Choosing What to Protect

We study a strategic model in which a defender must allocate defensive resources to a collection of locations, and an attacker must choose a location to attack. The defender does not know the attacker's preferences, while the attacker observes the defender's resource allocation. The defender's problem gives rise to negative externalities, in the sense that increasing the resources allocated to one location increases the likelihood of an attack at other locations. In equilibrium, the defender exploits these externalities to manipulate the attacker's behavior, sometimes optimally leaving a location undefended, and sometimes preferring a higher vulnerability at a particular location even if a lower risk could be achieved at zero cost. Key results of our model are as follows: (1) the defender prefers to allocate resources in a centralized (rather than decentralized) manner; (2) as the number of locations to be defended grows, the defender can cost effectively reduce the probability of a successful attack only if the number of valuable targets is bounded; (3) the optimal allocation of resources can be nonmonotonic in the relative value of the attacker's outside option; and (4) the defender prefers his or her defensive allocation to be public rather than secret.

[1]  Daniel G. Arce,et al.  Transnational public goods: Strategies and institutions , 2001 .

[2]  W. Martin Honey pots and honey nets , Security through deception , 2001 .

[3]  G. Woo Quantitative Terrorism Risk Assessment , 2002 .

[4]  Yacov Y. Haimes,et al.  Roadmap for Modeling Risks of Terrorism to the Homeland , 2002 .

[5]  John A. Major Advanced Techniques for Modeling Terrorism Risk , 2002 .

[6]  Henry H. Willis,et al.  Estimating Terrorism Risk , 2002 .

[7]  T. Sandler,et al.  Terrorism & Game Theory , 2003 .

[8]  I. M. Destler,et al.  Protecting the American Homeland , 2003 .

[9]  D. Cousins Bureau of Customs and Border Protection , 2003 .

[10]  B. Zycher A Preliminary Benefit / Cost Framework for Counterterrorism Public Expenditures , 2003 .

[11]  Vicki M. Bier,et al.  Optimal Allocation of Resources for Defense of Simple Series and Parallel Systems from Determined Adversaries , 2003 .

[12]  H. Kunreuther,et al.  Interdependent Security , 2003 .

[13]  T. Sandler,et al.  What do we know about the substitution effect in transnational terrorism , 2003 .

[14]  B. Frey,et al.  How to Fight Terrorism: Alternatives to Deterrence , 2003 .

[15]  R. Zeckhauser,et al.  The Ecology of Terror Defense , 2003 .

[16]  T. Sandler,et al.  An economic perspective on transnational terrorism , 2004 .

[17]  Budi Arief,et al.  Computer security impaired by legitimate users , 2004, Comput. Secur..

[18]  J. Mueller A False Sense of Insecurity , 2004 .

[19]  Kenneth Hendricks,et al.  Feints , 2004 .

[20]  Vicki M. Bier,et al.  Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..

[21]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[22]  A. Brunet Grant Funding to State and Local Governments and Systematic Assessment of Vulnerability , 2005 .

[23]  Veronique de Rugy What Does Homeland Security Spending Buy , 2005 .

[24]  David L. Banks,et al.  Combining Game Theory and Risk Analysis in Counterterrorism: A Smallpox Example , 2006 .