Hostname: page-component-586b7cd67f-vdxz6 Total loading time: 0 Render date: 2024-11-24T18:56:45.709Z Has data issue: false hasContentIssue false

Alliances between Militant Groups

Published online by Cambridge University Press:  23 March 2012

Abstract

Instrumentally, militant groups should seek to maximize their power against governments by forming alliances. However, studies in bargaining theory predict that alliances between militants would suffer from commitment problems. This study seeks to identify the conditions under which militant groups overcome these acute commitment problems and form alliances. Two game theory models of alliances amongst militants are presented, the first capturing bilateral co-operation, and the second under conditions of asymmetry. It may be concluded that while militants less susceptible to government repression should prefer bilateral alliances, vulnerable militants are more likely to form asymmetric alliances involving state sponsors. Following the theoretical predictions, the theory is tested empirically using the UCDP/PRIO data.

Type
Articles
Copyright
Copyright © Cambridge University Press 2012

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Footnotes

*

The University of North Carolina – Chapel Hill (email: [email protected]); and The University of Maryland – College Park (email: [email protected]), respectively. The authors are sincerely grateful to Kristian Gleditsch, Mark Crescenzi, Sarah Croco, Stephen Gent, Errol Henderson, Doug Lemke, Will Moore, Glenn Palmer, Todd Sandler, the Journal's four anonymous reviewers, and especially George Rabinowitz, for their exceptionally helpful comments. Data replication materials are available at http://www.bsos.umd.edu/gvpt/bond/.

References

1 Coll, Steve, Ghost Wars (New York: Penguin, 2004)Google Scholar

2 McKelvey, Richard, ‘General Conclusions for Global Instransitivities in Formal Voting Models’, Econometrica, 47 (1979), 10851112CrossRefGoogle Scholar

Shepsle, Kenneth, ‘Institutional Arrangements and Equilibrium in Multidimensional Voting Models’, American Journal of Political Science, 23 (1979), 2759CrossRefGoogle Scholar

3 Cunningham, David, ‘Veto Players and Civil War Duration’, American Journal of Political Science, 50 (2006), 875–92CrossRefGoogle Scholar

Davis, David and Moore, Will H., ‘Ethnicity Matters: Transnational Ethnic Alliances and Foreign Policy Behavior’, International Studies Quarterly, 41 (1997), 171181CrossRefGoogle Scholar

Kydd, Andrew and Walter, Barbara, ‘Sabotaging the Peace: The Politics of Extremist Violence’, International Organization, 56 (2002), 4980CrossRefGoogle Scholar

4 Byman, Daniel, Deadly Connections: States that Sponsor Terrorism (Cambridge: Cambridge University Press, 2005)CrossRefGoogle Scholar

Chailand, Gerard, Terrorism: From Popular Struggle to Media Spectacle (London: Saqi, 1987)Google Scholar

5 While the conventional definition of alliances requires a formal contract, we loosen the definition by considering any security co-operation, be it formal or informal, as a type of alliance. This is necessary largely due to the relative lack of codified agreements among non-state actors.

6 Fearon, James, ‘Rationalist Explanations for War’, International Organization, 49 (1995), 379414CrossRefGoogle Scholar

Leeds, Brett Ashley, ‘Domestic Political Institutions, Credible Commitments, and International Cooperation’, American Journal of Political Science, 43 (1999), 9791002CrossRefGoogle Scholar

Morrow, James D., ‘Alliances: Why Write them Down?’ Annual Review of Political Science, 3 (2000), 6383CrossRefGoogle Scholar

7 Axelrod, Robert, The Evolution of Cooperation (New York: Basic Books, 1984)Google Scholar

Fearon, James, ‘Bargaining, Enforcement, and International Cooperation’, International Organization, 52 (1998), 269306CrossRefGoogle Scholar

Kydd, Andrew, Trust and Mistrust in International Relations (Princeton, N.J.: Princeton University Press, 2005)CrossRefGoogle Scholar

Sartori, Anne, ‘The Might of the Pen: A Reputational Theory of Communication in International Disputes’, International Organization, 56 (2002), 121149CrossRefGoogle Scholar

8 Cronin, Audrey K., Ending Terrorism: Lessons for Policymakers from the Decline and Demise of Terrorist Groups (London: Routledge, 2009)Google Scholar

Jones, Seth G. and Libicki, Martin C., How Terrorist Groups End: Lessons for Countering al Qaeda (Santa Monica: RAND, 2008)Google Scholar

Kydd and Walter, ‘Sabotaging the Peace: The Politics of Extremist Violence’, pp. 263–296CrossRefGoogle Scholar

Stedman, Stephen, ‘Spoiler Problems in Peace Processes’, International Security, 22 (1997), 553CrossRefGoogle Scholar

Walter, Barbara, Committing to Peace: The Successful Settlement of Civil Wars (Princeton, N.J.: Princeton University Press, 2002)CrossRefGoogle Scholar

9 Throughout this analysis, we draw parallels between alliance formation amongst militants and alliance formation amongst states. Although one could argue that these are different entities, we believe in applying game theory, there is no qualitative difference between states and non-state actors. Whether there is a difference is an empirical question, which we seek to address in our statistical test.

10 Byman, Daniel, Chalk, Peter, Hoffman, BruceRosenau, William and Brannan, David, Trends in Outside Support for Insurgent Movements (Santa Monica, Calif.: RAND, 1999)Google Scholar

11 We acknowledge that this model greatly simplifies these conflicts. It is possible that in some cases, there are either more than two groups or more than one state involved. It is also possible that, in a particular case, one of the factions may be a splinter group, or that the groups may co-operate under an umbrella organization. However, to allow the models to develop clear empirical implications, we simplify the model to three players, and assume that each group is distinct from one another. This substantively excludes splinters from the analysis, though the analysis does speak to cases where various groups consider whether to ally under an umbrella organization.

12 Lichbach, Mark I., The Rebel's Dilemma (Ann Arbor: University of Michigan Press, 1995)CrossRefGoogle Scholar

Zartman, I. William, Elusive Peace: Negotiating an End to Civil Wars 1995–1996 (Washington, D.C.: The Brookings Institution, 1995)Google Scholar

13 Conybeare, John A., ‘Arms Versus Alliances: The Capital Structure of Military Enterprise’, Journal of Conflict Resolution, 38 (1994), 215235CrossRefGoogle Scholar

Lake, David A., Entangling Relations: American Foreign Policy in its Century (Princeton, N.J.: Princeton University Press, 1999)CrossRefGoogle Scholar

Morgan, T. Clifton and Palmer, Glenn, ‘To Protect and Serve: Alliances and Foreign Policy Portfolios’, Journal of Conflict Resolution, 47 (2003), 180203CrossRefGoogle Scholar

14 A report by Anand Gopal suggests that while the Quetta Shura favours an Islamic emirate, the Haqqani network's preference appears to be for an Islamic Republic. Reports also indicate that though he was once a member of the Taliban government, Haqqani complained about the heavy-handedness of the Taliban. See Anand Gopal, ‘The most deadly U.S. foe in Afghanistan’, Christian Science Monitor, 31 May 2009, p. 1; http://www.csmonitor.com/World/Asia-South-Central/2009/0601/p10s01-wosc.html

15 For more information on the Quetta Shura and the Haqqani Network, see David Clark Scott, ‘What is the Quetta Shura Taliban and Why Does it Matter?’ Christian Science Monitor, Global News Blog, available at: http://www.csmonitor.com/World/Global-News/2010/0224/What-s-the-Quetta-Shura-Taliban-and-why-does-it-matter; and Anand Gopal, Mansur Khan Mahsud and Brian Fishman. ‘Inside the Haqqani Network’, Foreign Policy. The AfPak Channel: Inside the War for South Asia. http://afpak.foreignpolicy.com/posts/2010/06/03/inside_the_haqqani_network_0.

16 Lake, Entangling Relations, pp. 35–77Google Scholar

17 Arguably, this is the strategy pursued by the United States in the Afghan conflict against the Quetta Shura and the Haqqanis. See Dexter Filkins, ‘Taliban elite, aided by NATO, joint talks for Afghan peace’, 19 October 2010. p. A1. http://www.nytimes.com/2010/10/20/world/asia/20afghan.html?_r =1&pagewanted = 1

18 We acknowledge that this model greatly simplifies these conflicts. It is possible that in some cases there are either more than two groups or more than one state involved. It is also possible that in a particular case one of the factions may be a splinter group, or that the groups may co-operate under an umbrella organization. However, to allow the models to develop clear empirical implications, we simplify the model to three players, and assume that each group is distinct from one another.

19 The game assumes complete but imperfect information. Each player's utilities are represented by Von Neumann–Morgenstern utility functions.

20 To allow for generalizability, we assume that the concession may substantively represent the granting of territory to the group, the altering of an offensive government policy, investment in the militant group's home area, cash or any other policy concession the group is seeking.

21 Ethan Bueno de, Mesquita, ‘Conciliation, Counterterrorism, and Patterns of Terrorist Violence’, International Organization, 59 (2005), 145176Google Scholar

22 For a discussion of how the probability that a game continues can serve as a discount factor, please see Evelyn C. Fink, Scott Gates and Brian Humes, Game Theory Topics: Incomplete Information, Repeated Games, and N-Player Games (Thousand Oaks, Calif.: Sage University Papers on Quantitative Applications in the Social Sciences, No. 122, 1998): and/or James D. Morrow, Game Theory for Political Scientists (Princeton, N.J.: Princeton University Press, 1994). These texts indicate that since probabilities and the traditional discount factor are both bounded between 0 and 1 they are equivalent in infinitely repeated games. It is also important to note that the parameter δ in this game is different from the traditional discount factor, and is used here to represent the discount on the payoff for each player if they co-operate.

23 Bapat, Navin, ‘Insurgency and the Opening of Peace Processes’, Journal of Peace Research, 42 (2005), 699717CrossRefGoogle Scholar

Cronin, Ending Terrorism, pp. 28–47Google Scholar

Jones and Libicki, How Terrorist Groups End, pp. 9–44Google Scholar

24 Ethan Bueno de, Mesquita and Dickson, Eric, ‘The Propaganda of the Deed: Terrorism, Counterterrorism, and Mobilization’, American Journal of Political Science, 51 (2007), 145176Google Scholar

25 Since both p and q are probabilities, they must be bounded between (0,1). Therefore, assume that if βp > 1, βp = 1 and if βq > 1, βq = 1. This substantively does not change the result. It indicates that in this situation, if a group is betrayed, the probability that they will be disarmed is equal to 1.

26 This conclusion is very similar to Bueno de Mesquita, ‘Conciliation’.

27 Axelrod, Robert and Keohane, Robert, ‘Achieving Cooperation Under Anarchy: Strategies and Institutions’, World Politics, 38 (1985), pp. 226–254Google Scholar

Lake, Entangling Relations, pp. 35–77Google Scholar

28 Martin, Lisa L., ‘Interests, Power, and Multilateralism’, International Organization, 46 (1992), 765792CrossRefGoogle Scholar

Koremenos, Barbara, ‘Contracting around International Uncertainty’, American Political Science Review, 99 (2005), 549565CrossRefGoogle Scholar

Rosendorff, B. Peter and Milner, Helen, ‘The Optimal Design of International Trade Institutions: Uncertainty and Escape’, International Organization, 55 (2001), 829858CrossRefGoogle Scholar

29 Conybeare, ‘Arms Versus Alliances’, pp. 215–235CrossRefGoogle Scholar

Lake, Entangling Relations, pp. 35–77Google Scholar

Morrow, James D., ‘Alliances, Credibility, and Peacetime Costs’, Journal of Conflict Resolution, 38 (1994), 270297CrossRefGoogle Scholar

30 Byman, Deadly Connections, pp. 155–186Google Scholar

31 This would further suggest that since both the Quetta Shura and the Haqqani Network were initially quite vulnerable to collapse at the hands of the US military following Operation Enduring Freedom it is likely that parts of Pakistan's government assisted the groups in banding together.

32 Byman, Deadly Connections, pp. 155–186Google Scholar

33 Catanzaro, Raimondo, ‘Enforcers, Entrepreneurs, and Survivors: How the Mafia Has Adapted to Change’, British Journal of Sociology, 36 (1985), 3457CrossRefGoogle Scholar

34 Victor Asal, Hyun Hee Park, Karl Rathemeyer and Gary Ackerman, ‘With Friends Like These … Why Terrorist Organizations Ally’ (paper presented at the International Studies Association Meeting, 2010).

35 We currently lack a reliable measure of the ideological compatibility of the militant groups. While one strategy might be to examine the manifestos of some of these groups, we encounter two potential problems. First, not all of the groups have public manifestos. Secondly, in forming an alliance, these groups might have incentives to misrepresent their true ideologies in order to make themselves more attractive alliance partners, or to signal that the alliance is stronger than it actually might be. While this is certainly an interesting area of study, we leave it for future research and focus on what we can currently test.

36 Particularly for the ethnically or religiously based conflicts, individual actors could not be identified, but it was clear that there was more than one challenger – examples of the Uppsala/PRIO coding of this are: Sikh insurgents, Palestinian factions or sectarian factions. If there was evidence of some co-operation/co-ordination among these actors, then the entire collective was coded as having formed an alliance. We do not create dyads that allow groups that are fighting separate territorial conflicts to be considered alliance partners. For example, in the case of India, we have dyadic pairings for those groups that participated in the conflict in Kashmir and pairings for groups involved in Naxalite insurgency. However, we do not create dyads that consider the groups in the Kashmir conflict as potential alliance partners with the Naxalites.

37 The eighteen observations that involved major powers as target states were removed from the analysis, though the results are robust even when they remain in the dataset. However, since the major powers’ campaigns involved interventions on foreign territory (United Kingdom–People's Republic of Yemen; France–Algeria; and Soviet Union–Latvia), it is inappropriate to consider these observations to be comparable to cases where the target government was fighting multiple groups within its own territory. The exclusion of the major power observations removed 1.04 per cent of the observations.

38 The full dataset for replicating the analysis is available at: http://www.bsos.umd.edu/gvpt/bond/.

39 Byman, Deadly Connections, pp. 21–52Google Scholar

Gleditsch, KristianSalehyan, Idean and Schultz, Kenneth, ‘Fighting at Home: Fighting Abroad: How Civil Wars Lead to International Disputes’, Journal of Conflict Resolution, 52 (2008), 479506CrossRefGoogle Scholar

Salehyan, Idean, ‘No Shelter Here: Rebel Sanctuaries and International Conflict’, Journal of Politics, 70 (2007), 113Google Scholar

40 Thompson, William R., ‘Identifying Rivals and Rivalries in World Politics,’ International Studies Quarterly, 45 (2001), 557586CrossRefGoogle Scholar

Paul Diehl and Gary Goertz (War and Peace in International Rivalry (Ann Arbor: University of Michigan Press, 2000), pp. 29–34)CrossRefGoogle Scholar

41 In some cases there are more than two militant groups, which allows the sponsor more than one choice of alliance to sponsor per year. However, since our data focus mainly on the government, these data would essentially repeat. For example, in the case of Israel, four sponsors could intervene to support an alliance between Hamas/Hezbollah, Fatah/Hezbollah, Hamas/PFLP, Fatah/PFLP, Hezbollah/PLFP, etc. This would require repeating data from the years in which each of these groups are active, but the data would not be independent. To keep the observations independent, the sponsorship variable is coded as 1 for this data if the potential sponsor intervenes in any of the potential alliances. We did, however, run our analyses with the repeated observations, and the results are robust to this design.

42 However, these states were not excluded from the tests of Hypotheses 1 and 2.

43 Jongman, Albert J. and Alex Peter Schmidt, World Directory of Terrorist and Other Organizations Associated with Guerrilla Warfare, Political Violence and Protest (Edison, N.J.: Transaction, 1988)Google Scholar

Janke, Peter, Guerrilla and Terrorist Organisations: A World Directory and Bibliography (New York: Macmillan, 1983)Google Scholar

44 This coding of a sponsor state provides a useful alternative to and/or extension of the UCDP/PRIO coding of ‘secondary parties’ to a conflict. While ‘secondary parties’ (variables SideA2nd and SideB2nd) are identified as state actors that enter the conflict to aid the primary actors, this aid is restricted to the military sort: ‘[S]econdary parties are states that enter a conflict with troops to actively support one of the primary parties’ (UCDP/PRIO Armed Conflict Dataset Codebook, p. 2). Our definition allows for a greater range of sponsorship activities, and includes both economic and tactical support as indicators of outside support for a militant group or alliance. Additionally, where the UCDP/PRIO data restrict the universe of potential secondary parties in a conflict to those countries that ‘share the position of the primary party it is supporting in the incompatibility’, we impose no ideological restrictions on the sponsor state by our definition.

45 Cunningham, DavidGleditsch, Kristian and Salehyan, Idean, ‘It Takes Two: A Dyadic Analysis of Civil War Duration and Outcome’, Journal of Conflict Resolution, 53 (2009), 570597CrossRefGoogle Scholar

46 We also created a third version of the weak link variable that simply drops categories 2 and 3, and the results were robust.

47 Fearon, James and Laitin, David, ‘Ethnicity, Insurgency, and Civil War’, American Political Science Review, 97 (2003), 7590CrossRefGoogle Scholar

48 Fearon and Laitin, ‘Ethnicity, Insurgency, and Civil War’, p. 80Google Scholar

49 Carment, David and James, Patrick, ‘Internal Constraints and Interstate Ethnic Conflict: Toward a Crisis-Based Assessment of Irrendentism’, Journal of Conflict Resolution, 39 (1995), 82109CrossRefGoogle Scholar

Davis and Moore, ‘Ethnicity Matters’, pp. 171–81Google Scholar

50 Fearon and Laitin, ‘Ethnicity, Insurgency, and Civil War’, p. 80Google Scholar

51 Hegre, Havard and Sambanis, Nicholas, ‘Sensitivity Analysis of Empirical Results on Civil War Onset’, Journal of Conflict Resolution, 50 (2006), 508535CrossRefGoogle Scholar

Lyall, Jason and III, Isaiah Wilson, ‘Rage against the Machines: Explaining Outcomes in Counter-Insurgency Wars’, International Organization, 63 (2009), 67106CrossRefGoogle Scholar

52 Bennett, D. Scott and Stam, Allan, ‘EUgene: A Conceptual Manual’, International Interactions, 26 (2000), 179204CrossRefGoogle Scholar

53 Carter, David and Signorino, Curtis, ‘Back to the Future: Modeling Time Dependence in Binary Data’, Political Analysis, 18 (2010), 271292CrossRefGoogle Scholar

54 Manus Midlarsky, Handbook of War Studies II (Ann Arbor: University of Michigan Press), pp. xiii–xxiiGoogle Scholar

55 Singer, J. David, ‘Reconstructing the Correlates of War Dataset on the Material Capabilities of States, 1816–1985’, International Interactions, 14 (1987), 115132CrossRefGoogle Scholar

56 Signorino, Curtis and Ritter, Jeffrey M., ‘Tau-b or not Tau-b: Measuring the Political Similarity of Foreign Policy Positions’, International Studies Quarterly, 43(1999),115–144CrossRefGoogle Scholar

57 Monty G. Marshall, Keith Jaggers and Ted Robert Gurr, ‘Polity IV Project: Political Regime Characteristics and Transitions, 1800–2010’, available at: http://www.systemicpeace.org/polity/polity4.htm

58 Beck, NathanielKatz, Jonathan N. and Tucker, Richard, ‘Taking Time Seriously: Time-Series-Cross-Section Analysis with a Binary Dependent Variable’, American Journal of Political Science, 42 (1998), 12601288CrossRefGoogle Scholar

59 The results do not change if we use the first weak-link indicator as opposed to the second with the controls.

60 As a further robustness check, we re-analysed the models using all of the controls from Fearon and Laitin's 2003 study, ‘Ethnicity, Insurgency, and Civil War’. The results remain consistent and the weak-link variable along with the interaction term remain in the anticipated directions and significant.

61 The 95 per cent confidence intervals are in the parentheses.

62 Byman et al., Trends in Outside Support for Insurgent Movements.