Abstract
In a structure involving two independent terror outfits operating in a country, we study possible implications for counter-terrorism (CT) strategy in the presence and absence of operational externalities. Inter alia, the analysis suggests a possible explanation for the widespread application of defensive CT measures and the sparing use of offensive CT. But confidence-building measures come to be ineffective against resource-constrained outfits, irrespective of the nature and magnitude of externalities. Offensive measures against resource-abundant outfits, appear to be successful in reducing the total number of terror strikes only when strong negative externalities prevail.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs41775-019-00041-w/MediaObjects/41775_2019_41_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs41775-019-00041-w/MediaObjects/41775_2019_41_Fig2_HTML.png)
Similar content being viewed by others
Notes
See Arce and Sandler (2007) for a similar discussion in the context of the need for targeted countries to invest in their intelligence apparatus as an essential part of their counter-terrorism efforts.
Also called Islamic State of Iraq and the Levant (ISIL).
See Global Terrorism Database, Institute for Economics and Peace, (https://www.start.umd.edu/gtd/search/Results.aspx?start_yearonly=2007&end_yearonly=2014&start_year=&start_month=&start_day=&end_year=&end_month=&end_day=&asmSelect0=&asmSelect1=&perpetrator=399&perpetrator=407&dtp2=all&success=yes&casualties_type=b&casualties_max=).
The present analysis can be extended to the case of more than two outfits, without affecting the qualitative results of the paper.
This specification treats terrorism as an end in itself for the terror outfit, rather than the means to achieving some other goal. The implications cannot be too divorced from reality in a world which is witnessing increasing instances of religious fundamentalist ideology driven terror incidents. Also, the utility function is separable in its two arguments - Xi and Ai. This implies that the marginal utility with respect to either argument is independent of the other argument, which is reasonable to expect. For example, there is no reason as to why consuming more of another good would yield a higher or lower marginal utility from conducting a terror strike, and vice versa.
The numeraire good represents a basket of all goods other than terror strikes, the consumption of which provide utility to the terror outfit.
To keep matters simple, we abstract away from the issue of the “success” or “failure” of a terror attack, because it is often hard to define “success” and “failure” in this context. Our implicit assumption is that the cost of any terror attack is the same irrespective of whether it is successful or not.
These assumptions are fairly standard and reflect the increased difficulty in conducting each successive attack, due to the increased alertness and enhanced response of the governmental authorities and security forces after each successive terror strike. For a similar cost function, see Siqueira and Sandler (2008).
An interior optimum exists if and only if \( R_{i} \ge \beta_{i} C_{i} (A_{i} ),\,\forall i = 1,2 \), when Ai is chosen optimally.
We assume that the marginal cost of conducting an infinitesimal amount of terror activity is not prohibitively high. Formally, we assume \( - \,\beta_{i} C_{i}^{\prime } (0) + \alpha_{i} \nu_{i}^{\prime } (0) > 0 \). If this is not so, then we shall have a corner solution where all resources are optimally consumed and no attacks are conducted, thereby rendering the terrorism problem trivial. No “counter-terrorism strategy” would be required in this scenario.
An interior optimum exists if and only if in equilibrium neither outfit is resource-constrained, i.e., \( R_{i} \ge \beta_{i} C_{i} (A_{i} ,A_{j} ),\,\forall i = 1,2 \).
For instance, suppose βi= 1, i = 1, 2; \( \nu_{i} (A_{i} ) = A_{i} \), i = 1, 2; and \( C_{i} (A_{i} ,A_{j} ) = \frac{1}{\gamma }A_{i}^{\gamma } A_{j}^{\sigma } ,\,\,\gamma > 1 \) and \( \gamma - 1 > |\sigma | \). Then all the relevant conditions are satisfied.
For this, Tj’s reaction function must be steep enough, in particular, \( \left| {\frac{{dA_{j} }}{{dA_{i} }}} \right| > 1 \).
This involves increasing the security levels of potential targets or enhancing surveillance, etc., thereby rendering these targets more difficult or costly for a terror outfit to attack.
These details are as mentioned by the Indian Director General of Military Operations (DGMO), in the immediate aftermath of the surgical strikes.
On the other hand, localized or tactical pre-emptive actions do not usually create any major dent in the resources available with terror outfits, and fall under the category of the afore-discussed defensive CT measures.
See Mesquita (2005) for a formal explanation of the causes of terrorist backlash.
References
Acharya, D. (2014). Assam live: security forces, NDFB(S) encounter in Chirang along India-Bhutan border. Firstpost. http://www.firstpost.com/india/assam-live-security-forces-ndfbs-encounter-in-chirang-along-india-bhutan-border-2013001.html. Accessed 26 Dec 2014.
Anderton, C. H., & Carter, J. R. (2006). Applying intermediate microeconomics to terrorism. Journal of Economic Education, 37(4), 442–458.
Arce, D. G., & Sandler, T. (2005). Counterterrorism: A game-theoretic analysis. Journal of Conflict Resolution, 49(2), 183–200.
Arce, D. G., & Sandler, T. (2007). Terrorist signalling and the value of intelligence. British Journal of Political Science, 37(4), 573–586.
Aronson, S. L. (2014). AQIM’s threat to western interests in the Sahel. Combating Terrorism Center. https://www.ctc.usma.edu/posts/aqims-threat-to-western-interests-in-the-sahel. Accessed 28 Apr 2014.
Calica, A. (2007). Defeating Abu Sayyaf is biggest contribution to world security. Philstar headlines.
Das, S. P., & Roy Chowdhury, P. (2014). Deterrence, preemption and panic: A common-enemy problem of terrorism. Economic Enquiry, 52(1), 219–238.
Enders, W., & Jindapon, P. (2010). Network externalities and the structure of terror networks. Journal of Conflict Resolution, 54(2), 262–280.
Faria, J. R., Silva, E. C. D., Arce, D. G. (2013). Terrorism and counterterrorism: History dependence, spillovers and coordination failures. Alberta School of Business research paper no. 2013-1313.
Hancock, R. (2015). Putting the ISIS & Al-Qaeda rivalry into context. Muftah. http://www.muftah.org/putting-isis-al-qaeda-rivalry/#.VuCEMOq6bqB. Accessed 4 Mar 2015.
Karam, Z. (2014). Hezbollah tells Israel: Continuing in Gaza is suicide. Business insider. http://www.businessinsider.com/hezbollah-hamas-israel-gaza-war-2014-7?IR=T. Accessed 25 July 2014.
Kronk, H. (2015). Al-Qaeda responds to ISIS, escalates Jihadist rivalry. HNGN. http://www.hngn.com/articles/163980/20151227/al-qaeda-responds-isis-escalates-jihadist-rivalry.htm#ic-nav. Accessed 27 Dec 2015.
Mesquita, E. B. (2005). Conciliation, commitment, and counter-terrorism: A formal model. International Organization, 59, 145–176.
Sandler, T., & Siqueira, K. (2006). Global terrorism: Deterrence versus pre-emption. Canadian Journal of Economics, 39(4), 1370–1387.
Siqueira, K., & Sandler, T. (2007). Terrorist backlash, terrorist mitigation, and policy delegation. Journal of Public Economics, 91(9), 1800–1815.
Siqueira, K., & Sandler, T. (2008). Defensive counterterrorism measures and domestic politics. Defence and Peace Economics, 19(6), 405–413.
Acknowledgements
Authors would like to thank an anonymous referee of this journal for valuable comments and suggestions. However, errors, if any are their responsibility.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
On behalf of all authors, the corresponding author states that there is no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix 1
\( T_{i} \)’s optimization problem is to maximize its utility (1), with respect to its resource constraint (5), and non-negativity constraints \( X_{i} \ge 0 \) and \( A_{i} \ge 0 \). This is equivalent to the unconstrained maximization of the Lagrangean function:
where \( \lambda \), \( \gamma \) and \( \mu \) are non-negative Lagrangean multipliers.
Solving the FOCs, the slope for the reaction function can be obtained as:
where \( \gamma = 0 \) when the resource constraint (5) is not binding, and \( \gamma > 0 \) when (5) is binding. Invoking Eq. (8), the result follows. Q.E.D.
Appendix 2
In this scenario, \( T_{i} \)’s budget constraint is given by Eq. (2). However, its utility is:
\( T_{i} \)’s optimization problem is to maximize its utility (17) subject to its budget constraint (2). Substituting \( X_{i} \) in (17) using (2), we can rewrite the utility maximization problem as:
If an interior optimum exists, the first-order condition (FOC) is:
From (17), the best-response (or reaction) function of each outfit \( i( \ne j = 1,2) \), \( A_{i} = A_{i} (A_{j} ) \), can be obtained. Also, along the reaction function, \( \frac{{{\text{d}}A_{i} }}{{{\text{d}}A_{j} }} = \alpha_{i} \frac{{\frac{{\partial^{2} v_{i} }}{{\partial A_{i} \partial A_{j} }}}}{{\beta_{i} C_{i}^{\prime \prime } - \alpha_{i} \frac{{\partial^{2} v_{i} }}{{\partial A_{i}^{2} }}}} \). The SOC ensures that the denominator is positive. Therefore, the reaction functions are positively (negatively) sloped if \( \frac{{\partial^{2} v_{i} }}{{\partial A_{i} \partial A_{j} }} > 0 \) (< \( 0 \)), i.e., if an outfits’s terror activities impose a positive (negative) externality on the utility of the other outfit’s terror activities. In this case, the numbers of attacks conducted by the outfits are strategic complements (substitutes). Q.E.D.
Appendix 3
Differentiating the FOCs for \( T_{i} \) [given by Eq. (7)] and \( T_{j} \) [obtained by interchanging subscripts \( i \) and \( j \) in Eq. (7)] with respect to \( \alpha_{i} \) (\( i \ne j = 1,2 \)), and solving the resulting pair of Equations, we obtain
invoking the SOC, Eqs. (1) and (9). Under positive externalities,
Obviously, the total number of attacks also increases if \( \alpha_{i} \) increases, since
In the context of \( \beta_{i} \) (\( i \ne j = 1,2 \)), Eq. (7) can similarly be utilized to obtain
And under positive externalities,
Obviously, the total number of attacks also decreases if \( \beta_{i} \) increases, since
Lastly, for (\( i \ne j = 1,2 \)), \( \frac{{{\text{d}}A_{i}^{*} }}{{{\text{d}}R_{i} }} = \frac{{{\text{d}}A_{j}^{*} }}{{{\text{d}}R_{i} }} = \frac{{{\text{d}}(A_{i}^{*} + A_{j}^{*} )}}{{{\text{d}}R_{i} }} = 0 \). Q.E.D.
Rights and permissions
About this article
Cite this article
Bhan, A., Kabiraj, T. Operational externalities and counter-terrorism. Ind. Econ. Rev. 54, 171–187 (2019). https://doi.org/10.1007/s41775-019-00041-w
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41775-019-00041-w
Keywords
- Terrorist outfit
- Operational externalities
- Counter-terrorism
- Offensive and defensive measures
- Confidence-building measures