Hostname: page-component-586b7cd67f-rcrh6 Total loading time: 0 Render date: 2024-11-23T19:26:16.934Z Has data issue: false hasContentIssue false

The Spotlight's Harsh Glare: Rethinking Publicity and International Order

Published online by Cambridge University Press:  07 May 2018

Abstract

How does publicizing states' illicit activities affect the stability of international order? What does this relationship tell us about how governments react to violations of international rules? In contrast to the conventional wisdom that transparent monitoring strengthens the normative legal order, we argue that these activities often undermine it. We develop two mechanisms through which this occurs: by raising the known rate of noncompliance, and by sharpening the threat that deviance poses to other states. We argue that when enforcers understand the dangers of publicizing transgressions, they do so selectively. Focusing on the nuclear nonproliferation domain, we demonstrate that these concerns shaped American decisions to reveal or obfuscate other states' efforts to obtain nuclear weapons. We formalize this argument and then empirically test the model's predictions using in-depth case study analyses. We find that the US failed to disclose infractions when this publicity would have undermined the rules through the two mechanisms we identify. However, while concealing violations can prevent proliferation in response to specific nuclear programs, it can also create potential dangers to a regime's overall health and stability. In addition to reassessing a widely shared assumption about the value of transparent monitoring, this article's broad theoretical framework can shed light on enforcement and compliance dynamics in a variety of international settings.

Type
Research Article
Copyright
Copyright © The IO Foundation 2018 

“Publicity is justly commended as a remedy for social and industrial diseases. Sunlight is said to be the best of disinfectants; electric light the most efficient policeman.”

–Louis D. BrandeisFootnote 1

How does the publicity of noncompliance affect international order? Brandeis's sunshine analogy invokes an intuitive and widely shared answer: revealing infractions can strengthen socio-political rules. This positive association between the exposure of violations and a well-regulated political system is manifested in several influential areas of international relations scholarship. Rational institutionalist theories, along with research on norms and international law, have argued that publicizing noncompliance can reverse deviant behavior through punishment and sanctions, and can reassure compliers that they will learn whether others fail to comply.Footnote 2 Indeed, many international organizations that monitor state compliance reflect this logic because they are designed to facilitate the identification and publicity of transgressions.Footnote 3

Despite this intuitive logic, theoretical and empirical studies in sociology, criminology, and economics suggest that the relationship between visible rule breaking and social order is more complex. Decades ago, social theorists noted that the opacity of violations of social norms allows many implicit and explicit rules to persist.Footnote 4 More recently, studies of compliance with laws about everything from alcohol consumption to tax reporting have found that increased transparency about the rate of noncompliance can increase individuals' propensities to break these regulations.Footnote 5

This raises two puzzles for scholars of international politics. First, when might the disclosure of international rule violations strengthen regimes, and when might it endanger them? Answering this question requires first identifying the mechanisms through which the revelation of noncompliance affects regime health. Second, how do rule enforcers react to noncompliance in light of these concerns? Well-informed states that detect noncompliance can influence whether the international community learns about deviant behavior. Such states should strategically manipulate the provision of information about violations of international laws in light of the likely impact of publicity.

In this article we develop and test a theory that answers these questions, arguing that while the conventional wisdom often holds, it breaks down under key circumstances that are prevalent in international settings. We develop two mechanisms by which exposing rule violations endangers norms and formalized legal regimes: (1) when a state learns of high levels of noncompliance in the international community, the perceived social opprobrium from that state violating the norm is reduced (the pessimism mechanism), and (2) when a state learns of specific instances of noncompliance that may pose a direct threat to the state's security, it may seek to defend itself (the threat mechanism). Next we analyze how these mechanisms inform the strategic behavior of a well-informed state with enforcement capabilities, modeling the conditions under which such a state intentionally hides another state's rule violations to protect the regime. When the well-informed state finds it difficult to reverse a case of noncompliance, publicity can encourage additional instances of rule abandonment, leading regime advocates to strategically withhold information to perpetuate the practical and legal ambiguity about a given infraction. Otherwise, such a state will publicize noncompliance in line with the conventional view.

We evaluate the theory's observable implications in the nuclear nonproliferation setting, focusing on whether decision makers in the regime's strongest advocate, the United States, intuitively grasped the appeals and dangers of revealing violations. Drawing on recently declassified internal documents, we find that US leaders strategically obfuscated violations of the nuclear regime when they believed that a state's nuclear progress was irreversible and would lead to other states' noncompliance. Otherwise, US leaders shared their information with other states to reassure such states and to organize punishment of the violator, mirroring the conventional wisdom. The nuclear domain illustrates potential downsides of this pattern of behavior for the regime as a whole: high rates of concealment can undermine confidence in the enforcement of the regime.

Our focus on how strategic actors react to nuclear proliferation allows us to shed light on an empirical puzzle: Why would a regime advocate withhold its information about another state's nuclear program, especially given extant theory about the benefits of revelation? While obfuscating a state's own nuclear ambitions is sensible, the strategic purpose of hiding other states' programs is less clear. Beyond the nuclear realm, the article re-examines and revises the common assumption of scholarship on both international norms and international organizations that knowledge improves compliance with rules and norms. We combine game-theoretic tools, social-theoretic insights from outside of political science, and archival documentary evidence to show that this view is incomplete. Under some conditions, shining a spotlight on rule violations increases the stress on a regime, resulting in the strategic withholding of intelligence. By addressing these large theoretical debates, our findings also speak to treaty violations and enforcement efforts in other arenas including ceasefire agreements, global trade rules, and environmental accords.

The Spotlight's Benefits

A common theme of studies of both norms and international regimes is that widely shared knowledge about noncompliance helps to maintain a rule-based international order. A monitor's standard role is to facilitate cooperation when states mistrust each other, which occurs when they remain uncertain about whether their partner prefers to respond to cooperation with cooperation or defection.Footnote 6 A monitor can allow cooperation to emerge when both parties are too mistrustful to do so otherwise by reassuring each that the other side wants to cooperate.Footnote 7 A variety of studies echo this positive view of monitoring. For example, constructivist models of norm evolution argue that drawing attention to norm-inconsistent behavior can stimulate domestic and international pressure and sanctions, which can force deviant states to enter or rejoin normative regimes.Footnote 8 Recent applied studies have systematically assessed this intuition by analyzing how publicity affects compliance with international human rights norms,Footnote 9 typically finding that condemnation motivates the target state to comply.Footnote 10

Also germane to our theory is the larger literature on cooperation and international institutions. Beginning with Keohane, rational institutionalists have argued that cooperation is often difficult because states fear being suckered into complying while their partner violates the agreement.Footnote 11 International institutions and other monitors, however, can facilitate cooperation by easing access to information about states' adherence to the rules. This can reassure states that they will not be taken advantage of because they will learn of defections.Footnote 12 By providing such information, international organizations (IOs) can encourage reciprocity, solve political hold-up problems, allow states to develop reputations for compliance, and coordinate punishments for defection.Footnote 13 While the degree of centralized monitoring varies,Footnote 14 a common assumption is that exposing noncompliance strengthens regimes.

The Spotlight's Dangers

Despite the widespread positive view of transparent monitoring, a countercurrent of research on the possible dangers of information revelation in global governance hints at a more complex story. For example, some studies suggest that greater domestic institutional transparency provides information that sharpens value conflicts among groups, empowers dangerous nongovernmental actors, and breeds misperception of intentions during crises.Footnote 15 Others highlight the downsides of revealing diplomatic negotiations regarding international agreements, a step prior to the compliance stage on which we focus.Footnote 16 Most relevant to our argument is Lindley's finding that information gleaned from institutionalized monitoring can be counterproductive because it can facilitate coercive diplomacy.Footnote 17

We build on these ideas by arguing that when states are willing to cooperate with each other without additional information about each other's willingness to respond to cooperation with more cooperation, monitoring can actually prevent cooperation by publicizing defections, leading the other party to defect as well. This can occur through the pessimism and threat mechanisms, where the first is triggered when high levels of noncompliance reduce the perceived social opprobrium from violating the norm, and the second is activated when specific violations that pose a direct threat lead a state to defend itself by defecting. To make our argument, we adapt related theoretical and empirical findings from outside of political science to the context of states in an anarchic international system.

The first mechanism builds from mid-century social-theoretic analyses of privacy and deviance, which argue that ignorance and concealment can create the appearance that a normative consensus exists when in fact it may not. Actors may then comply as a result of a mistaken belief that if they do not, they will face ridicule or stigma. Hiding transgressions is thus not only attractive for the rule violators but is also “an important functional requirement for the effective operation of social structure”Footnote 18 because it “reinforc[es] the assumption that deviation from the rules is statistically insignificant.”Footnote 19 Influential sociologists like Erving Goffman, Georg Simmel, and others thus noted the stabilizing effects of masking devianceFootnote 20 because the higher rates of perceived compliance strengthen the social bonds and shared commitment to the rules.Footnote 21 In contrast, if actors discovered that many others violated the rules, they would conclude that following the norm was less highly valued than they had previously thought, and that straying from it would trigger less severe reputational consequences. This theme also appears in more recent work. In diverse settings from juvenile gangs to tax compliance, sociologists and economists have found that hard-to-observe transgressions lead actors to underestimate the rate at which such violations occur, reinforcing the economic incentives and perceived social pressures for others to remain in compliance with the rules.Footnote 22

These studies point to an overlooked effect of publicizing rule violations in the international realm: publicity can eliminate ignorance and uncertainty about defections, relaxing the strategic incentives and normative pressure to remain within a regime. As states become aware of other states' violations—regardless of the direct threat that the violations pose—the behavioral and ideational consensus in the international community may weaken, which can alter states' assessments of the benefits associated with their own cooperation. States may realize that their reputations will not be tarnished from breaking the rules to the degree that they once believed. The increasing pessimism about the overall rate of compliance can thus lead to second-order or reactive violations.Footnote 23

A second and distinct effect of publicizing rule violations—which is especially relevant to the anarchic international system—is a sharpening of the threat that these violations pose to other states. This scenario is most plausible in regimes that govern interdependent state activities where economic, military, or other advantages are generated by defections from norms.Footnote 24 Because a rule violation can create negative consequences for other states, the publicity of noncompliance can alert states to the threat and thereby lead to reactive violations. Unlike the pessimism mechanism, which results when any state violates a given norm, this mechanism comes into play when a violation poses a direct danger. For example, in the nuclear realm, the acquisition of weapons by nearby or enemy states can have particularly severe consequences.Footnote 25 These second-order rule violations, in turn, can accumulate and generate a wider unraveling of participation in a regime.Footnote 26

Many states recognize these dangers of transparent monitoring, and thus often seek to limit knowledge of violations.Footnote 27 When an enforcer is not “exploitation averse”—that is, when it prefers a single defection to mutual defection—it has an incentive to hide the original defection to prevent additional violations from occurring.Footnote 28 Our theory thus expects states with unique information about violations that support the goals of the regime to carefully manage the publicity of violations when the dangers we highlight are present.

Signaling and Strategic Obfuscation

We develop a formal model to generate testable empirical hypotheses about how enforcers strategically manage information in light of the countervailing effects of publicity that we identify. The game is referenced but, because of space constraints, the formalization appears in the supplementary appendix. The central actors are three states: a regime monitor and enforcer (E), state A, and state B, where B represents a member of the international community. Prior to the start of the game, neither A nor B have broken the law. The game begins with Nature randomly drawing A's benefit from a violation so that A derives a large benefit ($\overline b $) with probability 1 − p and a small benefit ($\underline b $) with probability p, where $\overline b \gt \underline b $.Footnote 29 A then chooses whether to violate the rules (v A) or not (¬v A). B does not observe A's action while E does because of E's informational advantage.

If A violates the rules, Nature determines E's capacity to persuade A to come into compliance. E is able to inflict a large punishment $\overline e $ with probability q, or a small punishment $\underline e $ with probability 1 − q, where $\overline e \gt \underline e $.Footnote 30 When E has more leverage over A and can punish A more severely by inflicting $\overline e $, it is more likely to persuade A to come into compliance. E observes A's type and whether it violates, along with its own type. If a violation occurred, E decides whether to reveal A's violation (r) or to obscure its information (o). If E publicizes the violation, A decides whether to come back into compliance with the law or to continue to violate it. If A continues to break the rules, it is punished, while if A comes into compliance, it is forgiven. Further, if E reveals the violation, B learns A's type and actions, whereas if A either does not break the law or does so but the violation is concealed by E, B does not observe A's decision. Finally, B decides whether to violate the rules (v B) or not (¬v B).

A's payoff is made up of four components. First, if A violates and E hides it, or if A violates at both of its moves, the state receives a net domestic benefit $b_A = \{ \overline b, \underline b \} $. Next, if B violates the rules, A receives utility from doing so as well because of its resulting enhanced capacity to defend itself against B, denoted d, and vice versa. If E publicizes A's violation and A does not come into compliance, A incurs a punishment of $e = \{ \overline e, \underline e \} $, which captures the resulting economic sanctions or loss of reputation. If A rolls its violation back, however, it escapes punishment. Finally, A cares about the total number of states that comply with the agreement, represented by $\Omega _A(2 - 1_{\{ v_A\}} - 1_{\{ v_B\}} )$. This specification is in line with our discussion because the idea that actors gain more from obeying the law when others do also is central to this literature. Since this simple model consists of two potential violators, their utility from following the norm in effect depends on whether A and B themselves follow it.

B's payoff depends on three items: it receives domestic costs and benefits from a violation that are summarized by the parameter B; it obtains d if both A and B violate the agreement since B can defend itself; and it derives greater utility the more states comply with the norm $\Omega _B(2 - 1_{\{ v_A\}} - 1_{\{ v_B\}} )$. Finally, E's utility is made up of two components: it cares about compliance with the law since E must enforce it, and it incurs a small cost s from the strategic obfuscation of a violation. The enforcer's utility function is thus $\pi _E(v_A,v_B,o) = \Theta _E(2 - 1_{\{ v_A\}} - 1_{\{ v_B\}} ) - s1_{\{ o\}} $.Footnote 31 This discussion is summarized in the game tree and the players' strategies are laid out fully in the appendix. We focus on pure strategy weak perfect Bayesian equilibria and solve the model through backward induction.

Table 1. Model parameters

Assumptions and Discussion

We make several parametric assumptions. First, we assume that $\bar b - \bar e \gt \underline b - \underline e $ so that the difference in the potential domestic benefits associated with having nuclear weapons is greater than the difference between the two potential severities of E's punishment. Second, we assume that $\underline b \gt \Omega _A(1)$ where $\underline b $ is A's payoff if only A has nuclear weapons while ΩA(1) is A's payoff if only B has nuclear weapons. We thus assume that if only one country possesses nuclear weapons, A strictly prefers that A has them. Third, we assume that Ωi(.) is linearly additive, which ensures that a state's willingness to comply does not depend on the rate of noncompliance.Footnote 32

Figure 1. Game tree

We also make several simplifying modeling choices. First, we solve the game under imperfect information. Otherwise, if A's type were common knowledge, E's role would be minimal since B would know whether A violated the rules with certainty. Uncertainty about whether A desires cooperation—or whether B can “trust” A—is thus required for E to influence B's response. Moreover, we could instead assume that B obtains some information, or that E has imperfect information; the key assumption is that E possesses an informational advantage over B.

Second, we include only one B in the model, though typically many states are affected by A's decision in reality. A more complicated model could include additional Bs, though the intuition would remain the same. In such a model, E would not need to possess an informational advantage over all such states because E faces incentives to hide a given violation as long as doing so would affect the information received by at least one B.

Third, we conceptualize E as a state even though, as noted, international organizations and nongovernmental organizations also frequently possess information about compliance.Footnote 33 However, states have the capacity for strategic monitoring, while other actors often lack private information about compliance and thus cannot withhold it selectively.Footnote 34 We assume that evidence is necessary to change B's beliefs, so that E cannot alter its views by simply asserting otherwise. In effect, this means that E cannot lie, though this could be relaxed without changing the basic results.

Finally, E cannot publicize a violation if one did not occur. Since E must present evidence of a violation, we think it is reasonable to assume that E cannot lie, though this could be relaxed.

Analysis

While the full proof of the model appears in the supplemental appendix, we describe E's incentives and actions here. Specifically, consider E and B's responses to two scenarios: first, when A complies following E's threat to punish it, and second, when it does not. In the first case, E publicizes the violation. Then, B becomes aware that A is no longer breaking the law and therefore does not need to do so in self-defense. Further, A's capitulation preserves the norm so B continues to follow it since everyone else is doing so. Publicizing A's violation thus enhances the regime's health.

In the second case, publicity may still represent a rational response for E. The decision to hide A's activity may be exposed later, risking international and domestic criticism. However, if E publicizes the violation and A does not roll its program back, B may respond by violating the rules for two reasons. First, consistent with our threat mechanism described previously, B may require self-defense capabilities if A's violation poses a direct threat. Second, consistent with the pessimism mechanism, B may view the overall rate of compliance more negatively, and learn that the reputational consequences of violating the norm are not as severe as it thought. Whether this mechanism comes into play depends on the strength of the regime; if many other states follow the rules, the effect of A's violation is smaller than if few other states follow them. Thus, through both the threat and pessimism mechanisms, knowledge of a violation can weaken B's incentives to obey the rules.

By contrast, if E obfuscates the violation, B cannot detect it; it knows only that no violation was publicized. It thus believes that an infraction took place with some probability. Since A's transgression remains hidden, B is left with the impression of a greater consensus than if B knew that a violation occurred, creating stronger pressure to conform. Further, B's environment may be less threatening, since it is only possible that B faces a threat from A, rather than certain. The costs of violating the rules may not be worth addressing this potential threat, while they may be justified in the face of a known one.

When E observes a violation, then its best response depends on whether it can reverse A's decision and the likelihood that B will transgress following publicity. If B's self-defense needs are low and the regime is strong, such that B will not break the law regardless of A's actions, E always publicizes A's violation. Or, if E can reverse A's noncompliant behavior by exposing its violation, it will do so. However, if B would react to A's deviance by violating the rules itself, and E cannot reverse A's transgression, E hides the violation to avoid triggering the pessimism and threat mechanisms that might otherwise endanger the international regime. This discussion is captured formally by the following proposition and, under the assumptions listed previously, is summarized in Table 2:

Proposition 1

Assume d + b > ΩB(1) > b, $d + \bar b - \underline e \gt \Omega _A(2) \gt d + \underline b - \underline e $ and pB(1) − b] + (1 − p)(1 − q)[ΩB(1) − d − b] > 0.

Under these assumptions, E 's equilibrium strategy is to hide A 's violation if: 1) A will not come into compliance and 2) B will not violate if A 's violation is hidden. Otherwise, E publicizes the violation.

Table 2. Choice of strategic obfuscation versus publicity

While we have focused on the enforcer's incentives, the model is rich and provides many insights into issues such as overall regime stability. For example, the model also indicates that the possibility of obfuscation can erode the regime because B suspects that unobserved violations could be occurring but are hidden. Reliance on a monitor with less discretion, such as an IO, may help to mitigate this issue under some conditions. While we focus our empirical examination on E's strategic behavior, we address many of these additional implications later.

The Nuclear Nonproliferation Regime

We examine our model's predictions empirically by focusing on a particular international regime to make our problem tractable: the prohibition on the use of nuclear technology for developing nuclear weapons arsenals. Nuclear proliferation is a rich empirical setting in which to test our claims because it features powerful states—the US in particular—that sought to create and enforce a prominent and substantively important international regime affecting many countries over a long period of time. Moreover, it contains numerous cases in which the United States possessed unique, private information about other states' violations, giving it the opportunity to strategically choose whether to reveal this knowledge. Finally, the nuclear domain hosts variation in our critical independent variables and includes a corpus of recently declassified archival materials that permits us to examine the motivations behind these decisions.

The nonproliferation regime was formalized in 1968 in a binding multilateral agreement known as the Non-Proliferation Treaty (NPT). Since the treaty specifically regulates military uses of nuclear technology, we define a rule violation as the pursuit of nuclear facilities and nuclear-weapons-related research and development by any state besides the five classified as nuclear weapons states in the NPT (the US, Russia, the UK, France, and China.) Broad agreement exists that nonproliferation has become a strong norm,Footnote 35 and while the NPT did not create the norm, it “codified the sentiment that states should not seek to acquire nuclear weapons.”Footnote 36 Thus, though not all states signed the NPT, all were expected to abide by the rules of the nonproliferation regime more broadly.Footnote 37 Many scholars argue that normative and legal penalties for pursuing nuclear weapons constrain both their acquisition and use and that “violating these international norms will result in severe constraints to any state, such as political, economic and possibly even military reactions.”Footnote 38 This broad prohibition was reflected in the 1974 Zangger Committee's trigger list, under which members noted the importance of “the application of safeguards in non-nuclear-weapon states not party to the NPT,”Footnote 39 as well as in the norm's enforcement outside of the NPT more generally.Footnote 40

Monitoring of the norm takes place in part through the International Atomic Energy Agency (IAEA), which collects reports submitted by individual member governments, inspects their declared facilities, and conducts special inspections in response to particularly suspicious member activities. In practice, however, its activities are limited, particularly during the period we analyze, because “IAEA safeguards inspections had been quite pro forma. IAEA inspectors only checked on nuclear facilities that states chose to declare; they typically did so in a ‘cursory’ manner, and up to 1991 they had never undertaken even a single ‘special inspection’ of suspect facilities … Essentially, the regime was strong enough only to ensure that the IAEA would become aware of a ‘smash and grab’ operation on declared nuclear fuel within six months of its occurrence.”Footnote 41 As a result, effective monitoring typically depends on intelligence collected by member states.Footnote 42 We focus on the US in particular because it devotes substantial resources to tracking nuclear programs, possesses superior intelligence, and exercises greater discretion about whether to publicize that information.Footnote 43

Empirical Analysis

We test an implication of our argument that is normally difficult to observe: whether a well-informed state that both supports and helps to enforce the regime (E) manipulates its private information consistent with the conditions that we derive in the model. The model suggests that when B mistrusts A and has an incentive to arm if A does, it should develop nuclear weapons since it assumes that A likely violated the norm. However, if B has relatively high trust in A and seeks weapons only if A has them, it should not pursue them in the absence of additional information. The key implication is that if an enforcer publicizes A's decision to proliferate and cannot convince A to reverse its program, B will seek its own arsenal when it otherwise would not have. In such a scenario, the enforcer will obfuscate A's activities to prevent B's reactive defection.Footnote 44 Otherwise, we expect the enforcer to disclose information in line with the conventional wisdom.

Our empirical strategy draws heavily on declassified American intelligence and related documents. This primary evidence helps us to accomplish three goals: we identify cases in which a state's intelligence was withheld despite the difficulty in observing such cases using traditional open sources; we test the theory by evaluating the conditions under which intelligence was hidden; and we test our theoretical mechanisms by assessing leaders' intentions and beliefs about the consequences of their actions.Footnote 45 The United States was a key regime advocate throughout the period we analyze and often had private information about other states' nuclear activities that allowed it to make strategic decisions about how to handle violations of the nonproliferation norm.Footnote 46 In each case we analyze, the US had an informational advantage over both the IAEA and most other states, though it did not necessarily possess an informational monopoly, which is not necessary for the enforcer to hold and exercise such an advantage.Footnote 47

Our specific research question narrows the relevant universe of cases to: (1) states that pursued a military nuclear capability; (2) states with clandestine programs that were active after the emergence and formalization of the norm against proliferation; and (3) states that had not overtly demonstrated a nuclear weapons capability through a test or a political announcement.Footnote 48 These criteria include the nuclear programs of states outside of the NPT, for both empirical and theoretical reasons. Empirically, the prohibition on new arsenals since 1967 has been treated as universal (as we discussed previously) and, as our case evidence demonstrates, key states perceived nonmembers' programs to be central to the fate of the nonproliferation regime. Theoretically, including nonmembers is important because previous studies of naming and shaming have explicitly identified publicity as a useful tool for convincing new states to join the regime. Table 3 lists the resulting universe of cases.Footnote 49 Because we require access to internal assessments and discussions, we take advantage of the recent release of declassified material on US views of nuclear proliferation trends, supplementing these data with secondary sources where necessary.Footnote 50

Table 3. Choice of strategic obfuscation versus publicity

Note: The table shows which cases featured conditions that should have led E to strategically obfuscate (lower-right box) or publicize violations (other three boxes).

Our main independent variables are the perceived likelihood that the proliferator would comply following publicity (i.e., A's reversal), and the perceived risks of second-order proliferation (i.e., B's reaction). The former is coded using US assessments of this probability. Since the US generally believed that compliance was more likely when the US possessed strong unilateral leverage over the country and when a multilateral coalition could be assembled in opposition to the program, we note when either of these factors were present.Footnote 51 In such cases, tactics such as diplomatic pressure and threats of sanctions were frequently effective. However, the primary determinant of how this variable is coded is whether the internal US assessments indicate a belief that compliance was likely.Footnote 52

The risk of reactive proliferation is coded in two parts. First, we assess the US's belief that other states would react to a violation by pursuing nuclear weapons and/or hosting an existing nuclear power's nuclear weapons.Footnote 53 Specifically, we code the regional threat as “low” if it was deemed unlikely that other states would proliferate in response, “medium” if one other state might have done so, and “high” if more than one other state was expected to respond by proliferating.Footnote 54 Second, we determine the strength of the regime at the time of the violation, which we simplify by coding three phases following Wan.Footnote 55 Phase I includes 1968–1978, which encompasses the date the NPT entered into force through a period of reforms to strengthen the regime that took place in the 1970s.Footnote 56 Phase II includes 1979–1990, a period that featured only minor changes to the regime. Phase III includes 1991 and beyond when major reforms were implemented that were catalyzed by the 1991 Gulf War,Footnote 57 and the Cold War's end left the US as the sole superpower, facilitating multilateral pressure on violating states. If neither of these two components are coded as “high,” then this variable is coded as “low.”

Finally, for our dependent variable—the US's (i.e., E's) reaction to each violation—we code whether the US chose to publicize or conceal its private assessments of each state's nuclear activities. Publicity occurred when the US shared its private information through bilateral contacts with other governments, international organizations, official public media statements, or authorized leaks by government officials.Footnote 58 The US engaged in the strategic obfuscation of another state's noncompliance when it attempted to minimize the scrutiny of the violation and abstained from sharing private information about the program at any time following a state's initial violation.Footnote 59

We analyze each case and organize our empirical analysis according to the four scenarios shown in Table 3. As Table 4 summarizes, we find that the US strategically obfuscated violations in five cases: Israel, Pakistan, India, Iraq (pre-1990), and South Africa. In the remaining examples, the US chose to publicize states' noncompliance. We analyze the full universe of cases, though space constraints limit our presentation to exemplar cases from three of the four potential scenarios shown in Table 3. We assess the remainder in the appendix.Footnote 60

Table 4. Summary of cases

Notes: The table summarizes the coding of each of our cases. The fourth column codes the norm stage as described in the text, and in parentheses we list the resulting severity of the threat of reactive proliferation.

Israel (Proliferator Unlikely to Comply and High Risk of Reactive Proliferation)

When the threat of reactive proliferation is high and the violator is unlikely to comply following US efforts to compel it to do so, our theory expects the US to strategically obfuscate the infraction since publicizing it would sharpen the threat posed to regional rivals and weaken other states' confidence in the norm. We find that these conditions held in five cases and that the US chose to conceal the state's activities in each. We focus on Israel here and analyze the others in the appendix.

The US's confidence that Israel was clandestinely progressing toward a nuclear arsenal grew in a political climate marked by strong concerns about larger proliferation trends.Footnote 61 This period marked the earliest, most fragile stage of the norm. Since relatively few states adhered to it, a single deviation could have revealed the norm's weakness and shown states that the consequences from violating it were less severe than they previously thought. As early as 1961 the US had concluded that Israel would obtain plutonium by 1965–66 and would have a weapon by 1966–67. By 1969, the US had determined that Israel possessed a weapon.Footnote 62

The US was convinced that Israel was highly unlikely to relinquish its program despite the US's efforts to convince it to do so, such as threatening to curtail the US's support for Israel and offering security guarantees, military assistance, and foreign aid.Footnote 63 US intelligence officials believed that even regional diplomatic solutions like a Middle East peace agreement would not change Israel's course; open pressure or a multilateral coalition were seen as futile.Footnote 64 Henry Kissinger concluded that it was “impossible to deprive Israel of the option to put together an operational nuclear capacity” because it would be “impossible politically for an Israeli Prime Minister to give up completely an advantage deemed vital and achieved at considerable cost … [the US] has no way of forcing Israel to destroy any nuclear devices or components it may now have.”Footnote 65

Thus, while the US had kept estimates of Israel's nuclear program secret since 1960,Footnote 66 a September 1969 visit by Israeli Prime Minister Golda Meir made this secrecy permanent in an agreement to hide Israel's nuclear status.Footnote 67 Evidence for both the pessimism and threat mechanisms is showcased during debates surrounding this meeting. Obfuscation advocates argued that avoiding the publicity of Israel's nuclear arsenal would reduce the chances that surrounding states that were hostile toward Israel would reject the NPT to seek their own nuclear capabilities. Cohen notes that “the most serious concern … was that the Israeli nuclear project would lead to a dangerous regional nuclear arms race.”Footnote 68 US leaders feared that Syria and Egypt might seek a Soviet nuclear security guarantee because of the direct threat that Israel's activities posed. As Kissinger's top adviser on the Middle East wrote, “Until the Arabs could develop nuclear weapons, they might seek, and get, Soviet agreement to extend a ‘nuclear umbrella’ to the Arab states.”Footnote 69 Publicity would exacerbate this because the Soviet Union might find it harder to decline such a request once Israel's arsenal became an established fact and, over time, other Arab states could seek their own nuclear capabilities.Footnote 70 Kennedy also expressed concerns that Egypt would respond by developing a nuclear weapon, and the US worried about the possibility of a nuclear arms race among Arab states more generally.Footnote 71

The US also worried about the reaction of states that were further afield, since they might believe that the emerging nonproliferation norm had weakened and would likely feel less pressure to adhere to it themselves. For instance, an issue paper widely circulated within the Nixon administration claimed that Israel's nuclear arsenal could jeopardize the momentum toward global acceptance of the treaty. Similarly, a State Department policy planning staff memo argued, “A known Israel nuclear capability would have far-reaching unfavorable effects,” first among them that “other nuclear capable countries would be more likely to opt in favor of nuclear weapons for themselves and … would be less likely to sign the NPT.”Footnote 72 Indeed, internal documents show that leaders outside of the Middle East considered reactive proliferation. For example, the West German chancellor cites the possibility of Israel's proliferation as a key consideration in Germany's nuclear pursuits.Footnote 73 The US intelligence community, too, argued that an awareness of Israel's activities might cause changes in general perceptions of proliferation trends that could be detrimental to the norm.Footnote 74 The New York Times reported, “American officials are particularly worried about the pressures that [Israel's possession of the bomb] may put on such countries as India, Japan and Sweden, which are believed to have the technical capacities for producing atomic arms, but are not believed to have done so.”Footnote 75

The US thus created “circumstances in which Israel would not ‘announce’ a nuclear capability and would maintain secrecy” through “private, bilateral assurances that Israel would not deploy or test nuclear explosive devices.”Footnote 76 Indeed, “Nixon probably guaranteed that the United States would not pressure Israel to roll back its program and join the NPT if it kept a low profile; this entailed a non-testing and non-declaring guarantee.”Footnote 77 As Kissinger succinctly stated in the summer of 1969, “public knowledge is almost as dangerous as possession itself.”Footnote 78 A subsequent memo from Kissinger reminded Nixon that during his visit to Israel he had “emphasized [to Meir] that our primary concern was that the Israelis make no visible introduction of nuclear weapons or undertake a nuclear test program.”Footnote 79 While other states might suspect that Israel had nuclear weapons, the US hoped that enough doubt would remain to dissuade reactive proliferation.Footnote 80 Kissinger argued,

Our interest is in preventing Israel's possession of nuclear weapons. But since we cannot—and may not want to try to—control the state of Israel's nuclear program and since Israel may already have nuclear weapons, the one objective we might achieve is to persuade them to keep what they have secret. This would meet our objective because the international implications of an Israeli program are not triggered until it becomes public knowledge … . Our aim is to keep Israel's possession of nuclear weapons from becoming public knowledge and to do what we can to stop further proliferation.Footnote 81

Although many leaders suspected that Israel intended to acquire a weapon—Egypt's Nasser had publicly warned the Arab world about a possible future Israeli arsenal in 1960—the US thought that hiding the weapons program could “keep Israeli possession from becoming an established international fact.”Footnote 82 While information about the arsenal was leaked to the New York Times in 1970, we find no evidence in the sourcing of this story or histories of this period that this was an authorized leak used to place pressure on Israel. Since the US intended to keep the secret, this case is coded as an example of concealing the violation. The US assumed that some leaks would take place, as “news about Israeli progress could continue to seep out … until it is generally taken for granted that Israel has this capability”Footnote 83 but the US administration hoped that “‘other nations might be kept in line,’ and nuclear weapons acquisition might be delayed ‘at least five to ten years.’”Footnote 84

Brazil (Proliferator Unlikely to Comply but Low Risk of Reactive Proliferation)

When the threat of reactive proliferation is low, the US should publicize programs even when the proliferator is unlikely to comply with the US's demands. This strategy avoids the international and domestic scrutiny that occurs if obfuscation of the violation is later exposed, along with the costs of convincing the proliferator to keep its program secret. These conditions held in two closely linked cases—Argentina and Brazil. We focus on Brazil here and analyze the Argentina case in the appendix.

Brazil began constructing a nuclear power plant in 1971, and by 1983 the US had determined that it could produce highly enriched uranium by the mid-1990s. The program remained secret throughout the 1970s and 1980s before it was dismantled in 1990. While Brazil acquired the technology to produce nuclear weapons, it did not build them and instead acceded to the NPT in 1998. The US determined that while Brazil was unlikely to comply as a result of US efforts, the threat of reactive proliferation was relatively low (with the possible exception of Argentina, which we detail subsequently), so the US did not hide the program.

The US argued that Brazil would not come into compliance as a result of US publicity and pressure, stating that Brazil would “persist in its … resistance to any US effort to constrain its nuclear ambitions.”Footnote 85 Furthermore, US officials claimed, “Brazil strongly resists what it perceives as foreign effort to limit its access to new equipment and technologies.”Footnote 86 Intelligence officials concluded, “It will be difficult for the United States—or any other nation—to have a major impact on its nuclear policies … Brazilian leaders have a strong determination to pursue their own self-interest—especially with regard to the acquisition and development of nuclear technology—and the confidence to oppose those who stand in their way.”Footnote 87 Brazilian officials echoed these sentiments. For instance, a Brazilian embassy representative stated, “We know how to resist any and all US pressures … Our nuclear program will continue, at least to the extent it depends on us, against all internal and external pressures.”Footnote 88 US coercion and its publicity of the program did not compel Brazil's compliance, but instead propelled Brazil and Argentina to work together. While the two states had faced a brief period of tension over hydroelectric resources, US pressure made both so angry that they overcame their differences to cooperate in the nuclear domain.Footnote 89 A multilateral coalition was also unlikely to form since states were divided over whether to support Brazil's nuclear program. For example, West Germany and China assisted Brazil, while the Soviets joined the US in opposing it.Footnote 90

Although obtaining Brazil's compliance was improbable, the threat environment was also not particularly high, leading the US to expose the violation. First, because the norm was in its intermediate stage, the threat of a defection to the overall regime was moderate since a single defection would be unlikely to significantly change states' views of the likely consequences. Second, Argentina was the main concern regarding second-order proliferation, since Brazil's activities could directly threaten the state. Yet “neither Argentina nor Brazil perceived the other as having the intention to introduce instability into the Southern Cone by building nuclear weapons.”Footnote 91 Instead, they held talks beginning in 1967 that helped to ensure that nuclear energy would be used for peaceful purposes.Footnote 92 Although the talks had several fits and starts, they picked up in the early 1980s and continued until the dismantling of the programs. This “fluid dialogue … kept both sides comfortably aware of their counterparts' intentions and capabilities and prevented the development of a nuclear rivalry.”Footnote 93 Brazil and Argentina's nuclear interests appeared to be safely short of weaponization because “the Brazilian military sought to reach the same technological level that Argentina was on the verge of achieving: that of enrichment capacity and the resulting nuclear option. In this regard the technology itself was seen as a ‘species of deterrent’; the mere capacity to match a potential Argentine bomb was presumed sufficient to deter its construction.”Footnote 94 The US therefore believed that “relations between the two nations are marked by intermittent rivalry rather than overt hostility”Footnote 95 and chose not to hide Brazil's program.

South Korea (Proliferator Likely to Comply)

Our theory expects the US to publicize a violator's activities regardless of the threat of reactive proliferation if the US is likely able to compel compliance. The US was confident that it could do so in six cases: North Korea, Iraq after 1990, Taiwan, South Korea, Libya, and Algeria. To illustrate the common logic leading to the publicity of these programs, we assess the South Korean case here and analyze the remaining cases in the appendix.

The US correctly ascertained that South Korea was moving toward obtaining a nuclear weapon in 1975.Footnote 96 The threat environment was high both because the risk came during Phase I of the norm's development—so a single defection could signal weak social consequences for doing so—and because the US feared proliferation by nearby states for whom a violation by South Korea would represent a direct threat. US internal policy memos highlighted the danger, stating, “Our general concerns are intensified by … the impact which any Korean effort to establish nuclear capability would have on its neighbors, particularly North Korea and Japan. ROK [Republic of Korea] possession of nuclear weapons would have [a] major destabilizing effect in an area in which not only Japan but USSR, PRC, and ourselves are directly involved. It could lead to Soviet or Chinese assurances of nuclear weapons support to North Korea in the event of a conflict.”Footnote 97

However, the US expected public scrutiny and its own private threats to lead to compliance. Policy officials explained, “We believe that [a] direct, early, and firm approach … will have best chance of success.”Footnote 98 The US thus advocated for “several complementary policy courses … [that would] be evolved inside of, or in consonance with, the multilateral framework.” These policies included working with other nations to “inhibit ROK access to sensitive technology and equipment, … press the ROK to ratify the NPT, [and] improve our surveillance of ROK nuclear facilities.”Footnote 99 The US had strong leverage over South Korea as its biggest trading partner, primary buyer of South Korean debt, large provider of aid and nuclear materials, and military guarantor. Further, because of South Korea's reliance on the US's nuclear umbrella, security guarantees were thought to be a particularly effective inducementFootnote 100 as a result of “the US rapprochement with China and withdrawal from Vietnam, both of which communicated to South Korea that anti-Communism was no longer sufficient to merit unwavering military and political support from the US.”Footnote 101 The US acted on this leverage in various ways, such as making Export-Import Bank loans for the country's nuclear industry contingent on NPT ratification, threatening to cut its annual $225 million in military assistance, and threatening to restrict technology sharing, financing, nuclear cooperation, and security guarantees.Footnote 102 Reagan also promised security guarantees and economic support to reward South Korea's compliance.Footnote 103 This strategy succeeded. “Under US pressure, in January 1976 it suspended negotiations for a reprocessing facility; in December 1976 it suspended the whole formal program to develop nuclear weapons technology that it had inaugurated only two years earlier.”Footnote 104

Its close political relationship with South Korea not only provided the US with leverage but also necessitated a discreet method of publicizing its potential proliferation. Because of the US–South Korean partnership during the Cold War, the US believed that explicit and official public criticism of Seoul's nuclear program was unwise. Instead, US policymakers quietly consulted with potential nuclear suppliers and indirectly publicized its activities through authorized leaks to the media. For example, major news headlines at the time warned of South Korea's nuclear ambitions and France's cooperation on reprocessing technology citing “high-ranking Administration officials” as sources.Footnote 105 Thus, while the US used an ally-friendly publicity strategy, the overall approach comports with the theory's predictions.

Possible Alternative Explanations

The results of the case study analysis are largely consistent with our theoretical hypotheses. The US withheld private information on noncompliance when it faced a hard-to-reverse proliferator and probable reactive proliferation. In the absence of these conditions, the US tended to publicize its private information. This basic logic also appeared in broader private US assessments of nuclear proliferation. Two classified American intelligence reviews of overall proliferation trends show a widespread perceived link between the publicity of nuclear activity and the health of the regime. For example, a 1975 CIA analysis of proliferation trends invokes the logic of the pessimism mechanism, arguing that the US should seek to “delay … successive nuclear debuts to prevent or reduce the momentum of change.” It concludes that if proliferating states “leave their nuclear status purposely ambiguous,” then “the rate of proliferation … would itself be ambiguous and threshold states would react to the suspicion rather than the demonstrated certainty of nuclear debuts.”Footnote 106 A classified assessment of proliferation trends from the mid-1980s similarly notes that “the norm against developing weapons may become psychologically harder to breach the longer it persists overtly unbroken.”Footnote 107 It further assesses that the US's efforts to avoid and delay visible violations of the norm “lessened the adverse impact their development of a nuclear capability otherwise would have had on the international system for containing proliferation.”Footnote 108 Note that these conclusions were not intended for public consumption; they represent candid internal judgments about the value of past US efforts to avoid public, overt violations of the nonproliferation regime.

We also consider several alternative explanations of the patterns that we observe. One possibility is that the US strategically obfuscated violations by its allies and publicized those of its adversaries or its adversaries’ clients. This is plausible in part because US domestic law requiring sanctions for proliferation raised the stakes of publicly acknowledging an ally's nuclear program; the Cold War also increased the cost of alienating friends. Yet the evidence casts doubt on the power of this explanation. Two countries whose violations were obfuscated, Iraq and India, were not US allies. Other key proliferation cases involved political relationships that fluctuated during the Cold War. For example, the US's views of states like South Africa and Pakistan changed significantly as a result of shifting geostrategic and presidential priorities.Footnote 109 Recent work suggests that states are more likely to proliferate when they are less dependent on the US because the US maintains weaker leverage over them.Footnote 110 Even in a case like Pakistan where this alternative explanation has some purchase, we still find archival material consistent with the theory's mechanisms. Thus, even if these considerations occasionally play a role, they do not explain the observed variation across cases.

Another potential alternative explanation is that the US obfuscated to avoid looking weak when it was unable to reverse a program; otherwise, publicity risked humiliation. However, many of the cases we analyze do not fit this logic. For instance, the US publicized Argentina and Brazil's efforts but did not believe it could roll back their programs. The US often applied sanctions ineffectively to deter potential future proliferators, demonstrating that it was not deterred from punishing states by the slim chance of success.Footnote 111 Finally, we found little to no discussion of these concerns in our primary or secondary documents.Footnote 112

A third possible alternative is that the US strategically obfuscated violations by states that were not formal members of the NPT because such deception was unlikely to be discovered by the IAEA. We do not think this consideration played a significant role for several reasons. First, the empirical pattern does not comport with this explanation. For example, the US hid Iraq's program even though it was an NPT signatory, while the US publicized Argentina, Brazil, and Algeria's programs even though these states were not signatories at the time. Second, as we mentioned earlier, the IAEA had very limited information-gathering capabilities for members and nonmembers during the period we analyze. Since the IAEA was restricted to routine inspections and declared facilities, US leaders could be reasonably confident that the information they gleaned from confidential sources and methods would not be discovered by the organization regardless of the state's NPT status. As one former IAEA director-general explained, during the 1970s and 1980s, “for regimes that chose to conceal their illicit activities, the IAEA was a beat cop with a blindfold.”Footnote 113

Discussion: Potential Regime Erosion

The model and case studies support our core claim that well-informed states strategically exercise informational discretion to buffer regimes from problematic cases of noncompliance, but what effect might this practice have on a regime's long-term health? After all, reliable information about noncompliance can reassure states that they will not become victims of undetected defection and that violators will be punished. The formalization of our theory suggests that a potential downside of an enforcer's ability to hide infractions is an erosion of compliance within the regime.Footnote 114 If it is possible for the enforcer to hide noncompliance, states may infer that unobserved proliferation is taking place, creating a possible risk of reactive proliferation when no initial proliferation took place. The enforcer cannot credibly commit ex ante to reveal all infractions because once it detects a breach that it cannot roll back and that will lead to further proliferation, it faces strong short-term incentives to obfuscate it.Footnote 115 In contrast, if the enforcer reports all violations, member-states will feel more confident that unobserved proliferation is not taking place. Yet, as we have described, this will include exposure of violations that likely cannot be reversed and that risk creating reactive violations that endanger the regime.

An enforcer's ability to exercise discretion about whether to reveal information thus creates a trade-off, mitigating some dangers to the regime while enhancing others. These costs and benefits associated with strategic monitoring may help to shed light on questions surrounding institutional design, including recent moves toward a more aggressive monitoring role for the IAEA. Delegating the capacity to gather compliance-related information to IOs may make strategic obfuscation less likely as many states are involved in IOs' operations and their conclusions are typically more transparent than those of states. Since the IAEA's powers increased after 1990, the potential for obfuscating nuclear programs has likely been reduced. A plausible interpretation of the IAEA's evolution is that it was prompted, at least in part, by fears of regime erosion resulting from the US's efforts to hide several defections.Footnote 116 Assessing the downsides of strategic obfuscation and its impact on decisions to delegate monitoring remains an interesting direction for future research.

Conclusion

Shining a light on violations of social rules is often thought to foster compliance and build social order. This logic is manifested in models of norm emergence, international legal compliance, and theories of the cooperation-enhancing function of international organizations. Although there is truth to this view, the full picture is more complex. Drawing on studies both within and outside of political science, we developed two mechanisms through which the publicity of rule violations can endanger international regimes. It can alert neighbors and enemies to the direct threat posed by a state's deviance and can create pessimism about the overall rate of compliance, lessening the perceived social opprobrium that results from a violation. We modeled these dynamics to identify the conditions under which a well-informed state might manipulate its private information about infractions to avoid triggering these dynamics. The model shows that such a state does so when it cannot reverse a violator's activities and when those activities would create additional defections if they were revealed. We found considerable support for our core hypothesis in our examination of how the US has handled information about nuclear proliferation. However, we also discussed our model's insight that the concealment of violations can possibly erode the regime over time.

While we focus on the nuclear setting, our theory's mechanisms are relevant for a wide range of empirical domains, though some areas may support the threat and pessimism mechanisms differently. In particular, the greater the negative externalities associated with a given violation, the more relevant the threat mechanism becomes. Yet this is a modest scope condition because defections impose direct harm to other states in many if not most areas of international laws and norms including those governing security, economic, and environmental issues. A required condition for our central empirical prediction is that the enforcer must possess information advantages that create opportunities for exercising discretion over whether to report violations. This also represents a modest condition since many states hold information advantages—even if only temporarily—about economic and security-related activities that confront leaders with meaningful choices about whether to publicize their knowledge. Even when information advantages are rare, our mechanisms linking the publicity of infractions with compliance behavior apply.

This article suggests the substantive importance and theoretical promise of addressing secrecy and strategic information management in studies of international compliance. Potentially fruitful extensions of our theory include investigating dynamics in a world with multiple regime enforcers, and the domestic political concerns associated with hiding violations.Footnote 117 Scholars could also incorporate new technologies or practices into the theory such as social media and unauthorized leaks because these developments could reduce states' informational discretion and therefore shrink opportunities to obfuscate violations. Finally, while we have demonstrated our theory's application to the nuclear domain, our model could be productively tested in many other empirical arenas as well.

Supplementary Material

Supplementary material for this article is available at <https://doi.org/10.1017/S0020818318000176>.

Footnotes

2. For example, Finnemore and Sikkink Reference Finnemore and Sikkink1998; Keohane Reference Keohane1984; Mitchell Reference Mitchell1994. We discuss exceptions noting potential downsides of monitoring subsequently.

3. These arguments have strong micro-foundations outside of international relations as well, as demonstrated by studies of voter turnout and legislative responsiveness that find a positive link between publicity and compliance. See See Gerber, Green, and Larimer Reference Gerber, Green and Larimer2010; Grose Reference Grose2014.

6. Groeber and Rauhut Reference Groeber and Rauhut2010.

8. Finnemore and Sikkink Reference Finnemore and Sikkink1998; Keck and Sikkink Reference Keck and Sikkink1998; Risse-Kappen and Sikkink Reference Risse-Kappen, Ropp and Sikkink1999. For exceptions that note that public shaming can provoke a domestic backlash or articulation of a counter-norm, see Bailey Reference Bailey2008; Risse-Kappen and Sikkink Reference Risse-Kappen, Ropp and Sikkink1999, chapter 4.

9. Barry, Clay, and Flynn Reference Barry, Clay and Flynn2013; Carnegie and Samii Reference Carnegie and Samii2017; Murdie and Davis Reference Murdie and Davis2012.

10. Though see Hafner-Burton Reference Hafner-Burton2008. Factors that erode norm health have received less attention than the drivers of norm emergence, though see Bailey Reference Bailey2008; Panke and Petersohn Reference Panke and Petersohn2011. We follow the widely used definitions of norms, regimes, and laws. Norms are “standards of appropriate behavior for actors with a given identity” and can be formalized as international law via an explicit agreement. Finnemore and Sikkink Reference Finnemore and Sikkink1998, 891. Regimes are a larger conceptual construct—“implicit or explicit principles, norms, rules and decision-making procedures around which actors' expectations converge in a given area of international relations.” Krasner Reference Krasner1982, 2. We refer to rules and regimes interchangeably because our claims are relevant to both formalized international legal rules and informal international norms. However, see Búzás Reference Búzás2018 for the argument that norms and laws can differ and that leaders can exploit these differences.

12. Lindley Reference Lindley2004, Reference Lindley2007. While our focus is on information provision about compliance, institutions may perform other functions such as the clarification of what constitutes compliance.

14. See Dai Reference Dai2007; Koremenos, Lipson, and Snidal Reference Koremenos, Lipson and Snidal2001.

16. Hafner-Burton, Steinert-Threlkeld, and Victor Reference Hafner-Burton, Steinert-Threlkeld and Victor2016; Stasavage Reference Stasavage2004. Similarly Daxecker Reference Daxecker2012 shows that revealing electoral fraud can spark violence. Other studies demonstrate that states strategically limit information. For example, Carson Reference Carson2016 demonstrates that states sometimes collude to minimize the visibility of provocative war-related events and Marquardt Reference Marquardt2007 argues that monitoring regimes can be used for strategic rather than cooperative gains.

17. Lindley Reference Lindley2007, 109–14.

18. Merton Reference Merton1968, 375.

19. Moore and Tumin Reference Moore and Tumin1949, 791; see also Kitts Reference Kitts2003, 226.

21. Moore and Tumin conclude that “the normative system … may suffer more from knowledge of violations than from the violations themselves.” Reference Moore and Tumin1949, 791. See also Schimmelfennig Reference Schimmelfennig2002.

22. Bicchieri and Fukui Reference Bicchieri and Fukui1999; Groeber and Rauhut Reference Groeber and Rauhut2010; Kitts Reference Kitts2003. See Scott Reference Scott1990, 203–16 for a similar argument about sexual norms within the Catholic church. The visibility of rule violations depends on the social structure's features (Coser Reference Coser1961) as well as the rule breaker's tactics (Goffman Reference Goffman1963).

23. The extent to which knowledge of a single violation creates pessimism likely depends on several factors including the norm stage and a state's prior beliefs. Regimes and norms may be most fragile early in their life-cycles (Finnemore and Sikkink Reference Finnemore and Sikkink1998) and, as we will discuss, if states already assume that rule violations are common then publicizing them will have no meaningful effect. Further, international politics may be more intimate than politics in other settings due to the relatively small number of states, which can magnify the impact of noncompliance.

24. Examples include regimes for the use of military force, arms control and ceasefire agreements, trade regulations, and access to natural resources. In contrast, violations of human rights agreements often pose little threat to other states. On this distinction, see Simmons Reference Simmons2010.

25. On the threat posed by defection from mutual restraint in security settings, see Legro Reference Legro1995, 175–200. Legro also notes that states may dampen the publicity of their rival's noncompliance to minimize tit-for-tat violations.

26. Kahler Reference Kahler2000, 679. A similar dynamic is noted outside of the international context in Bicchieri and Fukui Reference Bicchieri and Fukui1999; and Groeber and Rauhut Reference Groeber and Rauhut2010. While the pessimism mechanism focuses on perceptions of the overall level of noncompliance, the threat mechanism highlights violations made in response to specific instances of noncompliance. Threat concerns are less relevant in settings like college campuses or tax compliance, where individual defections do not directly endanger other community members, but are common in anarchic settings such as international politics.

27. Lindley notes the promise of analyzing strategic deception in light of institutionalized transparency. See Lindley Reference Lindley2007, 109–14.

29. To minimize notation, $\overline b$ and $\underline b$ also denote A's type.

30. To minimize notation, $\overline e$ and $\underline e$ also denote E's type.

31. 1{o} = 1 if E conceals information; otherwise 1{o} = 0. Similarly, $1_{\{ v_i\}} = 1$ if and only if player i violates the agreement.

32. This is because Ωi(2) − Ωi(1) = Ωi(1) − Ωi(0), which indicates that i's additional benefit from complying does not depend on the number of other countries that have already complied. To simplify the discussion, we also do not consider equilibria under knife-edge conditions in which B is indifferent between complying with the rules or violating them after A's second move. Similarly, we assume that A strictly prefers either violating the rules or complying at its second move. We also assume that if A's payoff from violating at its first move and complying at its second move is the same as its payoff from complying from the beginning, A complies. Since states are rarely indifferent between two actions in reality, this is not a strong assumption.

34. The contrast with a nonstrategic monitor is addressed in the discussion section.

35. Hymans and Herrera Reference Hymans and Herrera2011, 4; and Rublee Reference Rublee2009.

36. Rublee Reference Rublee2009, 39.

37. Hymans and Herrera Reference Hymans and Herrera2011, 4.

38. See Van der Meer Reference Van der Meer2011, 39. See also Coe and Vaynman Reference Coe and Vaynman2015; Fuhrmann and Lupu Reference Fuhrmann and Lupu2016; Rublee Reference Rublee2009.

39. INFCIRC/209, 3 September 1974. Appendix, Memorandum A, paragraph 3.

40. Rublee Reference Rublee2009, 39.

41. Hymans Reference Hymans2012, 14–15.

42. Fuhrmann Reference Fuhrmann2012, 220.

43. The US's decision to release such intelligence necessarily raises the possibility of sanctions, as codified by the 1976 Symington and Glenn amendments to the 1961 Foreign Assistance Act and the 1978 Nuclear Non-Proliferation Act. See Miller Reference Miller2013.

44. More precisely, E should hide A's activities as long as E favors a single defection over violations by both states.

45. On the value of archival and similar transcript evidence for testing models' mechanisms, see Lorentzen, Fravel, and Paine Reference Lorentzen, Fravel and Paine2017.

46. On US information advantages and interests in regime protection, see Monteiro and Debs Reference Monteiro and Debs2014. Lindley suggests in a different empirical context that states can use deception to avoid publicity's negative effects on regimes. Lindley Reference Lindley2007.

47. On the special importance of the US to the nonproliferation norm, see Lantis Reference Lantis2011. Others, such as the Soviets, also played a role in monitoring and enforcement; an extension of the model could explore tacit or explicit collaboration, though the basic conclusions would remain. Coe and Vaynman Reference Coe and Vaynman2015. Nuclear-capable states other than the US sometimes possessed knowledge of other states' programs as well. Our theory does not require that all potential proliferators are completely uninformed. Rather, it requires meaningful uncertainty about the program's existence or extent in relevant heads of state or domestic populations, which means E's (i.e., the United States') exposure could alter decisions.

48. We define “pursuit” as “a political decision by cabinet-level officials, movement toward weaponization, or development of single-use, dedicated technology.” Singh and Way Reference Singh and Way2004, 866. “Clandestine” refers to programs that were not established facts in the international community, such that other potential proliferators were uncertain about their status. The second criterion excludes cases prior to 1967 because the regime's emergence coincided with its formalization in the NPT's negotiation and signature. Regarding the third criterion, a test whose existence and sponsorship is not acknowledged is not considered an overt demonstration.

49. We began with all proliferation cases from Montgomery and Mount Reference Montgomery and Mount2014 and Singh and Way Reference Singh and Way2004. However, we exclude cases that did not meet our specific criteria, which include: China (program prior to regime; declared), France (program prior to regime; declared), India post-1998 (declared), North Korea post-2011 (declared), Pakistan post-1998 (declared), Romania (declared), Sweden (program prior to regime), Switzerland (program prior to regime), the US (program prior to regime; declared), Ukraine (declared), the USSR (program prior to regime; declared), and Australia (no active program after 1967). While Australia explored acquiring an indigenous capability after 1967, it did not actively pursue the bomb during this period. See Walsh Reference Walsh1997, 12. We exclude Iran because of its status as an open case. We exclude Yugoslavia because of missing data; since key US documents remain classified, we cannot determine the extent of the US's knowledge and its policy response. We exclude Syria because the US did not have an information advantage over other states. Albright and Brannan Reference Albright and Brannan2008; Spector and Cohen Reference Spector and Cohen2008.

50. The National Security Archive, George Washington University, and the Woodrow Wilson Center's Nuclear Proliferation International History Project were especially valuable collections.

51. In general, assembling a large, multilateral coalition was much more feasible after the end of the Cold War and in response to the activities of “pariah” states such as Libya. The US tended to hold greater unilateral leverage when it had more extensive ties with the proliferator in areas including trade, foreign and military aid, and others. Leverage was also typically greater when the proliferator's program was less advanced.

52. While the assessments were not always correct, our interest is in the expected probability of compliance.

53. The NPT prohibits nonnuclear states from controlling another state's nuclear weapons. Doing so is often a short-term solution to a lack of indigenous production and carries similar security risks for neighbors and rivals. Fuhrmann and Sechser Reference Fuhrmann and Sechser2014.

54. On the role of reactive proliferation in US decision making generally, see Miller Reference Miller2014.

56. These included new restrictions on the diffusion of nuclear materials in 1974, the establishment of the Nuclear Suppliers Group which put additional restrictions on nuclear supplies in 1975 and its expansion in 1977, and the initiation of the yearly Safeguards Implementation Reports in 1977. The US Congress then passed the 1978 Nuclear Non-Proliferation Act which increased supply requirements still further. See Ibid.

57. The IAEA's powers increased during this period, culminating in the Additional Protocol in 1997.

58. Private information sharing may not always be observed; however, we are interested in the US's overall strategy of the publicity or obfuscation of violations, which is reflected in strategy papers and other declassified documents. Further, while most leaks are unauthorized, we code only leaks that are sourced to administration officials (or similar individuals) as instances of intentional publicity of private information.

59. Note that obfuscating a program and attempting to privately pressure a state to come into compliance are not mutually exclusive decisions, especially early in the life of a program. States can also still signal in the covert realm. Carson and Yarhi-Milo Reference Carson and Yarhi-Milo2017. Once the US sought to mask a state's activities, the proliferating state could threaten to go public as a bargaining chip. Rabinowitz Reference Rabinowitz2014.

60. We do not present an exemplar case for the upper-left box because the combination of independent variables provides an especially strong reason to expect the conventional wisdom to hold and is therefore least interesting for theory-testing purposes.

61. Hendrick, Smith, “US Assumes the Israelis Have A-Bomb or Its Parts,” New York Times, 18 July 1970.

62. Montgomery and Mount Reference Montgomery and Mount2014.

63. Rabinowitz and Miller Reference Rabinowitz and Miller2015; and Richelson Reference Richelson2007, 253–60.

64. Cohen Reference Cohen2013, 9.

65. Cited in ibid., 17.

66. Montgomery and Mount Reference Montgomery and Mount2014, 14.

67. Cohen Reference Cohen2013, 2.

68. Footnote Ibid., 50.

69. Joseph J. Sisco to the Secretary, “Israel's Nuclear Policy and Implications for the United States,” 3 April 1969. National Security Archive Electronic Briefing Book No. 189. George Washington University.

70. “Minutes of National Security Council Meeting,” 29 January 1969. Foreign Relations of the United States, 1969–1976, Volume E2. Document 5. Washington: GPO, 2007.

71. Rabinowitz and Miller Reference Rabinowitz and Miller2015.

72. Henry Owen to the Secretary, 7 February 1969, “Impact on US Policies of an Israeli Nuclear Weapons Capability.” National Security Archive Electronic Briefing Book No. 189. George Washington University, p. 2.

73. Gavin Reference Gavin2006, 127.

74. See multiple references to “global permissiveness” and the “general course of proliferation” in the analysis of considerations driving proliferation in several states in National Intelligence Council. 23 August 1974. “Prospects for Further Proliferation of Nuclear Weapons.” Special National Intelligence Estimate 4-1-74. National Security Archive Electronic Briefing Book No. 240, George Washington University.

75. Smith, “US Assumes the Israelis Have A-Bomb or Its Parts.”

76. Rodger Davies to Mr. Austin et al. 30 June 1969, “Review Group Consideration of Response to NSSM-40 June 26, 1969.” National Security Archive Electronic Briefing Book No. 189. George Washington University.

77. Rabinowitz and Miller Reference Rabinowitz and Miller2015, 60. Israel's decision to develop and test nuclear weapons was independent of the US's decision to strategically obfuscate its program. Israel believed that its test would remain undetected, not that the US would hide it. Rabinowitz Reference Rabinowitz2014, 96.

78. Henry Kissinger, 19 July 1969, “Memorandum From the President's Assistant for National Security Affairs (Kissinger) to President Nixon.” Foreign Relations of the United States, 1969–1976, Vol. 23.

79. Henry Kissinger to the President, 7 October 1969, “Discussions with the Israelis on Nuclear Matters,” National Security Archive Electronic Briefing Book No. 189. George Washington University, p. 1.

80. The US had an intelligence advantage over most other states so it possessed the ability to meaningfully influence what other states knew. Bollfrass Reference Bollfrass2017.

81. Memorandum from Henry Kissinger to President Nixon, 19 July 1969, “Israeli Nuclear Program.” National Security Archive Electronic Briefing Book No. 485. George Washington University.

82. See Cohen Reference Cohen2013, 14. A possible alternative argument is that Nixon initially weakly supported the NPT and thus the obfuscation of the program represented a failure to uphold it. However, Nixon's support increased over time, and because the US government generally endorsed it, Nixon would not dare to scuttle it. See Burr Reference Burr2014; Gavin Reference Gavin2012; Rabinowitz and Miller Reference Rabinowitz and Miller2015. Thus, this logic cannot explain why Nixon continued to hide Israel's arsenal.

83. Henry Owen to the Secretary, “Impact on US Policies of an Israeli Nuclear Weapons Capability” (cited above), p. 1.

84. Gavin Reference Gavin2006, 112. In fact, the New York Times stated, “The issue has been so sensitive that the personal assessments of Mr. Helms and other senior advisers have been passed directly to Presidents Johnson and Nixon, and restricted from normal circulation within the Government and the intelligence community.” Smith, “US Assumes the Israelis Have A-Bomb or Its Parts.”

85. Central Intelligence Agency, 21 October 1983, “Brazil's Changing Nuclear Goals: Motives and Constraints.” Special National Intelligence Estimate 93–83, CIA FOIA Document 0005743962, p. 2.

86. Footnote Ibid., 8.

87. Footnote Ibid., 12–13.

88. US Embassy Cable, Brazilian Public Reaction to US Nuclear Policies, 19 November 1976. Wilson Center Digital Archive. Document 115212, pp. 1–2. In 1975, Brazil signed a secret deal with the US to terminate its order of reprocessing plants from Germany in exchange for arms and security guarantees but the deal was leaked to the US press and Brazil then canceled it. After being burned once, it would not make such a deal again. Levite Reference Levite2006.

90. Brazilian Embassy Cable, Brazilian Ambassador to Bonn Reports on Soviet Pressure on West Germany, 21 March 1977. Wilson Center Digital Archive. Document 115218; Memorandum, Minister Saraiva Guerreiro, Information for the President of Brazil, 4 April 1984, “Brazil-PRC. Nuclear Energy.” Wilson Center Digital Archive. Document 116872.

91. Hymans Reference Hymans2001, 161.

94. Reiss Reference Reiss1995, 15.

95. Central Intelligence Agency, “Brazil's Changing Nuclear Goals,” p. 9.

96. Montgomery and Mount Reference Montgomery and Mount2014.

97. “US National Security Council Memorandum, ROK Weapons Plans, 3 March” 1975. Wilson Center Digital Archive. Document 114628 p. 1. Note the IAEA's weakness in detecting the program, as “the fact that [the IAEA] took … nearly four years to learn of South Korea's secret program does not inspire confidence.” Hersman and Peters Reference Hersman and Peters2006, 549.

98. US Embassy Seoul telegram 1637 to Department of State, 12 March 1975, “ROK Plans to Develop Nuclear Weapons and Missiles.” National Security Archive Electronic Briefing Book No. 582. George Washington University.

99. “US National Security Council Memorandum, ROK Weapons Plans,” pp. 3–5.

100. Central Intelligence Agency, June 1978, “South Korea: Nuclear Developments and Strategic Decision-making.” National Foreign Assessment Center. CIA FOIA Document 0001254259.

101. Miller Reference Miller2013, 33.

104. Central Intelligence Agency, “South Korea: Nuclear Developments and Strategic Decision-making,” p. 1.

105. David Binder, “US Fears Spread of Atomic Arms in Asia,” New York Times, 31 August 1976; Leslie H. Gelb, “Arms Expert Warns on Nuclear Spread,” New York Times, 10 August 1975.

106. Central Intelligence Agency, December 1975, “Managing Nuclear Proliferation: The Politics of Limited Choice.” Research Study OPR 408. CIA FOIA Document CIA-RDP86T00608R000600170035-1, pp. 40–41.

107. National Intelligence Council, September 1985, “The Dynamics of Nuclear Proliferation: Balance of Incentives and Constraints.” NIC M 85-10001. National Security Archive Electronic Briefing Book No. 451. George Washington University.

109. Rabinowitz Reference Rabinowitz2014.

112. However, an additional factor in the US's policy decisions toward Israel was the concern that it would be held responsible for letting Israel develop nuclear weapons. Cohen Reference Cohen2013, 24.

113. ElBaradei Reference ElBaradei2011, 10.

114. For related claims about the effects of unpunished noncompliance and the erosion of a hegemon's power, see Alt, Calvert, and Humes Reference Alt, Calvert and Humes1988.

115. A system in which the enforcer obfuscates infractions is beneficial only when the objective is to deter reactive proliferation; if reactive proliferation is not a large concern or is unavoidable, then overall proliferation is minimized when the monitor publicizes all violations. We focus on the enforcer's incentives for preventing overall proliferation. However, states that most highly value the ability to defend themselves against specific instances of proliferation may prefer as much information about violations as possible. A given state's preferences about objectivity and discretion in regime monitoring thus vary depending on the value it places on regime stability versus its own ability to defend itself through nuclear weapons acquisition.

116. Specifically, the US's obfuscation of Iraq's clandestine nuclear program during the 1980s became apparent when the international community discovered Iraq's progress after the first Iraq War. See the discussion of the Iraq case in the appendix. On the IAEA's use of state-derived intelligence after 1991 to enable more aggressive monitoring, see Carnegie and Carson Reference Carnegie and Carson2018.

117. Our cases shed some light on the latter direction. For example, Arab states' reactions to Israel's program hint that the likelihood of reactive proliferation may be influenced by how domestic constituents respond to publicized violations.

References

Albright, David, and Brannan, Paul. 2008. The Al Kibar Reactor: Extraordinary Camouflage, Troubling Implications. ISIS Report, Institute for Science and International Security, 12 May. Available at <http://www.isis-online.org/publications/syria/SyriaReactorReport_12May2008.pdf>, accessed 5 March 2018.,+accessed+5+March+2018.>Google Scholar
Alt, James E., Calvert, Randall L., and Humes, Brian D.. 1988. Reputation and Hegemonic Stability: A Game-Theoretic Analysis. The American Political Science Review 82 (2):445–66.Google Scholar
Bailey, Jennifer L. 2008. Arrested Development: The Fight to End Commercial Whaling as a Case of Failed Norm Change. European Journal of International Relations 14 (2):289318.Google Scholar
Barry, Colin M., Clay, K. Chad, and Flynn, Michael E.. 2013. Avoiding the Spotlight: Human Rights Shaming and Foreign Direct Investment. International Studies Quarterly 57 (3):532–44.Google Scholar
Bicchieri, Cristina, and Fukui, Yoshitaka. 1999. The Great Illusion: Ignorance, Informational Cascades, and the Persistence of Unpopular Norms. Business Ethics Quarterly 9 (1):127–55.CrossRefGoogle Scholar
Bollfrass, Alexander K. 2017. The Half-Lives of Others: The Democratic Advantage in Nuclear Intelligence Assessment. PhD dissertation, Princeton University.Google Scholar
Brandeis, Louis D. 1914. Other People's Money and How the Bankers Use It. New York: Frederick A. Stokes.Google Scholar
Burr, William. 2014. A Scheme of “Control”: The United States and the Origins of the Nuclear Suppliers’ Group, 1974–1976. The International History Review 36 (2):252–76.Google Scholar
Búzás, Zoltán I. 2018. Is the Good News about Law Compliance Good News About Norm Compliance? The Case of Racial Equality. International Organization 72 (2). Published online 14 March.Google Scholar
Carnegie, Allison. 2015. Power Plays: How International Institutions Reshape Coercive Diplomacy. New York: Cambridge University Press.CrossRefGoogle Scholar
Carnegie, Allison, and Carson, Austin. 2018. The Disclosure Dilemma: Nuclear Intelligence and International Organizations. Working Manuscript.CrossRefGoogle Scholar
Carnegie, Allison, and Samii, Cyrus. 2017. International Institutions and Political Liberalization: Evidence from the World Bank Loans Program. British Journal of Political Science 123. Published online 31 August at <https://doi.org/10.1017/S0007123417000187>.Google Scholar
Carson, Austin. 2016. Facing Off and Saving Face: Covert Intervention and Escalation Management in the Korean War. International Organization 70 (1):103–31.CrossRefGoogle Scholar
Carson, Austin, and Yarhi-Milo, Keren. 2017. Covert Communication: The Intelligibility and Credibility of Signaling in Secret. Security Studies 26 (1):124–56.CrossRefGoogle Scholar
Coe, Andrew J., and Vaynman, Jane. 2015. Collusion and the Nuclear Nonproliferation Regime. The Journal of Politics 77 (4):983–97.Google Scholar
Cohen, Avner. 2013. The Worst-kept Secret: Israel's Bargain with the Bomb. New York: Columbia University Press.Google Scholar
Coser, Rose Laub. 1961. Insulation from Observability and Types of Social Conformity. American Sociological Review 26 (1):2839.CrossRefGoogle Scholar
Dai, Xinyuan. 2007. International Institutions and National Policies. Cambridge, UK: Cambridge University Press.Google Scholar
Daxecker, Ursula E. 2012. The Cost of Exposing Cheating International Election Monitoring, Fraud, and Post-Election Violence in Africa. Journal of Peace Research 49 (4):503–16.Google Scholar
ElBaradei, Mohamed. 2011. The Age of Deception: Nuclear Diplomacy in Treacherous Times. New York: Metropolitan Books.Google Scholar
Finel, Bernard I., and Lord, Kristin M.. 1999. The Surprising Logic of Transparency. International Studies Quarterly 43 (2):325–39.CrossRefGoogle Scholar
Finnemore, Martha, and Sikkink, Kathryn. 1998. International Norm Dynamics and Political Change. International Organization 52 (4):887917.Google Scholar
Florini, Ann. 1998. The End of Secrecy. Foreign Policy 111:5063.CrossRefGoogle Scholar
Fuhrmann, Matthew. 2012. Atomic Assistance: How “Atoms for Peace” Programs Cause Nuclear Insecurity. Ithaca, NY: Cornell University Press.Google Scholar
Fuhrmann, Matthew, and Lupu, Yonatan. 2016. Do Arms Control Treaties Work? Assessing the Effectiveness of the Nuclear Nonproliferation Treaty. International Studies Quarterly 60 (3):530–39.Google Scholar
Fuhrmann, Matthew, and Sechser, Todd S.. 2014. Signaling Alliance Commitments: Hand-Tying and Sunk Costs in Extended Nuclear Deterrence. American Journal of Political Science 58 (4):919–35.Google Scholar
Gambetta, Diego. 1988. Trust: Making and Breaking Cooperative Relations. Oxford, UK: Basil Blackwell.Google Scholar
Gavin, Francis J. 2006. Blasts from the Past: Proliferation Lessons from the 1960s. International Security 29 (3):100–35.Google Scholar
Gavin, Francis J. 2012. Nuclear Statecraft: History and Strategy in America's Atomic Age. Ithaca, NY: Cornell University Press.Google Scholar
Gerber, Alan S., Green, Donald P., and Larimer, Christopher W.. 2010. An Experiment Testing the Relative Effectiveness of Encouraging Voter Participation by Inducing Feelings of Pride or Shame. Political Behavior 32 (3):409–22.Google Scholar
Goffman, Erving. 1963. Stigma: Notes on the Management of Spoiled Identity. Englewood Cliffs, NJ: Prentice-Hall.Google Scholar
Groeber, Patrick, and Rauhut, Heiko. 2010. Does Ignorance Promote Norm Compliance? Computational and Mathematical Organization Theory 16 (1):128.CrossRefGoogle Scholar
Grose, Christian R. 2014. Field Experimental Work on Political Institutions. Annual Review of Political Science 17:355–70.Google Scholar
Hafner-Burton, Emilie M. 2008. Sticks and Stones: Naming and Shaming the Human Rights Enforcement Problem. International Organization 62 (4):689716.Google Scholar
Hafner-Burton, Emilie, Steinert-Threlkeld, Zachary, and Victor, David. 2016. Predictability Versus Flexibility: Secrecy in International Investment Arbitration. World Politics 68 (3):413–53.Google Scholar
Hersman, Rebecca K.C., and Peters, Robert. 2006. Nuclear U-turns: Learning from South Korean and Taiwanese Rollback. The Nonproliferation Review 13 (3):539–53.Google Scholar
Hymans, Jacques E.C. 2001. Of Gauchos and Gringos: Why Argentina Never Wanted the Bomb, and Why the United States Thought It Did. Security Studies 10 (3):153–85.Google Scholar
Hymans, Jacques E.C. 2012. Achieving Nuclear Ambitions: Scientists, Politicians, and Proliferation. New York: Cambridge University Press.Google Scholar
Hymans, Jacques, and Herrera, Yoshiko M.. 2011. The Non-Proliferation Treaty as a Conditional Norm. PONARS Eurasia Policy Memo No. 142, PONARS Eurasia, May. Available at <http://www.ponarseurasia.org/sites/default/files/policy-memos-pdf/pepm_142.pdf>, accessed 6 March 2018.,+accessed+6+March+2018.>Google Scholar
Kahler, Miles. 2000. Conclusion: The Causes and Consequences of Legalization. International Organization 54 (3):661–83.Google Scholar
Keck, Margaret E., and Sikkink, Kathryn. 1998. Activists Beyond Borders: Advocacy Networks in International Politics. Ithaca, NY: Cornell University Press.Google Scholar
Keohane, Robert O. 1984. After Hegemony: Cooperation and Discord in the World Political Economy. Princeton, NJ: Princeton University Press.Google Scholar
Kitts, James A. 2003. Egocentric Bias or Information Management? Selective Disclosure and the Social Roots of Norm Misperception. Social Psychology Quarterly 66 (3):222–37.Google Scholar
Koremenos, Barbara, Lipson, Charles, and Snidal, Duncan. 2001. The Rational Design of International Institutions. International Organization 55 (4):761–99.Google Scholar
Krasner, Stephen D. 1982. Structural Causes and Regime Consequences: Regimes As Intervening Variables. International Organization 36 (2):185205.CrossRefGoogle Scholar
Kydd, Andrew H. 2005. Trust and Mistrust in International Relations. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Kydd, Andrew H. 2006. When Can Mediators Build Trust? American Political Science Review 100 (3):449–62.Google Scholar
Lantis, Jeffrey S. 2011. Irrational Exuberance? The 2010 NPT Review Conference, Nuclear Assistance, and Norm Change. The Nonproliferation Review 18 (2):389409.Google Scholar
Legro, Jeffrey. 1995. Cooperation Under Fire: Anglo-German Restraint During World War II. Ithaca, NY: Cornell University Press.Google Scholar
Levite, Ariel E. 2006. Never Say Never Again: Nuclear Reversal Revisited. International Security 27 (3):5988.Google Scholar
Lindley, Dan. 2004. Avoiding Tragedy in Power Politics: The Concert of Europe, Transparency, and Crisis Management. Security Studies 13 (2):195229.Google Scholar
Lindley, Dan. 2007. Promoting Peace with Information: Transparency as a Tool of Security Regimes. Princeton, NJ: Princeton University Press.Google Scholar
Lord, Kristin M. 2012. The Perils and Promise of Global Transparency: Why the Information Revolution May Not Lead to Security, Democracy, or Peace. Albany, NY: SUNY Press.Google Scholar
Lorentzen, Peter, Fravel, M. Taylor, and Paine, Jack. 2017. Qualitative Investigation of Theoretical Models: The Value of Process Tracing. Journal of Theoretical Politics 29 (3):467–91.Google Scholar
Mallea, Rodrigo. 2013a. The Brazilian Proposal to Renounce Peaceful Nuclear Explosions and the Argentine Response (1983–1985). Nuclear Proliferation International History Project Publication, Wilson Center, 31 July. Available at <https://www.wilsoncenter.org/publication/the-brazilian-proposal-to-renounce-peaceful-nuclear-explosions-and-the-argentine>, accessed 6 March 2018.,+accessed+6+March+2018.>Google Scholar
Mallea, Rodrigo. 2013b. The First Attempt at Argentine-Brazilian Nuclear Cooperation and the Argentine Response, 1967–1972. Nuclear Proliferation International History Project Publication, Wilson Center, 12 July. Available at <https://www.wilsoncenter.org/publication/the-first-attempt-argentine-brazilian-nuclear-cooperation-and-the-argentine-response>, accessed 6 March 2018.,+accessed+6+March+2018.>Google Scholar
Marquardt, James J. 2007. Transparency and Security Competition: Open Skies and America's Cold War Statecraft, 1948–1960. Journal of Cold War Studies 9 (1):5587.CrossRefGoogle Scholar
Merton, Robert King. 1968. Social Theory and Social Structure. New York: Simon and Schuster.Google Scholar
Milgrom, Paul R., North, Douglass C., and Weingast, Barry R.. 1990. The Role of Institutions in the Revival of Trade: The Law Merchant, Private Judges, and the Champagne Fairs. Economics and Politics 2 (1):123.Google Scholar
Miller, Nicholas L. 2013. The Secret Success of Nonproliferation Sanctions. International Organization 68 (4):913–44.Google Scholar
Miller, Nicholas L. 2014. Nuclear Dominoes: A Self-Defeating Prophecy? Security Studies 23 (1):3373.Google Scholar
Mitchell, Ronald B. 1994. Regime Design Matters: Intentional Oil Pollution and Treaty Compliance. International Organization 48 (3):425–58.Google Scholar
Monteiro, Nuno P., and Debs, Alexandre. 2014. The Strategic Logic of Nuclear Proliferation. International Security 39 (2):751.Google Scholar
Montgomery, Alexander H., and Mount, Adam. 2014. Misestimation: Explaining US Failures to Predict Nuclear Weapons Programs. Intelligence and National Security 29 (3):357–86.Google Scholar
Moore, Wilbert E., and Tumin, Melvin M.. 1949. Some Social Functions of Ignorance. American Sociological Review 14 (6):787–95.Google Scholar
Murdie, Amanda M., and Davis, David R.. 2012. Shaming and Blaming: Using Events Data to Assess the Impact of Human Rights INGOs. International Studies Quarterly 56 (1):116.Google Scholar
Panke, Diana, and Petersohn, Ulrich. 2011. Why International Norms Disappear Sometimes. European Journal of International Relations 18 (4):719–42.Google Scholar
Rabinowitz, Or. 2014. Bargaining on Nuclear Tests: Washington and Its Cold War Deals. Oxford, UK: Oxford University Press.Google Scholar
Rabinowitz, Or, and Miller, Nicholas L.. 2015. Keeping the Bombs in the Basement: US Nonproliferation Policy Toward Israel, South Africa, and Pakistan. International Security 40 (1):4786.Google Scholar
Reiss, Mitchell. 1995. Bridled Ambition: Why Countries Constrain Their Nuclear Capabilities. Washington, DC: Woodrow Wilson Center Press.Google Scholar
Richelson, Jeffrey. 2007. Spying on the Bomb: American Nuclear Intelligence from Nazi Germany to Iran and North Korea. New York: WW Norton and Company.Google Scholar
Risse-Kappen, Thomas, Ropp, Stephen C., and Sikkink, Kathryn. 1999. The Power of Human Rights: International Norms and Domestic Change. Cambridge, UK: Cambridge University Press.Google Scholar
Rublee, Maria Rost. 2009. Nonproliferation Norms: Why States Choose Nuclear Restraint. Athens, GA: University of Georgia Press.Google Scholar
Schimmelfennig, Frank. 2002. Goffman Meets IR: Dramaturgical Action in International Community. International Review of Sociology 12 (3):417–37.Google Scholar
Schwartz, Barry. 1968. The Social Psychology of Privacy. American Journal of Sociology 73 (6):741–52.Google Scholar
Scott, James C. 1990. Domination and the Arts of Resistance: Hidden Transcripts. New Haven, CT: Yale University Press.Google Scholar
Simmel, Georg. 1950. The Sociology of Georg Simmel. New York: Simon and Schuster.Google Scholar
Simmons, Beth. 2010. Treaty Compliance and Violation. Annual Review of Political Science 13:273–96.Google Scholar
Singh, Sonali, and Way, Christopher R.. 2004. The Correlates of Nuclear Proliferation A Quantitative Test. Journal of Conflict Resolution 48 (6):859–85.Google Scholar
Spector, Leonard S., and Cohen, Avner. 2008. Israel's Airstrike on Syria's Reactor: Implications for the Nonproliferation Regime. Arms Control Today 38 (6):1521.Google Scholar
Stasavage, David. 2004. Open-Door or Closed-Door? Transparency in Domestic and International Bargaining. International Organization 58 (4):667704.Google Scholar
Van der Meer, Sico. 2011. Not That Bad: Looking Back on Sixty-five Years of Nuclear Non-proliferation Efforts. Security and Human Rights 22 (1):3747.Google Scholar
Walsh, Jim. 1997. Surprise Down Under: The Secret History of Australia's Nuclear Ambitions. The Nonproliferation Review 5 (1):120.Google Scholar
Wan, Wilfred. 2014. Firewalling Nuclear Diffusion. International Studies Review 16 (2):217–28.Google Scholar
Figure 0

Table 1. Model parameters

Figure 1

Figure 1. Game tree

Figure 2

Table 2. Choice of strategic obfuscation versus publicity

Figure 3

Table 3. Choice of strategic obfuscation versus publicity

Figure 4

Table 4. Summary of cases

Supplementary material: PDF

Carnegie and Carson supplementary material

Online Appendix

Download Carnegie and Carson supplementary material(PDF)
PDF 589.1 KB