Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation

In this article, we explore reasons that a defender might prefer secrecy or deception about her defensive resource allocations, rather than disclosure, in a homeland‐security context. Our observations not only summarize and synthesize the results of existing game‐theoretic work, but also provide intuitions about promising future research directions.

[1]  F. E. Rourke,et al.  Secrecy and Publicity: Dilemmas of Democracy. , 1962 .

[2]  S. Brams,et al.  Deception in simple voting games , 1977 .

[3]  Steven J. Brams,et al.  Deception in 2 × 2 Games , 1977 .

[4]  Sissela Bok,et al.  Secrets: On the Ethics of Concealment and Revelation , 1982 .

[5]  David G. Bromley,et al.  Secrecy: A Cross-Cultural Perspective. , 1982 .

[6]  Steven D. Levitt,et al.  Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack , 1997 .

[7]  Peter P. Swire What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory , 2001, ArXiv.

[8]  Oliver J. Board The Deception of the Greeks: Generalizing the Information Structure of Extensive Form Games , 2002 .

[9]  T. Sandler,et al.  Terrorism & Game Theory , 2003 .

[10]  Eric Maskin,et al.  The Politician and the Judge: Accountability in Government , 2004 .

[11]  Molly J. Walker Wilson,et al.  Verbal and Nonverbal Dynamics of Privacy, Secrecy, and Deceit , 2003 .

[12]  D. Pinto Secrets and Lies: Digital Security in a Networked World , 2003 .

[13]  Peter P. Swire A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security? , 2004, J. Telecommun. High Technol. Law.

[14]  Kenneth Hendricks,et al.  Feints , 2004 .

[15]  Gerald G. Brown,et al.  A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..

[16]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[17]  Gilbert Laporte,et al.  A Continuous Model for Multistore Competitive Location , 2005, Oper. Res..

[18]  Vicki M. Bier,et al.  Game-Theoretic and Reliability Methods in Counterterrorism and Security , 2006 .

[19]  Robert Powell,et al.  Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.

[20]  V. Bier Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[21]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[22]  Gilat Levy Decision–Making Procedures for Committees of Careerist Experts , 2007 .

[23]  Gerald G. Brown,et al.  Interdicting a Nuclear-Weapons Project , 2009, Oper. Res..

[24]  Gregory Levitin,et al.  Protection vs. false targets in series systems , 2009, Reliab. Eng. Syst. Saf..

[25]  Vicki M. Bier,et al.  Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .

[26]  Jun Zhuang,et al.  Robustness of Optimal Defensive Resource Allocations in the Face of Less Fully Rational Attacker , 2009 .

[27]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[28]  David A. Siegel,et al.  Is this Paper Dangerous? Balancing Secrecy and Openness in Counterterrorism , 2010 .

[29]  V. Bier,et al.  SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .

[30]  Vicki M. Bier,et al.  Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks , 2011, Ann. Oper. Res..