Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection - A Three-Stage Game

Deterring the smuggling of nuclear weapons in container freight is critical. Previous work has suggested that such deterrence could be achieved by retaliation threats and partial inspection. However, pre-event declared retaliation threats may not be credible, causing the desired deterrence not to be achieved. In this paper, we extend and complement the work of Haphuriwat et al. (2011) to model credible retaliation threats in a three-stage game, by introducing two additional decision variables and five additional parameters. Our results suggest that noncredible retaliation could be at equilibrium when the reputation loss is low, the reward from the public for retaliation is low, or the costs of retaliation are high. When the declared retaliations are noncredible, we quantitatively show that a higher inspection level would be required to deter nuclear smuggling than would be needed if retaliation threats are always credible. This paper provides additional quantitative insights on the decision-making process for container screening to deter nuclear smuggling.

[1]  J. Frey The 9/11 Commission Report: Final Report of the National Commission on Terrorist attacks upon the United States , 2004 .

[2]  Xiaojun Shan,et al.  Subsidizing to disrupt a terrorism supply chain—a four-player game , 2014, J. Oper. Res. Soc..

[3]  A. Dixit,et al.  Thinking Strategically: The Competitive Edge in Business, Politics, and Everyday Life , 1991 .

[4]  Colin Camerer Behavioral Game Theory: Experiments in Strategic Interaction , 2003 .

[5]  Ralph L Keeney,et al.  Modeling Values for Anti‐Terrorism Analysis , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[6]  A. Dixit,et al.  Thinking Strategically: The Competitive Edge in Business, Politics, and Everyday Life , 1991 .

[7]  Jun Zhuang,et al.  Balancing congestion and security in the presence of strategic applicants with private information , 2011, Eur. J. Oper. Res..

[8]  R. Axelrod,et al.  The Complexity of Cooperation: Agent-Based Models of Competition and Collaboration , 1998 .

[9]  Ralph L Keeney,et al.  A Value Model for Evaluating Homeland Security Decisions , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[10]  Vicki M. Bier,et al.  Deterring the Smuggling of Nuclear Weapons in Container Freight Through Detection and Retaliation , 2011, Decis. Anal..

[11]  Victor Richmond R. Jose,et al.  The use of games in modeling the relationship between an attacker and a defender Technology Adoption , Accumulation , and Competition in Multi-period Attacker-Defender Games , .

[12]  ปิยดา สมบัติวัฒนา Behavioral Game Theory: Experiments in Strategic Interaction , 2013 .

[13]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[14]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[15]  R. Powell Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.

[16]  T. Sandler,et al.  Terrorism & Game Theory , 2003 .

[17]  Kjell Hausken,et al.  The timing and deterrence of terrorist attacks due to exogenous dynamics , 2012, J. Oper. Res. Soc..

[18]  Vicki M. Bier,et al.  Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks , 2011, Ann. Oper. Res..

[19]  Jun Zhuang,et al.  Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[20]  Jr. Louis Anthony Cox,et al.  Game Theory and Risk Analysis , 2009 .

[21]  Rong Yang,et al.  Improving resource allocation strategies against human adversaries in security games: An extended study , 2013, Artif. Intell..

[22]  Jun Zhuang,et al.  Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker , 2013, Risk analysis : an official publication of the Society for Risk Analysis.

[23]  Rae Zimmerman,et al.  Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[24]  Avery E. Goldstein,et al.  Deterrence and Security in the 21st Century: China, Britain, France, and the Enduring Legacy of the Nuclear Revolution , 2001 .

[25]  Xiaojun Shan,et al.  Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game , 2013, Eur. J. Oper. Res..

[26]  Anthony Michael Barrett,et al.  Cost Effectiveness of On-Site Chlorine Generation for Chlorine Truck Attack Prevention , 2010, Decis. Anal..

[27]  Eliot Marshall Parsing terrorism. , 2012, Science.

[28]  Thomas C. Schelling,et al.  Choice and Consequence , 1984 .

[29]  Jason R. W. Merrick,et al.  Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile? , 2010, Decis. Anal..

[30]  Robert F. Trager,et al.  Deterring Terrorism: It Can Be Done , 2005, International Security.

[31]  David Ríos Insua,et al.  Adversarial Risk Analysis: The Somali Pirates Case , 2012, Decis. Anal..

[32]  Niyazi Onur Bakir A Decision Tree Model for Evaluating Countermeasures to Secure Cargo at United States Southwestern Ports of Entry , 2008, Decis. Anal..

[33]  Seth D. Guikema,et al.  Robust Adversarial Risk Analysis: A Level-k Approach , 2012, Decis. Anal..

[34]  Huseyin Cavusoglu,et al.  Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches , 2004, Decis. Anal..

[35]  Jeffrey W. Knopf,et al.  The Fourth Wave in Deterrence Research , 2010 .

[36]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[37]  David P. Morton,et al.  Models for nuclear smuggling interdiction , 2007 .

[38]  J. Neumann,et al.  Prisoner's Dilemma , 1993 .

[39]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[40]  Kenneth E. Train,et al.  Discrete Choice Methods with Simulation , 2016 .

[41]  Kjell Hausken,et al.  Governments' and Terrorists' Defense and Attack in a T-Period Game , 2011, Decis. Anal..

[42]  K. Train Discrete Choice Methods with Simulation , 2003 .

[43]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[44]  Kevin Chlebik Terrorism and Game Theory: From the Terrorists’ Point of View , 2010 .

[45]  T. Schelling Arms and In# uence , 2008 .

[46]  John R Hall The elephant in the room is called game theory. , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[47]  Chen Wang,et al.  Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility , 2011, Decis. Anal..

[48]  David M. Kreps,et al.  Game Theory and Economic Modelling , 1992 .

[49]  Jun Zhuang,et al.  Robustness of Optimal Defensive Resource Allocations in the Face of Less Fully Rational Attacker , 2009 .

[50]  W. M. Reisman,et al.  Arms and Influence. , 1967, American Journal of International Law.

[51]  A. Colman,et al.  The complexity of cooperation: Agent-based models of competition and collaboration , 1998, Complex..

[52]  Graham Allison,et al.  Nuclear Terrorism: The Ultimate Preventable Catastrophe , 2004 .