Cross-Domain
Cross-Domain

Warfare, Coercion & Conflict Theory — Map of Content

Cross-Domain

Warfare, Coercion & Conflict Theory — Map of Content

The structural principles governing how force gets applied, how coercion works across scales, and how mutual threat produces stable (or unstable) equilibrium. This 8-page hub consolidates theory…
active·hub··May 6, 2026

Warfare, Coercion & Conflict Theory — Map of Content

What This Hub Covers

The structural principles governing how force gets applied, how coercion works across scales, and how mutual threat produces stable (or unstable) equilibrium. This 8-page hub consolidates theory from military strategy, game theory, negotiation, and psychology showing that coercion operates through the same architectural principles regardless of scale (individual persuasion to nuclear deterrence).

The hub moves through: archetypes of how violence gets justified → theological parallels in warfare → nervous system persuasion at individual scale → game-theoretic coercion (bargaining under threat) → technology as force multiplier → indirection as superior to direct force → asymmetric warfare and protection strategies.

Core insight: All coercion operates on the same principle: making the target's continued resistance more costly than capitulation. Whether the cost is psychological (nervous system threat), material (economic loss), or existential (annihilation) is strategically variable. The architecture is universal.


Core Concepts

Foundational pages — read these first

  • Schelling's Coercive Bargaining & Nervous System Negotiation — Game-theoretic analysis of bargaining under threat; commitment tactics; credible threat as persuasion; nervous system calibration as negotiation substrate; why threats fail (lack of credibility) or succeed (credible escalation path) | status: developing | sources: 1
  • Archetypes of Political Violence — Recurring patterns in how violence gets justified: sacrificial (need for victim), revolutionary (destruction of old order), reactionary (restoration), fascistic (fusion of leader and state); psychological substrates producing each; archetypal justifications for coercion | status: developing | sources: 1

Developed Concepts

Pages with multiple sources and structured protocols

  • Mutual Assured Destruction and Protective Stalemate — MAD as ultimate coercive equilibrium; credible threat sufficient for deterrence (no actual use required); stability through mutual vulnerability; protective capacity producing unstable arms races; game-theoretic resolution: both states prefer coexistence but cannot escape escalation dynamic | status: developing | sources: 1
  • Technology-Mediated Warfare — Asymmetric force multiplication; muskets vs. non-militarized societies; technology as behavioral amplifier; non-technological people with tech dominate technological people without it; force outcome determined by tech differential not warrior quality | status: developing | sources: 1

Developing Concepts

Pages building toward greater depth

  • Combat Theology — The Parallel Battlespace — Warfare as theological statement; enemy demonized (absolute evil); own cause sacralized (absolute good); both operate simultaneously; theology justifies combat scale that economics or politics alone would not sustain; religious warriors more persistent than mercenaries | status: developing | sources: 1
  • Counterinsurgency and Nervous System Persuasion — COIN operations targeting nervous system (fear of state capacity) rather than military defeat; population control through demonstration of state presence; protection versus punishment producing loyalty; persuasion through threat-reduction | status: developing | sources: 1
  • Sourcing Asymmetry in Wartime — Controlling resource supply chains determines war outcome; total warfare requires total economy mobilization; sourcing advantage permits protracted conflict; resource scarcity forces either compromise or escalation to total destruction | status: developing | sources: 1
  • Sun Tzu's Indirection vs. Direct Completion — Indirect approach as superior strategy (enemy defeats self without direct engagement); direct approach as brute force; strategic situations favoring each; psychological completion requiring acknowledgment of defeat (why some wars require occupation/humiliation) | status: developing | sources: 1
  • Theology as Military Doctrine — Theology not separate from strategy; goddess invocation IS strategic doctrine; shapes perception, decision architecture, timeline assumptions, organization, objectives; Kali doctrine (bold, concentrated, rapid) vs. Bagalamukhi doctrine (patient, distributed, coalition) produce fundamentally different strategic approaches | status: developing | sources: 1
  • Goddess as Strategic Intelligence — Enemy's goddess choice reveals entire strategic framework; counter-intelligence principle: recognize goddess, infer doctrine, prepare counter-doctrine; Jai Singh's recognition of ShivaJi's Kali invocation enables invocation of Bagalamukhi counter-strategy | status: developing | sources: 1
  • Sacred Infiltration — Infiltration becomes ritual operation under goddess authorization; differs from dishonorable ambush through sacred reversal structure; requires authorization, reversal, completion; psychological/somatic consequences differ: authorized operation produces presence; shameful deception produces dissociation | status: developing | sources: 1

History of Warfare and Grand Strategy — Foundational Theory Pages

Eight history-domain pages covering warfare origins, strategic concepts, and the ethics of conflict. These extend the hub's theoretical reach from Cold War deterrence and counterinsurgency into long-arc history of warfare and classical strategic theory.

Origins and Typology

Strategic Concepts

  • Thalassocracy and Maritime Power — naval supremacy as strategic foundation; how control of sea lanes enables projection of force without territorial occupation; historical cases from Athens to Britain
  • Decisive Point and Leverage — Jomini's decisive point doctrine; force concentration at the point of maximum impact; how identifying the decisive point changes the strategic calculus
  • Strategic Thinking — Defined — what strategic thinking actually is and how it differs from tactical or operational thinking; the architecture of long-horizon decision-making
  • Thucydides Trap — Recognition — the structural dynamic of rising power vs. established power producing war; historical cases from Athens/Sparta through contemporary US/China tension

Ethics and Aftermath

Key Tensions in This Area

  • Credibility paradox: Coercion requires credible threat, but threatening actual escalation can trigger uncontrolled conflict. How to be credibly threatening without becoming non-negotiable?
  • Stalemate durability: Protected stalemate (both sides capable of destroying each other) is stable but fragile. One technological shift destabilizes the whole system.
  • Indirection effectiveness: Does enemy "defeat through own errors" work or does it require direct force as fallback? Evidence suggests indirection works only when direct force remains possible.

Cross-Domain Connections

Cross-Domain Extensions: Warfare + Psychology/Ethics

Pages from the cross-domain folder requiring warfare frameworks plus psychology, ethics, or political theory simultaneously.

Related Hubs

domainCross-Domain
active
complexity
createdApr 24, 2026
inbound links3