Skip to main content

Subsidizing to Disrupt a Terrorism Supply Chain—A Four-Player Game

  • Chapter
OR, Defence and Security

Part of the book series: The OR Essentials series ((ORESS))

  • 266 Accesses

Abstract

Terrorism with weapons of mass destruction (WMDs) is an urgent threat to homeland security. The process of counter-WMD terrorism often involves multiple government and terrorist group players, which is under-studied in the literature. In this paper, first we consider two subgames: a proliferation game between two terrorist groups or cells (where one handling the black market for profits proliferates to the other one to attack, and this is modelled as a terrorism supply chain) and a subsidization game between two governments (where one potential WMD victim government subsidizes the other host government, who can interfere with terrorist activities). Then we integrate these two subgames to study how the victim government can use the strategy of subsidization to induce the host government to disrupt the terrorism supply chain. To our knowledge, this is the first game-theoretic study for modelling and optimally disrupting a terrorism supply chain in a complex four-player scenario. We find that in the integrated game, when proliferation payment is high or low, the practical terrorist group will proliferate and not proliferate, respectively, regardless of government decisions. In contrast, in the subsidization subgame between the two governments, the decision of subsidization depends on its cost. When proliferation payment is medium, the decision of subsidization depends on not only its cost but also the preparation cost and the attacking cost. Findings from our results would assist in government policymaking.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Arce DG and Sandler T (2005). Counterterrorism — a game-theoretic analysis. Journal of Conflict Resolution 49(2): 183–200.

    Article  Google Scholar 

  • Arce DG and Sandler T (2010). Terrorist spectaculars: backlash attacks and the focus of intelligence. Journal of Conflict Resolution 54(2): 354–373.

    Article  Google Scholar 

  • Bier VM, Oliveros S and Samuelson L (2007). Choosing what to protect: strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory 9(4): 563–587.

    Article  Google Scholar 

  • Brown G, Carlyle M, Salmeron J and Wood K (2006). Defending critical infrastructure. Interfaces 36(6): 530–544.

    Article  Google Scholar 

  • Brown G, Carlyle WM, Harney RC, Skroch EM and Wood RK (2009). Interdicting a nuclear-weapons project. Operations Research 57(4): 866–877.

    Article  Google Scholar 

  • Cormican KJ, Morton DP and Wood RK (1998). Stochastic network interdiction. Operations Research 46(2): 184–197.

    Article  Google Scholar 

  • Drakos K and Gofas A (2006). In search of the average transnational terrorist attack venue. Defence and Peace Economics 17(2): 73–93.

    Article  Google Scholar 

  • Enders W and Sandler T (2005). After 9/11 is it all different now? Journal of Conflict Resolution 49(2): 259–277.

    Article  Google Scholar 

  • Frey BS (2004). Dealing with Terrorism: Stick or Carrot? Edward Elgar Publishing Ltd.: Cheltenham, UK and Northampton, MA.

    Book  Google Scholar 

  • Golden B (1978). A problem in network interdiction. Naval Research Logistics Quarterly 25(4): 711–713.

    Article  Google Scholar 

  • Hausken K and Zhuang J (2011). The timing and deterrence of terrorist attacks due to exogenous dynamics. Journal of the Operational Research Society 63(6): 726–735.

    Article  Google Scholar 

  • He F and Zhuang J (2012). Modelling ‘contracts’ between a terrorist group and a government in a sequential game. Journal of the Operational Research Society 63(6): 790–809.

    Article  Google Scholar 

  • Hoffman B (2006). Inside Terrorism. Columbia University Press: New York, NY.

    Google Scholar 

  • Konrad KA (2004). The investment problem in terrorism. Economica 71(283): 449–459.

    Article  Google Scholar 

  • Kunreuther H and Heal G (2003). Interdependent security. Journal of Risk and Uncertainty 26(2): 231–249.

    Article  Google Scholar 

  • Lapan HE and Sandler T (1993). Terrorism and signalling. European Journal of Political Economy 9(3): 383–397.

    Article  Google Scholar 

  • Levitin G and Hausken K (2009). Redundancy vs. protection vs. false targets for systems under attack. IEEE Transactions on Reliability 58(1): 58–68.

    Article  Google Scholar 

  • Major J (2002). Advanced techniques for modeling terrorism risk. Journal of Risk Finance 4(1): 15–24.

    Article  Google Scholar 

  • McCloud K and Osborne M (2001). WMD terrorism and Usama Bin Laden. http://cns.miis.edu/reports/binladen.htm, accessed December 2012.

    Google Scholar 

  • Mickolus EF (2008). Terrorism, 2005–2007: A Chronology. Praeger Security International: Westpost, CT.

    Google Scholar 

  • Pan F, Charlton WS and Morton DP (2003). A stochastic program for interdicting smuggled nuclear material. In: Woodruff DL (ed). Network Interdiction and Stochastic Integer Programming. Kluwer Academic Publishers: Dordrecht, The Netherlands, pp 1–20.

    Chapter  Google Scholar 

  • Peters R (2001). When devils walk the earth: The mentality and roots of terrorism, and how to respond. The United States Center for Emerging Threats and Opportunities. http://www.au.af.mil/au/awc/awcgate/usmc/ceto/when_devils_walk_the_earth.pdf, accessed December 2012.

  • Report to the President of the United States (2005). Commission on the intelligence capabilities of the United States regarding weapons of mass destruction. Final report. http://govinfo.library.unt.edu/wmd/report/index.html, accessed December 2012.

    Google Scholar 

  • Salama S and Hansell L (2005). Does intent equal capability? Al-Qaeda and weapons of mass destruction. The Nonproliferating Review 12(3): 615–653.

    Article  Google Scholar 

  • Sandler T and Arce DG (2003). Terrorism & game theory. Simulation & Gaming 34(3): 319–337.

    Article  Google Scholar 

  • Sandler T and Lapan HE (1988). The calculus of dissent—an analysis of terrorists’ choice of targets. Synthese 76(2): 245–261.

    Article  Google Scholar 

  • Sandler T and Siqueira K (2006). Global terrorism: deterrence versus pre-emption. Canadian Journal of Economics 39(4): 1370–1387.

    Article  Google Scholar 

  • Sandler T and Siqueira K (2009). Games and terrorism: recent developments. Simulation & Gaming 40(2): 164–192.

    Article  Google Scholar 

  • Shan X and Zhuang J (2012). Cost of equity in homeland security resource allocations in the face of a strategic attacker. Risk Analysis. published online 19 December, doi: 10.1111/j.1539–6924.2012.01919.x.

    Google Scholar 

  • Shan X and Zhuang J (2013). Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game. European Journal of Operational Research 228(1): 262–272.

    Article  Google Scholar 

  • Washburn A and Wood K (1995). Two-person zero-sum games for network interdiction. Operations Research 43(2): 243–251.

    Article  Google Scholar 

  • Wein LM, Wilkins AH, Baveja M and Flynn SE (2006). Preventing the importation of illicit nuclear materials in shipping containers. Risk Analysis 26(5): 1377–1393.

    Article  Google Scholar 

  • Woo G (2002). Quantitative terrorism risk assessment. Journal of Risk Finance 4(1): 7–14.

    Article  Google Scholar 

  • Zhuang J and Bier VM (2007). Balancing terrorism and natural disasters—Defensive strategy with endogenous attacker effort. Operations Research 55(5): 976–991.

    Article  Google Scholar 

  • Zhuang J, Bier VM and Ashish G (2007). Subsidies in inter-dependent security with heterogeneous discount rates. The Engineering Economist 52(1): 1–19.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Copyright information

© 2015 Operational Research Society

About this chapter

Cite this chapter

Shan, X., Zhuang, J. (2015). Subsidizing to Disrupt a Terrorism Supply Chain—A Four-Player Game. In: Forder, R.A. (eds) OR, Defence and Security. The OR Essentials series. Palgrave Macmillan, London. https://doi.org/10.1057/9781137454072_12

Download citation

Publish with us

Policies and ethics