Skip to main content
Log in

Intertemporal Versus Spatial Externalities in Counterterror Policy Games

  • Published:
Dynamic Games and Applications Aims and scope Submit manuscript

Abstract

This paper studies a dynamic game between two national governments that fight a common terrorist organization that is seeking to mount a transnational terror campaign. It is the first examination that combines the temporal externalities associated with a sustained campaign with the spatial externalities that occur when the effects of one government’s counterterror policy spill over into another country. We consider two types of noncooperative behavior; one in which national authorities are sensitive to the reactions of the terrorists on foreign soil and another in which they are insensitive. It is shown that foreign terrorist sensitivity is preferred to insensitivity. Moreover, unilaterally accounting for terrorist reactions on foreign soil can be preferred to full policy coordination between governments. This then feeds into policy recommendations as to when each nation finds it desirable to coordinate transnational counterterror policy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. In this sense, our model is consistent with economic models of habit formation (see, e.g., [6, 10, 11, 17, 29, 36]). See also Rozen [35].

  2. No a priori assumptions are made, however, about the existence of first- or second-mover advantages.

  3. See also Das [16] for a model of terrorist cycles. Behrens et al. [7] examine a Stackelberg dynamic game of international terrorism.

  4. In addition, an attack such as the Black September kidnaping of Israeli athletes at the 1972 Munich Olympic Games would qualify as a success even though few terrorists (and no athletes) survived. It certainly brought the cause of the Palestinians to prominence. By contrast, the successful extraction of hostages in a skyjacking [such as Lufthansa flight 181 during 1977 or Air France Flight 139 in 1976 (the Raid on Entebbe)] would not be deemed as a success because interventions such as these typically encourage other nations to develop similar highly trained rescue teams in order to credibly commit to a policy of no negotiation in future skyjackings.

  5. In the games examined below, the terrorist organization makes its decisions after it observes governmental policy commitments. It is, therefore, able to calculate whether it is optimal to supply attacks in any given period.

  6. Alternatively, one can assume that the government announces the counterterrorism effort rates, \(\left\{ {\varphi _t } \right\} _{t=0,\ldots ,\infty }\). Since \(g_t =\varphi _t a_t \) for \(\forall t\), this alternative game yields the same subgame-perfect Nash equilibrium as the one examined in the text. It is more convenient to treat the effort levels rather than the effort rates as the variables controlled by the government.

  7. Our analysis focuses on the steady state because it is the usual way to carry out the comparative statics analysis for stable equilibria according to Samuelson’s correspondence principle. One can also analyze the path and speed of convergence to the steady- state equilibrium (see Footnote 11).

  8. Dynamic optimization in discrete time methods can be found in macroeconomic textbooks such as Obstfeld and Rogoff [32, Chapter 2] as well as in environmental economics textbooks, e.g., Conrad [12, Chapter 1]. Euler equations are the basic first-order necessary conditions in the calculus of variations. It is worth noting that one of the most common methods to analyze convergence paths and speed to the steady state is through log-linearization method of the dynamic system formed by the Euler equations and dynamic constraints (e.g., Barro and Sala-i-Martin, [4, pp. 110-118]); however, the log- linearization applies only to the vicinity of the steady state.

  9. See Barros et al. [5] and Faria and Arce [2022] for alternative frameworks that rationalize the equation that governs the time path of terrorist activity in a nation.

  10. The payoff function for the terrorist organization is

    $$\begin{aligned}&\bar{{Y}}+\sum _{t=0}^\infty \rho ^{t}\left\{ a_{1,t} \left( {b+m\left( {a_{1,t-1} -g_{1,t-1} -\theta g_{2,t-1} } \right) } \right) \right. \nonumber \\&\left. \quad +\,a_{2,t} \left( b+m\left( {a_{2,t-1} -g_{2,t-1}-\theta g_{1,t-1} } \right) \right) -\frac{a_{1,t}^2 +a_{2,t}^2 }{2}-b\left( {1+\theta } \right) \left( {g_{1,t} +g_{2,t} } \right) \right\} , \end{aligned}$$

    where \(\bar{{Y}}={\bar{{y}}}/{\left( {1-\rho } \right) }\) if \(a_{j,t} >0\), \(j=1,2\), \(\forall t\). Since the terrorist organization takes \(g_{j,t} \) as given for \(j=1,2\) and \(\forall t\), the term \(b\left( {1+\theta } \right) \left( {g_{1,t} +g_{2,t} } \right) \) is constant and can be omitted from the relevant objective function. Note that the objective function is strict concave with respect to \(a_{j,t} ,j=1,2\). Hence, the first-order conditions are necessary and sufficient for a global maximum.

  11. Recall that as the objective function is strictly convex and the constraints are given by affine functions, the first-order conditions are necessary and sufficient for a global minimum.

  12. The equilibrium characterized by insensitivity in our context can be understood as a corner solution.

  13. As each nation’s objective function is strictly convex and the constraints are given by affine functions, the first-order conditions are necessary and sufficient for a global minimum in each constrained minimization problem.

  14. If, in addition, each sensitive nation were altruistic and were to care about the social costs incurred by the other nation just as much as they care about their own social costs, the problem solved by each sensitive nation would be mathematically identical to the problem solved by the international coalition.

  15. It is important to note that the functions described by Eqs. (5c) and (5d) are derived from the terrorist organization’s best-response functions. They do not represent the nations’ best-response functions. They should be understood as “feedback functions.” The nations’ best-response functions are determined by taking the feedback functions into account.

  16. This inequality is reached by multiplying \(a^{n}\) by \((1-\theta )/(1-\theta )\) and then canceling like terms.

References

  1. Abrahms M (2011) Does terrorism work? Evolution of the conventional wisdom since 9/11. Def Peace Econ 22(6):583–594

    Article  Google Scholar 

  2. Arce DG, Sandler T (2005) Counterterrorism: a game-theoretic analysis. J Confl Resolut 49:183–200

    Article  Google Scholar 

  3. Arce D, Roberson B, Kovenock D (2012) Weakest-link attacker-defender games with multiple attack technologies. Nav Res Logist 59(6):457–469

    Article  MathSciNet  Google Scholar 

  4. Barro RJ, Sala-i-Martin X (2004) Economic growth, 2nd edn. MIT Press, Cambridge

    MATH  Google Scholar 

  5. Barros CP, Proença I, Faria JR, Gil-Alana L (2007) Are US citizens at risk of terrorism in Europe? Def Peace Econ 18:495–507

    Article  Google Scholar 

  6. Becker GS, Murphy KM (1988) A theory of rational addiction. J Polit Econ 96:675–700

    Article  Google Scholar 

  7. Behrens DA, Caulkins JP, Feichtinger G, Tragler G (2007) Incentive Stackelberg strategies for a dynamic game on terrorism. Ann Int Soc Dyn Games 9(Part V):459–486

    Article  MathSciNet  MATH  Google Scholar 

  8. Blomberg SB, Engel RC, Sawyer R (2009) On the duration and sustainability of transnational terrorist organizations. J Confl Resolut 54(2):303–330

    Article  Google Scholar 

  9. Blomberg SB, Gaibulloev K, Sandler T (2011) Terrorist group survival: ideology, tactics and base of operations. Public Choice 149:441–463

    Article  Google Scholar 

  10. Boyer M (1978) A habit forming optimal growth model. Int Econ Rev 19:585–609

    Article  MathSciNet  MATH  Google Scholar 

  11. Boyer M (1983) Rational demand and expenditure patterns under habit formation. J Econ Theory 31:27–53

    Article  MathSciNet  MATH  Google Scholar 

  12. Conrad JM (1999) Resource economics. Cambridge University Press, Cambridge

    Book  Google Scholar 

  13. Cook D (2006) The role of Islam as a motivating factor in Usama bin Ladin’s appeal within the Muslim world. In: Kamien DG (ed) The McGraw-Hill homeland security handbook. McGraw-Hill, New York

    Google Scholar 

  14. Crettez B, Hayek N (2014) Terrorists’ eradication versus perpetual terror war. J Optim Theory Appl 160:679–702

    Article  MathSciNet  MATH  Google Scholar 

  15. Dahl EJ (2011) The plots that failed: intelligence lessons learned from unsuccessful attacks against the United States. Stud Confl Terror 24(8):621–648

    Article  Google Scholar 

  16. Das S (2008) Some mechanisms of terror cycle. J Econ Behav Organ 67:644–656

    Article  Google Scholar 

  17. Dockner EJ, Feichtinger G (1993) Cyclical consumption patterns and rational addiction. Am Econ Rev 83:256–263

    Google Scholar 

  18. Enders W, Sandler T (2000) Is transnational terrorism becoming more threatening? A time-series investigation. J Confl Resolut 44:307–332

    Article  Google Scholar 

  19. Faria JR (2003) Terror cycles. Stud Nonlinear Dyn Econom 7(1). Article 3

  20. Faria JR, Arce DG (2005) Terror support and recruitment. Def Peace Econ 16:263–273

    Article  Google Scholar 

  21. Faria JR, Arce DG (2012a) Counterterrorism and its impact on terror support and recruitment: accounting for backlash. Def Peace Econ 23:431–445

    Article  Google Scholar 

  22. Faria JR, Arce DG (2012b) A vintage model of terrorist organizations. J Confl Resolut 56(4):626–647

    Article  Google Scholar 

  23. Feichtinger G, Novak AJ (2008) Terror and counterterror operations: differential game with cyclical Nash solution. J Optim Theory Appl 139:541–556

    Article  MathSciNet  MATH  Google Scholar 

  24. Gartenstein-Ross D (2011) Bin Laden’s legacy: why we’re still losing the war on terror. Wiley, Hoboken

    Google Scholar 

  25. Hashim AS (2006) Al-Qaida: origins, goals, and grand strategy. In: Kamien DG (ed) The McGraw-Hill homeland security handbook. McGraw-Hill, New York

    Google Scholar 

  26. Heal G, Kunreuther H (2005) IDS models of airline security. J Confl Resolut 49(2):201–217

    Article  Google Scholar 

  27. Hoffman B (2006) Inside terrorism. Columbia University Press, New York

    Google Scholar 

  28. Horgan J (2005) The psychology of terrorism. Routledge, London

    Book  Google Scholar 

  29. Iannaccone LR (1986) Addiction and satiation. Econ Lett 21:95–99

    Article  Google Scholar 

  30. Kaplan E (2012) Estimating the duration of Jihadi terror plots in the United States. Stud Confl Terror 35:880–894

    Article  Google Scholar 

  31. Novak AJ, Feichtinger G, Leitmann G (2010) A differential game related to terrorism: Nash and Stackelberg strategies. J Optim Theory Appl 144:533–555

    Article  MathSciNet  MATH  Google Scholar 

  32. Obstfeld M, Rogoff K (1996) Foundations of international macroeconomics. MIT Press, Cambridge

    MATH  Google Scholar 

  33. Rapoport DC (1992) Terrorism. In: Hawkesworth M, Kogan M (eds) Routledge encyclopedia of government and politics, vol 2. Routledge, London, pp 1067–70

    Google Scholar 

  34. Rosenbaum T (2008) The president has kept us safe. Wall Str J Opin 30:A15

  35. Rozen K (2010) Foundations of intrinsic habit formation. Econometrica 78:1341–1373

    Article  MathSciNet  MATH  Google Scholar 

  36. Ryder HE, Heal GM (1973) Optimal growth with intertemporally dependent preferences. Rev Econ Stud 40:1–31

    Article  MATH  Google Scholar 

  37. Sandler T, Arce D (2007) Terrorism: a game-theoretic approach. Handb Def Econ 2:775–813

    Article  Google Scholar 

  38. Sandler T, Arce D, Enders W (2009) Transnational terrorism. In: Lomborg B (ed) Global crises, global solutions, 2nd edn. Cambridge University Press, Cambridge, pp 516–562

    Chapter  Google Scholar 

  39. Sandler T, Arce D, Enders W (2011) An evaluation of Interpol’s cooperative-based counterterrorism linkages. J Law Econ 54(1):79–110

    Article  Google Scholar 

  40. Sandler T, Siqueira K (2006) Global terrorism: deterrence versus preemption. Can J Econ 39:1370–1387

    Article  Google Scholar 

  41. US Congress (2002) Joint inquiry into intelligence community activities before and after the terrorist attacks of September 11, 2001. Senate Report No. 107-351, House Report No. 107-792, Washington, DC

  42. Woo G (2009) Intelligence constraints on terrorist network plots. In: Memon N et al (eds) Mathematical methods in counterterrorism. Springer, Wien, pp 205–214

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel G. Arce.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Faria, J.R., Silva, E.C.D. & Arce, D.G. Intertemporal Versus Spatial Externalities in Counterterror Policy Games. Dyn Games Appl 7, 402–421 (2017). https://doi.org/10.1007/s13235-016-0188-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13235-016-0188-0

Keywords

JEL Classification

Navigation