Choice: Cooperation (Choosing not to Initiate a War ………… 154 VI-4-3. New Narrow Window of Opportunity ……………………………… 154 VI-5. Conclusion: Sadat’s Gamble ……………………………………………… 158 VII. Conclusion …………………………………………………………………..…… 161 Bibliography …………………………………………………………………………. 169 Vita …………………………………………………………………………………… 207 vi List of Tables Table 3-1. Strong states’ preference order…………………………….…………..…34 Table 3-2. Weak states’ preference order……………………………….………...… 35 Table 4-1. Coalition Forces’ preference order in Desert Storm…….…………....…. 69 Table 4-2. Iraqi preference order in Desert Storm………………….………..……….72 Table 5-1. Argentina’s Economic Indicators, 1976-1983………………..……….…..90 Table 5-2. British preference order in the Falklands War……………..……….……111 Table 5-3. Argentine preference order in the Falklands crisis……..………………..113 Table 6-1. Israel’s preference order ………………………………………………... 145 Table 6-2. Egypt’s preference order …………………………………………..…….146 Table 7-1. Summary of Case Studies …………………………………………..…….164 Table 7-2. Weak States’ Choices in an Asymmetric Conflict …….……….…….…. 167 vii List of Figures Figure 2-1. Prisoner’s Dilemmas Game Structure ……..…..………………………... 16 Figure 3-1. Utility Curve of Prospect Theory………………………………….….…. 30 Figure 3-2. Decision Making Tree of International Military Conflict …………….… 32 Figure 3-3. Game structure of asymmetric conflict………………….………..………36 Figure 3-4. Chicken Game Structure………………………………………….….….. 39 Figure 4-1. GDP and Consumer Price Index of Iraq, 1978-1991…………..…………56
Recommended publications
  • Little Wars by H.G. Wells
    Little Wars 1 Little Wars The Project Gutenberg EBook of Little Wars, by (H)erbert (G)eorge Wells #20 in our series by (H)erbert (G)eorge Wells Copyright laws are changing all over the world. Be sure to check the copyright laws for your country before downloading or redistributing this or any other Project Gutenberg eBook. This header should be the first thing seen when viewing this Project Gutenberg file. Please do not remove it. Do not change or edit the header without written permission. Please read the "legal small print," and other information about the eBook and Project Gutenberg at the bottom of this file. Included is important information about your specific rights and restrictions in how the file may be used. You can also find out about how to make a donation to Project Gutenberg, and how to get involved. **Welcome To The World of Free Plain Vanilla Electronic Texts** **eBooks Readable By Both Humans and By Computers, Since 1971** *****These eBooks Were Prepared By Thousands of Volunteers!***** Title: Little Wars Author: (H)erbert (G)eorge Wells Release Date: January, 2003 [EBook #3691] [This file was last updated on August 5, 2002] Edition: 11 Language: English Character set encoding: ASCII *** START OF THE PROJECT GUTENBERG EBOOK LITTLE WARS *** eText by Alan D. Murray - North Carolina Edition 11 revisions by William Jenness and Andrew Sly. Little Wars (A Game for Boys from twelve years of age to one hundred and fifty and for that more intelligent sort of girl who likes boys' games and books) With an Appendix on Kriegspiel By H.
    [Show full text]
  • The Inventory of the H.G. Wells Collection #458
    The Inventory of the H.G. Wells Collection #458 Howard Gotlieb Archival Research Center Wells, Herbert George, 1866 - 1946 Purchi.se 1969 Box 1 Letters . 16 AIS, l postcard AIB, 3 holograph envelopes ✓1899 AIS 1899 N0 vember 27, Sandgate, Ken} to Harold Grost, Esq. ✓ 1900 AIS 1900 January 28, Sandgate, Kent, to "Connell" Conal 0 •Riordan 2 PPo ✓AIS 1900 October 19, Sandgate, Keny to 'lftMy Dear Sir" 3 PPo on l Marked "iBrivaten o V ALS 1900 November _22, Sandgate, Kent, to 11Dear Sir11 2 PP• on l Marked 11Private 11 ·v'Envelope holograph. Postmarked 1900 November 23. Addressed to William H. Maas, Esqo, Londono ✓1905 AIS 1905 April 30, Sandgate, to the Director of trre Natural History Museum~ ✓1914 ALS 1914 April 7, t,1ondonJ to «.DEar Sirs" ✓ 1922 AIS nodo, Dun.mow, to Mrs o Dawson Scott. Envelope holograph. Postli"..arked 1922, June 12, London. Addressed to Mrs. Dawson Scott. ✓ ALS n.d., London, to Mrs 0 Scotto Envelope holograph. Postmarked 1922, June 15, Londono Addressed to Mrs. Dawson Scott. ( 1924 AIS 1924 November 3, Dunmow, to Miss Hordero /1925 AIS 1925 June 8, Dunmow, to Miss H0 rdero v/1928 Postcard ALSo Postmarked 1928 January 21, London, to Mrs• Dawson Scotto V" 1935 ALS 1935 May 15, r.Londonl, to -Miss Hordero Wells, Herbert George 1866 - 1946 Page 2 AL5 November 15, n .y., r.London l to Lord Du...visa.ny. AL5 Ilodo [London] to 11 :My dear Sir" 4 PP• on 2 cards. Ats n.d. Dunmow to Mr. Ridling ?, 1 P• ' .AL5 n.d.
    [Show full text]
  • Little Wars the Basic Game the Rules Given Here Constitute the Basic Game As De- When H
    Little Wars The Basic Game The rules given here constitute the basic game as de- When H. G. Wells committed to paper the rules signed by H. G. Wells. for his Little Wars in 1913, one suspects he had some The advanced game, whose rules begin on page 6, inkling of the course the field was steering. Games de- contains my revisions and expansions to Wells’ original. rived from the Prussian Kriegsspiel were not at all un- common in the Europe of his day. By that time, Ox- 1. Troops ford’s University Kriegspiel [sic] Club dated back forty years. 1.1. Unit Types and Terminology. Little Wars is Unlike Kriegsspiel and its descendants in the dice, ta- played with three kinds of unit: infantry, cavalry, and ar- bles, and hefty rulebooks tradition, which have their tillery. Infantry and cavalry (collectively, men or troops) roots in battlefield simulation, Little Wars began with may be represented by toy soldiers of the appropriate pure play: knocking over a toy soldier with a toy cannon. kind. Infantry should be of uniform size, as should cav- This spark of whimsy courses through the game’s veins. alry. Foot soldiers of between one and a half and two Which victory is sweeter: rolling well on the combat re- inches tall work well. sults table, or sending an enfiladed column of miniature Artillery (or guns) should be of the breech-loading, soldiers flying with a well-aimed cannon shot? Your au- spring-firing variety1. thor knows which one he prefers. What it gives up in 1.2.
    [Show full text]
  • The United States and Democracy Promotion in Iraq and Lebanon in the Aftermath of the Events of 9/11 and the 2003 Iraq War
    The United States and democracy promotion in Iraq and Lebanon in the aftermath of the events of 9/11 and the 2003 Iraq War A Thesis Submitted to the Institute of Commonwealth Studies, School of Advanced Study, University of London in fulfilment of the requirements for the Degree of PhD. in Political Science. By Abess Taqi Ph.D. candidate, University of London Internal Supervisors Dr. James Chiriyankandath (Senior Research Fellow, Institute of Commonwealth Studies, School of Advanced Study, University of London) Professor Philip Murphy (Director, Institute of Commonwealth Studies, School of Advanced Study, University of London) External Co-Supervisor Dr. Maria Holt (Reader in Politics, Department of Politics and International Relations, University of Westminster) © Copyright Abess Taqi April 2015. All rights reserved. 1 | P a g e DECLARATION I hereby declare that this thesis is my own work and effort and that it has not been submitted anywhere for any award. Where other sources of information have been used, they have been duly acknowledged. Signature: ………………………………………. Date: ……………………………………………. 2 | P a g e Abstract This thesis features two case studies exploring the George W. Bush Administration’s (2001 – 2009) efforts to promote democracy in the Arab world, following military occupation in Iraq, and through ‘democracy support’ or ‘democracy assistance’ in Lebanon. While reviewing well rehearsed arguments that emphasise the inappropriateness of the methods employed to promote Western liberal democracy in Middle East countries and the difficulties in the way of democracy being fostered by foreign powers, it focuses on two factors that also contributed to derailing the U.S.’s plans to introduce ‘Western style’ liberal democracy to Iraq and Lebanon.
    [Show full text]
  • Little Wars James H
    12 FOOTNOTES TO HISTORY Little Wars James H. Hillestad, Member No. 6, pays tribute to the prolific writer H.G. Wells and notes his fondness for W. Britains ne hundred years ago, TOP H(erbert) G(ordon) Wells H.G. Wells playing published the classic Little Little Wars Wars. Wells is best known for his scientific fantasies The Time Ma- ABOVE chine (1895) and The War of the Little Wars by H.G. Worlds (1898). Wells In January 1913, war was loom- ing in Europe and Little Wars RIGHT was both an expression of Wells’ The battlefield in passion for toy soldiers and his Little Wars fears about the coming slaughter. Those fears manifested themselves in Little Wars. In his own words, with toy soldiers. Inspiration for non with a match stick. He then “You have only to play at Little Little Wars came from a friend methodically aimed the cannon, Wars three or four times to realize who was visiting for lunch. The released the spring in the breech, just what a blundering thing Great friend was drawn to five W.Britain and hit one of the soldiers. As War must be.” toy soldiers aligned on a table top, Wells put it, “He fired a shot that In Little Wars and its companion along with a cannon. He drew still echoes round the world.” Floor Games (1911), Wells de- a chair to the table, sat down, The game that developed was veloped a set of rules for playing and proceeded to load the can- based on the spring breech- FOOTNOTES TO HISTORY 13 An Apocryphal Tale -- True or False? loader 4.7 inch naval gun made by W.Britain in 1902.
    [Show full text]
  • 4. Wargaming the Middle East: the Evolution of Simulated Battlefields from Chequerboards to Virtual Worlds and Instrumented Artificial Cities
    4. Wargaming the Middle East: The Evolution of Simulated Battlefields from Chequerboards to Virtual Worlds and Instrumented Artificial Cities Janina Schupp Abstract Shortly after the end of a tank combat during the Gulf War, a team of US Army historians, scientists, and engineers flew to Iraq to gather detailed data of the battle. The collected information was used to create an exact virtual simulation of the combat for training. The mapping capability – offered by the resulting simulation game 73 Easting – to visualize the battlefield from any position and point in time revolutionized military exercises. With ongoing conflicts in the Middle East, these digital training cartographies are now linked to real bodies and vehicles through digital and mobile technologies during live training in artificially constructed villages. This chapter analyses this evolution and critically investigates the growing ‘gamification’ ensuing in these representations of Middle Eastern battlefields. Keywords: Wargames, Middle East, interactive battlespace, live simulations In war the experienced soldier reacts in the same way as the human eye does in the dark: the pupil expands to admit what little light there is, discerning objects by degrees, and finally seeing them indistinctly. By contrast, the novice is plunged into the deepest night. […] It is immensely important that no soldier, whatever his rank, should wait for war to expose him to those aspects of active service that amaze and confuse him when he first comes across them. (Clausewitz 1989, p. 122) Strohmaier, A. and A. Krewani (eds.), Media and Mapping Practices in the Middle East and North Africa: Producing Space. Amsterdam: Amsterdam University Press, 2021 doi 10.5117/9789462989092_ch04 96 JANINA SCHUPP The act of playing at war is deeply engrained in human history and has per- sisted to the present day in both professional and hobby culture.
    [Show full text]
  • (1389) and the Munich Agreement (1938) As Political Myths
    Department of Political and Economic Studies Faculty of Social Sciences University of Helsinki The Battle Backwards A Comparative Study of the Battle of Kosovo Polje (1389) and the Munich Agreement (1938) as Political Myths Brendan Humphreys ACADEMIC DISSERTATION To be presented, with the permission of the Faculty of Social Sciences of the University of Helsinki, for public examination in hall XII, University main building, Fabianinkatu 33, on 13 December 2013, at noon. Helsinki 2013 Publications of the Department of Political and Economic Studies 12 (2013) Political History © Brendan Humphreys Cover: Riikka Hyypiä Distribution and Sales: Unigrafia Bookstore http://kirjakauppa.unigrafia.fi/ [email protected] PL 4 (Vuorikatu 3 A) 00014 Helsingin yliopisto ISSN-L 2243-3635 ISSN 2243-3635 (Print) ISSN 2243-3643 (Online) ISBN 978-952-10-9084-4 (paperback) ISBN 978-952-10-9085-1 (PDF) Unigrafia, Helsinki 2013 We continue the battle We continue it backwards Vasko Popa, Worriors of the Field of the Blackbird A whole volume could well be written on the myths of modern man, on the mythologies camouflaged in the plays that he enjoys, in the books that he reads. The cinema, that “dream factory” takes over and employs countless mythical motifs – the fight between hero and monster, initiatory combats and ordeals, paradigmatic figures and images (the maiden, the hero, the paradisiacal landscape, hell and do on). Even reading includes a mythological function, only because it replaces the recitation of myths in archaic societies and the oral literature that still lives in the rural communities of Europe, but particularly because, through reading, the modern man succeeds in obtaining an ‘escape from time’ comparable to the ‘emergence from time’ effected by myths.
    [Show full text]
  • Mediated Music Makers. Constructing Author Images in Popular Music
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Helsingin yliopiston digitaalinen arkisto Laura Ahonen Mediated music makers Constructing author images in popular music Academic dissertation to be publicly discussed, by due permission of the Faculty of Arts at the University of Helsinki in auditorium XII, on the 10th of November, 2007 at 10 o’clock. Laura Ahonen Mediated music makers Constructing author images in popular music Finnish Society for Ethnomusicology Publ. 16. © Laura Ahonen Layout: Tiina Kaarela, Federation of Finnish Learned Societies ISBN 978-952-99945-0-2 (paperback) ISBN 978-952-10-4117-4 (PDF) Finnish Society for Ethnomusicology Publ. 16. ISSN 0785-2746. Contents Acknowledgements. 9 INTRODUCTION – UNRAVELLING MUSICAL AUTHORSHIP. 11 Background – On authorship in popular music. 13 Underlying themes and leading ideas – The author and the work. 15 Theoretical framework – Constructing the image. 17 Specifying the image types – Presented, mediated, compiled. 18 Research material – Media texts and online sources . 22 Methodology – Social constructions and discursive readings. 24 Context and focus – Defining the object of study. 26 Research questions, aims and execution – On the work at hand. 28 I STARRING THE AUTHOR – IN THE SPOTLIGHT AND UNDERGROUND . 31 1. The author effect – Tracking down the source. .32 The author as the point of origin. 32 Authoring identities and celebrity signs. 33 Tracing back the Romantic impact . 35 Leading the way – The case of Björk . 37 Media texts and present-day myths. .39 Pieces of stardom. .40 Single authors with distinct features . 42 Between nature and technology . 45 The taskmaster and her crew.
    [Show full text]
  • Children of the Heav'nly King: Religious Expression in the Central
    Seldom has the folklore of a particular re- CHILDREN lar weeknight gospel singings, which may fea­ gion been as exhaustively documented as that ture both local and regional small singing of the central Blue Ridge Mountains. Ex- OF THE groups, tent revival meetings, which travel tending from southwestern Virginia into north- from town to town on a weekly basis, religious western North Carolina, the area has for radio programs, which may consist of years been a fertile hunting ground for the HE A"' T'NLV preaching, singing, a combination of both, most popular and classic forms of American .ft.V , .1 the broadcast of a local service, or the folklore: the Child ballad, the Jack tale, the native KING broadcast of a pre-recorded syndicated program. They American murder ballad, the witch include the way in which a church tale, and the fiddle or banjo tune. INTRODUCTORY is built, the way in which its interi- Films and television programs have or is laid out, and the very location portrayed the region in dozens of of the church in regard to cross- stereotyped treatments of mountain folk, from ESS A ....y roads, hills, and cemetery. And finally, they include "Walton's mountain" in the north to Andy Griffith's .ft. the individual church member talking about his "Mayberry" in the south. FoIklor­ own church's history, interpreting ists and other enthusiasts have church theology, recounting char­ been collecting in the region for acter anecdotes about well-known over fifty years and have amassed preachers, exempla designed to miles of audio tape and film foot­ illustrate good stewardship or even age.
    [Show full text]
  • Policy Failure and Unipolarity on the Eve of Operation Desert Storm Written by Riccardo Ghioni
    Policy Failure and Unipolarity on the Eve of Operation Desert Storm Written by Riccardo Ghioni This PDF is auto-generated for reference only. As such, it may contain some conversion errors and/or missing information. For all formal use please refer to the official version on the website, as linked below. Policy Failure and Unipolarity on the Eve of Operation Desert Storm https://www.e-ir.info/2019/07/31/policy-failure-and-unipolarity-on-the-eve-of-operation-desert-storm/ RICCARDO GHIONI, JUL 31 2019 In this essay, I examine the build up to Operation Desert Storm (17 January 1991–28 February 1991), the war waged by a United States (US)-led coalition of 35 states against Iraq, arguing that its causes can be divided into primary and secondary factors. The primary cause, Iraq’s decision to invade Kuwait, should be viewed as the triggering factor, whereas the three secondary ones, namely the ambiguous United States (US)–Iraq diplomatic relations at the time, Gorbachev’s “new thinking” approach and the almost non-existent opposition from Near Eastern countries, were all instrumental either in speeding up the decision-making or in creating consensus around the campaign. In the first section I address the primary cause for Desert Storm, giving a background on Iraqi economics and politics before Saddam’s decision to invade Kuwait together and its implications for the region. Then, I turn to the secondary causes. First, I illustrate US–Iraq diplomatic relations at the time, with specific reference to the infamous Glaspie cable, arguing that ambiguity on the part of the United States might have increased Saddam’s confidence and therefore accelerated his decision to invade Kurawi.
    [Show full text]
  • STRIKING FIRST – Preemptive and Preventive Attack in U.S. National
    THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE Support RAND Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Project AIR FORCE View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. STRIKINGFIRST Preemptive and Preventive Attack in U.S. National Security Policy KARL P. MUELLER JASEN J. CASTILLO FORREST E. MORGAN NEGEEN PEGAHI BRIAN ROSEN Prepared for the United States Air Force Approved for public release; distribution unlimited The research described in this report was sponsored by the United States Air Force under Contract F49642-01-C-0003.
    [Show full text]
  • West Coast Rock Final Version
    WEST COAST ROCK AND THE COUNTERCULTURE MOVEMENT Diplomarbeit zur Erlangung des akademischen Grades einer Magistra der Philosophie an der Karl-Franzens-Universität Graz vorgelegt von Christina DREIER am Institut für Anglistik Begutachter: Ao. Univ.-Prof. Mag. Dr.phil. Hugo Keiper Graz, 2012 An dieser Stelle möchte ich mich bei meinem Betreuer Prof. Dr. Hugo Keiper für seine Unterstützung auf meinem Weg von der Idee bis zur Fertigstellung der Arbeit herzlich bedanken. Seine Ideen, Anregungen und Hinweise, sowie sein umfangreiches musikalisches, kulturelles und literarisches Wissen waren mir eine große Hilfe. Des Weiteren gilt mein Dank meinem Onkel Patrick, der die Arbeit Korrektur gelesen und mir dadurch sehr geholfen hat. Natürlich möchte ich mich auch von ganzem Herzen bei all jenen bedanken, die mich während meiner gesamten Studienzeit tatkräftig unterstützt haben. Danke Mama, Papa, Oma, Opa, Lisa, Eva, Markus, Gabi, Erwin UND DANKE JÜRGEN! . Table of Contents 0. Timeline ......................................................................................................................................................... 1 1. Introduction .................................................................................................................................................. 2 2. Socio-Historical Background ....................................................................................................................... 4 2.1. Political Issues ...............................................................................................................................
    [Show full text]