Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort

In this paper, we apply game theory to identify equilibrium strategies for both attacker and defender in a fully endogenous model of resource allocation for countering terrorism and natural disasters. The key features of our model include balancing protection from terrorism and natural disasters, and describing the attacker choice by a continuous level of effort rather than a discrete choice (i.e., attack or not). Interestingly, in a sequential game, increased defensive investment can lead an attacker to either increase his level of effort (to help compensate for the reduced probability of damage from an attack), or decrease his level of effort (because attacking has become less profitable). This can either reduce or increase the effectiveness of investments in protection from intentional attack, and can therefore affect the relative desirability of investing in protection from natural disasters.

[1]  T. Sandler,et al.  Too Much of a Good Thing? , 2004 .

[2]  Bruno S. Frey,et al.  Decentralization as a disincentive for terror , 2004 .

[3]  Vicki M. Bier,et al.  Subsidized Security and Stability of Equilibrium Solutions in an N-Player Game with Errors ⁄ , 2006 .

[4]  T. Sandler,et al.  Global Terrorism: Deterrence Versus Pre-Emption , 2006 .

[5]  Vicki M. Bier,et al.  Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..

[6]  Kai A. Konrad The Investment Problem in Terrorism , 2004 .

[7]  M. Naceur Azaiez,et al.  Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..

[8]  Ian Bellany Superpower games: applying game theory to superpower conflict , 1986 .

[9]  Robert Powell,et al.  Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.

[10]  R. Zeckhauser,et al.  The Ecology of Terror Defense , 2003 .

[11]  Gerard Debreu,et al.  A Social Equilibrium Existence Theorem* , 1952, Proceedings of the National Academy of Sciences.

[12]  Bernard Harris Mathematical Methods in Combating Terrorism , 2002 .

[13]  Todd Sandler,et al.  The calculus of dissent: An analysis of terrorists' choice of targets , 1988, Synthese.

[14]  Harvey E. Lapan,et al.  To Bargain or Not to Bargain: That is the Question , 1988 .

[15]  I. Glicksberg A FURTHER GENERALIZATION OF THE KAKUTANI FIXED POINT THEOREM, WITH APPLICATION TO NASH EQUILIBRIUM POINTS , 1952 .

[16]  J. Tirole The Theory of Industrial Organization , 1988 .

[17]  E. Maskin,et al.  The Existence of Equilibrium in Discontinuous Economic Games, I: Theory , 1986 .

[18]  J. Hirshleifer Conflict and rent-seeking success functions: Ratio vs. difference models of relative success , 1989 .

[19]  G. Beitel,et al.  Balanced Scorecard Method For Predicting TheProbability Of A Terrorist Attack , 2004 .

[20]  John A. Major Advanced Techniques for Modeling Terrorism Risk , 2002 .

[21]  R. Powell Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.

[22]  Huseyin Cavusoglu,et al.  Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches , 2004, Decis. Anal..

[23]  Ethan Bueno de Mesquita Conciliation, Counterterrorism, and Patterns of Terrorist Violence , 2005, International Organization.

[24]  Ethan Bueno de Mesquita The Terrorist Endgame , 2005 .

[25]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[26]  Todd Sandler,et al.  Terrorists versus the Government , 2006 .

[27]  Vicki M. Bier,et al.  Game-Theoretic and Reliability Methods in Counterterrorism and Security , 2006 .

[28]  James H. Clifford,et al.  Protecting the American Homeland: A Preliminary Analysis , 2003 .

[29]  Bernard Harris Mathematical methods in combatting terrorism. , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[30]  C. Perrow Shrink the Targets , 2006, IEEE Spectrum.

[31]  Herschel I. Grossman,et al.  Swords or Plowshares? A Theory of the Security of Claims to Property , 1995, Journal of Political Economy.

[32]  T. Sandler,et al.  Terrorism & Game Theory , 2003 .

[33]  B. Frey,et al.  How to Fight Terrorism: Alternatives to Deterrence , 2003 .

[34]  V. Bier Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[35]  Seth D. Guikema,et al.  Game Theory Models of Intelligent Actors in Reliability Analysis: An Overview of the State of the Art , 2009 .

[36]  G. Woo Quantitative Terrorism Risk Assessment , 2002 .

[37]  Ethan Bueno de Mesquita The Terrorist Endgame , 2005 .

[38]  Scott Farrow,et al.  THE ECONOMICS OF HOMELAND SECURITY EXPENDITURES: FOUNDATIONAL EXPECTED COST‐EFFECTIVENESS APPROACHES , 2007 .

[39]  K. Fan Fixed-point and Minimax Theorems in Locally Convex Topological Linear Spaces. , 1952, Proceedings of the National Academy of Sciences of the United States of America.

[40]  Huseyin Cavusoglu,et al.  The Value of Intrusion Detection Systems in Information Technology Security Architecture , 2005, Inf. Syst. Res..

[41]  D. B. Montgomery,et al.  First‐mover advantages , 1988 .

[42]  S. Skaperdas Contest success functions , 1996 .

[43]  J. Frey The 9/11 Commission Report: Final Report of the National Commission on Terrorist attacks upon the United States , 2004 .

[44]  Peter R. Orszag,et al.  Protecting the American Homeland: A Preliminary Analysis , 2002 .

[45]  Vicki M. Bier,et al.  Subsidies in Interdependent Security With Heterogeneous Discount Rates , 2007 .