IDEAS home Printed from https://ideas.repec.org/a/cup/bjposi/v37y2007i04p573-586_00.html
   My bibliography  Save this article

Terrorist Signalling and the Value of Intelligence

Author

Listed:
  • ARCE, DANIEL G.
  • SANDLER, TODD

Abstract

This article presents a model of terrorist attacks as signals where the government is uncertain as to whether it is facing a group that is politically motivated or militant. Pooling equilibriums result with two types of ex post regret: P-regret, where the government concedes to political types that would not subsequently attack; and M-regret, where the government does not concede to militant types that subsequently attack at greater levels. Avoidance of such regret defines a measure of the value of intelligence. Counter-terrorism policy can then be characterized in terms of whether a government should focus on increased intelligence versus increased security (hardening targets). The recommended use of asset freezing is also evaluated in terms of the resources required by terrorists to achieve the various equilibriums. Finally, this article supports the empirical finding of intertemporal substitution of resources by terrorists, concerned with the level of government response to their attacks.

Suggested Citation

  • Arce, Daniel G. & Sandler, Todd, 2007. "Terrorist Signalling and the Value of Intelligence," British Journal of Political Science, Cambridge University Press, vol. 37(4), pages 573-586, October.
  • Handle: RePEc:cup:bjposi:v:37:y:2007:i:04:p:573-586_00
    as

    Download full text from publisher

    File URL: https://www.cambridge.org/core/product/identifier/S0007123407000324/type/journal_article
    File Function: link to article abstract page
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    2. Mario Gilli & Paolo Tedeschi, 2020. "European Union and Transnational Terrorism. A Normative Analysis of Strategic Spillovers," Working Papers 437, University of Milano-Bicocca, Department of Economics, revised Mar 2020.
    3. Coyne,Christopher J., 2020. "Defense, Peace, and War Economics," Cambridge Books, Cambridge University Press, number 9781108724036.
    4. Bhan, Aditya & Kabiraj, Tarun, 2018. "External Sponsorship and Counter-Terrorism," MPRA Paper 98361, University Library of Munich, Germany, revised 31 Dec 2019.
    5. Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
    6. Aditya Bhan & Tarun Kabiraj, 2019. "Operational externalities and counter-terrorism," Indian Economic Review, Springer, vol. 54(1), pages 171-187, June.
    7. Garcia-Alonso, Maria D.C. & Levine, Paul & Smith, Ron, 2016. "Military aid, direct intervention and counterterrorism," European Journal of Political Economy, Elsevier, vol. 44(C), pages 112-135.
    8. Bhan, Aditya & Kabiraj, Tarun, 2018. "Countering Terror Cells: Offence versus Defence," MPRA Paper 88873, University Library of Munich, Germany.
    9. Insua, Insua Rios & Rios, Jesus & Banks, David, 2009. "Adversarial Risk Analysis," Journal of the American Statistical Association, American Statistical Association, vol. 104(486), pages 841-854.
    10. Shouqiang Wang & David Banks, 2011. "Network routing for insurgency: An adversarial risk analysis framework," Naval Research Logistics (NRL), John Wiley & Sons, vol. 58(6), pages 595-607, September.
    11. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    12. Todd Sandler, 2010. "Terrorism and Policy: Introduction," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 203-213, April.
    13. Navin Bapat, 2011. "Terrorism, democratization, and US foreign policy," Public Choice, Springer, vol. 149(3), pages 315-335, December.
    14. Ulrich Hendel, 2016. "‘Look like the innocent flower, but be the serpent under’t’: mimicking behaviour of growth-oriented terrorist organizations," Defence and Peace Economics, Taylor & Francis Journals, vol. 27(5), pages 665-687, September.
    15. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    16. Michael McBride & Gary Richardson, 2012. "Stopping Suicide Attacks: Optimal Strategies and Unintended Consequences," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 413-429, October.
    17. Andre Rossi de Oliveira & João Ricardo Faria & Emilson C. D. Silva, 2018. "Transnational Terrorism," Journal of Conflict Resolution, Peace Science Society (International), vol. 62(3), pages 496-528, March.
    18. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    19. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    20. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:cup:bjposi:v:37:y:2007:i:04:p:573-586_00. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Kirk Stebbing (email available below). General contact details of provider: https://www.cambridge.org/jps .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.