IDEAS home Printed from https://ideas.repec.org/a/taf/defpea/v30y2019i3p349-366.html
   My bibliography  Save this article

Transnational policing: preemption and deterrence against elusive perpetrators

Author

Listed:
  • Keisuke Nakao

Abstract

Why does a state directly police certain kinds of transnational perpetrators by itself while indirectly policing other kinds through their host government? To address this question, we develop a formal model, where Defender chooses either to police Perpetrators or to make Proxy do so. According to our theory, the delegation of policing can enhance its effectiveness in light of Proxy’s three advantages: (a) Proxy can convince Perpetrators of punishments more credibly than Defender (communicative advantage); (b) Proxy is more likely to identify Perpetrators and detect what they hold dear (informational advantage); (c) Proxy can cripple and punish Perpetrators more effectively (offensive advantage). On the other hand, the delegation may cause inefficiency if Defender has limited information about Proxy’s choice or cost of policing. Depending on the relative size between these advantages and disadvantages, one of the following four forms of policing may emerge: (i) Defender polices Perpetrators on her own (e.g. Somali counter-piracy operations); (ii) Defender induces Proxy to police Perpetrators (U.S. War on Drugs in Colombia and Mexico); (iii) Defender and Proxy together police Perpetrators (Operation Inherent Resolve); (iv) two or more Defender-Proxy states police Perpetrators in each’s own domain (Interpol, Budapest Convention).

Suggested Citation

  • Keisuke Nakao, 2019. "Transnational policing: preemption and deterrence against elusive perpetrators," Defence and Peace Economics, Taylor & Francis Journals, vol. 30(3), pages 349-366, April.
  • Handle: RePEc:taf:defpea:v:30:y:2019:i:3:p:349-366
    DOI: 10.1080/10242694.2017.1331081
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1080/10242694.2017.1331081
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1080/10242694.2017.1331081?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to look for a different version below or search for a different version of it.

    Other versions of this item:

    References listed on IDEAS

    as
    1. Todd Sandler & Kevin Siqueira, 2006. "Global terrorism: deterrence versus pre-emption," Canadian Journal of Economics, Canadian Economics Association, vol. 39(4), pages 1370-1387, November.
    2. James D. Fearon, 1997. "Signaling Foreign Policy Interests," Journal of Conflict Resolution, Peace Science Society (International), vol. 41(1), pages 68-90, February.
    3. Carter, David B., 2012. "A Blessing or a Curse? State Support for Terrorist Groups," International Organization, Cambridge University Press, vol. 66(1), pages 129-151, January.
    4. Levy, Jack S., 1988. "When Do Deterrent Threats Work?," British Journal of Political Science, Cambridge University Press, vol. 18(4), pages 485-512, October.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Nakao, Keisuke, 2019. "Moving Forward vs. Inflicting Costs in a Random-Walk Model of War," MPRA Paper 96071, University Library of Munich, Germany.
    2. Keisuke Nakao, 2022. "Denial and punishment in war," Journal of Peace Research, Peace Research Institute Oslo, vol. 59(2), pages 166-179, March.
    3. Nakao, Keisuke, 2019. "Modeling Deterrence by Denial and by Punishment," MPRA Paper 95100, University Library of Munich, Germany.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Nakao, Keisuke, 2015. "Indirect Policing: Its Theory, Mechanism, and Application to Combatting Elusive Perpetrators," MPRA Paper 67218, University Library of Munich, Germany.
    2. Khusrav Gaibulloev & Todd Sandler, 2023. "Common myths of terrorism," Journal of Economic Surveys, Wiley Blackwell, vol. 37(2), pages 271-301, April.
    3. Subhayu Bandyopadhyay & Todd Sandler, 2023. "The Trade-Offs of Counterterrorism Policies," Review, Federal Reserve Bank of St. Louis, vol. 105(3), pages 177-197, July.
    4. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    5. Khusrav Gaibulloev & Todd Sandler, 2013. "Determinants of the Demise of Terrorist Organizations," Southern Economic Journal, John Wiley & Sons, vol. 79(4), pages 774-792, April.
    6. Clayton L. Thyne, 2006. "Cheap Signals with Costly Consequences," Journal of Conflict Resolution, Peace Science Society (International), vol. 50(6), pages 937-961, December.
    7. Sylvain Baumann, 2019. "Intelligence Service for a Better Information: Application to a Terrorist Threat," Post-Print hal-02949075, HAL.
    8. Alejandro Quiroz Flores, 2011. "Alliances as Contiguity in Spatial Models of Military Expenditures," Conflict Management and Peace Science, Peace Science Society (International), vol. 28(4), pages 402-418, September.
    9. Peter Egger & Martin Gassebner, 2015. "International terrorism as a trade impediment?," Oxford Economic Papers, Oxford University Press, vol. 67(1), pages 42-62.
    10. Bhan, Aditya & Kabiraj, Tarun, 2018. "Countering Terror Cells: Offence versus Defence," MPRA Paper 88873, University Library of Munich, Germany.
    11. Satya P. Das & Prabal Roy Chowdhury, 2014. "Deterrence, Preemption, And Panic: A Common-Enemy Problem Of Terrorism," Economic Inquiry, Western Economic Association International, vol. 52(1), pages 219-238, January.
    12. Yuleng Zeng, 2020. "Bluff to peace: How economic dependence promotes peace despite increasing deception and uncertainty," Conflict Management and Peace Science, Peace Science Society (International), vol. 37(6), pages 633-654, November.
    13. Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
    14. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    15. Matthew O. Jackson & Massimo Morelli, 2007. "Political Bias and War," American Economic Review, American Economic Association, vol. 97(4), pages 1353-1373, September.
      • Jackson, Matthew O. & Morelli, Massimo, "undated". "Political bias and war," Working Papers 1247, California Institute of Technology, Division of the Humanities and Social Sciences.
    16. Choong-Nam Kang, 2017. "Capability revisited: Ally’s capability and dispute initiation1," Conflict Management and Peace Science, Peace Science Society (International), vol. 34(5), pages 546-571, September.
    17. Mehmet Ekmekci & Nenad Kos, 2020. "Signaling Covertly Acquired Information," Working Papers 658, IGIER (Innocenzo Gasparini Institute for Economic Research), Bocconi University.
    18. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    19. Cullen S. Hendrix, 2014. "Oil Prices and Interstate Conflict Behavior," Working Paper Series WP14-3, Peterson Institute for International Economics.
    20. Rupayan Gupta, 2014. "Changing threat perceptions and the efficient provisioning of international security," Canadian Journal of Economics/Revue canadienne d'économique, John Wiley & Sons, vol. 47(4), pages 1312-1341, November.

    More about this item

    JEL classification:

    • F51 - International Economics - - International Relations, National Security, and International Political Economy - - - International Conflicts; Negotiations; Sanctions
    • F52 - International Economics - - International Relations, National Security, and International Political Economy - - - National Security; Economic Nationalism
    • F53 - International Economics - - International Relations, National Security, and International Political Economy - - - International Agreements and Observance; International Organizations
    • H56 - Public Economics - - National Government Expenditures and Related Policies - - - National Security and War
    • H77 - Public Economics - - State and Local Government; Intergovernmental Relations - - - Intergovernmental Relations; Federalism
    • K42 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - Illegal Behavior and the Enforcement of Law

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:taf:defpea:v:30:y:2019:i:3:p:349-366. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Longhurst (email available below). General contact details of provider: http://www.tandfonline.com/GDPE20 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.