Hostname: page-component-8448b6f56d-c4f8m Total loading time: 0 Render date: 2024-04-16T10:00:11.281Z Has data issue: false hasContentIssue false

The Security Dilemma Revisited

Published online by Cambridge University Press:  13 June 2011

Charles L. Glaser
Affiliation:
University of Chicago
Get access

Abstract

Robert Jervis's article “Cooperation under the Security Dilemma” is among the most important works in international relations of the past few decades. In it, Jervis develops two essential arguments. First, he explains that the security dilemma is the key to understanding how in an anarchic international system states with fundamentally compatible goals still end up in competition and at war. The security dilemma exists when “many of the means by which a state tries1 to increase its security decrease the security of others.” It provides the rational foundation for what Jervis termed the “spiral model,” which describes how the interaction between states that are seeking only security can fuel competition and strain political relations.2 Second, Jervis explains that the magnitude and nature of the security dilemma depend on two variables: the offense-defense balance and offense-defense differentiation.3 As a result, the security dilemma can vary across space and time. Although states exist in a condition of international anarchy that does not vary, there can be significant variation in the attractiveness of cooperative or competitive means, the prospects for achieving a high level of security, and the probability of war.

Type
Research Article
Copyright
Copyright © Trustees of Princeton University 1997

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1 Jervis, Robert, “Cooperation under the Security Dilemma,” World Politics 30 (January 1978), 169CrossRefGoogle Scholar. For earlier discussions of the security dilemma, see Here, John H., “Idealist Internationalism and the Security Dilemma,” World Politics 2 (January 1950)Google Scholar, which identifies the basic concept, but does not develop it extensively, and Butterfield, Herbert, History and Human Relations (London: Collins, 1951).Google Scholar

2 Jervis, Robert, Perception and Misperception in International Politics (Princeton: Princeton Universit Press, 1976)Google Scholar, chap. 3, esp. 62–76; these pages provide a more thorough discussion of the basic workings of the security dilemma than does “Cooperation under the Security Dilemma.” For an early discussion of this type of interaction, see Singer, J. David, “Threat-Perception and the Armament-Tension Dilemma,” Journal of Conflict Resolution 2 (March 1958)CrossRefGoogle Scholar; for a recent discussion, see Glaser, Charles L., “Political Consequences of Military Strategy: Expanding and Refining the Spiral and Deterrence Models,” World Politics 44 (July 1992).CrossRefGoogle Scholar

3 Many similar arguments are developed by Quester, George, Offense and Defense in the International System (New York: Wiley, 1977)Google Scholar. See also Boggs, Marion William, Attempts to Define and Limit“Aggressive” Armament and Strategy (Columbia: University of Missouri, 1941)Google Scholar; and Borg, Marlies Ter, “Reducing Offensive Capabilities: The Attempt of 1932,” Journal of Peace Research 29, no. 2 (1992).Google Scholar

4 The major statement of the standard structural-realist analysis is Waltz, Kenneth N., Theory of International Politics (Reading, Mass.: Addison-Wesley, 1979)Google Scholar; also important are idem, Man, the State and War (New York: Columbia University Press, 1959)Google Scholar, esp. chaps. 6, 7; and idem, “Reflections on Theory of International Politicr. A Response to My Critics,” in Keohane, Robert O., ed., Neorealism and Its Critics (New York; Columbia University Press, 1986).Google Scholar

5 See Glaser, Charles L., “Realists as Optimists: Cooperation as Self-Help,” International Security 19 (Winter 1994–95)CrossRefGoogle Scholar; and Stephen Van Evera, Causes of War, vol. 1, The Structure of Power and the Roots of War (Ithaca, N.Y.: Cornell University Press, forthcoming).

6 Although not framed in terms of the security dilemma, see, for example, Lebow, Richard Ned and Stein, Janice Gross, “Beyond Deterrence Journal of Social Issues 43 (Winter 1987)CrossRefGoogle Scholar. See also Stein,“Deterrence and Reassurance,” in Tetlock, Philip E. et aL, Behavior, Society and Nuclear War, vol. 2 (New York: Oxford University Press, 1991)Google Scholar, esp. 17; this essay gives somewhat greater prominence to the security dilemma. On the more general question of resolving political rivalries, see Sean Lynn-Jones, “Rivalry and Rapprochement: Accommodation between Adversaries in International Politics” (Ph.D. diss., Harvard University, in process).

7 Matthew Evangelism,“Sources of Moderation in Soviet Security Policy,” in Tetlock et al. (fn. 6), esp. 290–96; and idem, “Cooperation Theory and Disarmament Negotiations in the 1950s,” World Politics 42 (July 1990)Google Scholar. On the Soviet use of concessions, see Larson, Deborah Welch, “Crisis Prevention and the Austria State Treaty,” International Organization 41 (Winter 1987)CrossRefGoogle Scholar.

8 Powell, Robert, “Absolute and Relative Gains in International Relations Theory” American Political Science Review 85 (December 1991)CrossRefGoogle Scholar; Powell casts the argument in terms of the costs of war, not in terms of the offense-defense balance. And see Glaser (fn. 5), 79.

9 On balancing versus bandwagoning, see Walt, Stephen M., The Origins of Alliances (Ithaca, N.Y.: Cornell University Press, 1987)Google Scholar, esp. 24–25, 165–67. On the tightness of alliances, see Christensen, Thomas J. and Snyder, Jack, “Chain Gangs and Passed Bucks: Predicting Alliance Patterns in Multipolarity,” International Organization 44 (Spring 1990)CrossRefGoogle Scholar; and Christensen, Thomas J., “Perceptions and Allies in Europe, 1865–1940,” International Organization 51 (Winter 1997)CrossRefGoogle Scholar; disagreeing is Morrow, James D., “Arms versus Allies: Trade-offs in the Search for Security,” International Organization 47 (Spring 1993)CrossRefGoogle Scholar. On the alliance choices of small powers, see Mueller, Karl, “Patterns of Alliance: Alignment Balancing and Stability in Eastern Europe,” Security Studies 5 (Autumn 1995)CrossRefGoogle Scholar.

10 Posen, Barry R., The Sources of Military Doctrine: France, Britain and Germany between the World Wars (Ithaca, N.Y.: Cornell University Press, 1984)Google Scholar, esp. 67, 74, 221–22, 236–39; Snyder, Jack, The Ideology of the Offensive (Ithaca, N.Y.: Cornell University Press, 1984)Google Scholar; for disagreements, see Sagan, Scott D., “1914 Revisited: Allies, Offense and Instability,” International Security 11 (Fall 1986)CrossRefGoogle Scholar; the correspondence between Sagan, and Snyder, , International Security 11 (Winter 1986–87)CrossRefGoogle Scholar; and Kier, Elizabeth, “Culture and Military Doctrine: France between the Wars,” International Security 19 (Spring 1995)CrossRefGoogle Scholar.

11 Snyder, Jack, Myths of Empire: Domestic Politics and International Ambition (Ithaca, N.Y.: Cornell University Press, 1991), 2126.Google Scholar

12 Walt, Stephen M., Revolutions and War (Ithaca, N.Y.: Cornell University Press, 1996)Google Scholar, esp. 33–45, 334–38.

13 Posen, Barry R., “The Security Dilemma in Ethnic Conflict,” Survival 35 (Spring 1993)CrossRefGoogle Scholar; and Kaufmann, Chaim, “Possible and Impossible Solutions to Ethnic Civil Wars,” International Security 20 (Spring 1996)CrossRefGoogle Scholar.

14 Snyder, Jack, “Limiting Offensive Conventional Forces: Soviet Proposals and Western Options,” International Security 12 (Spring 1988)CrossRefGoogle Scholar, esp. 67–71; see also Biddle, Stephen Duane, “The Determinants of Offensiveness and Defensiveness in Conventional Land Warfare” (Ph.D. diss., Harvard University, 1992)Google Scholar. Following the basic approach of offense-defense theory, although apparently not directly influenced by it, is the nonprovocative defense literature. See, for example, the special issue of the Bulletin of the Atomic Scientists 44 (September 1988)Google Scholar; and Boserup, Anders and Neild, Robert, The Foundations of Defensive Defense (New York: St. Martin's, 1990)CrossRefGoogle Scholar.

15 Glaser, Charles L., Analyzing Strategic Nuclear Policy (Princeton: Princeton University Press, 1990)CrossRefGoogle Scholar.

16 Feldman, Shai, Israeli Nuclear Deterrence: A Strategy for the 1980s (New York: Columbia University Press, 1982).Google Scholar

17 Posen, Barry R., “Inadvertent Nuclear War? Escalation and NATO's Northern Flank,” International Security 7 (Fall 1982)CrossRefGoogle Scholar; and idem, Inadvertent Escalation: Conventional War and Nuclear Risks (Ithaca, N.Y.: Cornell University Press, 1992)Google Scholar. Offering a different explanation is Legro, Jeffrey W., “Military Culture and Inadvertent Escalation in World War II,” International Security 18 (Spring 1994)CrossRefGoogle Scholar.

18 Walt, Stephen M., “The Case for Finite Containment: Analyzing U.S. Grand Strategy,” International Security 14 (Summer 1989)CrossRefGoogle Scholar, esp. 22–30.

19 Evera, Stephen Van, “Primed for Peace: Europe after the Cold War,” International Security 15 (Winter 1990–91)CrossRefGoogle Scholar, esp. 11–17; Hopf, Ted, “Managing Soviet Disintegration: A Demand for Behavioral Regimes,” International Security 17 (Summer 1992)CrossRefGoogle Scholar; Kupchan, Charles A. and Kupchan, Clifford A., “Concerts, Collective Security, and the Future of Europe,” International Security 16 (Summer 1991)CrossRefGoogle Scholar, esp. 133–37; and Glaser, Charles L., “Why NATO Is Still Best: Future Security Structures for Europe,” International Security 18 (Summer 1993)CrossRefGoogle Scholar, esp. 26–33,38–47.

20 Jervis (fh. 2), 76.

21 On the advantages of this usage of“capability,” see Snyder, Glenn H., “Process Variables in Neorealist Theory,” Security Studies 5 (Spring 1996), 180–83.CrossRefGoogle Scholar

22 For the sake of simplicity, I will focus on the decision to buy arms. However, the logic of the security dilemma is more general, including the decision to take territory and to acquire allies to increase security. Regarding territory, an action-reaction process could be expansion into part of a buffer zone that leads one's adversary to expand into the remainder of the zone.

23 Jervis (fn. 2), 64, says that such an action-reaction process results in reduced security because“when states seek the ability to defend themselves, they get too much and too little … too lirde because others, being menaced, will increase their own arms and so reduce the first state's security.” However, this explains only why the state's security is reduced relative to the situation following its initial buildup, but not why it should be reduced relative to the prior military status quo.

24 Mearsheimer, John J., Conventional Deterrence (Ithaca, N.Y.: Cornell University Press, 1983)Google Scholar, chap. 7.

25 This possibility is discussed in Chaim Kaufmann and Charles Glaser,“What Is the Offense-Defense Balance and Can We Measure It?” International Security (forthcoming).

26 See, for example, Schelling, Thomas C. and Halperin, Morton H., Strategy and Arms Control (New York: Twentieth Century Fund, 1961)Google Scholar, esp. 1–2.

27 For earlier use of game theory to explore the different motives that can lead to arms competition and cooperation, see Schelling, Thomas C., “A Framework for the Evaluation of Arms-Control Proposals,” Daedulus 104 (Summer 1975)Google Scholar. While remaining positive about the potential contribution of game-theoretic formulations, Jervis explores their shortcomings in “Realism, Game Theory, and Cooperation,” World Politics 40 (April 1988)Google Scholar.

28 Axelrod, Robert, The Evolution of Cooperation (New York: Basic Books, 1984)Google Scholar. For a focus on questions of arming, see Downs, George W., Rocke, David M., and Siverson, Randolph M., “Arms Races and Cooperation,” in Oye, Kenneth A., ed., Cooperation under Anarchy (Princeton: Princeton University Press, 1986).Google Scholar

29 Jervis (fh. 1), 168–69. Although Jervis identifies this phenomenon as being separate from the security dilemma, I describe it as an integral part of the security dilemma. On the resource value of territory, see Liberman, Peter, “The Spoils of Conquest,” International Security 18 (Fall 1993)CrossRefGoogle Scholar; and idem, Dots Conquest Pay? The Exploitation of Occupied Industrial Societies (Princeton: Princeton University Press, 1996).Google Scholar

30 See, for example, Brown, Michael E., “The Flawed Logic of NATO Expansion,” Survival 37 (Spring 1995)CrossRefGoogle Scholar. For a security dilemma—based argument against nuclear superiority, see Glaser (fn. 15), chap. 5.

31 The adversary could also become less secure if it concludes that the state places a higher value on security or demands a higher level of security, both of which could make the state harder to deter. For simplicity, I focus on the adversary's assessment of the state's greed.

32 I use the term “greedy” because states can be motivated to expand for two fundamentally different types of reasons—security and greed—which are blurred by the more common terms “expansionist” and “aggressive.” Four types of states can be defined in terms of greed and security seeking; see Glaser (fh. 2), 501–3. In referring to states as greedy, I do not mean to imply that they do not also seek security.

33 Jervis (fn. 2), chap. 3, esp. 62–76. See also Snyder, Glenn, “The Security Dilemma in Alliance Politics,” World Politics 36 (July 1984), 468–70CrossRefGoogle Scholar; Snyder argues that firm alliance policies can generate reactions that are comparable to a spiral generated by an arms buildup.

34 In addition to the passage cited in fn. 20, see, for example, Jervis (fn. 2), 62.

35 On signaling, see Jems, Robert, The Logic of Images in International Relations (Princeton: Princeton University Press, 1970)Google Scholar; and Fearon, James D., “Threats to Use Force: The Role of Costly Signals in International Crises” (Ph.D. diss., University of California, Berkeley, 1992).Google Scholar

36 This is an oversimplification, however, since a pure security seeker might want the capability to take territory for a variety of reasons. See fn. 57 below for qualifications.

37 Although Jervis identifies the types of buildups, he does not really explain how rational states can spiral; Jervis (fn. 1), 199–201. He notes that states often cannot accurately infer motives from others' military forces and therefore they tend to assume the worst; Jervis (fn. 2), 64–65. This would clearly generate increased hostility, but the judgment is logically flawed, since without additional information states' assessments should remain unchanged. Moreover, states should not assume the worst in the face of uncertainty, since this can support policies that are too competitive/provocative.

38 For discussion of related issues concerning subjective security requirements, see Jervis (fn. 1), 174–76.

39 Kydd, Andrew, “Game Theory and the Spiral Model,” World Politics 49 (April 1997)CrossRefGoogle Scholar. Kydd notes (p. 373) that Jervis explores this dynamic for the extreme cases in which bias leads the adversary to assume the state is definitely secure. For pure security seekers, however, all that is necessary to generate a spiral is for the adversary to believe there is some possibility that the state is secure. See also Downs, George W. and Rocke, David M., Tacit Bargaining, Arms Races, and Arms Control (Ann Arbor University of Michigan Press, 1990), chap. 4.CrossRefGoogle Scholar

40 Kydd (fn. 39) provides a formal treatment.

41 Glaser (fh. 5), 67–70; and idem (fh. 2), 526–33; for related points, see Downs, Rocke, and Siverson (fh. 28). On reassurance more generally, see Stein (fn. 6); on the inhibiting effect of appearing weak, see Morrow, James D., “Signaling Difficulties with Linkage in Crisis Bargaining,” International Studies Quarterly 36 (June 1996).Google Scholar

42 This approach, often referred to as GRIT, was developed by Osgood, Charles E., An Alternative to War or Surrender (Urbana: University of Illinois, 1962).Google Scholar

43 Misperception receives far less discussion in “Cooperation under the Security Dilemma” (but see pp. 181–83) than in Jervis (fh. 2), 67–76.

44 On attribution theory, see Jervis (fn. 2), esp. 35—48; Larson, Deborah Welch, Origins of Containment: A Psychological Explanation (Princeton: Princeton University Press, 1985), esp. 3442Google Scholar; and Mercer, Jonathan, Refutation and International Politics (Ithaca, N.Y.: Cornell University Press, 1996).Google Scholar

45 For an emphasis on organizational perspectives, see Evera, Stephen Van, “Causes of War” (Ph.D. diss., University of California, Berkeley, 1984)Google Scholar, pt. 2; and Snyder (fn. 10). Snyder (fn. 11) emphasizes domestic political dynamics.

46 Evera, Van (fn. 45), chap. 8; and idem, “Why States Believe Foolish Ideas: Non-Self-Evaluation by Government and Society” (Paper presented at the annual meeting of the American Political Science Association, Washington, D.C., 1988).Google Scholar

47 Snyder (fn. 33), 461, emphasizes wasted resources; he argues (p. 462) that alliance formation is similar to arming, in that all states would be better off remaining outside an alliance; action and reaction nevertheless generate alliance blocks that are costly but fail to increase security.

48 On Stag Hunt and related games, see Kenneth A. Oye, “Explaining Cooperation under Anarchy: Hypotheses and Strategies,” in Oye (fn. 28).

49 For discussion of their impact on a Stag Hunt, see Downs, Rocke, and Siverson (fn. 28), 134–37.

50 In addition, a type of uncertainty that is not explored in the text is also important—uncertainty about whether an adversary will become greedier. This uncertainty cannot be eliminated because leaders cannot bind themselves and their successors to current goals; see Jervis (fn. 1), 168.

51 Although my discussion focuses on competition over territory, a parallel analysis can be developed for arms competition.

52 If facing a greedy adversary, however, a pure security seeker would now see instrumental value in expansion, if this would increase its security. The state would then have Prisoners' Dilemma preferences instead of Stag Hunt preferences. In addition, the state would see a higher payoff for war, if war held some prospect of successful expansion or of leaving the adversary relatively weaker, which makes competition more attractive.

Some of my game-theory colleagues object to this formulation, on the grounds that payoffs should be fixed and not vary with the type of adversary. A more adequate formulation requires a multiperiod game.

53 Consequently, the relative size of payoffs matters. Jervis devotes much of “Cooperation under the Security Dilemma” to exploring factors that influence payoffs. Offense-defense variables are among the most important and are discussed in the following section.

54 For related analysis, see Hoag, Malcolm W., “On Stability in Deterrent Races,” World Politics 13 (July 1961)CrossRefGoogle Scholar.

55 On the relationship between first-strike advantages, preemption, and accidents, see Schelling and Halperin (fn. 26), 14–16.

56 See also Quester (fh. 3), 105–6.

57 As Jervis (fn. 1) notes, this is an overstatement (pp. 201–2). A pure security seeker might buy offense for a number of reasons: (1) if offense has a great advantage over defense; (2) if the state has extended deterrence commitments; (3) because offense may be necessary to regain territory lost at the beginning of a war; and (4) because the threat of counter offense can enhance deterrence. On extended deterrence, see Van Evera, Stephen W., “Offense, Defense and Strategy: When Is Offense Best?” (Paper presented at the annual meeting of the American Political Science Association, Chicago, September 1987)Google Scholar. On counter offense, see Huntington, Samuel P., “Convention Deterrence and Conventional Retaliation in Europe,” International Security 8 (Winter 1983–84)CrossRefGoogle Scholar; and Posen, Barry R., “Crisis Stability and Conventional Arms Control,” Daedulus 120 (Winter 1991)Google Scholar.

58 The concept of differentiation is implicit in the distinction between qualitative and quantitative arms control, with the former relying on differentiation. This concept lies at the core of modern arms control theory; see, for example, Schelling, Thomas C., “What Went Wrong with Arms Control,” Foreign Affairs 64 (Winter 1985–86)CrossRefGoogle Scholar.

59 Van Evera (fh. 5), chap. 5.

60 Fearon, James D., “Rationalist Explanations for War,” International Organization 49 (Summer 1995), 402–3CrossRefGoogle Scholar. And see the following papers prepared for the annual meeting of the International Studies Association, Chicago, February 1995: Fearon, “The Offense-Defense Balance and War since 1648”; and Charles Glaser and Chaim Kaufmann, “Inspecting the Foundations of Offense-Defense Theory: Can They Bear the Weight?”

61 Van Evera (fh. 5), chaps. 5,6; and idem, “The Cult of the Offensive and the Origins of the First World War,” International Security 9 (Summer 1984)Google Scholar. See also Hopf, Ted, “Polarity, the Offense-Defense Balance, and War,” American Political Science Review 85 (June 1991)CrossRefGoogle Scholar; and Fearon (fn. 60, February 1995), who argues that the frequency of war in broad historical periods runs counter to standard offense-defense predictions.

62 See also Snyder, Jack L., “Perceptions of the Security Dilemma in 1914,” in Jervis, Robert et al., Psychology and Deterrence (Baltimore: Johns Hopkins University Press, 1985)Google Scholar.

63 Trachtenberg, Marc, History and Strategy (Princeton: Princeton University Press, 1991), chap. 2, esp. 6472Google Scholar. See also Kaiser, David, Politics and War: European Conflict from Philip II to Hitler (Cambridge: Harvard University Press, 1990), 324Google Scholar; and idem, “Deterrence or National Interest? Reflections on the Origins of War,” Orbis 30 (Spring 1986)Google Scholar; Stevenson, David, “Militarization and Diplomacy in Europe before 1914,” International Security 22 (Summer 1997)CrossRefGoogle Scholar.

64 This slightly overstates the similarity, since Waltz (fn. 4,1979), for example, assumes that states seek at least security but may have other goals as well (p. 126), while Jervis's formulation assumes that states are pure security seekers. This difference is not problematic, however.

65 Although “Cooperation under the Security Dilemma” precedes Theory of International Politics by a year, much of Waltz's argument is available in “Theory of International Relations,” in Greenstein, Fred and Polsby, Nelson, eds., The Handbook of Political Science (Reading, Mass: Addison-Wesley, 1975)Google Scholar. Waltz (fn. 4,1979) makes only passing reference to the security dilemma (pp. 186–87).

66 See Glaser (fn. 5), which presents additional reasons for modification; and Van Evera (fn. 5).

67 Jervis (fn. 1) does not overlook power, he is explicit that both power and offense-defense variables matter (p. 187).

68 See, for example, Snyder (fn. 11), who uses “aggressive” instead of “offensive” (pp. 10–13); and Lynn-Jones, Sean M. and Miller, Steven E., “Preface,” in Brown, Michael E., Lynn-Jones, , and Miller, , eds., The Perils of Anarchy (Cambridge: MIT Press, 1995), xiGoogle Scholar.

69 See Glaser (fn. 5).

70 Another basic puzzle still exists, however why states—security seekers as well as greedy states—do not compromise instead of incurring the cost of fighting; see Fearon (fn. 60, Summer 1995).

71 For related points, see Jervis, Robert, “Arms Control, Stability, and Causes of War,” Political Science Quarterly 108 (Summer 1993), 244–45CrossRefGoogle Scholar. Randall L. Schweller argues otherwise, holding that when a greedy state exists there is no security dilemma; see Schweller, , “Neorealism's Status-Quo Bias: What Security Dilemma?” Security Studies 5 (Spring 1996)CrossRefGoogle Scholar.

72 Schweller (fn. 71), quote at 106. Disagreement about the relative importance of greed and insecurity is long standing. For a comparison of the contending formulations offered by realists, see, for example, Wolfers, Arnold, Discord and Collaboration: Essays on International Politics (Baltimore: Johns Hopkins University Press, 1962), esp. 8384Google Scholar.

73 Restraint may not be ill-advised, however, since for a greedy insecure adversary the reduction in its insecurity could still offset the reduction in the state's military capabilities. Assessing the net effect requires more specific assumptions and a detailed model of interaction. By contrast, unilateral concessions are always misguided when one is facing a secure greedy state, as described by the deterrence model.

74 On the deterrent value of counteroffensive capabilities, see fn. 57.

75 Although at first glance this might seem to eliminate the security dilemma, this need not be the case. A state motivated entirely by security might choose war to increase its security; consequently, the state's insecurity should lead the adversary to fear it. Thus, eliminating the security dilemma would require that the adversary know not only that the state was a pure security seeker but also that the state did not fear it. Consequently, some points in this paragraph are overstated.

76 In this spirit, see de Mesquita, Bruce Bueno and Lalman, David, War and Reason: Domestic and International Imperatives (New Haven: Yale University Press, 1992)Google Scholar, chap. 5. A different argument is that the openness that characterizes mature democracies results in domestic debate that cannot be manipulated simply to deceive an adversary, and therefore provides valuable information about motives. See Kydd, Andrew, “Signaling and Structural Realism” (Manuscript 1996)Google Scholar; and Schultz, Kenneth A., “Domestic Political Competition and Bargaining in International Crises” (Ph.D. diss., Stanford University, 1996)Google Scholar. Schultz develops this type of argument for crisis interactions.

77 Arguing along these lines is Fearon, James D., “Domestic Political Audiences and the Escalation of International Disputes,” American Political Science Review 88 (September 1994), 587CrossRefGoogle Scholar. If, however, a democracy believes this to be the case and it is not, then we get the kind of misperception described above: the democracy believes that it doe not face a security dilemma and therefore does not moderate its building; its adversary, not confident that the democracy is a pure security seeker, then responds to the buildup; and the democracy then increases its estimate of the adversary's greediness because it believes that its adversary knew that a response was unnecessary for maintaining its security.

78 See Jervis (fn. 2), chap. 3; and Glaser (fn. 2).

79 Patrick Glynn focuses on Van Evera's arguments; see Glynn, , Closing Pandora's Box: Arms Races, Arms Control and the History of the Cold War (New York: Basic Books, 1992)Google Scholar, chap. 1, quote at 21. For a more nuanced but at least partially sympathetic discussion, see Trachtenberg (fn. 63), chap. 2, esp. 49–57.

80 Gray, Colin S., Weapons Don't Make War (Lawrence: University Press of Kansas, 1993), 174Google Scholar. A similar theme runs through idem, House of Cards: Why Arms Control Must Fail (Ithaca, N.Y.: Cornell University Press, 1992)Google Scholar.

81 Jervis (fn. 2), chap. 3. Douglas Seay reviews the debate among Soviet specialists; see Seay “What Are the Soviets' Objectives in Their Foreign, Military, and Arms Control Policies?” in Eden, Lynn and Miller, Steven E., eds., Nuclear Arguments (Ithaca, N.Y.: Cornell University Press, 1989)Google Scholar.

82 Schweller, Randall L., “Bandwagoning for Profit: Bringing the Revisionist State Back In,” International Security 19 (Summer 1994)CrossRefGoogle Scholar.

83 Jervis (fh. 2), 112–13; Glaser (fh. 2), 505–6.

84 Schweller (fh. 71), 117–20, quotes at 117 and 118.

85 Jervis (fh. 2) deals with precisely this issue (pp. 75–76).

86 Mearsheimer, John J., “The False Promise of International Institutions,” International Security 19 (Winter 1994–95), 1112CrossRefGoogle Scholar. Other prominent structural realists reject this position; see Waltz, (fn. 4, 1979), 118,126,127Google Scholar.

87 Mearsheimer, John J., “Back to the Future: Instability in Europe after the Cold War,” International Security 15 (Summer 1990), 12CrossRefGoogle Scholar. See also Zakaria, Fareed, “Realism and Domestic Politics: A Review Essay,” International Security 17 (Summer 1992), 190–96CrossRefGoogle Scholar.

88 Wendt, Alexander, “Anarchy Is What States Make of It: The Social Construction of Power Politics,” International Organization 46 (Spring 1992), quote at 407, and also 401–2CrossRefGoogle Scholar; and idem, “Constructing International Politics,” International Security 20 (Summer 1995), 77Google Scholar. For a very different constructivist critique, which focuses on the offense-defense balance, instead of the security dilemma, see Kier (fn. 10).

89 Wendt (fn. 88,1995), 73.

90 Wendt (fn. 88,1992), 396; see also idem (fn. 88,1995), 72.

91 This said, some realists have argued otherwise. See, for example, Grieco, Joseph M., Cooperation among Nations (Ithaca, N.Y.: Cornell University Press, 1990)Google Scholar. This is because they have conflated means and ends. See Glaser, Charles L., “Correspondence: When Cumulative Relative Gains Matter,” International Security 21 (Spring 1997)Google Scholar. See also Powell, Robert, “Guns, Butter, and Anarchy,” American Political Science Review 87 (March 1993), 127CrossRefGoogle Scholar.

92 Wendt (fn. 88,1992), 404–5.

93 Ibid., 407.

94 See especially Wendt (fn. 88,1992), 406. Wendt turns to the existence of predatory (greedy) states to explain how anarchy becomes a competitive realm (pp. 407–9). However, the weaker structural-realist assumption of uncertainty about motives, in combination with a security dilemma, is sufficient.

95 This section draws on Kaufmann and Glaser (fn. 25), which addresses a number of additional criticisms, as does Lynn-Jones, Sean M., “Offense-Defense Theory and Its Critics,” Security Studies 4 (Summer 1995)CrossRefGoogle Scholar. Jack S. Levy provides some of the early criticisms; see Levy, , “The Offensive/Defensive Balance of Military Technology: A Theoretical and Historical Analysis,” International Studies Quarterly 28 (June 1984)CrossRefGoogle Scholar.

96 Mearsheimer (fn. 86), 23.

97 For a different response, see also Lynn-Jones (fh. 95), 674–77.

98 Huntington, Samuel P., “U.S. Defense Strategy: The Strategic Innovations of the Reagan Years,” in Kruzel, Joseph, ed., American Defense Annual, 1987–1988 (Lexington, Mass.: Lexington Books, 1987), 36Google Scholar. See also Gray (fn. 80,1993), 28.

99 See, for example, Levy (fn. 95), 222. For related discussion of this criticism, see Lynn-Jones (fn. 95), 677–82.

100 See fn. 60 for work that has already raised this possibility.