Top Qs
Timeline
Chat
Perspective

Weaponized interdependence

Theory in international relations From Wikipedia, the free encyclopedia

Remove ads

Weaponized interdependence is a theory in international relations that describes how states can leverage asymmetrical interdependence within global production networks to coerce other actors.[1] The concept was developed by Henry Farrell and Abraham Newman, who argue that states with political authority over the central "hubs" in global economic networks—such as those for finance, data, and trade—can exploit this position to gain a strategic advantage.[1] This is achieved through two primary mechanisms: the panopticon effect, which involves gathering critical information from data traffic flowing through hubs under control of a powerful state, and the chokepoint effect, which involves a state's ability to limit or deny other actors' access to the network.[2]

The theory challenges earlier liberal views of complex interdependence, which primarily saw it as a source of cooperation and mutual benefit.[3] Instead, weaponized interdependence posits that the very structures created to enhance market efficiency can be repurposed as tools of state power, turning focal points of cooperation into tools of control.[4]

Remove ads

Relation to liberal peace theory

Proponents of weaponized interdependence argue that the flaw in the liberal argument is not the premise that interdependence makes war costly, but the conclusion that states will therefore consistently behave peacefully.[5] Farrell and Newman contend that liberal accounts have tended to avoid the question of power, focusing instead on mutual cooperative gains or suggesting that interdependence generates reciprocal, rather than one-sided, vulnerabilities.[6] The theory of weaponized interdependence demonstrates how the very structures that liberals believe foster peace—global economic networks—can be repurposed for coercive ends.[4] It suggests that states can exploit network asymmetries to inflict costs on others, effectively turning interdependence into a weapon rather than a source of peace.[1]

Remove ads

Theoretical background

The concept of weaponized interdependence emerged as an extension of the new interdependence approach (NIA), a research program developed by Farrell and Newman to update the classic theory of "complex interdependence".[7] While complex interdependence, pioneered by Robert Keohane and Joseph Nye, focused on how bilateral relationships created vulnerabilities, it largely emphasized the dispersion of power and the potential for mutual gains.[1]

Weaponized interdependence offers a structural explanation where the topography of networks themselves creates enduring power imbalances.[1] It critiques liberal institutionalism for its assumption that because interdependence makes conflict costly, states will not use it for aggressive ends.[5] In contrast, this theory argues that key global economic networks tend to evolve into centralized "hub-and-spoke systems" due to network effects and efficiency gains, rather than flat, decentralized webs.[8] States that have jurisdiction over these hubs are uniquely positioned to exercise coercive power over other "nodes" in the network.[1]

Remove ads

Mechanisms

Summarize
Perspective

States that control network hubs can weaponize interdependence through two distinct effects.[9]

Panopticon effect

The panopticon effect refers to the ability of a state to gather and exploit information by monitoring data flowing through a network hub it controls.[10] The term is derived from Jeremy Bentham's Panopticon, an architectural design for a prison allowing a single central observer to see all inmates (Michel Foucault applied the term to the modern technique of the social control in 1971).[11] In a global network, a state with jurisdiction over a key hub can gain an informational advantage, allowing it to understand an adversary's intentions, tactics, and vulnerabilities.[10] It is difficult for other actors to avoid these hubs, making it nearly impossible for them to communicate or transact without passing through them.[12]

Panopticon effect predates the Internet by at least a century: during the first era of globalization, the British government enjoyed the benefits of the international financial flows going through the City of London and thus an ability to interrupt the flow of goods.[10]

Chokepoint effect

The chokepoint effect is the ability of a state to restrict or deny other actors access to the network by controlling a critical hub.[10] Because hubs offer significant efficiency benefits and are hard to circumvent, being denied access can impose substantial costs on a targeted state or private entity.[13] This allows the controlling state to use the network as a tool to punish or coerce others, effectively turning the hub into a "chokepoint".[14] The disconnection of a state from a critical network can be highly disruptive not only to its international transactions but also to its domestic economy, as internal actors may rely on the foreign-controlled hub.[15]

Case studies

Summarize
Perspective

Financial networks and SWIFT

The SWIFT financial messaging system is a primary example of a centralized global network.[16] Although technically being a Belgian cooperative, it has been subject to the jurisdiction of both the United States and the European Union.[17]

  • Chokepoint: In 2012, under joint pressure from the U.S. and EU, SWIFT was forced to disconnect sanctioned Iranian banks from its network as part of the effort to counter Iran's nuclear program.[19] This action was described as the "financial market equivalent of crossing the nuclear threshold" and severely crippled Iran's banking sector.[20]

The Internet and data flows

The physical and commercial architecture of the Internet is highly centralized, with a disproportionate number of key hubs—including fiber optic cable landing sites, internet exchange points, and dominant tech companies—located in the United States.[21]

  • Panopticon: The U.S. government has extensively used this "home-field advantage" for surveillance.[22] Through NSA programs such as PRISM and Stellar Wind, it compelled U.S. technology and telecommunications companies to provide access to vast amounts of global data.[22] The Snowden revelations exposed how this surveillance targeted foreign citizens and even allied leaders.[23]
  • Chokepoint: The U.S. has largely refrained from using the chokepoint effect on the internet, partly because of a strategic commitment to an "open internet" and partly because its domestic institutions are not designed to easily compel tech firms to cut off users.[24]

Rare earth elements supply chain

The supply chain for rare earth elements (REEs) is a network in the material world that is vulnerable to weaponization.[25] China controls over 90% of the world's REE processing, giving it asymmetric network power and chokepoint capabilities.[26] REEs are critical for numerous consumer, military, and green energy technologies, including smartphones, precision-guided missiles, and electric vehicle motors.[27]

The 2010 rare earths crisis is considered a potential case of weaponized interdependence.[28] Following a maritime collision near the disputed Senkaku Islands, China was accused of halting REE exports to Japan, its largest trading partner for the minerals.[29] Researchers debate whether the export reduction was a direct act of coercion or an acceleration of pre-planned industrial policy, but the event was treated as an act of weaponization by the U.S., Japan, and the EU, leading to a World Trade Organization case against China.[30]

Remove ads

Responses and implications

Summarize
Perspective

When states fear they will be targeted by weaponized interdependence, they are likely to pursue strategies of decoupling or de-risking to reduce their vulnerabilities.[27] This backlash can lead to the fragmentation of global networks.[31]

After the 2010 rare earths crisis, the U.S., Japan, and the EU began efforts to diversify their REE supply chains away from China to reduce its chokepoint power.[32]

Threats to disconnect Russia from SWIFT following the Ukraine crisis prompted Russia to explore creating alternative payment systems to become less dependent on the U.S. dollar.[33]

The European Union has sought to mitigate its vulnerabilities in the digital sector through regulation. Research suggests the EU is highly vulnerable to the panopticon effect from both the U.S. and China, with the GDPR having almost no effect on the foreign surveillance of EU data.[34] However, the EU is considered less vulnerable to the chokepoint effect, as no single rival state has both high market dominance and sufficiently strained diplomatic relations to make a cutoff likely.[35] Regulations like the Digital Markets Act are intended to further insulate the EU from future chokepoint threats.[36]

Remove ads

References

Sources

Loading related searches...

Wikiwand - on

Seamless Wikipedia browsing. On steroids.

Remove ads