Lone Wolf Terrorism

The purpose of this paper is to investigate the insights that might be generated into the nature of 'lone wolf terrorism’ through the application of economic analysis. Orthodox approaches, particularly (standard) expected utility analysis and game theoretical analysis, are discussed. These tools prove useful in developing preliminary or 'first order’ insights. The lone wolf terrorist exhibits a number of idiosyncrasies that present challenges to both economic analysis and government security policy. An alternative analytical framework is constructed wherein a terroristic agent makes choices on the basis of a preference ordering constructed over two moments of the distribution (measured in terms of fatalities generated by terrorist attacks). Seven predictions are yielded from the mean-variance theoretical framework and numerical estimates are computed as preliminary steps towards the full exploration of the implications of the framework. Most importantly, depending on their level of risk aversion (or risk seeking behaviour), lone wolves are expected to predominantly choose assassination, armed attack, bombing, hostage taking or unconventional attacks. Furthermore, within a range of between one and two standard deviations from the mean, it is possible that the quadratic utility function will reach a maximum. Following attacks of a certain magnitude (in terms of fatalities), it might be expected that the lone wolf will withdraw from activity for a period of time. This analytical approach may assist governments and security agencies facing the threat of lone wolf terrorism.

[1]  Ramon Spaaij,et al.  The Enigma of Lone Wolf Terrorism: An Assessment , 2010 .

[2]  Kevin Chlebik Terrorism and Game Theory: From the Terrorists’ Point of View , 2010 .

[3]  P. J. Phillips Terrorists’ Equilibrium Choices When No Attack Method is Riskless , 2009 .

[4]  P. J. Phillips APPLYING MODERN PORTFOLIO THEORY TO THE ANALYSIS OF TERRORISM. COMPUTING THE SET OF ATTACK METHOD COMBINATIONS FROM WHICH THE RATIONAL TERRORIST GROUP WILL CHOOSE IN ORDER TO MAXIMISE INJURIES AND FATALITIES , 2009 .

[5]  Walter Enders,et al.  9/11: WHAT DID WE KNOW AND WHEN DID WE KNOW IT? , 2009 .

[6]  F. Schneider,et al.  AL QAEDA AND JIHADIST TERRORISM IN THE LIGHT OF CONTEST THEORY, A THEORETICAL NOTE AND EMPIRICAL EVIDENCE OVER THE PERIOD 2004-2008 , 2009 .

[7]  Edward H. Kaplan,et al.  Suicide Bombings and Targeted Killings in (Counter-) Terror Games , 2007 .

[8]  T. Sandler,et al.  Cycles and Substitutions in Terrorist Activities: A Spectral Approach , 2007 .

[9]  Ethan Bueno de Mesquita,et al.  The Propaganda of the Deed: Terrorism, Counterterrorism, and Mobilization , 2022 .

[10]  Aidan Kirby,et al.  The London Bombers as “Self-Starters”: A Case Study in Indigenous Radicalization and the Emergence of Autonomous Cliques , 2007 .

[11]  Todd Sandler,et al.  Chapter 25 Terrorism: A Game-Theoretic Approach⁎ , 2007 .

[12]  Todd Sandler,et al.  Terrorists versus the Government , 2006 .

[13]  Navin A. Bapat State Bargaining with Transnational Terrorist Groups , 2006 .

[14]  Ethan Bueno de Mesquita The Quality of Terror , 2005 .

[15]  T. Sandler,et al.  Counterterrorism A Game-Theoretic Analysis , 2005 .

[16]  J. Victoroff The Mind of the Terrorist , 2005 .

[17]  Todd Sandler,et al.  The calculus of dissent: An analysis of terrorists' choice of targets , 1988, Synthese.

[18]  Claude Berrebi Evidence about the Link Between Education, Poverty and Terrorism among Palestinians , 2003 .

[19]  B. Frey,et al.  How to Fight Terrorism: Alternatives to Deterrence , 2003 .

[20]  R. Pape,et al.  The Strategic Logic of Suicide Terrorism , 2003, American Political Science Review.

[21]  Ahmad D. Alfarajat The International Terrorism , 2003 .

[22]  Margaret Wilson,et al.  Toward a Model of Terrorist Behavior in Hostage-Taking Incidents , 2000 .

[23]  Walter Enders,et al.  The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis , 1993, American Political Science Review.

[24]  Walter Enders,et al.  A time‐series analysis of transnational terrorism: Trends and cycles , 1992 .

[25]  R. J. Strong,et al.  Portfolio Construction, Management, and Protection , 1992 .

[26]  T. Anderson What Did We Know and When Did We Know It? GAO's Role in Analysis of the Savings and Loan Crisis , 1991, PS: Political Science & Politics.

[27]  Gabriel Weimann,et al.  The predictability of international terrorism: A time‐series analysis , 1988 .

[28]  Jack Meyer,et al.  Two Moment Decision Models And Expected Utility Maximization: Some Implications For Applied Research , 1988 .

[29]  Scott E. Atkinson,et al.  Terrorism in a Bargaining Framework , 1987, The Journal of Law and Economics.

[30]  H. Markowitz,et al.  Mean-Variance versus Direct Utility Maximization , 1984 .

[31]  T. Sandler,et al.  A Theoretical Analysis of Transnational Terrorism , 1983, American Political Science Review.

[32]  E. Elton Modern portfolio theory and investment analysis , 1981 .

[33]  Edward F. Mickolus,et al.  Transnational Terrorism: A Chronology of Events, 1968-1979. The Literature of Terrorism: A Selectively Annotated Bibliography , 1981 .

[34]  H. Levy,et al.  Approximating Expected Utility by a Function of Mean and Variance , 1979 .

[35]  W. Rasch,et al.  Psychological dimensions of political terrorism in the Federal Republic of Germany. , 1979, International journal of law and psychiatry.

[36]  William M. Landes,et al.  An Economic Study of U. S. Aircraft Hijacking, 1961-1976 , 1978, The Journal of Law and Economics.

[37]  David P. Baron,et al.  ON THE UTILITY THEORETIC FOUNDATIONS OF MEAN‐VARIANCE ANALYSIS , 1977 .

[38]  W. Landes,et al.  An Economic Study of U.S. Aircraft Hijacking, 1960-1976 , 1977 .

[39]  James A. Ohlson Quadratic Approximations of the Portfolio Selection Problem When the Means and Variances of Returns are Infinite , 1977 .

[40]  I. Ehrlich Participation in Illegitimate Activities: A Theoretical and Empirical Investigation , 1973, Journal of Political Economy.

[41]  Utility Implications of Portfolio Selection and Performance Appraisal Models , 1971 .