IDEAS home Printed from https://ideas.repec.org/p/pra/mprapa/88873.html
   My bibliography  Save this paper

Countering Terror Cells: Offence versus Defence

Author

Listed:
  • Bhan, Aditya
  • Kabiraj, Tarun

Abstract

The analysis provides insights regarding the suitability of offensive versus defensive measures in countering a terror cell. It is shown that the optimal allocation is more offensive when the cell is aware of which targets have been protected, but unable to distinguish between the values of different targets; than the case where it can neither distinguish between target values nor is the protection conspicuous. Also, the ability of the terror cell to inflict damage is least when it can neither distinguish between target values nor is the target protection conspicuous, and most when it can observe both target values and protection. Hence, from the counter-terrorism (CT) point of view, there seems to be a rationale in making target values and target protection inconspicuous to the extent possible. The paper finally deals with the possibility of diverging target valuations from the CT standpoint and that of the terror cell, and shows that if target protection is conspicuous to the cell and these are common knowledge, then the optimal CT allocation is at least as offensive as the case with identical valuation rankings.

Suggested Citation

  • Bhan, Aditya & Kabiraj, Tarun, 2018. "Countering Terror Cells: Offence versus Defence," MPRA Paper 88873, University Library of Munich, Germany.
  • Handle: RePEc:pra:mprapa:88873
    as

    Download full text from publisher

    File URL: https://mpra.ub.uni-muenchen.de/88873/1/MPRA_paper_88873.pdf
    File Function: original version
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Walter Enders & Paan Jindapon, 2010. "Network Externalities and the Structure of Terror Networks," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 262-280, April.
    2. Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
    3. Satya P. Das & Prabal Roy Chowdhury, 2014. "Deterrence, Preemption, And Panic: A Common-Enemy Problem Of Terrorism," Economic Inquiry, Western Economic Association International, vol. 52(1), pages 219-238, January.
    4. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    5. Walter Enders & Xuejuan Su, 2007. "Rational Terrorists and Optimal Network Structure," Journal of Conflict Resolution, Peace Science Society (International), vol. 51(1), pages 33-57, February.
    6. Todd Sandler & Kevin Siqueira, 2006. "Global terrorism: deterrence versus pre‐emption," Canadian Journal of Economics/Revue canadienne d'économique, John Wiley & Sons, vol. 39(4), pages 1370-1387, November.
    7. Arce, Daniel G. & Sandler, Todd, 2007. "Terrorist Signalling and the Value of Intelligence," British Journal of Political Science, Cambridge University Press, vol. 37(4), pages 573-586, October.
    8. Todd Sandler, 2005. "Collective versus unilateral responses to terrorism," Public Choice, Springer, vol. 124(1), pages 75-93, July.
    9. Quan Li, 2005. "Does Democracy Promote or Reduce Transnational Terrorist Incidents?," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 278-297, April.
    10. Siqueira, Kevin & Sandler, Todd, 2007. "Terrorist backlash, terrorism mitigation, and policy delegation," Journal of Public Economics, Elsevier, vol. 91(9), pages 1800-1815, September.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    2. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
    3. Aditya Bhan & Tarun Kabiraj, 2019. "Operational externalities and counter-terrorism," Indian Economic Review, Springer, vol. 54(1), pages 171-187, June.
    4. Todd Sandler, 2010. "Terrorism and Policy: Introduction," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 203-213, April.
    5. Garcia-Alonso, Maria D.C. & Levine, Paul & Smith, Ron, 2016. "Military aid, direct intervention and counterterrorism," European Journal of Political Economy, Elsevier, vol. 44(C), pages 112-135.
    6. Yang Jiao & Zijun Luo, 2019. "A model of terrorism and counterterrorism with location choices," Public Choice, Springer, vol. 179(3), pages 301-313, June.
    7. Todd Sandler & Daniel G. Arce & Walter Enders, 2011. "An Evaluation of Interpol's Cooperative-Based Counterterrorism Linkages," Journal of Law and Economics, University of Chicago Press, vol. 54(1), pages 79-110.
    8. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    9. Subhayu Bandyopadhyay & Todd Sandler, 2023. "The Trade-Offs of Counterterrorism Policies," Review, Federal Reserve Bank of St. Louis, vol. 105(3), pages 177-197, July.
    10. Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
    11. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    12. Subhayu Bandyopadhyay & Todd Sandler & Javed Younas, 2011. "Foreign aid as counterterrorism policy," Oxford Economic Papers, Oxford University Press, vol. 63(3), pages 423-447, July.
    13. Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What have we learned? Assessing the effectiveness of counterterrorism strategies in Pakistan," Economic Modelling, Elsevier, vol. 64(C), pages 487-495.
    14. Todd Sandler, 2013. "Introduction: Advances in the Study of the Economics of Terrorism," Southern Economic Journal, John Wiley & Sons, vol. 79(4), pages 768-773, April.
    15. B. Hoyer, 2012. "Network Disruption and the Common Enemy Effect," Working Papers 12-06, Utrecht School of Economics.
    16. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    17. Kumar, Dushyant & Roy Chowdhury, Prabal, 2022. "Winning hearts and minds in conflict-ridden areas: Development as a signal of benevolence," Economic Modelling, Elsevier, vol. 117(C).
    18. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    19. Mario Gilli & Paolo Tedeschi, 2020. "European Union and Transnational Terrorism. A Normative Analysis of Strategic Spillovers," Working Papers 437, University of Milano-Bicocca, Department of Economics, revised Mar 2020.
    20. Satya P. Das & Sajal Lahiri, 2021. "Why direct counter‐terrorism measures only may fail: An analysis of direct and preventive counter‐terrorism measures," International Journal of Economic Theory, The International Society for Economic Theory, vol. 17(4), pages 416-445, December.

    More about this item

    Keywords

    : terror cell; offensive and defensive measures; target value; target protection; counter-terrorism.;
    All these keywords.

    JEL classification:

    • C70 - Mathematical and Quantitative Methods - - Game Theory and Bargaining Theory - - - General
    • D74 - Microeconomics - - Analysis of Collective Decision-Making - - - Conflict; Conflict Resolution; Alliances; Revolutions
    • D78 - Microeconomics - - Analysis of Collective Decision-Making - - - Positive Analysis of Policy Formulation and Implementation
    • F52 - International Economics - - International Relations, National Security, and International Political Economy - - - National Security; Economic Nationalism

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pra:mprapa:88873. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Joachim Winter (email available below). General contact details of provider: https://edirc.repec.org/data/vfmunde.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.