Navigate
HomeStart here
MusingsResearch & long-form
BuildingProjects & learnings
WorkProfessional practice
RunningTraining & races
AboutValues & identity
Life & PlacesCulture, food, travel, cities
Notes & ArchiveJournals, essays, portfolio
Research essay — Part I of the War Powers DiptychKnowledge & ResearchUpdated April 2026Legal theory + IR coercion synthesis
Musings

Knowledge & Research · April 2026 · Part I of the War Powers Diptych

The Power to Threaten

Matthew Waxman's Yale Law Journal argument (2014) that war-powers scholarship has regulated the ceremony while ignoring the operation. Five declared wars, roughly two hundred uses of force, and many thousands of threats that never fired.

YLJ 2014
Published
123 Yale L.J. 1626
5
Declared wars
1812 through WWII
~200
Uses of force
CRS, 1798–present
Part of the law trioReads alongside Hathaway & Shapiro on outcasting and Goldsmith & Levinson on structural problems shared across public law. The three ask the same family of question from different sides: what does law do when the formal doctrine and the working system do not match?
01

The Question

Who has the legal authority to threaten war? Not to wage it, not to declare it, not to sign the peace. To threaten. Waxman argues the question is almost invisible in two centuries of war-powers scholarship, even though threats are how the United States exercises military power in almost every case that matters.[1]

“In contemporary American public law, the power to wage war has received extensive attention, while the power to threaten war has been largely ignored, even though threats of force are a more common and consequential exercise of American military power than actual war.”

— Waxman, 123 Yale L.J. at 1628 (2014)

02

Why This Matters

  • Iran

    Two decades of coercive diplomacy over the nuclear program have been carried through threats and partial signals. The formal war power has not been invoked. The operational war power has.

  • Taiwan

    Strategic ambiguity is a threat posture. Its credibility depends on how adversaries read American political signals, not on any formal Article I action.

  • Tariff weaponization

    Tariffs and sanctions have blurred into the same coercion family as military threats. Trade-power doctrine has the opposite shape from war-power doctrine: Congress has delegated extensively to the President. The blur matters for whether Waxman's framework holds at the edges.

  • Alliance credibility

    NATO Article 5, the Japan-US alliance, and extended deterrence all live or die on the believability of a threat that will, in almost every case, never be executed.

  • AI-accelerated signaling

    Decision loops are compressing. The Schelling-era signaling game assumed time to observe, interpret, and respond. Faster loops change what a credible signal even is.

Figure 1

The frequency mismatch between what war-powers doctrine regulates and what the US actually does

Count (log scale), 1789 – present5Declared wars1812 · Mexico · Spain · WWI · WWII~200Uses of force abroadCongressional Research Service countmany thousandsCoercive threats, alerts, deploymentsDenominator uncountable; order-of-magnitude estimateWhere doctrine looksWhere the action isWaxman (2014) argues the constitutional conversation regulates the red zone while the green zone carries almost all modern military power.
03

The Claim

Modern American military power is exercised primarily through credible threats rather than kinetic force. The constitutional conversation, frozen on the question of who gets to initiate war, has almost nothing to say about who gets to threaten. Waxman argues that Congress already shapes threat credibility through informal channels (appropriations, hearings, public dissent, political cost) and that those channels do much of the work the formal separation of powers is supposed to do. The framework is a correction to a scholarly blind spot, not a proposal for new constitutional doctrine.

This is a functionalist move in the lineage of Justice Jackson's Youngstown concurrence[2] and Harold Koh's National Security Constitution.[3] Waxman extends the functionalist reading to a specific category of power that neither Jackson nor Koh treated systematically.

04

The Mechanism

Written as a because-chain:

  1. Modern military power operates primarily through credible threats rather than kinetic force.
  2. Credibility requires costly signals that the threatened party can observe and interpret.
  3. The Executive can generate such signals unilaterally through deployments, statements, and alerts.
  4. Congress has no formal role in authorizing a threat short of war.
  5. Congress can, however, raise or lower the perceived cost of backing down through funding decisions, public hearings, visible dissent, and electoral pressure.
  6. Adversaries who observe those signals update on credibility accordingly.[4]
  7. The formal Article I power governs a rare ceremonial moment; informal congressional politics shapes the frequent operational one.

Why a 1966 IR text is load-bearing here

Thomas Schelling's Arms and Influence (1966) drew the distinction between brute force and coercion that Waxman imports into the legal conversation.[5] Brute force takes what it wants by seizing it. Coercion changes what the other party wants to do, by making the alternatives worse. Nuclear and modern conventional power sit in the coercive register almost all the time. The threat is the product; the violence is the rarely-used tail.

American constitutional doctrine has been frozen on the brute-force question, the authority to initiate violence, for two hundred years. The bulk of the modern phenomenon it is supposed to regulate lives in the coercive register Schelling named. Waxman's paper is the legal equivalent of noticing the phase change.

Figure 3

The coercion ladder: where US force actually operates

Low intensityHigh intensity →PressureThreatsForceDiplomatic note / pressure1Public statement / speech22013 Syria red lineEconomic sanctions3Freedom-of-navigation operation4Taiwan Straits 1995–96Force posture / deployment5Berlin Airlift 1948–49Alert level change6Cuban Missile Crisis 1962Limited strike7Kosovo 1999Sustained campaign8Declared war91812, Mexico, Spain, WWI, WWIIWaxman's zoneThe declared-war rung is regulated. Rungs 4–6 carry most US military power and are doctrinally silent.Spectrum derived from Schelling (1966); examples from Waxman (2014) and CRS records.

Rungs 4 through 6 are where most US military power actually operates. Those rungs have almost no formal constitutional treatment. Article I regulates rung 9. The War Powers Resolution gestures at rungs 7 and 8. Rungs 1 through 3 belong to routine foreign-policy authority. The middle band, the threat zone, is Waxman's subject.

05

Evidence & Method

This is a conceptual paper, not a causal-identification paper. Honest labeling matters, so we mark that up front. Waxman combines a frequency claim (threats far outnumber wars), historical case selection (Berlin, Cuba, the Taiwan Straits, Kosovo, the 2013 Syria red line), and borrowed political-science theory (audience costs) to argue for a reframe. His strength is reframing, not measurement.

Identification strategy

No research design. The argument combines a frequency claim (5 declared wars, roughly 200 documented uses of force abroad[6], orders of magnitude more threats, alerts, and deployments) with selected case histories to argue the doctrinal focus is pointed at the wrong tail of the distribution.

Key assumptions

  • Foreign governments distinguish between a united and a divided US government when reading signals.
  • Domestic political costs discipline presidential threats ex ante.
  • “Threat of force” is a coherent analytical category across the cases Waxman treats.

Threats to the argument

  • Audience-costs theory is empirically disputed.[7]
  • Adversary interpretation of congressional signals is not well measured; the existing work is mixed.
  • Personalist autocrats and non-state actors may not play the Schelling-style signaling game the theory assumes.
  • The boundary between threat of force, sanctions threat, tariff coercion, and freedom-of-navigation posture is not clean. The live cases sit in the blur.

External validity

Travels well to allied-reassurance contexts (NATO, Japan, Taiwan) and adversary-coercion contexts (Iran, North Korea, Russia). Travels less well to hybrid coercion (cyber, information operations) and to non-state actors where the signaling assumptions weaken.

06

Doctrinal Voices

Where Waxman's reframing sits in the field. The map below positions five voices on two axes: how they read doctrine (formalist vs functionalist) and which branch they think holds the power in practice. Click a dot to jump to the matching card.

Figure 2

Where the five voices sit: method (how to read doctrine) × allocation (who should hold the power)

MethodFormalistFunctionalistCongressExecutiveYoo (2005) — click to open card belowYoo2005Fisher (various) — click to open card belowFishervariousKoh (1990) — click to open card belowKoh1990Goldsmith (recent) — click to open card belowGoldsmithrecentWaxman (2014) — click to open card belowWaxman2014The five voices span the space. Waxman sits center-right: functionalist method, split on allocation.
John Yoo2005Presidentialist / Originalist
Louis FishervariousCongressionalist
Harold Koh1990Functionalist
Jack GoldsmithrecentRealist
Matthew Waxman2014Reframing
07

What Would Falsify This?

Four candidates, in order of impact on the argument's load-bearing structure.

F1

Audience costs fail empirically

If domestic political costs do not discipline presidential threats, the informal-constraint story loses its load-bearing element.

Evidence that would move the posterior:Downes & Sechser (IO 2012) and Snyder & Borghard (APSR 2011) already question the empirical basis. A stronger version of that critique, with wider case coverage, would put Waxman's reassurance claim in serious trouble.

F2

Adversaries do not read congressional signals

If foreign decision-makers treat the United States as a unitary actor regardless of congressional posture, the informal channel does no work.

Evidence that would move the posterior:The adversary-perception literature (Baum, Potter) is mixed and under-powered. A well-identified study of how foreign leaders actually weight domestic US politics when pricing a threat would be decisive.

F3

Modern coercion breaks the signaling model

Personalist autocrats, non-state actors, and AI-accelerated decision systems may not play the Schelling-style signaling game the theory assumes.

Evidence that would move the posterior:Evidence from the post-2014 period suggests the signaling environment has changed in ways the 2014 paper does not address. Demonstrating systematic breakdown in specific adversary categories would shrink the frame's generality.

F4

"Threat of force" is not a stable category

If tariff coercion, sanctions threats, and freedom-of-navigation operations cannot be bundled with military threats, the claim shrinks to a narrow historical range.

Evidence that would move the posterior:This is where the live cases sit. The blur between coercive instruments is not a bug in the paper but a live research question. Evidence that adversaries treat these as meaningfully different categories would force Waxman's framework to narrow.

08

So What?

Waxman's portability is narrow and load-bearing. The framework travels cleanly to two specific contexts. In allied reassurance (NATO, Japan, Taiwan), the credibility of an American security guarantee depends on whether adversaries and allies both read the domestic political signals correctly. In adversary coercion (Iran, North Korea, Russia), the signaling game Waxman describes is the substrate. In both, the informal channels he identifies (funding, hearings, public dissent, political cost) are the actual constitutional conversation the field has underweighted.

Where it travels less cleanly: hybrid coercion (cyber, information operations) and non-state adversaries. The signaling assumptions weaken when the actors are not states playing a public game. Waxman does not claim otherwise, but the field often quotes him as if he had.

The paper sits in direct conversation with two others on this site. Compare Hathaway & Shapiro on outcasting, which argues that much of international-law enforcement runs through exclusion rather than violence. Waxman is the domestic complement: most American military power runs through threats rather than force. Compare also Goldsmith & Levinson, who argue that international law and constitutional law face the same structural problems. Waxman shows one of those problems (enforcement against the executive) in close-up inside constitutional law.

Editor's extension · Jenn's reading, not Waxman's argument

Waxman does not make this next move. The site does. War powers are one instance of a general pattern: a 1787-era institution regulating a phenomenon that has transformed beneath it. Labeling this extension explicitly keeps observation and inference separate.

1787 textOriginal phenomenonModern phenomenon
Declare WarInter-state armed conflictCoercive threat, sanctions, strategic ambiguity
Commerce among the several StatesPhysical goods, shipping, tariffsData flows, platforms, attention markets
Cases and ControversiesDiscrete private disputesSupervision of the administrative state
Lay and collect TaxesTariffs and exciseTransfer programs, refundable credits, economic steering

This is a question, not a proposal. Amending the document is one answer. Rebuilding constitutional practice through functionalist readings like Waxman's is another. The drift is the observation. The remedy is the open question.

Adjacent questions · Where the frame might travel next

Waxman stays inside constitutional war powers. The signaling frame he borrows from Schelling is bigger than that, and several questions follow immediately from his argument that he does not answer. A reader from securities, corporate, or financial regulation will probably meet these before they finish the paper.

  • Private-party coercion

    Hostile-takeover threats, activist-investor letters, and litigation-threat playbooks all run on the same credibility dynamic. Who has the practical authority to make a credible threat when the threatener is a firm or a fund rather than a state? The nearest musings on this site are Lina Khan on Amazon and Ohio v. American Express.

  • Regulatory enforcement credibility

    The SEC's threat to prosecute is itself a signaling game. Audience-cost dynamics likely discipline agency threats too: deferred prosecution agreements, selective enforcement, and enforcement backlogs all move the perceived cost of calling a regulator's bluff. Waxman's framework would apply almost line for line.

  • Benchmark manipulation

    The Libor and Forex scandals were, at one level, about private actors coercing an index. Schelling's coercion-versus-brute-force distinction applies cleanly: the manipulators did not seize a market, they signaled into it. Much of contemporary research on benchmark integrity sits in this terrain and reads naturally as the financial-markets analogue of Waxman's constitutional argument.

  • Market-moving statements

    Fed communications, central-bank forward guidance, and Treasury jawboning all share the structure of the war-powers threat. There is no formal declaration, but there is a credible signal, and markets price it. The open question is whether informal congressional channels discipline those signals the way Waxman argues they discipline military threats.

These are the adjacencies. A careful reader from securities, corporate, or financial regulation could pick up the frame and walk it into any of them. The related musings on antitrust and platforms are the closest neighbors already on the shelf.

Through a securities-law lens

The securities-law record gives us concrete cases of the mechanism Waxman is pointing at in war powers. The parallel is not that the two fields disagree; it is that the same mechanism shows up in both, and the markets cases make the mechanism easier to see. Read this table as a magnifier, not as a counterpoint.

Waxman asksWhat it looks like in markets
Who has the legal authority to threaten war?Who has the legal authority to issue a market-moving signal?
Do audience costs discipline the Executive?Do audience costs discipline benchmark-setters, rate panels, the Fed, or the SEC itself?
Is “threat of force” a coherent analytical category?Is “market manipulation” a coherent category, or does the blur between spoofing, jawboning, and benchmark-setting repeat the same problem?
When informal channels constrain the Executive, does that constraint count as constitutional law?When informal market discipline constrains a benchmark-setter, does that constraint count as regulation?

Three places in the securities-law record where Waxman's mechanism is visible in concrete cases:

  • Benchmark integrity (Libor, Forex). The scandals were private-party coercion of an index without a formal rule about who sets it. Waxman's informal-channel account of congressional constraint on executive threats is the constitutional twin of contemporary accounts of market discipline on benchmark-setters.
  • The Salman personal-benefit standard. What the law does when the formal doctrine has no clean category for a kind of signal (a tip, a wink, a quiet favor). Waxman's functionalist move is the war-powers version of the same problem: the doctrine does not name threats, so threats operate outside doctrinal reach.
  • The legal function of motive. Audience-costs theory assumes observers can infer executive motive from political context. The corporate-law literature on motive is the doctrinal machinery for how courts actually do that inference, and when they get it wrong.

None of this is a stretch. It is the same mechanism at two different altitudes: constitutional law at the state level, securities law at the firm and market level. The markets record is the richer evidence base for what Waxman is arguing in war powers.

09

The Clean Takeaway

War-powers doctrine regulates a rare ceremonial act while the operational reality runs through threats the doctrine barely names. Waxman does not solve that gap. He makes it visible. That alone is a large enough contribution to change what the scholarship counts as the subject.

Sources

Matthew C. Waxman, The Power to Threaten War, 123 Yale L.J. 1626 (2014).

Thomas C. Schelling, Arms and Influence (Yale Univ. Press 1966).

James D. Fearon, Domestic Political Audiences and the Escalation of International Disputes, 88 Am. Pol. Sci. Rev. 577 (1994).

Kenneth A. Schultz, Democracy and Coercive Diplomacy (Cambridge Univ. Press 2001).

Alexander B. Downes & Todd S. Sechser, The Illusion of Democratic Credibility, 66 Int'l Org. 457 (2012).

Jack Snyder & Erica D. Borghard, The Cost of Empty Threats: A Penny, Not a Pound, 105 Am. Pol. Sci. Rev. 437 (2011).

Harold Hongju Koh, The National Security Constitution: Sharing Power After the Iran-Contra Affair (Yale Univ. Press 1990).

Louis Fisher, Presidential War Power (3d ed. Univ. Press of Kansas 2013).

John C. Yoo, The Powers of War and Peace: The Constitution and Foreign Affairs After 9/11 (Univ. of Chicago Press 2005).

Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 579 (1952) (Jackson, J., concurring).

Congressional Research Service, Instances of Use of United States Armed Forces Abroad, 1798–Present (running report).

Linked sources
[1]Matthew C. Waxman, “The Power to Threaten War,” 123 Yale L.J. 1626 (2014).The primary source. Waxman's framing statement is on pages 1628–29; the frequency argument is developed in Part I; the functionalist account of congressional informal influence is in Parts II and III.
[2]Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 579 (1952) (Jackson, J., concurring).Justice Jackson's three-zone framework (President acting with, without, or against Congress) is the doctrinal seed for the functionalist reading Waxman extends to threats.
[3]Harold Hongju Koh, The National Security Constitution: Sharing Power After the Iran-Contra Affair (Yale Univ. Press 1990).Koh's functionalist account of war powers. Waxman extends Koh's framework to the specific category of threats.
[4]James D. Fearon, “Domestic Political Audiences and the Escalation of International Disputes,” 88 Am. Pol. Sci. Rev. 577 (1994); Kenneth A. Schultz, Democracy and Coercive Diplomacy (Cambridge Univ. Press 2001).The audience-costs literature Waxman draws on. Democratic leaders face higher ex-post political costs for issuing threats they fail to carry out, which in theory lets their threats carry more credibility. Search by title on Google Scholar for open-access versions.
[5]Thomas C. Schelling, Arms and Influence (Yale Univ. Press 1966, 2008 reissue).The brute-force-versus-coercion distinction that Waxman imports. Chapters 1 and 2 are the load-bearing part for the legal argument.
[6]Congressional Research Service, Instances of Use of United States Armed Forces Abroad, 1798–Present (running report).The canonical count of documented uses of force. The ~200 figure is a headline summary of a running document; search the CRS reports site for the current edition (the report number has shifted over time).
[7]Alexander B. Downes & Todd S. Sechser, “The Illusion of Democratic Credibility,” 66 Int'l Org. 457 (2012); Jack Snyder & Erica D. Borghard, “The Cost of Empty Threats: A Penny, Not a Pound,” 105 Am. Pol. Sci. Rev. 437 (2011).The central empirical critiques of audience-costs theory. Downes & Sechser find no clear democratic credibility premium. Snyder & Borghard challenge the magnitude of audience costs in practice. Both are indexed on Google Scholar.

Continue · Part II of the War Powers Diptych

The Operational Code of Competence →

W. Michael Reisman's international-law complement. Where Waxman asks who has the domestic constitutional authority to threaten, Reisman asks who holds the legally recognized competence to use force under the UN Charter regime.

Related Reading

Musing

The Operational Code of Competence

A blended reading of W. Michael Reisman’s US-force corpus, with the 1989 Operational Code of Competence paper at the spine. Reisman’s question: when does the United States actually move to use force, and what unwritten rules govern that decision? Answer: the written Constitution describes less of it than the working code. Part II of the War Powers Diptych with Waxman.

Read →
Musing

Outcasting: How Law Enforces Without Police

Hathaway & Shapiro’s Yale Law Journal paper (2011) introduced “outcasting” — enforcement through exclusion, not violence. Medieval Iceland had courts but no police. The Catholic Church excommunicated. The WTO revokes trade benefits. From Austin (1832) to the Modern State Conception, critics insisted law requires force. This paper proves them wrong with 2,000 years of evidence.

Read →
Musing

Law for States: How Public Law Works Without a Sovereign

Goldsmith & Levinson’s Harvard Law Review paper (2009) argued that international law and constitutional law face the same three structural problems — uncertainty, enforcement, and sovereignty — and solve them the same way. Game theory, 12 theorists, and a fiat money analogy that reframes everything.

Read →
Musing

Amazon's Antitrust Paradox — A Close Reading of Lina Khan (2017)

A 27-year-old law student wrote a 96-page Note that rewrote the terms of antitrust debate. Khan argued the consumer welfare standard cannot see platform monopolies — because the harm isn't in prices. This is the argument, its lineage, and its afterlife.

Read →
Musing

Ohio v. American Express — The Economics of Two-Sided Markets

The Supreme Court decided 5–4 that credit card networks are single two-sided markets — and that proving harm on one side isn't enough. The economics of Rochet and Tirole, deployed in constitutional law, reshaped how courts see every platform from Apple to Amazon.

Read →
Musing

Iran’s Financial Collapse: From Sanctions to Street Protests

How maximum pressure sanctions, a proxy war, and a Ponzi-banking system converged into the worst financial crisis in Iran’s modern history. The rial fell 84%, Ayandeh Bank collapsed, and the regime killed 2,600+ protesters.

Read →