Allocating Defensive Resources with Private Information about Vulnerability

In many resources-allocation problems, strategic adversaries move sequentially and are likely to have private information about the effectiveness of their spending. A defender, for example, often has to allocate its defensive resources before an attacker (e.g., a terrorist group) decides where to strike. Defenders are also likely to have private information about the vulnerability of the things they are trying to protect. Sequential decisions and private information about effectiveness creates a dilemma for a defender. Allocating more to a highly vulnerable site reduces the expected losses should that site be attacked but may also signal that that site is more vulnerable and thereby increase the probability of an attack. Modeling this tradeoff as a signaling game, the analysis shows that secrecy concerns generally swamp vulnerability concerns when more vulnerable sites are weakly harder to protect on the margin. The defender pools in equilibrium, that is, allocates its resources in the same way, regardless of the level of vulnerability. If more vulnerable sites are easier to protect on the margin, vulnerability concerns may swamp secrecy concerns.

[1]  John D Moteff Critical Infrastructures: Background, Policy, and Implementation , 2009 .

[2]  Robert Powell,et al.  Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack , 2009, Games Econ. Behav..

[3]  Scott E. Page,et al.  General Blotto: games of allocative strategic mismatch , 2009 .

[4]  Dmitriy Kvasov,et al.  Contests with limited resources , 2007, J. Econ. Theory.

[5]  R. Powell Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.

[6]  V. Bier Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[7]  J. Morgan,et al.  On the buyability of voting bodies , 2007 .

[8]  B. Roberson The Colonel Blotto game , 2006 .

[9]  Jean-François Laslier,et al.  Distributive Politics and Electoral Competition , 2002, J. Econ. Theory.

[10]  Tim Groseclose,et al.  Buying Supermajorities , 1996, American Political Science Review.

[11]  Garey Ramey,et al.  D1 Signaling Equilibria with Multiple Signals and a Continuum of Types , 1996 .

[12]  A. Mas-Colell,et al.  Microeconomic Theory , 1995 .

[13]  R. Myerson Incentives to Cultivate Favored Minorities Under Alternative Electoral Systems , 1993, American Political Science Review.

[14]  J. Snyder Election Goals and the Allocation of Campaign Resources , 1989 .

[15]  Mordecai Kurz Game Theory in the Social Sciences. Vol. 1, Concepts and Solutions. Vol. 2, A Game-theoretic Approach to Political Economy. Martin Shubik , 1986 .

[16]  Martin Shubik,et al.  Systems Defense Games: Colonel Blotto, Command and Control , 1981 .

[17]  Lawrence Freedman The Problem of Strategy , 1980 .

[18]  D. W. Blackett Pure strategy solutions of blotto games , 1958 .

[19]  É. Borel The Theory of Play and Integral Equations with Skew Symmetric Kernels , 1953 .

[20]  J. Tinbergen Some Remarks on the Problem of Dollar Scarcity , 1949 .