We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure [email protected]
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Chapter 8 evaluates the argument that ruling monarchs are more effective than other types of autocrats at avoiding blame through delegation. It does so by drawing on cross-national data from around the world in addition to more specific comparisons of monarchies and republics in the Middle East. First, the chapter establishes that ruling monarchs tend to share power more credibly than presidential autocrats both in the Middle East and beyond, and it shows that this difference is recognized by people living in these regimes. Next, the chapter draws on an original survey experiment administered in Jordan, Morocco, Egypt, and Tunisia, in addition to data on constitutions, to demonstrate that monarchs benefit from reduced expectations that they will govern and be held responsible for policy outcomes. These expectations imply that delegation by ruling monarchs will be more in line with how the public expects responsibility to function in the political system. The chapter concludes by tracing patterns of opposition during the Arab Spring and analyzing cross-national protest data to show that monarchs are less likely than other dictators to be targeted by mass opposition when the public is dissatisfied, suggesting their advantages in avoiding blame contribute to their resiliency.
The chapter analyzes Hamas’s use of intelligence to conduct successful operations against Israel. The combination of intelligence gathering and clandestine activities, as described in the previous chapters, led to several high-quality operations against Israel. For example, in an attack in 2006, Hamas successfully abducted IDF soldier Gilad Shalit and was able to keep him hidden for years, despite Israel’s efforts to find and rescue him in the tiny Gaza Strip. In addition, Hamas created a “bank” of targets through its intelligence-gathering efforts. This structured list of vulnerable quality targets was used to focus rocket attacks against Israel and find locations for suicide attacks.
Chapter 5 provides evidence that power sharing in Jordan is effective at shifting the public’s attributions and protecting the monarchy’s popular support. First, the chapter draws on interviews with opposition activists to show that even these sophisticated political elites frequently do not perceive the king to be most at fault for their grievances. Second, it utilizes survey data to demonstrate that Jordanians perceive institutions like the cabinet and parliament to be important contributors to policy decisions in Jordan and that such attitudes are correlated with higher support for the monarchy. Third, the chapter reports results from a novel Facebook advertising experiment that is used to estimate public approval of the Jordanian monarchy relative to the prime minister and parliament. The experiment indicates that the king is more popular than these other institutions, and it suggests that the king’s popularity is less likely to be affected by unpopular policy decisions like substantial tax increases.
Chapter 6 continues the Jordan case study by providing an important assessment of the theory’s expectations over time. Drawing on archival documents, internet search data, elite interviews, and secondary sources, the chapter shows that Jordan’s kings have shared power more credibly when they have more reasons to be concerned about popular discontent. Furthermore, it also demonstrates that Jordanians have responded to these changes as the theory expects, becoming more likely to blame the king for their grievances when the monarchy controls the decision-making process more directly, and less likely to blame the king when he delegates more credibly to other political elites. Not only do these findings demonstrate the theory’s utility for explaining changes in authoritarian decision-making over time, but they also help to account for alternative explanations to the argument, such as the possibility that the Jordanian monarchy benefits from traditional legitimacy that protects its reputation from popular anger.
Chapter 2 provides a detailed account of the book’s theoretical arguments. It first expands on why blame is important for dictators, explaining how even the most powerful autocrats must be worried about a revolutionary uprising if enough citizens come to the conclusion that they are personally responsible for the country’s problems. Next, it outlines a theoretical framework of power sharing and blame in authoritarian regimes, defining the actors, their interests, and strategic interactions around blame and delegation of decision-making responsibilities. As autocrats become more concerned about threats from the public, they should be more incentivized to share power to shift blame, but they must also take into account the risks of delegating to elites who may try to challenge them from within the regime. The chapter then explains why monarchs are advantaged in using delegation to avoid blame, arguing that monarchs can share power more safely with other elites and that such delegation is more likely to align with the public’s expectations about how responsibility should be attributed for governance. The chapter concludes by outlining the key implications that will be tested in the subsequent empirical chapters.
The chapter explores Hamas’s strategic analysis and study of Israel and the IDF. As part of its intelligence warfare, Hamas strove to increase its knowledge of the enemy. This chapter describes Hamas’s accumulation of intelligence about Israeli weaponry, IDF units, Israeli battlefield tactics, operational training, and so on. The organization particularly sought information about the capabilities of Israeli armored vehicles in order to inform its use of anti-tank weaponry. The chapter also illustrates how Hamas disseminated this knowledge in its ranks. This chapter goes on to analyze Hamas’s operational preparations for war after Israel’s withdrawal from the Gaza Strip. Further, it examines Hamas’s ongoing assessment of the possibility and characteristics of a large-scale Israeli attack, and in particular the analysis of the Israeli political and social situation used by Hamas in order to form such an assessment. In this manner, the chapter discusses the influence of Hamas’s “enemy image” of Israel – an image based on the organization’s Palestinian Islamic ideology as well as its interpretation of events and social processes in Israel – on the organization’s assessment of its enemy. The chapter also sheds light on the organization’s difficulties in strategic analysis of Israel.
Chapter 4 begins the detailed case study of Jordan. It first provides important background information on the country and reviews academic literature explaining the monarchy’s durability over the past century. It then draws on my elite interviews and other country-specific sources to explain how Jordan’s policymaking process functions. The chapter shows that the Jordanian king does grant meaningful decision-making influence to political elites in the cabinet and parliament, even though this delegation can result in policies that do not reflect the monarch’s preferences and can increase potential elite threats against the monarchy. The chapter also provides evidence that this delegation is intentionally used by the monarchs as a blame avoidance strategy. Interviews with senior decision-makers, including former chiefs of the royal court and prime ministers, reveal that the monarchy is aware that its reputation is likely to suffer if the king governs more directly and attracts more blame for the public’s grievances. This awareness is also reflected in how the Jordanian educational system teaches students about the decision-making process, and in the monarch’s willingness to share power more credibly for economic and social issues rather than foreign policy and security issues.
Chapter 9 looks comparatively within monarchies to assess whether the theory contributes to understanding why some monarchies survived and others were overthrown in the past two centuries. It begins by analyzing two datasets of ruling monarchies from the 1800s to the 1900s, showing that monarchies that shared more power with parliaments were less likely to fall to revolutions. It then uses case studies of the Iranian and Nepali monarchies to illustrate how centralizing monarchs made themselves vulnerable to blame and attracted mass opposition, ultimately leading to their downfalls. The chapter suggests that the theory has implications for understanding historical transitions from monarchy, and it underscores that kings who forego their delegation advantage and monopolize power are also vulnerable to being blamed and facing mass opposition when they govern poorly.
After addressing Hamas’s intelligence collection in previous chapters, this chapter focusses on Hamas’s efforts to counter Israeli intelligence efforts against it. To overcome Israel’s attempts to infiltrate its ranks, Hamas went to great lengths to screen those wishing to join it, while diligently acting to detect collaborators with Israel, both within its ranks and in the broader society in which they operate, while applying internal compartmentalization to the organization. To counter Israel’s SIGINT activity, Hamas tried to avoid the use of wireless communications, and also made use of encryption, both in telephone communication and in correspondence; over time, Hamas developed an internal communication system that is separate from the public system. To defeat Israel’s GEOINT efforts, Hamas tried to conceal its activities to the greatest extent possible. This included a range of strategies, including camouflage, the assimilation of military installations in civilian surroundings, and the use of subterranean spaces. Regarding open-source media publications, Hamas developed the awareness of the need to impose censorship to hide certain characteristic signs of its activity.
The chapter deals with Hamas’s human intelligence (HUMINT) activity. Hamas, of course, makes use of the most traditional method of intelligence gathering – information from human sources. This chapter details how Hamas first recruited local sources for short periods and specific missions. Gradually, sources were recruited who could operate outside of Israel; these sources were sent on longer-term and more advanced missions. Hamas also used the internet, i.e., social media and email, to contact and handle potential sources. This chapter also describes how Hamas turned collaborators with Israel into double agents and ran operations using these agents.
This chapter describes how Hamas operatives set up tactical observation posts during the First Intifada, the years after the Oslo Accord, and the Second Intifada, and explores the systematization of this activity after Israel’s withdrawal from the Gaza Strip. Eventually, Hamas established the murabitun, a border patrol force that staffs observation posts and serves as the first responder to any Israeli incursion, and instituted an observation section of the ʿIzz al-Din al-Qassam Brigades, the military wing of Hamas. The members of the latter section used more advanced equipment than had previously been deployed and documented their findings for in-depth analysis. This chapter also describes Hamas’s efforts to develop and operate unmanned aerial vehicles (UAVs) for observation missions.
Chapter 10 concludes the book. After summarizing the main arguments and findings, the chapter reflects on the book’s implications for understanding the relationship between popular politics, elites, and institutions in authoritarian regimes. In doing so, the chapter also considers how the theory might apply to other types of authoritarian rule, focusing on its application to military regimes in particular. The chapter concludes by discussing how the theory can contribute to understanding democratic transitions, and by reflecting on the similarities and differences between authoritarian and democratic political systems.
Chapter 3 provides evidence from cross-national statistical analysis as well as two case studies that are consistent with the major implications of the theory. First, it draws on internet search data, survey data, and short case studies of Russia and Morocco to demonstrate that power-sharing arrangements affect how the public attributes blame under autocracy. The case studies also suggest that autocrats delegate strategically in response to shifting threats to their rule. Second, the chapter uses cross-national data from Varieties of Democracy to test my expectations about how strategic interactions around delegation and blame influence broader governance outcomes in autocracy. The analysis indicates that autocrats who share power more are less vulnerable to popular discontent, which is consistent with their ability to shift blame more effectively. The analysis also shows that autocrats who share power more are less likely to use repression and more likely to provide a measure of accountability by sacking ministers when the public becomes dissatisfied. These findings indicate that the book’s arguments provide insights into a range of modern authoritarian regimes around the world.