IDEAS home Printed from https://ideas.repec.org/p/pra/mprapa/72676.html
   My bibliography  Save this paper

Transnational Policing: Preemption and Deterrence against Elusive Perpetrators

Author

Listed:
  • Nakao, Keisuke

Abstract

Why does a state directly police certain kinds of transnational perpetrators by itself while indirectly policing other kinds through their host government? To address this question, we develop a formal model, where Defender chooses either to police Perpetrators or to make Proxy do so. According to our theory, the delegation of policing can enhance its effectiveness in light of Proxy’s advantages in threatening, identifying, and attacking Perpetrators, but it may also cause inefficiency if Defender has limited information about Proxy’s choice or cost of policing. Depending on the relative size between these advantages and disadvantages, one of the following four forms of policing may emerge: (i) Defender polices Perpetrators on her own (e.g., Somali counter-piracy operations); (ii) Defender induces Proxy to police Perpetrators (U.S. War on Drugs); (iii) Defender and Proxy together police Perpetrators (Operation Inherent Resolve); (iv) two or more Defender-Proxy states police Perpetrators in each’s own domain (Interpol).

Suggested Citation

  • Nakao, Keisuke, 2016. "Transnational Policing: Preemption and Deterrence against Elusive Perpetrators," MPRA Paper 72676, University Library of Munich, Germany.
  • Handle: RePEc:pra:mprapa:72676
    as

    Download full text from publisher

    File URL: https://mpra.ub.uni-muenchen.de/72676/1/MPRA_paper_72676.pdf
    File Function: original version
    Download Restriction: no
    ---><---

    Other versions of this item:

    References listed on IDEAS

    as
    1. Levy, Jack S., 1988. "When Do Deterrent Threats Work?," British Journal of Political Science, Cambridge University Press, vol. 18(4), pages 485-512, October.
    2. Todd Sandler & Kevin Siqueira, 2006. "Global terrorism: deterrence versus pre‐emption," Canadian Journal of Economics/Revue canadienne d'économique, John Wiley & Sons, vol. 39(4), pages 1370-1387, November.
    3. James D. Fearon, 1997. "Signaling Foreign Policy Interests," Journal of Conflict Resolution, Peace Science Society (International), vol. 41(1), pages 68-90, February.
    4. Carter, David B., 2012. "A Blessing or a Curse? State Support for Terrorist Groups," International Organization, Cambridge University Press, vol. 66(1), pages 129-151, January.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Nakao, Keisuke, 2019. "Moving Forward vs. Inflicting Costs in a Random-Walk Model of War," MPRA Paper 96071, University Library of Munich, Germany.
    2. Keisuke Nakao, 2022. "Denial and punishment in war," Journal of Peace Research, Peace Research Institute Oslo, vol. 59(2), pages 166-179, March.
    3. Nakao, Keisuke, 2019. "Modeling Deterrence by Denial and by Punishment," MPRA Paper 95100, University Library of Munich, Germany.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Nakao, Keisuke, 2015. "Indirect Policing: Its Theory, Mechanism, and Application to Combatting Elusive Perpetrators," MPRA Paper 67218, University Library of Munich, Germany.
    2. Khusrav Gaibulloev & Todd Sandler, 2023. "Common myths of terrorism," Journal of Economic Surveys, Wiley Blackwell, vol. 37(2), pages 271-301, April.
    3. Subhayu Bandyopadhyay & Todd Sandler, 2023. "The Trade-Offs of Counterterrorism Policies," Review, Federal Reserve Bank of St. Louis, vol. 105(3), pages 177-197, July.
    4. Clayton L. Thyne, 2006. "Cheap Signals with Costly Consequences," Journal of Conflict Resolution, Peace Science Society (International), vol. 50(6), pages 937-961, December.
    5. Bhan, Aditya & Kabiraj, Tarun, 2018. "Countering Terror Cells: Offence versus Defence," MPRA Paper 88873, University Library of Munich, Germany.
    6. Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
    7. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    8. Choong-Nam Kang, 2017. "Capability revisited: Ally’s capability and dispute initiation1," Conflict Management and Peace Science, Peace Science Society (International), vol. 34(5), pages 546-571, September.
    9. Mehmet Ekmekci & Nenad Kos, 2020. "Signaling Covertly Acquired Information," Working Papers 658, IGIER (Innocenzo Gasparini Institute for Economic Research), Bocconi University.
    10. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    11. Axel Dreher & Merle Kreibaum, 2016. "Weapons of choice," Journal of Peace Research, Peace Research Institute Oslo, vol. 53(4), pages 539-553, July.
    12. Paul K. Huth, 1998. "Major Power Intervention in International Crises, 1918-1988," Journal of Conflict Resolution, Peace Science Society (International), vol. 42(6), pages 744-770, December.
    13. Garcia-Alonso, Maria D.C. & Levine, Paul & Smith, Ron, 2016. "Military aid, direct intervention and counterterrorism," European Journal of Political Economy, Elsevier, vol. 44(C), pages 112-135.
    14. Pitsoulis Athanassios & Schwuchow Soeren C., 2014. "Coercion, Credibility, and Mid-Air Interceptions of Military Planes," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 20(4), pages 697-707, December.
    15. Sylvain Baumann, 2018. "Protection, Technological Transfer and Alliance against Terrorist Conflict," Post-Print hal-02949083, HAL.
    16. Thomas Jensen & Andreas Madum, 2014. "Partisan Optimism and Political Bargaining," Discussion Papers 14-05, University of Copenhagen. Department of Economics.
    17. Seok Joon Kim, 2022. "Quick on the Draw: American Negativity Bias and Costly Signals in International Relations," Journal of Conflict Resolution, Peace Science Society (International), vol. 66(2), pages 246-271, February.
    18. Subhayu Bandyopadhyay & Todd Sandler & Javed Younas, 2011. "Foreign aid as counterterrorism policy," Oxford Economic Papers, Oxford University Press, vol. 63(3), pages 423-447, July.
    19. Adam Rose & Tyler Kustra, 2013. "Economic Considerations in Designing Emergency Management Institutions and Policies for Transboundary Disasters," Public Management Review, Taylor & Francis Journals, vol. 15(3), pages 446-462, March.
    20. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.

    More about this item

    Keywords

    cyberattack; deterrence; policing; piracy; preemption; terrorism;
    All these keywords.

    JEL classification:

    • F51 - International Economics - - International Relations, National Security, and International Political Economy - - - International Conflicts; Negotiations; Sanctions
    • F52 - International Economics - - International Relations, National Security, and International Political Economy - - - National Security; Economic Nationalism
    • F53 - International Economics - - International Relations, National Security, and International Political Economy - - - International Agreements and Observance; International Organizations
    • H56 - Public Economics - - National Government Expenditures and Related Policies - - - National Security and War
    • H77 - Public Economics - - State and Local Government; Intergovernmental Relations - - - Intergovernmental Relations; Federalism
    • K42 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - Illegal Behavior and the Enforcement of Law

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pra:mprapa:72676. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Joachim Winter (email available below). General contact details of provider: https://edirc.repec.org/data/vfmunde.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.