stronger belief than Clinton in his own ability to control historical events, and
when dealing with non-democracies “Blair is less cooperative, both strategic-
ally and tactically, than Clinton, having a propensity to use more threats in this
domain,” Schafer and Walker find.
32
Stephen Dyson has made especially fruitful use of this approach as well,
illustrating the value of operational code analysis as a predictive device.
33
He
argues that operational code analysis is especially useful for understanding “new
actors” about whom we know little, “an executive or other important figure
who has recently come to our attention, without the kind of long-standing and
visible record of decision-making and public behavior which would in most
circumstances form the basis for a profile.”
34
As Dyson puts it in his analysis of
Soviet President Vladmir Putin:
Putin’s Operational Code suggests he will, chameleon-like, imitate his
environment. One could not expect Putin to act in a norm-bound manner
when those with which he is engaged do not. Putin is unlikely to “stick to
the rules” in the face of deviation by another [. . .] Overall, the policy-
maker can feel confident that carefully constructed initiatives will not be
dismissed out of hand, and that Putin is unlikely to make rash, impulsive or
emotional gestures [. . .] However, the policymaker can feel warned that
Putin will reciprocate “bad” as well as “good” behavior, and that a break-
down in cooperation will likely be quite bitter and long-lived.
35
Prediction is one of the things that political scientists do least well, but
Dyson’s remarks—published originally in 2001—seem quite prescient in the
light of the recent deterioration in US–Russian relations over issues like
national missile defense and NATO expansion.
One potential weakness of the operational code approach is its frequent
reliance on speeches and other public communications. While memoirs and
other sources have been used to construct operational codes as well (for
instance in the Kissinger study noted earlier), there are obvious problems with
relying on public utterances as “data,” since these do not simply reflect the
beliefs of the communicator but may be constructed with certain domestic
and/or international audiences in mind, as already noted. In 2007, for instance,
Iran’s President Ahmadinejad made a series of belligerent-sounding speeches,
including one in which he directly threatened Israel. Were these genuinely
intended for U.S. or Western consumption, or were they intended to shore
up what many believed was the Iranian leader’s declining support at home?
Speeches are also infrequently penned by leaders themselves. Nevertheless, as
Crichlow notes, although there may be instances where a speech is obviously
tailored to some audience or another, it is rare indeed for a speech to depart
112 The Individual