IDEAS home Printed from https://ideas.repec.org/p/irv/wpaper/121307.html
   My bibliography  Save this paper

The Enemy You Can't See: An Investigation of the Disruption of Dark Networks

Author

Listed:
  • Michael McBride

    () (Department of Economics, University of California-Irvine)

  • David Hewitt

    () (Department of Economics, Whittier College)

Abstract

We examine the optimal disruption of dark (covert and illegal) networks. Of central importance is that an interventionist will generally have incomplete information about the dark network's architecture. We derive the optimal disruption strategy in a stylized model of dark network intervention with incomplete information and show how it combines features of two types of disruption considered in the literature: random failure and targeted attacks. In particular, the optimal disruption strategy encourages greater risk as less of the architecture is observed. A laboratory experiment finds that subjects tasked with disrupting a dark network qualitatively mimic the theoretical predictions.

Suggested Citation

  • Michael McBride & David Hewitt, 2012. "The Enemy You Can't See: An Investigation of the Disruption of Dark Networks," Working Papers 121307, University of California-Irvine, Department of Economics.
  • Handle: RePEc:irv:wpaper:121307
    as

    Download full text from publisher

    File URL: https://www.economics.uci.edu/files/docs/workingpapers/2012-13/mcbride-07.pdf
    Download Restriction: no

    Other versions of this item:

    References listed on IDEAS

    as
    1. Britta Hoyer & Kris De Jaegher, 2016. "Strategic Network Disruption and Defense," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 18(5), pages 802-830, October.
    2. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Working Papers 10-14, Chapman University, Economic Science Institute.
    3. Gary S. Becker, 1974. "Crime and Punishment: An Economic Approach," NBER Chapters,in: Essays in the Economics of Crime and Punishment, pages 1-54 National Bureau of Economic Research, Inc.
    4. Subhasish Chowdhury & Dan Kovenock & Roman Sheremeta, 2013. "An experimental investigation of Colonel Blotto games," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 52(3), pages 833-861, April.
    5. Cary Deck & Roman M. Sheremeta, 2012. "Fight or Flight?," Journal of Conflict Resolution, Peace Science Society (International), vol. 56(6), pages 1069-1088, December.
    6. Coralio Ballester & Antoni Calvó-Armengol & Yves Zenou, 2006. "Who's Who in Networks. Wanted: The Key Player," Econometrica, Econometric Society, vol. 74(5), pages 1403-1417, September.
    7. Walter Enders & Paan Jindapon, 2010. "Network Externalities and the Structure of Terror Networks," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 262-280, April.
    8. Daniel G Arce & Rachel TA Croson & Catherine C Eckel, 2011. "Terrorism Experiments," Journal of Peace Research, Peace Research Institute Oslo, vol. 48(3), pages 373-382, May.
    9. Mariagiovanna Baccara & Heski Bar-Isaac, 2008. "How to Organize Crime -super-1," Review of Economic Studies, Oxford University Press, vol. 75(4), pages 1039-1067.
    10. Emmanuel Dechenaux & Dan Kovenock & Roman Sheremeta, 2015. "A survey of experimental research on contests, all-pay auctions and tournaments," Experimental Economics, Springer;Economic Science Association, vol. 18(4), pages 609-669, December.
    11. Chris Starmer, 1999. "Experiments in economics: should we trust the dismal scientists in white coats?," Journal of Economic Methodology, Taylor & Francis Journals, vol. 6(1), pages 1-30.
    12. Jonathan S. Feinstein & Edward H. Kaplan, 2010. "Analysis of a Strategic Terror Organization," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 281-302, April.
    13. Urs Fischbacher, 2007. "z-Tree: Zurich toolbox for ready-made economic experiments," Experimental Economics, Springer;Economic Science Association, vol. 10(2), pages 171-178, June.
    14. Kosfeld Michael, 2004. "Economic Networks in the Laboratory: A Survey," Review of Network Economics, De Gruyter, vol. 3(1), pages 1-23, March.
    15. Heski Bar-Isaac & Mariagiovanna Baccara, 2006. "How to Organize Crime," Working Papers 06-07, New York University, Leonard N. Stern School of Business, Department of Economics.
    16. Dan Kovenock & Brian Roberson, 2010. "The Optimal Defense of Networks of Targets," Purdue University Economics Working Papers 1251, Purdue University, Department of Economics.
    17. Brian Roberson, 2006. "The Colonel Blotto game," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 29(1), pages 1-24, September.
    18. Cameron, Samuel, 1988. "The Economics of Crime Deterrence: A Survey of Theory and Evidence," Kyklos, Wiley Blackwell, vol. 41(2), pages 301-323.
    19. Walter Enders & Xuejuan Su, 2007. "Rational Terrorists and Optimal Network Structure," Journal of Conflict Resolution, Peace Science Society (International), vol. 51(1), pages 33-57, February.
    20. Peren Arin, K. & Lorz, Oliver & Reich, Otto F.M. & Spagnolo, Nicola, 2011. "Exploring the dynamics between terrorism and anti-terror spending: Theory and UK-evidence," Journal of Economic Behavior & Organization, Elsevier, vol. 77(2), pages 189-202, February.
    21. Das, Satya P., 2008. "Some mechanisms of terror cycles," Journal of Economic Behavior & Organization, Elsevier, vol. 67(3-4), pages 644-656, September.
    22. Michael D. Intriligator, 2010. "The Economics Of Terrorism," Economic Inquiry, Western Economic Association International, vol. 48(1), pages 1-13, January.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Subhasish M. Chowdhury & Dan Kovenock & David Rojo Arjona & Nathaniel T. Wilcox, 2016. "Focality and asymmetry in multi-battle contests," Working Paper series, University of East Anglia, Centre for Behavioural and Experimental Social Science (CBESS) 16-12, School of Economics, University of East Anglia, Norwich, UK..
    2. Bravard, Christophe & Charroin, Liza & Touati, Corinne, 2017. "Optimal design and defense of networks under link attacks," Journal of Mathematical Economics, Elsevier, vol. 68(C), pages 62-79.
    3. Christophe Bravard & Liza Charroin & Corinne Touati, 2017. "Optimal Design and Defense of Networks Under Link Attacks," Post-Print hal-01384998, HAL.
    4. Kvasov, Dmitriy, 2015. "From Sabotage Games to Border Protection," CEI Working Paper Series 2015-2, Center for Economic Institutions, Institute of Economic Research, Hitotsubashi University.

    More about this item

    Keywords

    Terrorism; Crime; Intervention; Defense;

    JEL classification:

    • C91 - Mathematical and Quantitative Methods - - Design of Experiments - - - Laboratory, Individual Behavior
    • D85 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Network Formation
    • K42 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - Illegal Behavior and the Enforcement of Law

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:irv:wpaper:121307. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Jennifer dos Santos). General contact details of provider: http://edirc.repec.org/data/deucius.html .

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service hosted by the Research Division of the Federal Reserve Bank of St. Louis . RePEc uses bibliographic data supplied by the respective publishers.