Politics and the Suboptimal Provision of Counterterror

I present a model of interactions between voters, a government, and a terrorist organization. The model focuses on a previously unexplored conceptualization of counterterrorism as divided into tactic-specific observable and general unobservable tactics. When there is divergence between voters and government preferences, strategic substitution among different modes of attack by terrorists and agency problems between the voters and government create a situation in which the politically optimal counterterrorism strategy pursued by the government in response to electoral and institutional incentives is quite different from the security maximizing counterterrorism strategy. In particular, in response to electoral pressure, the government allocates resources to observable counterterror in excess of the social optimum. This problem is particularly severe when governments put great weight on rent-seeking or care less about counterterror than do voters and when terrorists have a large set of tactics from which to choose. Voters can decrease the magnitude of the agency problem by increasing the benefits of reelection by, for example, slackening requirements for nonsecurity related public goods.I have received valuable comments and advice from Bruce Bueno de Mesquita, Randy Calvert, Martin Cripps, James Fearon, Amanda Friedenberg, Robert Powell, Matthew Stephenson, and Barbara Walter. I thank the Weidenbaum Center on the Economy, Government, and Public Policy at Washington University for financial support.

[1]  Todd Sandler,et al.  The calculus of dissent: An analysis of terrorists' choice of targets , 1988, Synthese.

[2]  M. Lichbach,et al.  Deterrence or Escalation? , 1987 .

[3]  David Austen-Smith,et al.  Electoral accountability and incumbency , 1989 .

[4]  Torsten Persson,et al.  Comparative Politics and Public Finance , 1997, Journal of Political Economy.

[5]  Cycles and Substitutions in Terrorist Activities: A Spectral Approach , 2007 .

[6]  B. Weingast,et al.  Vicious Cycles: Endogenous Political Extremism and Political Violence , 2000 .

[7]  Jack P. Gibbs,et al.  CONCEPTUALIZATION OF TERRORISM , 1989 .

[8]  Ethan Bueno de Mesquita,et al.  The Propaganda of the Deed: Terrorism, Counterterrorism, and Mobilization , 2022 .

[9]  Walter Enders,et al.  PATTERNS OF TRANSNATIONAL TERRORISM , 1970-99 : ALTERNATIVE TIME SERIES ESTIMATES by , 2002 .

[10]  J. Faria Terrorist Innovations and Anti-Terrorist Policies , 2006 .

[11]  Walter Enders,et al.  Patterns of Transnational Terrorism, 1970–1999: Alternative Time-Series Estimates , 2002, Transnational Terrorism.

[12]  R. Barro The control of politicians: An economic model , 1973 .

[13]  R. Powell Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.

[14]  T. Sandler,et al.  Global Terrorism: Deterrence Versus Pre-Emption , 2006 .

[15]  A. Edlin,et al.  Strict Monotonicity in Comparative Statics , 1998 .

[16]  Esteban F. Klor,et al.  On Terrorism and Electoral Outcomes , 2006 .

[17]  J. Ferejohn Incumbent performance and electoral control , 1986 .

[18]  Jennifer D. Kibbe The Rise of the Shadow Warriors , 2004 .

[19]  Walter Enders,et al.  The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis , 1993, American Political Science Review.

[20]  Ethan Bueno de Mesquita The Quality of Terror , 2005 .

[21]  T. Sandler,et al.  Too Much of a Good Thing? , 2004 .

[22]  Peter C. Ordeshook,et al.  Models of strategic choice in politics , 1989 .

[23]  Optimal Retrospective Voting , 2006 .

[24]  Walter Enders,et al.  UN Conventions, Technology and Retaliation in the Fight Against Terrorism: An Econometric Evaluation , 1990 .

[25]  Paul R. Milgrom,et al.  Multitask Principal–Agent Analyses: Incentive Contracts, Asset Ownership, and Job Design , 1991 .

[26]  Scott Ashworth Reputational Dynamics and Political Careers , 2005 .