Coercion for hire: a theory of indirect coercion
Dewey, Matthew D.
Moriarty, Paul J.
MetadataShow full item record
The purpose of this thesis is to examine the use of indirect coercion as an element of Political Warfare and as a policy option for the United States. This thesis synthesizes the concepts of indirect strategy and coercion to provide a cost-effective policy option for U.S. decision makers. In order to establish the strategic utility of indirect coercion, this thesis examines the conditions that are necessary for successful coercion of an adversary using limited military and economic resources. This thesis examines four historical cases of indirect coercion. The cases examined are Indonesia, Italy, and Chile during the early Cold War era, and Hezbollah as an ongoing case—to explore the varying outcomes, from success to complete failure. The analysis of the case studies examines surrogate targeting, the covert/overt balance, surrogate vs. sponsor centricity, and the role of positive inducements.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Rowe, Neil C. (Springer, 2017);Avoiding attacks on civilian targets during cyberwarfare is more difficult than it seems. We discuss ways in which an ostensibly military cyberattack could accidentally hit a civilian target. Civilian targets are easier ...
Dundon, Jeffrey R., Jr. (Monterey, California: Naval Postgraduate School, 2014-09);This study considers the triggers that may cause China to use economic coercion in bilateral state disputes. The literature reviewed shows that economic statecraft and coercion is a viable policy tool for shaping an opposing ...
Woods, Clinton, M. (Monterey, California: Naval Postgraduate School, 2015-03);Cyberspace has become an essential component of modern militaries. As this dependency grows, militaries who exploit this dependency may be able to hurt their adversaries within cyberspace to coerce them into a desirable ...