IDEAS home Printed from https://ideas.repec.org/p/irv/wpaper/121307.html

The Enemy You Can't See: An Investigation of the Disruption of Dark Networks

Author

Listed:
  • Michael McBride

    (Department of Economics, University of California-Irvine)

  • David Hewitt

    (Department of Economics, Whittier College)

Abstract

We examine the optimal disruption of dark (covert and illegal) networks. Of central importance is that an interventionist will generally have incomplete information about the dark network's architecture. We derive the optimal disruption strategy in a stylized model of dark network intervention with incomplete information and show how it combines features of two types of disruption considered in the literature: random failure and targeted attacks. In particular, the optimal disruption strategy encourages greater risk as less of the architecture is observed. A laboratory experiment finds that subjects tasked with disrupting a dark network qualitatively mimic the theoretical predictions.

Suggested Citation

  • Michael McBride & David Hewitt, 2012. "The Enemy You Can't See: An Investigation of the Disruption of Dark Networks," Working Papers 121307, University of California-Irvine, Department of Economics.
  • Handle: RePEc:irv:wpaper:121307
    as

    Download full text from publisher

    File URL: https://www.economics.uci.edu/files/docs/workingpapers/2012-13/mcbride-07.pdf
    Download Restriction: no
    ---><---

    Other versions of this item:

    References listed on IDEAS

    as
    1. Samuel Cameron, 1988. "The Economics of Crime Deterrence: A Survey of Theory and Evidence," Kyklos, Wiley Blackwell, vol. 41(2), pages 301-323, May.
    2. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019. "The attack and defense of weakest-link networks," Public Choice, Springer, vol. 179(3), pages 175-194, June.
    3. Gary S. Becker, 1974. "Crime and Punishment: An Economic Approach," NBER Chapters, in: Essays in the Economics of Crime and Punishment, pages 1-54, National Bureau of Economic Research, Inc.
    4. Deck, Cary & Sheremeta, Roman, 2012. "Fight or Flight?," MPRA Paper 52130, University Library of Munich, Germany.
    5. Walter Enders & Paan Jindapon, 2010. "Network Externalities and the Structure of Terror Networks," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 262-280, April.
    6. Subhasish Chowdhury & Dan Kovenock & Roman Sheremeta, 2013. "An experimental investigation of Colonel Blotto games," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 52(3), pages 833-861, April.
    7. Daniel G Arce & Rachel TA Croson & Catherine C Eckel, 2011. "Terrorism Experiments," Journal of Peace Research, Peace Research Institute Oslo, vol. 48(3), pages 373-382, May.
    8. Mariagiovanna Baccara & Heski Bar-Isaac, 2008. "How to Organize Crime -super-1," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 75(4), pages 1039-1067.
    9. Jonathan S. Feinstein & Edward H. Kaplan, 2010. "Analysis of a Strategic Terror Organization," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 281-302, April.
    10. Réka Albert & Hawoong Jeong & Albert-László Barabási, 2000. "Error and attack tolerance of complex networks," Nature, Nature, vol. 406(6794), pages 378-382, July.
    11. Chris Starmer, 1999. "Experiments in economics: should we trust the dismal scientists in white coats?," Journal of Economic Methodology, Taylor & Francis Journals, vol. 6(1), pages 1-30.
    12. Emmanuel Dechenaux & Dan Kovenock & Roman Sheremeta, 2015. "A survey of experimental research on contests, all-pay auctions and tournaments," Experimental Economics, Springer;Economic Science Association, vol. 18(4), pages 609-669, December.
    13. Britta Hoyer & Kris De Jaegher, 2016. "Strategic Network Disruption and Defense," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 18(5), pages 802-830, October.
    14. Urs Fischbacher, 2007. "z-Tree: Zurich toolbox for ready-made economic experiments," Experimental Economics, Springer;Economic Science Association, vol. 10(2), pages 171-178, June.
    15. Kosfeld Michael, 2004. "Economic Networks in the Laboratory: A Survey," Review of Network Economics, De Gruyter, vol. 3(1), pages 1-23, March.
    16. Heski Bar-Isaac & Mariagiovanna Baccara, 2006. "How to Organize Crime," Working Papers 06-07, New York University, Leonard N. Stern School of Business, Department of Economics.
    17. Brian Roberson, 2006. "The Colonel Blotto game," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 29(1), pages 1-24, September.
    18. repec:bla:kyklos:v:41:y:1988:i:2:p:301-23 is not listed on IDEAS
    19. Cary Deck & Roman M. Sheremeta, 2012. "Fight or Flight?," Journal of Conflict Resolution, Peace Science Society (International), vol. 56(6), pages 1069-1088, December.
    20. Walter Enders & Xuejuan Su, 2007. "Rational Terrorists and Optimal Network Structure," Journal of Conflict Resolution, Peace Science Society (International), vol. 51(1), pages 33-57, February.
    21. Dan Kovenock & Brian Roberson, 2018. "The Optimal Defense Of Networks Of Targets," Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
    22. Sunghoon Hong, 2011. "Strategic Network Interdiction," Working Papers 2011.43, Fondazione Eni Enrico Mattei.
    23. Coralio Ballester & Antoni Calvó-Armengol & Yves Zenou, 2006. "Who's Who in Networks. Wanted: The Key Player," Econometrica, Econometric Society, vol. 74(5), pages 1403-1417, September.
    24. Peren Arin, K. & Lorz, Oliver & Reich, Otto F.M. & Spagnolo, Nicola, 2011. "Exploring the dynamics between terrorism and anti-terror spending: Theory and UK-evidence," Journal of Economic Behavior & Organization, Elsevier, vol. 77(2), pages 189-202, February.
    25. Hong, Sunghoon, 2011. "Strategic Network Interdiction," Climate Change and Sustainable Development 108252, Fondazione Eni Enrico Mattei (FEEM).
    26. Das, Satya P., 2008. "Some mechanisms of terror cycles," Journal of Economic Behavior & Organization, Elsevier, vol. 67(3-4), pages 644-656, September.
    27. Michael D. Intriligator, 2010. "The Economics Of Terrorism," Economic Inquiry, Western Economic Association International, vol. 48(1), pages 1-13, January.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Subhasish M Chowdhury & Dan Kovenock & David Rojo Arjona & Nathaniel T Wilcox, 2021. "Focality and Asymmetry in Multi-Battle Contests," The Economic Journal, Royal Economic Society, vol. 131(636), pages 1593-1619.
    2. Daniel Woods & Mustafa Abdallah & Saurabh Bagchi & Shreyas Sundaram & Timothy Cason, 2022. "Network defense and behavioral biases: an experimental study," Experimental Economics, Springer;Economic Science Association, vol. 25(1), pages 254-286, February.
    3. Bravard, Christophe & Charroin, Liza & Touati, Corinne, 2017. "Optimal design and defense of networks under link attacks," Journal of Mathematical Economics, Elsevier, vol. 68(C), pages 62-79.
    4. Carlos Ponce & Flavia Roldán, 2016. "How a cartel operates: evidence from Graphite Electrode cartel from a social network perspective," Documentos de Investigación 113, Universidad ORT Uruguay. Facultad de Administración y Ciencias Sociales.
    5. Kvasov, Dmitriy, 2015. "From Sabotage Games to Border Protection," CEI Working Paper Series 2015-2, Center for Economic Institutions, Institute of Economic Research, Hitotsubashi University.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. B. Hoyer, 2012. "Network Disruption and the Common Enemy Effect," Working Papers 12-06, Utrecht School of Economics.
    2. Emmanuel Dechenaux & Dan Kovenock & Roman Sheremeta, 2015. "A survey of experimental research on contests, all-pay auctions and tournaments," Experimental Economics, Springer;Economic Science Association, vol. 18(4), pages 609-669, December.
    3. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019. "The attack and defense of weakest-link networks," Public Choice, Springer, vol. 179(3), pages 175-194, June.
    4. Shakun D. Mago & Roman M. Sheremeta, 2019. "New Hampshire Effect: behavior in sequential and simultaneous multi-battle contests," Experimental Economics, Springer;Economic Science Association, vol. 22(2), pages 325-349, June.
    5. Shakun D. Mago & Roman M. Sheremeta, 2017. "Multi‐battle Contests: An Experimental Study," Southern Economic Journal, John Wiley & Sons, vol. 84(2), pages 407-425, October.
    6. Zeynep B. Irfanoglu & Shakun D. Mago & Roman M. Sheremeta, 2014. "The New Hampshire Effect: Behavior in Sequential and Simultaneous Election Contests," Working Papers 14-15, Chapman University, Economic Science Institute.
    7. Daniel Woods & Mustafa Abdallah & Saurabh Bagchi & Shreyas Sundaram & Timothy Cason, 2022. "Network defense and behavioral biases: an experimental study," Experimental Economics, Springer;Economic Science Association, vol. 25(1), pages 254-286, February.
    8. Lacomba, Juan A. & Lagos, Francisco & Reuben, Ernesto & van Winden, Frans, 2017. "Decisiveness, peace, and inequality in games of conflict," Journal of Economic Psychology, Elsevier, vol. 63(C), pages 216-229.
    9. Avrahami, Judith & Kareev, Yaakov & Todd, Peter M. & Silverman, Boaz, 2014. "Allocation of resources in asymmetric competitions: How do the weak maintain a chance of winning?," Journal of Economic Psychology, Elsevier, vol. 42(C), pages 161-174.
    10. Kimbrough, Erik O. & Laughren, Kevin & Sheremeta, Roman, 2020. "War and conflict in economics: Theories, applications, and recent trends," Journal of Economic Behavior & Organization, Elsevier, vol. 178(C), pages 998-1013.
    11. Deck, Cary & Sarangi, Sudipta & Wiser, Matt, 2017. "An experimental investigation of simultaneous multi-battle contests with strategic complementarities," Journal of Economic Psychology, Elsevier, vol. 63(C), pages 117-134.
    12. Roman M. Sheremeta, 2013. "Overbidding And Heterogeneous Behavior In Contest Experiments," Journal of Economic Surveys, Wiley Blackwell, vol. 27(3), pages 491-514, July.
    13. Deck, Cary & Sheremeta, Roman M., 2019. "The tug-of-war in the laboratory," European Journal of Political Economy, Elsevier, vol. 60(C).
    14. Kimbrough, Erik O. & Rubin, Jared & Sheremeta, Roman M. & Shields, Timothy W., 2015. "Commitment problems in conflict resolution," Journal of Economic Behavior & Organization, Elsevier, vol. 112(C), pages 33-45.
    15. Acemoglu, Daron & Malekian, Azarakhsh & Ozdaglar, Asu, 2016. "Network security and contagion," Journal of Economic Theory, Elsevier, vol. 166(C), pages 536-585.
    16. Godinho, Pedro & Dias, Joana, 2013. "Two-player simultaneous location game: Preferential rights and overbidding," European Journal of Operational Research, Elsevier, vol. 229(3), pages 663-672.
    17. Llorente-Saguer, Aniol & Sheremeta, Roman M. & Szech, Nora, 2023. "Designing contests between heterogeneous contestants: An experimental study of tie-breaks and bid-caps in all-pay auctions," European Economic Review, Elsevier, vol. 154(C).
    18. Sheremeta, Roman, 2014. "Behavior in Contests," MPRA Paper 57451, University Library of Munich, Germany.
    19. Llorente-Saguer, Aniol & Sheremeta, Roman & Szech, Nora, 2016. "Designing Contests Between Heterogeneous Contestants: An Experimental Study of Tie-Breaks and Bid-Caps in All-Pay Auctions," MPRA Paper 71202, University Library of Munich, Germany.
    20. Kimbrough, Erik & Sheremeta, Roman, 2014. "Why can’t we be friends? Entitlements and the costs of conflict," MPRA Paper 53253, University Library of Munich, Germany.

    More about this item

    Keywords

    ;
    ;
    ;
    ;

    JEL classification:

    • C91 - Mathematical and Quantitative Methods - - Design of Experiments - - - Laboratory, Individual Behavior
    • D85 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Network Formation
    • K42 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - Illegal Behavior and the Enforcement of Law

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:irv:wpaper:121307. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Melissa Valdez (email available below). General contact details of provider: https://edirc.repec.org/data/deucius.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.