The timing and deterrence of terrorist attacks due to exogenous dynamics

In this paper, we develop a model for the timing and deterrence of terrorist attacks due to exogenous dynamics. The defender moves first and the attacker second in a two-stage game which is repeated over T periods. We study the effects of dynamics of several critical components of counter-terrorism games, including the unit defence costs (eg, immediately after an attack, the defender would easily acquire defensive funding), unit attack costs (eg, the attacker may accumulate resources as time goes), and the asset valuation (eg, the asset valuation may change over time). We study deterministic dynamics and conduct simulations using random dynamics. We determine the timing of terrorist attacks and how these can be deterred.

[1]  M. Naceur Azaiez,et al.  Game Theoretic Risk Analysis of Security Threats , 2009 .

[2]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[3]  Kjell Hausken,et al.  Defending Against a Terrorist Who Accumulates Resources , 2011 .

[4]  Luciano Telesca,et al.  Are global terrorist attacks time-correlated? , 2006 .

[5]  R. Zeckhauser,et al.  The Ecology of Terror Defense , 2003 .

[6]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[7]  Gustav Feichtinger,et al.  Terror and Counterterror Operations: Differential Game with Cyclical Nash Solution , 2008 .

[8]  Andrew Silke,et al.  Research on Terrorism: Trends, Achievements and Failures , 2003 .

[9]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[10]  Kjell Hausken,et al.  Governments' and Terrorists' Defense and Attack in a T-Period Game , 2011, Decis. Anal..

[11]  George Leitmann,et al.  A DYNAMICAL MODEL OF TERRORISM , 2006 .

[12]  S. Skaperdas Contest success functions , 1996 .

[13]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[14]  Todd Sandler,et al.  Games and Terrorism , 2009 .

[15]  R. Tollison,et al.  Toward a theory of the rent-seeking society , 1982 .

[16]  Oded Berman,et al.  Location of terror response facilities: A game between state and terrorist , 2007, Eur. J. Oper. Res..

[17]  G. Tullock Efficient Rent Seeking , 2001 .

[18]  T. Sandler,et al.  What do we know about the substitution effect in transnational terrorism , 2003 .

[19]  A. Clauset,et al.  On the Frequency of Severe Terrorist Events , 2006, physics/0606007.

[20]  Walter Enders,et al.  After 9/11 , 2005, Transnational Terrorism.

[21]  Luis A. Gil-Alana,et al.  The timing of ETA terrorist attacks , 2006 .

[22]  Claude Berrebi,et al.  HOW DOES TERRORISM RISK VARY ACROSS SPACE AND TIME? AN ANALYSIS BASED ON THE ISRAELI EXPERIENCE , 2006 .

[23]  J. Atsu Amegashie,et al.  A contest success function with a tractable noise parameter , 2003 .

[24]  Kjell Hausken,et al.  Whether to attack a terrorist's resource stock today or tomorrow , 2008, Games Econ. Behav..

[25]  Subhayu Bandyopadhyay,et al.  The Interplay between Preemptive and Defensive Counterterrorism Measures: A Two‐Stage Game , 2008 .

[26]  Kjell Hausken,et al.  Protection vs. redundancy in homogeneous parallel systems , 2008, Reliab. Eng. Syst. Saf..

[27]  Kjell Hausken,et al.  Defending Against Terrorism, Natural Disaster, and All Hazards , 2009 .

[28]  Stanislaw Raczynski Simulation of The Dynamic Interactions Between Terror and Anti-Terror Organizational Structures , 2004, J. Artif. Soc. Soc. Simul..