Skip to main content

Advertisement

Log in

Operational externalities and counter-terrorism

  • Article
  • Published:
Indian Economic Review Aims and scope Submit manuscript

Abstract

In a structure involving two independent terror outfits operating in a country, we study possible implications for counter-terrorism (CT) strategy in the presence and absence of operational externalities. Inter alia, the analysis suggests a possible explanation for the widespread application of defensive CT measures and the sparing use of offensive CT. But confidence-building measures come to be ineffective against resource-constrained outfits, irrespective of the nature and magnitude of externalities. Offensive measures against resource-abundant outfits, appear to be successful in reducing the total number of terror strikes only when strong negative externalities prevail.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Notes

  1. See Arce and Sandler (2007) for a similar discussion in the context of the need for targeted countries to invest in their intelligence apparatus as an essential part of their counter-terrorism efforts.

  2. Also called Islamic State of Iraq and the Levant (ISIL).

  3. See Hancock (2015) and Kronk (2015).

  4. See Global Terrorism Database, Institute for Economics and Peace, (https://www.start.umd.edu/gtd/search/Results.aspx?start_yearonly=2007&end_yearonly=2014&start_year=&start_month=&start_day=&end_year=&end_month=&end_day=&asmSelect0=&asmSelect1=&perpetrator=399&perpetrator=407&dtp2=all&success=yes&casualties_type=b&casualties_max=).

  5. The present analysis can be extended to the case of more than two outfits, without affecting the qualitative results of the paper.

  6. This specification treats terrorism as an end in itself for the terror outfit, rather than the means to achieving some other goal. The implications cannot be too divorced from reality in a world which is witnessing increasing instances of religious fundamentalist ideology driven terror incidents. Also, the utility function is separable in its two arguments - Xi and Ai. This implies that the marginal utility with respect to either argument is independent of the other argument, which is reasonable to expect. For example, there is no reason as to why consuming more of another good would yield a higher or lower marginal utility from conducting a terror strike, and vice versa.

  7. The numeraire good represents a basket of all goods other than terror strikes, the consumption of which provide utility to the terror outfit.

  8. To keep matters simple, we abstract away from the issue of the “success” or “failure” of a terror attack, because it is often hard to define “success” and “failure” in this context. Our implicit assumption is that the cost of any terror attack is the same irrespective of whether it is successful or not.

  9. These assumptions are fairly standard and reflect the increased difficulty in conducting each successive attack, due to the increased alertness and enhanced response of the governmental authorities and security forces after each successive terror strike. For a similar cost function, see Siqueira and Sandler (2008).

  10. An interior optimum exists if and only if \( R_{i} \ge \beta_{i} C_{i} (A_{i} ),\,\forall i = 1,2 \), when Ai is chosen optimally.

  11. We assume that the marginal cost of conducting an infinitesimal amount of terror activity is not prohibitively high. Formally, we assume \( - \,\beta_{i} C_{i}^{\prime } (0) + \alpha_{i} \nu_{i}^{\prime } (0) > 0 \). If this is not so, then we shall have a corner solution where all resources are optimally consumed and no attacks are conducted, thereby rendering the terrorism problem trivial. No “counter-terrorism strategy” would be required in this scenario.

  12. An interior optimum exists if and only if in equilibrium neither outfit is resource-constrained, i.e., \( R_{i} \ge \beta_{i} C_{i} (A_{i} ,A_{j} ),\,\forall i = 1,2 \).

  13. For instance, suppose βi= 1, i = 1, 2; \( \nu_{i} (A_{i} ) = A_{i} \), i = 1, 2; and \( C_{i} (A_{i} ,A_{j} ) = \frac{1}{\gamma }A_{i}^{\gamma } A_{j}^{\sigma } ,\,\,\gamma > 1 \) and \( \gamma - 1 > |\sigma | \). Then all the relevant conditions are satisfied.

  14. For this, Tj’s reaction function must be steep enough, in particular, \( \left| {\frac{{dA_{j} }}{{dA_{i} }}} \right| > 1 \).

  15. This involves increasing the security levels of potential targets or enhancing surveillance, etc., thereby rendering these targets more difficult or costly for a terror outfit to attack.

  16. These details are as mentioned by the Indian Director General of Military Operations (DGMO), in the immediate aftermath of the surgical strikes.

  17. On the other hand, localized or tactical pre-emptive actions do not usually create any major dent in the resources available with terror outfits, and fall under the category of the afore-discussed defensive CT measures.

  18. See Mesquita (2005) for a formal explanation of the causes of terrorist backlash.

References

Download references

Acknowledgements

Authors would like to thank an anonymous referee of this journal for valuable comments and suggestions. However, errors, if any are their responsibility.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tarun Kabiraj.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix 1

\( T_{i} \)’s optimization problem is to maximize its utility (1), with respect to its resource constraint (5), and non-negativity constraints \( X_{i} \ge 0 \) and \( A_{i} \ge 0 \). This is equivalent to the unconstrained maximization of the Lagrangean function:

$$ L = X_{i} + \alpha_{i} v_{i} (A_{i} ) + \lambda \{ R_{i} - X_{i} - \beta_{i} C_{i} (A_{i} ,A_{j} )\} + \gamma X_{i} + \mu A_{i} , $$
(15)

where \( \lambda \), \( \gamma \) and \( \mu \) are non-negative Lagrangean multipliers.

Solving the FOCs, the slope for the reaction function can be obtained as:

$$ \frac{{{\text{d}}A_{i} }}{{{\text{d}}A_{j} }} = - \,\beta_{i} \frac{{\frac{{\partial^{2} C_{i} }}{{\partial A_{i} \partial A_{j} }}}}{{\beta_{i} \frac{{\partial^{2} C_{i} }}{{\partial A_{i}^{2} }} - \frac{1}{1 + \gamma }\alpha_{i} v_{i}^{\prime \prime } }}, $$
(16)

where \( \gamma = 0 \) when the resource constraint (5) is not binding, and \( \gamma > 0 \) when (5) is binding. Invoking Eq. (8), the result follows. Q.E.D.

Appendix 2

In this scenario, \( T_{i} \)’s budget constraint is given by Eq. (2). However, its utility is:

$$ U_{i} = X_{i} + \alpha_{i} v_{i} (A_{i,} A_{j} ),\quad \frac{{\partial v_{i} (A_{i} ,A_{j} )}}{{\partial A_{i} }} > 0,\quad \frac{{\partial^{2} v_{i} (A_{i} , A_{j} )}}{{\partial A_{i}^{2} }} \le 0,\quad \forall A_{i} ,A_{j} \ge 0, $$
(17)

\( T_{i} \)’s optimization problem is to maximize its utility (17) subject to its budget constraint (2). Substituting \( X_{i} \) in (17) using (2), we can rewrite the utility maximization problem as:

$$ {\text{Max}}_{{A_{i} }} U_{i} = R_{i} - \beta_{i} C_{i} (A_{i} ) + \alpha_{i} v_{i} (A_{i} ,A_{j} ). $$
(18)

If an interior optimum exists, the first-order condition (FOC) is:

$$ - \,\beta_{i} C_{i}^{\prime } (A_{i} ) + \alpha_{i} \frac{{\partial v_{i} (A_{i} ,A_{j} )}}{{\partial A_{i} }} = 0. $$
(19)

From (17), the best-response (or reaction) function of each outfit \( i( \ne j = 1,2) \), \( A_{i} = A_{i} (A_{j} ) \), can be obtained. Also, along the reaction function, \( \frac{{{\text{d}}A_{i} }}{{{\text{d}}A_{j} }} = \alpha_{i} \frac{{\frac{{\partial^{2} v_{i} }}{{\partial A_{i} \partial A_{j} }}}}{{\beta_{i} C_{i}^{\prime \prime } - \alpha_{i} \frac{{\partial^{2} v_{i} }}{{\partial A_{i}^{2} }}}} \). The SOC ensures that the denominator is positive. Therefore, the reaction functions are positively (negatively) sloped if \( \frac{{\partial^{2} v_{i} }}{{\partial A_{i} \partial A_{j} }} > 0 \) (< \( 0 \)), i.e., if an outfits’s terror activities impose a positive (negative) externality on the utility of the other outfit’s terror activities. In this case, the numbers of attacks conducted by the outfits are strategic complements (substitutes). Q.E.D.

Appendix 3

Differentiating the FOCs for \( T_{i} \) [given by Eq. (7)] and \( T_{j} \) [obtained by interchanging subscripts \( i \) and \( j \) in Eq. (7)] with respect to \( \alpha_{i} \) (\( i \ne j = 1,2 \)), and solving the resulting pair of Equations, we obtain

$$ \frac{{{\text{d}}A_{i}^{*} }}{{{\text{d}}\alpha_{i} }} = - \frac{{v_{i}^{\prime } \left( {\alpha_{j} v_{j}^{\prime \prime } - \beta_{j} \frac{{\partial^{2} C_{j} }}{{\partial A_{j}^{2} }}} \right)}}{H} > 0, $$
(20)

invoking the SOC, Eqs. (1) and (9). Under positive externalities,

$$ \frac{{{\text{d}}A_{j}^{*} }}{{{\text{d}}\alpha_{i} }} = - \,\beta_{j} v_{i}^{\prime } \frac{{\frac{{\partial^{2} C_{j} }}{{\partial A_{j} \partial A_{i} }}}}{H} > 0. $$
(21)

Obviously, the total number of attacks also increases if \( \alpha_{i} \) increases, since

$$ \frac{{{\text{d}}(A_{i}^{*} + A_{j}^{*} )}}{{{\text{d}}\alpha_{i} }} = - \frac{{v_{i}^{\prime } \left( {\alpha_{j} v_{j}^{\prime \prime } - \beta_{j} \frac{{\partial^{2} C_{j} }}{{\partial A_{j}^{2} }}} \right) + \frac{{\partial^{2} C_{j} }}{{\partial A_{j} \partial A_{i} }}}}{H} > 0. $$
(22)

In the context of \( \beta_{i} \) (\( i \ne j = 1,2 \)), Eq. (7) can similarly be utilized to obtain

$$ \frac{{{\text{d}}A_{i}^{*} }}{{{\text{d}}\beta_{i} }} = - \frac{{\left( {\alpha_{j} v_{j}^{\prime \prime } - \beta_{j} \frac{{\partial^{2} C_{j} }}{{\partial A_{j}^{2} }}} \right)\frac{{\partial C_{i} }}{{\partial A_{i} }}}}{H} < 0. $$
(23)

And under positive externalities,

$$ \frac{{{\text{d}}A_{j}^{*} }}{{{\text{d}}\beta_{i} }} = \beta_{j} \frac{{\frac{{\partial^{2} C_{j} }}{{\partial A_{j} \partial A_{i} }}\frac{{\partial C_{i} }}{{\partial A_{i} }}}}{H} < 0. $$
(24)

Obviously, the total number of attacks also decreases if \( \beta_{i} \) increases, since

$$ \frac{{{\text{d}}(A_{i}^{*} + A_{j}^{*} )}}{{{\text{d}}\beta_{i} }} = - \frac{{\left( {\alpha_{j} v_{j}^{\prime \prime } - \beta_{j} \frac{{\partial^{2} C_{j} }}{{\partial A_{j}^{2} }}} \right)\frac{{\partial C_{i} }}{{\partial A_{i} }} + \frac{{\partial^{2} C_{j} }}{{\partial A_{j} \partial A_{i} }}\frac{{\partial C_{i} }}{{\partial A_{i} }}}}{H} > 0. $$
(25)

Lastly, for (\( i \ne j = 1,2 \)), \( \frac{{{\text{d}}A_{i}^{*} }}{{{\text{d}}R_{i} }} = \frac{{{\text{d}}A_{j}^{*} }}{{{\text{d}}R_{i} }} = \frac{{{\text{d}}(A_{i}^{*} + A_{j}^{*} )}}{{{\text{d}}R_{i} }} = 0 \). Q.E.D.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bhan, A., Kabiraj, T. Operational externalities and counter-terrorism. Ind. Econ. Rev. 54, 171–187 (2019). https://doi.org/10.1007/s41775-019-00041-w

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41775-019-00041-w

Keywords

JEL Classification

Navigation