A Most Lonely Union

In September 2019, two months before officially taking office, the new European Commission president was already insisting that the European Union needed to change. On the one hand, Ursula von der Leyen promised a new “geopolitical Commission,” but on the other, she wanted the EU “to be the guardian of multilateralism.” The difficult question was left unstated: How exactly is the EU supposed to reconcile the great-power maneuvering of geopolitics with the more level playing field of multilateralism?

Geopolitics is the ruthless pursuit of self-interest by powerful states, no matter the cost to others. Multilateralism involves mutual agreements among states pursuing their collective welfare. At a minimum, the two sit awkwardly with each other; at the worst, they are radically incompatible. The latter is true of the current system of globalization, which has been supported by a complex system of multilateral rules and agreements among states.

Access the full article here.

Other Writing:

Chapter in an Edited Volume

“Weaponized Interdependence and Networked Coercion: A Research Agenda,” in The Uses and Abuses of Weaponized Interdependence – with Abraham Newman – eds. Daniel Drezner, Henry Farrell and Abraham Newman

When we initially wrote our article on weaponized interdependence, we hoped that it would help people think more clearly about how economic coercion was changing. We did not anticipate either the reception that the argument has gotten or how dramatically the changes that we wanted to understand would accelerate, thanks to factors including the deterioration ...
Read Article
Essay

Defending Democratic Mechanisms and Institutions against Disinformation Attacks – with Bruce Schneier

To better understand influence attacks, we proposed an approach that models democracy itself as an information system and explains how democracies are vulnerable to certain forms of information attacks that autocracies naturally resist. Our model combines ideas from both international security and computer security, avoiding the limitations of both in explaining how influence attacks may ...
Read Article