economics, game theory and terrorism (walter enders, todd sandler)

544

Upload: ben-shion

Post on 28-Dec-2015

256 views

Category:

Documents


1 download

DESCRIPTION

Game Theory analysis of Terrorism

TRANSCRIPT

Page 1: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)
Page 2: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

PATTERNS OF TRANSNATIONAL TERRORISM, 1970-99: ALTERNATIVE TIME SERIES ESTIMATES

by

Walter Enders* Department of Economics, Finance, and Legal Studies

University of Alabama Tuscaloosa, AL 35487

and

Todd Sandler

School of International Relations University of Southern California

Von Kleinsmid Center 330 Los Angeles, CA 90089-0043

Revised: October 2001

e-mail of corresponding author: [email protected] Authors' Note: Enders is the Lee Bidgood Chair of Economics and Finance, while Sandler is the Robert R. and Katheryn A. Dockson Professor of International Relations and Economics. Sandler is a member of the School of International Relations and the Department of Economics. We have profited from comments from three anonymous referees and from Patrick James.

Page 3: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

PATTERNS OF TRANSNATIONAL TERRORISM, 1970-99: ALTERNATIVE TIME SERIES ESTIMATES

Abstract

Using alternative time series methods, this paper investigates the patterns of transnational

terrorist incidents that involve one or more deaths. Initially, an updated analysis of these fatal

events for 1970-99 is presented using a standard linear model with pre-specified interventions

that represent significant policy and political impacts. Next, a (regime-switching) threshold

autoregressive (TAR) model is applied to this fatality time series. TAR estimates indicate that

increases above the mean are not sustainable during high-activity eras, but are sustainable during

low-activity eras. The TAR model provides a better fit than previously tried methods for the

fatality time series. By applying a Fourier approximation to the nonlinear estimates, we get

improved results. The findings in this study and those in our earlier studies are then applied to

suggest some policy implications in light of the tragic attacks on the World Trade Center and the

Pentagon on 11 September 2001.

Page 4: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

PATTERNS OF TRANSNATIONAL TERRORISM, 1970-99: ALTERNATIVE TIME SERIES ESTIMATES

On the morning of 11 September 2001, the world watched in horror as 19 hijackers

wreaked death and destruction on the World Trade Center and the Pentagon. The lethality of

transnational terrorism attained a new height, greatly out of line with the experience of the last

three decades where on average 400-500 people lost their lives each year in transnational

terrorist events (US Department of State, 1989-2000). In a matter of an hour, somewhere

between 5000 to 6000 innocent individuals from upwards of 62 nations died in four coordinated

hijackings. This attack underscores that the security threat confronting industrial nations is more

from clandestine groups with perceived grievances than from rogue nations. The reliance of

modern industrialized economies on technology makes them especially vulnerable to terrorist

attacks, as the events of 11 September 2001 sadly demonstrate.

Terrorism is the premeditated use or threat of use of extra-normal violence or brutality by

subnational groups to obtain a political, religious, or ideological objective through intimidation

of a huge audience, usually not directly involved with the policymaking that the terrorists seek to

influence.1 Key ingredients of the definition include the underlying political motive, the general

atmosphere of intimidation, and the targeting of those outside of the decision-making process.

Terrorists choose their targets to appear to be random so that everyone feels at risk, when getting

on a plane, entering a federal building, or strolling a market square. Business people, military

personnel, tourists, and everyday citizens, rather than politicians, are generally the targets of

terrorists attacks. In the case of the World Trade Center, the victims were not directly involved

in the political decision-making process associated with the demand (i.e., the removal of the US

presence from Saudi Arabia and an end to US support of Israel) that may have been behind the

attacks.2 The incident underscores the importance of applying sophisticated analyses to the study

Page 5: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

2

of international terrorism to better understand its patterns, in the hopes of deriving improved

policies and predictions to protect against future attacks.

Although terrorism has plagued civilization from its inception, there has been a

heightened awareness since the end of 1967 Arab-Israeli War and the start of Israeli occupation

of captured territory, at which point terrorism assumed a greater transnational character.

Whenever a terrorist incident (e.g., a bombing, plane hijacking, and assassination) in one country

involves victims, targets, or institutions of at least one other country, the incident is transnational.

Incidents to protest the Israeli occupation resulted in the hijacking of planes on international

flights, the murder of Israeli athletes at the 1972 Munich Olympics, and attacks throughout

Western Europe, and represented instances of transnational terrorism. Given the perpetrators'

citizenship and the multiple nationalities of the victims, the four simultaneous hijackings on 11

September 2001 were transnational terrorist acts. The ability of terrorist events to capture

headlines demonstrates the consequences of such tactics to others, who later adopt them for their

causes. Terrorism is particularly troublesome for liberal democracies, entrusted with protecting

the lives and property of their electorate.3 If such democracies respond inappropriately to a

terrorist threat by either caving in to terrorist demands or overly restricting freedoms, then they

can lose legitimacy and be defeated at the next election (Wilkinson, 1986, 2001).

With the availability of sufficiently long time series, economists and others have applied

time-series techniques to evaluate anti-terrorism policy effectiveness, to uncover trends and

cycles, and to estimate the effects of terrorist activities. A host of policy decisions have been

examined, including the usefulness of retaliatory raids (Brophy-Baermann and Conybeare, 1994;

Enders and Sandler, 1993), the consequences of UN conventions and resolutions on terrorist

activities (Enders, Sandler, and Cauley, 1990), and the impact of media reporting on future

events (Nelson and Scott, 1992; Scott, 2001). Past studies have decomposed the series of all

Page 6: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

3

terrorist events into its component series (e.g., assassinations, threats and hoaxes, hostage-taking

events, and bombings) so as to identify any trend or cycles.4 In so doing, it was shown that the

time series for each attack mode displays its own cycle, whose length increases with the

logistical complexity of the action. Apparently, the attack-counterattack interaction between the

terrorists and the authorities give rise to cycles that take longer to play out for more complicated

operations such as skyjackings (Enders et al., 1992). In terms of the estimated effects of

terrorism, studies have examined the relationship of terrorism and tourism as well as that

between terrorism and foreign direct investment.5

When incidents involving casualties (i.e., deaths, injuries, or both) are distinguished from

those with no casualties, there is a striking difference between the two. Namely, casualties series

display more predictability than noncasualties series, which are largely random noise once

detrended (Enders and Sandler, 2000). Thus, estimates and policy evaluation should be based on

a casualty series such as “DEATH,” where one or more deaths among terrorists or victims

resulted from the action, owing to this series’ deterministic factors. This finding suggests that

more intense terrorist events are more predictable than those with less consequence such as

threats, hoaxes, letter bombings, and other small-scale bombings.

This paper carries on the process of improving policy evaluations and estimates of the

patterns of transnational terrorism. At first, time-series-based policy evaluation relied on

intervention analysis, in which dummy variables identifying suspected impact points are tested

for significance for a single series (Cauley and Im, 1988; Enders et al., 1990). This intervention

procedure was later extended to vector-autoregressive (VAR) analysis to capture the

interrelationship among two or more series (Enders and Sandler, 1991, 1993, 1996; Nelson and

Scott, 1992), so that the introduction of, say, metal detectors in airports may curtail skyjackings

but augment hostage-taking events (e.g., kidnappings), not protected by these detectors, as

Page 7: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

4

terrorists substitute among modes of attacks in response to policy-induced changes in relative

costs. These VAR studies, like their single-series predecessors, assumed linear representations

with no regime-switching possibilities. Hence, the current exercise represents an important

departure where nonlinear techniques are also applied to the DEATH series, which displays the

greatest deterministic factors. These techniques not only allow the mean of the DEATH series to

differ according to the overall intensity of activities, but they also permit the data to indicate

points at which things become different.

In the next section, we present the terrorists' choice-theoretical model that underlies some

of the empirical findings. This is followed by some important intervention points and a

description of the data. The ensuing section distinguishes the dummy-variable intervention

analysis from the nonlinear threshold model. Next, the regime-switching model is introduced,

followed by the actual estimations. The Fourier-approximation model is estimated in the next

section. The next-to-last section addresses the implications of this article and our prior work on

the aftermath of the attacks on the World Trade Center and the Pentagon. Concluding remarks

are then given.

THEORETICAL MODEL

Our application is to transnational terrorism which has become much more prevalent

during the last thirty years as terrorists have taken advantage of improvements in

communication, transportation, and technology to intimidate a global community with threats of

violence unless their political demands are met. Transnational terrorist incidents are examples of

transboundary externalities, because actions by terrorists or reactions by governments in one

country may impose uncompensated costs or benefits on the people or property of another

Page 8: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

5

country.6 Thus, a government plagued with terrorism on its soil may spend too much on

deterrence in an effort to transfer the attack elsewhere, or else a terrorist group may achieve

maximum news coverage by staging their attack in a European capital. When an incident is

planned in one country, but executed in another, it is a transnational event. The kidnapping or

assassination of a citizen from another country in a host country is a transnational terrorist act, as

is a bombing directed at one or more foreign citizens. A skyjacking of a flight that originates in

country A, but that ends in country B, is transnational. If, however, the targeted flight has

passengers from two or more countries, the skyjacking is transnational even if it never takes off.

We focus on transnational terrorism not only because of its importance to international studies,

but also because of the availability of a long consistently coded time series. Moreover,

transnational terrorism poses an important threat to the stability of the global community. The

events of 11 September have not only disrupted air travel, but may have pushed the global

economy, already on the brink, into recession. By increasing cross-border interactions,

globalization can augment the ramifications of catastrophic transnational terrorist events.

Like any agent, terrorists' resources in any period are limited and constrain their actions

to pursue satisfaction derived from a political cause. Because our focus is on the entire series of

terrorist events, terrorists are depicted as allocating their resources between terrorist events (t)

and legal actions ( E(U)]. Terrorist events includes

bombings, skyjackings, assassinations, and other actions, while legal activities include

propaganda statements and gaining a foothold within a base country or countries of operation. A

terrorist group is viewed as allocating scarce resources, R, between legal activities with a certain

gain, g, and terrorist activities with an uncertain gain, gt. A terrorist incident may end in at least

two states: success where the incident is completed as planned, or failure where the incident is

either not completed or fails in its goal. Success is a ran

Page 9: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

6

only two states of the world are permitted for terrorist events, then (1 –

of failure. A terrorist group's expected utility is

( ) ( ) (1 ) ( ),S FE U U W U W= π + − π (1)

where U(W) is the standard von Neumann-Morgenstern utility function. Arguments WS and WF

are the net wealth equivalent measures over the two states of success, S, and failure, F. These

measures equal:

1( ) ( , )S t tW w g R g R e= + + , (2)

2( ) ( , )F tW w g R f R e= + − . (3)

In equation (2), the net wealth derived from a successful terrorist incident includes the group's

current assets net of current earnings, w, the monetary equivalent net gains from legal activities,

and the monetary equivalent net gains from the terrorist act. R represents the resources assigned

to legal actions, and Rt indicates the resources assigned to terrorism actions. In either state of the

world, monetary gains depend directly on the resources (including time) allocated by the

terrorists to either legal activities or the terror campaign, and these gains are assumed to display

diminishing returns.7 In equation (2), e1 represents the environmental factor that also helps

determine gain during a successful outcome. For example, e1 can reflect actions taken by the

authorities (e.g., freezing assets, retaliatory raids, freedom of press) that influence the benefits of

a terrorist success. As such, e1 denotes a shift parameter.

In equation (3), the net wealth for a terrorist failure includes a group's current assets plus

its net gain from legal activities minus the monetary value of the fine or penalty, f, from failure.

If the group fails but escapes, then this penalty includes wasted resources expended on the

unsuccessful event. When, however, the group is captured, the fine refers to the wasted

resources (including murdered terrorists), the opportunity costs of incarceration, and any

monetary penalties assessed. The loss of one or more terrorists results in the costs of training

Page 10: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

7

replacements. In f(•), e2 denotes an environmental factor that influences the level of losses

during failed campaigns. This factor includes activities taken by authorities, such as the severity

of sentences and extradition requests. Once again, e2 represents a shift parameter of the model.

The terrorist group's resource constraint,

R = Rt + R, (4)

closes the model and indicates that the group's total resources, R, are divided each period

between legal and terrorist activities. Expected utility in equation (1) can be rewritten in terms

of the choice variables (R, Rt) and the exogenous shift parameters by substituting equations (2)-

(4) into (1). Both the optimal levels of R and Rt are then determined by maximizing the

resulting expression for expected utility. The likely effects of government policy decisions

e1, and e2 are found through comparative-static analysis, where the

assumption of the model are used to determine the influence that changes in these policy

parameters have on the optimal choice of R and Rt. Often, additional assumptions concerning

the terrorist group's risk attitudes can help sign these comparative-static impacts.

Some results are fairly clear-cut without further mathematical analysis. Actions by the

authorities to decrease the terrorists' total resources through raids on their camps, infiltration of

the group, or by freezing their assets will curtail both legal and terrorist activities. If a retaliatory

raid were to increase the terrorists' perceived gains from terrorist attacks as means of protest,8

then the terrorists will shift resources out of legal activities into terrorist acts. During periods of

high terrorist activities, this ability to sustain even a greater level of terrorist acts is limited in

contrast to periods of low activities.

Thus far, we represent the problem as the choice-theoretic decision of a single terrorist

group. From the early 1970s, terrorist groups, engaged in transnational acts, have been tied

either explicitly or implicitly in networks consisting of left-wing terrorist groups (Alexander and

Page 11: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

8

Pluchinsky, 1992) united in their goal to overthrow democratic governments, Palestinian groups

united in their aim to establish a homeland or to destroy Israel, and fundamentalist terrorist

groups (Hoffman, 1998; US Department of State, 2001) united in their goal to create nations

founded on fundamentalist principles. Since the start of 1980, the number of religious-based

groups has increased as a proportion of the active terrorist groups: 11 of 48 groups in 1992, 16

of 49 groups in 1994, and 25 of 58 groups in 1995 (Hoffman, 1997:3). Bin Laden's al-Qaida

network includes Islamic extremist organizations in many countries, which are linked through

finances, training, and a common enemy. This network includes such groups as Abu Sayyaf (the

Philippines), Egypt's Islamic Group, Harakat ul-Mujahidin (Pakistan), Islamic Movement of

Uzbekistan, Al-Jihan (Egypt), and Bin Laden's own group (Afghanistan) (US Department of

State, 2001). Even left-wing groups and Palestinian groups have been known to train together

and to have other ties (Wilkinson, 1986, 2001; Hoffman, 1998), so that separate networks have

explicit links to one another. Implicit ties come from copying each other's tactics – the so-called

demonstration effect. These networks' common hatred of the United States and Israel means that

heightened attacks by groups in one part of the world can spark increased attacks in other parts

of the world. This implicit coordination shows up as distinct cycles of peaks and troughs in

transnational terrorist activities (Enders et al., 1992; Enders and Sandler, 1999).

Thus far, we have only considered the terrorist choice between legal and terrorist

activities. Another choice by the terrorists must, however, be made in allocating Rt among

alternative modes of attacks so as to equate the expected marginal gain per dollar spent on

alternative operations. Actions by the government to increase the difficulty (i.e., the price) of

one kind of attack will cause the terrorists to substitute into other types of attacks that now

appear to be relatively cheaper (Sandler, Tschirhart, and Cauley, 1983; Enders and Sandler,

1993). Thus, it is essential for authorities to impose policies that cause the terrorists to substitute

Page 12: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

9

into less harmful modes of attacks. Authorities have not always been successful in this aim –

e.g., increased US embassy security led to a decrease in such attacks, which usually resulted in

no injuries, and to an increase of assassinations of embassy personnel as they left secure grounds

(Enders and Sandler, 1993). In light of these substitutions, the authorities must also raise the

difficulty of all modes of attacks – e.g., by limiting terrorist resources or through intelligence on

terrorist operations.

INTERVENTIONS AND THE DATA

Six interventions or suspected changes to the terrorist time series are germane to our

analysis and discussion. These interventions are listed in Table 1 along with their abbreviations,

description, and initiation period. Although our interest is to apply a methodology that allows

for ex post data identification of significant changes in the time series, these ex ante influences,

due to either policy changes (i.e., metal detectors at airports, enhanced embassy security, or a

retaliatory raid) or political events (i.e., the rise of religious fundamental terrorism or the start of

the post-cold era),9 are required for updating the linear intervention-based analysis to 1999 and

for comparing this latter analysis to the nonlinear techniques presented at a later point. In

previous papers, five of these six interventions resulted in significant shifts to the aggregate

terrorist series and its various component series. The sole exception is the US retaliatory raid on

Libya, which resulted in just an immediate impact that dissipated rapidly as the series returned to

its pre-intervention mean.10

Data on transnational terrorism incidents are drawn from International Terrorism

Attributes of Terrorist Events (ITERATE), which records, among other things, the incident date,

its location, type of event, and casualties (i.e., deaths or injuries), if any. ITERATE 2 covers

Page 13: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

10

1968-77 (Mickolus, 1982), ITERATE 3 covers 1978-87 (Mickolus, Sandler, Murdock and

Fleming, 1989), and ITERATE 4 covers 1988-91 (Mickolus, Sandler, Murdock and Fleming,

1993). To bring the data set up to date, we coded the necessary variables for 1992:1-1999:4

based on written descriptions provided by Mickolus. Coding consistency for ITERATE 2 and its

various updates has been preserved by applying the same criteria for defining transnational

events and associated variables. This consistency was enhanced owing to an overlap among

coders and monitors – e.g., Sandler participated in the coding of the data for 1977:1-1999:4.

ITERATE drew its information from the world print and electronic sources including the

Associated Press, United Press International, Reuter tickers, major US newspapers (e.g., the

Washington Post and the New York Times), and the Foreign Broadcast Information Service

(FBIS). The FBIS Daily Reports, which draws from hundreds of world print and electronic

media sources, served as the single most important source up through the start of 1996.11

ITERATE does not contain information about state sponsorship, because countries keep this

information secret; hence, we cannot distinguish such events in our analysis.

ITERATE does not classify incidents as transnational terrorism that relate to declared

wars or major military interventions by governments (e.g., Chechnyan acts against Russian

military personnel), or guerilla attacks on military targets conducted as internationally

recognized acts of belligency. If, however, the guerilla attacks were against civilians or the

dependents of military personnel in an attempt to create an atmosphere of fear to foster political

objectives, then the attacks are considered terrorism. Palestinian acts in Israel that do not harm

foreigners are not classified as transnational terrorism. While a domestic event may become

transnational if a foreigner is the unintended victim, instances of this are rare. If this randomness

of victims was great, then the large number of US victims, who are the intended target on

average of about 40 percent of all transnational acts (US Department of State, 1989-2001), would

Page 14: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

11

not consistently characterize the data totals each year. Official government-sanctioned acts in

response to terrorist attacks, such as the US bombing of Libya or US seizure of an Egyptian

plane carrying the terrorists from the Achille Lauro incident, are not themselves coded.

ITERATE also excludes unintended acts from the data set. If, for example, a foreign newspaper

reporter is killed in the cross fire between government troops and guerillas, the reporter's death is

not considered a terrorist assassination. ITERATE, however, does code terrorist acts against

foreign aid workers or UN peacekeepers.

We extract three quarterly time series from ITERATE: (i) a DEATH series, where one or

more individuals died as a result of the incident; (ii) a WOUNDED series, where one or more

individuals were injured, but no one died, as a result of the incident; and (iii) a

NONCASUALTIES series, where no one died or was injured as a result of the incident. We use

terrorist incident “count” data computed on a quarterly, rather than weekly or daily, basis to

eliminate zero-valued observations, inconsistent with the underlying normal distribution

assumption of the various autoregressive (AR) analyses (Harvey, 1989). Based on Enders and

Sandler (2000), we shall focus on the DEATH series, which has the most deterministic factors of

the three series owing to its intensity. This earlier study showed the NONCASUALTIES series

to be essentially random after detrending and the WOUNDED series to be less deterministic than

the DEATH series. Nevertheless, we shall apply our analysis to all three series.

DUMMY VARIABLES VERSUS THE THRESHOLD MODEL

A number of papers have tried to estimate and forecast transnational terrorist events. One

key issue is to ascertain the effects of various policy interventions and political events on the

occurrence of transnational terrorism. For example, Enders and Sandler (2000) estimated the

Page 15: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

12

following autoregression (with t-statistics in parentheses):

yt = 4.037 + 0.406 yt-1 + 5.62 METALt – 0.26 EMB76t – 5.92 EMB85t (1.77) (3.22) (2.28) (–0.11) (–3.20)

– 7.93 LIBYAt + 4.17 FUNDt + 6.77POSTt (5) (–1.30) (1.89) (3.19) where yt is the quarterly number of incidents with one or more deaths. METALt, EMB76t,

EMB85t, LIBYAt, FUNDt, and POSTt are all dummy variables that represent the various

intervention points as defined previously in Table 1.

The use of dummy variables in this fashion yields some interesting findings. The impact

of metal detectors in airports is estimated to have increased the number of incidents with deaths

by 5.62 incidents per quarter, implying a substitution from skyjackings into more deadly

events.12 The steady-state value of this increase rises to 9.46 [= 5.62/(1 – 0.406) ] incidents per

quarter. Fortification of U.S. embassies in 1985, but not in 1976, is found to decrease the short-

run number of incidents with deaths by 5.92 incidents per quarter, but with a long-run effect of

9.97 fewer incidents per quarter. Moreover, the break-up of the Soviet Union is found to have a

large positive impact on terrorism: the immediate impact effect is estimated to be 6.77 incidents

per quarter rising to a total of 11.4 incidents per quarter. In Figure 1, incidents per quarter are

measured on the vertical axis and the years on the horizontal axis. The dashed line represents the

actual number of fatal incidents, while the vertical lines indicate the four significant intervention

dates. The solid locus with horizontal segments shows the estimated magnitudes of the effects of

the interventions. To depict the impact of each intervention, we set y1 equal to the actual value

of death incidents in 1970:1 and generated the remaining values using equation (5). It is clear

from Figure 1 that the mean number of incidents rose from about 6.5 to about 16 per quarter after

the installation of metal detectors in 1973. The values are shown through only 1996:2 since

equation (5) was estimated using data from 1970:1 to 1996:2.

Page 16: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

13

Some words are instructive about the political events behind some of the various peaks in

Figure 1. The peaks in 1976 and 1977 are primarily attributed to activities of Palestinian groups

outside of Israel and left-wing European terrorists (Mickolus, 1982). The spikes in 1981, 1983,

and 1985 are due to terrorist activities by left-wing groups in Europe and South America, as well

as from spillover terrorism from the Middle East (Mickolus et al., 1989). The Libyan retaliatory

raid by the United States and the backlash it caused are behind the peak in 1986. Numerous

Middle-East-motivated deadly terrorist attacks, coupled with Afghan rebel attacks in Pakistan,

led to the spike in 1988 (US Department of State, 1989). Finally, the peaks in the early 1990s

are rooted in religious fundamentalism (by HAMAS and others) and in separatism (in Sri Lanka)

(US Department of State, 1990-96). Actions by the Kurdish Workers Party in Turkey and by

narcoterrorists in Colombia also contributed to these totals. The Afghanistan War trained many

individuals with fundamentalist views, who account for many lethal events in the 1990s and

beyond.

The use of multiple dummies, however, raises a number of concerns as follows:

1. There is a danger of ex post fitting if the break points’ dates are chosen as a result of

an observed change in the variable of interest, then test statistics lose their importance. Clearly,

with enough dummy variables, any series can be fitted to any degree desired. The problem is

reinforced by the fact that the starting dates for the FUND and POST variables were found by a

grid search method, for which the two starting dates were those that maximized the overall fit of

the regression (Enders and Sandler, 1999, 2000). There is, however, less of a problem if

interventions are chosen ex ante based on hypothesized changes to the data that are then tested

for significance.

2. Other incidents that roughly coincide with the break point dates may, in part, be

responsible for the observed change in the series. For example, events surrounding the demise of

Page 17: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

14

the Soviet Union (as measured by POST) came about the time of the war in Kuwait. As

recognized by Enders and Sandler (2000), it is exceedingly difficult to distinguish between the

influences of two near, but distinct, events.

3. The efficacy of the estimates cannot rely on the usual asymptotic properties of an

autoregression. If there is a single break point, Lutkepohl (1991) showed that the standard

asymptotic properties hold if it is assumed that observations on both sides of the break increase

as sample size increases, but that a “logical problem” arises in the presence of multiple breaks.

Given that there are a fixed number of observations lying between EMB76 and EMB85,

increasing the sample size does nothing to increase the number of points lying between these two

break points. Lutkepohl (1991:410) stated that “… the large sample χ2-distribution … may be

used if the periods between the interventions is reasonable large. Since no small sample results

are available it is not clear, however, how large is large enough to obtain a good approximation

to the asymptotic χ2-distribution.”

4. The interventions need not be modeled as [0, 1] dummy variables; for example, Enders

et al. (1990) used an alternative form for the METAL dummy. Although the United States began

installing metal detectors in its airports in the first quarter of 1973, it took almost a full year for

installation to be completed internationally at major airports. As such, they used an intervention

variable equal to 1/4 in 1973:1; 1/2 in 1973:2; 3/4 in 1973:3; and 1 in 1973:4. More generally,

interventions can have temporary or permanent effects on a series that may grow or fade over

time. The standard way to determine the ‘best’ form of the intervention variable is to use the one

that provides the best in-sample fit.

5. The effects of the different dummies may overlap each other. This could be especially

problematic if there is any misspecification in the way that each dummy is allowed to affect the

system. For example, instead of being a 0 versus 1 dummy, suppose that the importance of

Page 18: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

15

Islamic fundamentalism has grown over time. The POST variable will then capture some of this

effect, leading some of the subsequent increase in terrorism resulting from FUND to be wrongly

attributed to POST.

6. The effects of the interventions are allowed to affect only the mean of the series, even

though the autoregressive coefficient(s) may themselves be affected by the changes.

7. Finally, there may be other events that influence terrorism, not included in the model –

e.g., political events in the Middle East or Latin America may have had profound effects on the

terrorism series.

Some of the problems with multiple dummy variables are apparent when we re-estimate

equation (5) using an updated version of ITERATE with observations for 1996:3-1999:4. After

incorporating these 14 additional observations into the data set, we obtain the following

regression estimates of the DEATH series:

yt = 4.10 + 0.423 yt-1 + 4.71 METALt – 0.479 EMB76t – 4.91 EMB85t (2.10) (4.98) (1.89) (–0.201) (–2.65)

– 8.64 LIBYAt + 4.02 FUNDt + 2.50 POSTt, AIC = 1008.2, SBC = 1030.4, (6) (–1.37) (1.82) (1.48) where AIC is the Akaike Information Criteria and SBC is the Schwartz Bayesian Criteria.13 If

we omit EMB76t and LIBYAt we obtain:

yt = 4.15 + 0.417 yt-1 + 4.54 METALt – 5.29 EMB85t + 3.80 FUNDt + 2.87 POSTt, (7) (2.13) (4.93) (1.99) (–2.88) (2.11) (1.72)

AIC = 1006.3, SBC = 1022.9.

Even if we use equation (7), it is striking that METALt is barely significant at the 5% level

and POSTt is not significant at the 5% level. Moreover, the absolute values of the magnitudes of

the coefficients and the associated t-statistics for EMB85t and FUNDt are all closer to zero than

in equation (5). Thus, when we use the updated data, it appears that the interventions were not

that important for the DEATH series after all. To explain the erosion in the coefficients and their

Page 19: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

16

significance, we note that the number of incidents with deaths declined throughout the updated

sample period (see the extended portion of the dashed line in Figure 1), so that the magnitude of

the jump in incidents attributed to the demise of the Soviet Union was not sustained. Moreover,

the decrease in the overall mean of the incident series pushed the t-statistics for the previously

significant interventions closer to zero. Quite simply, the recent decline in the number of

DEATH incidents makes it difficult to interpret the importance of the previous interventions.

Perhaps, the importance of POSTt had just a temporary effect lasting only a few years (see our

previous point 4); there may have been other influences not captured by the interventions (see

point 7); or the original effect of POSTt was due to overfitting (see point 1). Of course, it would

be possible to capture the decline in terrorism with yet another dummy for the 1996:3-1999:4

period, but, this simply compounds the problems encountered when using multiple interventions.

A word of caution and clarification is in order before we present some nonlinear time

series methods for addressing these issues. Linear intervention analysis has its place if

intervention points are chosen ex ante based on theoretical priors. For a skyjacking time series,

the significant of metal detectors would remain even with the addition of another few years of

data because these detectors had such a large and sustained impact on skyjackings. The

influence of metal detectors on the DEATH series, which includes all incidents and not just

skyjackings, is apt to be more tenuous as equations (6)-(7) indicate. Thus, our exploration of

alternative time series methods is not intended to dismiss intervention analysis when used with

theoretical priors in the proper setting.

REGIME-SWITCHING ESTIMATION

One way to circumvent some of the above problems is to estimate the DEATH series

Page 20: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

17

using a type of regime-switching model. Intuitively, there may be several states of the world and

the severity of terrorism may differ in each. Suppose, for example, that a political event or

policy intervention occurs that causes the amount of terrorism to switch into the high state.

Since terrorists are using relatively large amounts of their scarce resources, it would be

surprising to find that attacks exhibit a high degree of persistence in the high state. Terrorism

could persist in this high state for a while until another event takes place that switches the system

into the low state. Terrorism could then remain low until yet another political or policy shock of

sufficient magnitude occurs that switches the system back into the high state. If our theoretical

model about resource allocation is correct, then we anticipate that activity levels above the

estimated mean of the series for the high state cannot last for long, unlike the low-state scenario

where terrorist resources are not stretched and departures from the mean can persist. The cause

of the shock sufficient to switch the system could be unknown to the researcher; nevertheless, it

is possible to estimate the behavior of the terrorist incidents in the various states.

Consider a two-regime version of the threshold autoregressive (TAR) model developed

by Tong (1983, 1990):

ε+

ββ−

αα= ∑∑

=−

=− t

p

iitit

p

iititt y + I+y + Iy

10

10 )1( , (8)

where yt is the series of interest, the αi, and βi are coefficients or constants to be estimated, τ is

the value of the threshold, p is the order of the TAR model, and It is the Heaviside indicator

function:

τ<τ≥

=−

.0

1

1

1

t

tt yif

yifI (9)

The nature of the system is that there are two states of the world. In the high-terrorism

state, yt-1 exceeds the value of the threshold τ so that It = 1 and (1 – It ) = 0, where yt follows the

Page 21: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

18

autoregressive process, α0 + Σαiyt-i. Similarly, in the low-terrorism state, yt-1 falls short of the

threshold τ, so that It = 0 and (1 – It ) = 1, where yt follows the autoregressive (AR) process,

β0 + Σβiyt-i. There are essentially two attractors or potential “equilibrium” values: the system is

drawn toward α0/(1 – Σαi) in the high state and toward β0/(1 – Σβi) in the low state. Moreover,

the degree of autoregressive decay will differ across the two states if for any value of i, αi ≠ βi.

The key feature of the TAR model is that a sufficiently large εt shock can cause the system to

switch between states.

The momentum threshold autoregressive (M-TAR) model used by Tong and Lim (1980)

and Enders and Granger (1998) allows the regime to change according to the first-difference of

yt-1. Hence, equation (9) is replaced with

τ<∆τ≥∆

=−

.0

1

1

1

t

tt yif

yifI (10)

The M-TAR model is useful in capturing situations in which the degree of autoregressive decay

depends on the direction of change in yt. For example, Enders and Granger (1998) showed

that interest rate adjustments to the term-structure relationship display M-TAR behavior. If,

however, all αi = βi, then the TAR and M-TAR models are equivalent to an AR(p) model.14

!"-TAR models is straightforward.

Simply set the indicator function according to equations (9) or (10) and form the variables Ityt-i

and (1 – It )yt-i. The coefficients of equation (8) can be estimated using ordinary least squares

(OLS), and the lag length p determined as in an AR model.15#$%&''(

showed how to obtain a super-consistent estimate of the threshold parameter. For a TAR model,

the procedure is to order the observations from smallest to largest such that:

y1 < y2 < y3 ... < yT. (11)

For each value of yj)yj, set the Heaviside indicator according to equation (9), and estimate

Page 22: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

19

an equation in the form of equation (8). The regression equation with the smallest residual sum

of squares contains the consistent estimate of the threshold. In practice, the highest and lowest

15 percent of the yj values are excluded from the grid search to ensure an adequate number of

observations on each side of the threshold. For the M-TAR model, equation (11) is replaced by

the ordered first-differences of the observations.

Notice that the TAR model overcomes a number of the problems involved with the use of

dummy variables. Most importantly, the dates of the regime switch at which the series passes

the threshold are not specified ex ante by the researcher; instead, the data itself determine

whether the series is in the high- or low-terrorism state. Since there are no specific intervention

points, the standard asymptotic properties of the estimates hold. For example, the asymptotic

properties of the estimates are such that individual coefficients can be tested using standard t-

statistics and joint restrictions – such as the symmetry restriction that all αi equal all βi – can be

tested using an F-test. Obviously, there are no overlapping dummy variables and the alternative

regimes are allowed to affect the degree of autoregressive decay as well as the mean of each

series. If, therefore, the goal is to determine the magnitude of any specific intervention, such as

the effect of the end of the Cold War, then the TAR model is not especially useful, because it

includes no exogenous variables. This again emphasizes that alternative time series methods can

fulfill different purposes making them complementary.

THE ESTIMATED THRESHOLD MODEL

We begin by estimating the DEATH series as a threshold autoregressive process with a

single lagged value. As indicated by equation (7), we search over all potential thresholds to

obtain (with t-statistics in parentheses):

Page 23: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

20

yt = [ 19.95 + 0.07yt-1 ] It + [ 7.09 + 0.47yt-1 ] (1 – It ), (12) (4.63) (0.38) (3.10) (2.39)

where the estimate of the threshold is τ = 18. If we purge the model of the insignificant lagged

coefficient occurring whenever yt-1 ≥ 18 and re-estimate the model, we obtain:16

yt = [ 21.53 ] It + [ 7.09 + 0.47yt-1 ] (1 – It ), (13) (23.02) (3.12) (2.41) AIC = 1005.4, SBC = 1016.5.

Diagnostic checking indicates that the model is appropriate. For example, the first eight

autocorrelations of the residuals are less than 0.13 in absolute value and the Ljung-Box Q-

statistics for 4, 8, and 12 lags indicate that there are no significant residual correlations at

conventional levels. We also estimate the model setting p = 2, and find that the coefficients of

yt-2It and yt-2 (1 – It) are both insignificant. We set the indicator function using the M-TAR

specification. Our estimated models never fit the data as well as the TAR models reported

above.17 Finally, Tsay’s (1989) method of arranged autoregressions do not yield any evidence of

multiple thresholds.

For comparison purposes, we estimate the DEATH series as a linear autoregression. The

best-fitting model is the following AR(1) equation:

yt = 6.81 + 0.56yt-1, AIC = 1012.1, SBC = 1017.7. (14) (5.03) (7.25) Notice that AIC and SBC both select the TAR model over the linear model. In addition, as

measured by either criteria, the TAR model fits better than either intervention model reported in

equations (6) and (7). This is particularly important since the TAR model makes no use of the

“explanatory” variables employed in the intervention model. In fact, the SBC actually selects the

linear model over either of the intervention models!

The threshold model yields very different implications about the behavior of the terrorism

DEATH series than the linear models. The linear AR(1) model indicates that the sequence

Page 24: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

21

convergences to the long-run mean of approximately 15.5 incidents per quarter [ 6.81 ÷ (1.0 –

0.56) ≈ 15.5 ]. Moreover, the degree of autoregressive decay is always constant. Regardless of

whether the number of incidents is above or below the mean, the degree of persistence is

estimated to be 56%. In contrast, the estimated threshold model in equation (13) suggests there

is no single long-run equilibrium value for the number of incidents, since there are high- and

low-terrorism regimes or states. In the low state, the system gravitates toward 13 incidents per

quarter [ 7.09 ÷ (1.0 – 0.47) ≈ 13 ]. The point estimates of this low-state regime are similar to

those of the linear AR(1) model. When the number of incidents exceeds the 18-incident

threshold, there tends to be an immediate jump to 21.53 incidents per quarter. Whenever the

number of incidents exceeds 21.53, we estimate that there will be an immediate decline to 21.53

incidents in the subsequent quarter, so that, there is no persistence for terrorist activity exceeding

the key value of 21.53 incidents.18 The high-incident state can be maintained until a shock of

sufficient magnitude causes a switch of regime; but, the number of events in this high-incident

state cannot be maintained at more than 21.53 incidents. Since the estimated standard deviation

*t is equal to 6.14, the magnitude of a typical shock is likely to cause a regime switch. In

fact, we uncover a number of short-lived terrorist campaigns of heightened activity (including

one immediately following POST) – see Figure 1.

We also examine other incident series for threshold autoregressive effects. We find no

evidence of any autoregressive behavior in the non-causality series, which is dominated by

threats, hoaxes, letter bombs, and other low-intensity activities. As these incidents use few

resources, it is to be anticipated that they contain no predictable pattern. The number of

incidents containing wounded individuals (but no deaths) appeared to be a symmetric AR(2)

process. One explanation is that a TAR specification is not appropriate to capture the form of the

non-linearity in this series. Another is that these incidents use few resources relative to incidents

Page 25: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

22

with deaths, so that there may not be any important differences in the persistence of this type of

terrorism.

THE FOURIER APPROXIMATION

As indicated above, the TAR model cannot ascribe the effects of a regime switch to any

particular event. An alternative way to capture any potential non-linearity's in the data is to use

the methodology of Ludlow and Enders (2000), where a simple modification of the

autoregressive framework allows the autoregressive coefficient to be a time-dependent function

%t). For simplicit !%& %t) is

an absolutely integral function, for any desired level of accuracy, then it is possible to write:19

yt)%t)yt-1+t, (15)

with sin coss

0 k kk=1

2 k 2 k(t)= + t + t A A B

T T

π π α • • ∑ ,

where s refers to the number of f , %t).20

The key point is that the behavior of any deterministic sequence can be readily captured

by a sinusoidal function even though the sequence in question is not periodic. As such, non-

linear coefficients may be represented by a deterministic time-dependent coefficient model

without first specifying the nature of the asymmetry. The nature of the approximation is such that

the standard ARMA model emerges as a special case. If the actual data-generating process is

linear, all values of Ak and Bk in equation (15) should be zero. Thus, instead of positing a

specific model, the specification problem is transformed into one of selecting the proper

frequencies to include in equation (15). Ludlow and Enders (2000) called the approximation in

equation (15) an F-ARMA process. Since the value of s can be large, the estimation problem is

Page 26: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

23

to determine the particular Fourier coefficients to include in the analysis.

More generally, both the intercept and the degree of autoregressive decay may fluctuate

over time and it is possible to apply the method to both coefficients. Because the nonlinear

estimation may be quite complicated, we restrict ourselves to only two frequencies for the

intercept and only one (possibly different) frequency for the degree of autoregressive decay. We

use nonlinear optimization methods to obtain the maximum-likelihood estimates of:

1 1 2 20 1 2 3 4sin cos sin cost

2 k 2 k 2 k 2 k = c c ( t) + c ( t) c ( t) + c ( t) y

T T T T

π π π π+ • • + • •

3 31 1 2 3sin cos .tt t -1 t -1

2 k 2 ka y a ( t) + a ( t) + y y

T T−π π+ + • • ε (16)

The interpretation of equation (16) is that the magnitudes of any fluctuations in the

intercept term are captured by nonzero values of c1 through c4. Similarly, fluctuations in the

degree of autoregressive decay are captured by nonzero values for a2 and a3. The frequencies of

the fluctuations in the intercept are given by k1 and k2, while the frequency of the fluctuations in

the autoregressive parameter is given by k3. Clearly, the linear AR(1) model is the special case

of equation (16) where the c1 = c2 = c3 = c4 = a2 = a3 = 0. Because we are not interested in the

very high frequency changes, we limited the analysis to frequencies no greater than 10. With

100 observations, Ludlow and Enders (2000) found that the critical values for a2 and a3 are each

2.06, 2.39, and 3.02 at the 10%, 5%, and 1% significance levels, respectively. Similarly, Davies

(1987) found that the critical values for the F-statistic of c1 = c2 = 0 (c3 = c4 = 0) are 10.66,

12.18, and 15.63 at the 10%, 5%, and 1% significant levels.

The Fourier approximation in equation (16) is something quite different from the

standard Spectral Analysis. The periodiogram used in Spectral Analysis is obtained from the

Fourier expansion:

[ ] t

T

kkkt TktcTktccy ε+π+π+= ∑

=

2/

10 )/2cos()/2sin( . (17)

Page 27: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

24

In particular, Spectral Analysis uses all possible integer frequencies in the interval k = [1, T/2] in

order to assess relative contribution of high, medium, and low frequencies to the total variation

of yt. Instead, equation (16) uses only the two most significant frequencies in order to

approximate a time-varying intercept term. This is supplemented by a (possibly) third frequency

to approximate a time-varying degree of autoregressive decay. Estimating (16) and eliminating

the coefficient with t-values less than 1.96 in absolute value, we obtain:21 c0 = 11.84 (11.77), c1

= –3.24 (–5.63), c3 = –2.85 (–5.31), a1 = 0.24 (4.05) and a3 = –0.14 (–2.96), where t-statistics are

in parentheses. In addition, the frequencies are k1 = 2.105, k2 = 3.23, and k3 = 6.80.

Given that there are two frequencies for the intercept and that the degree of

autoregressive decay oscillates, the time path for the estimated series is highly nonlinear. In

order to depict the estimated movements of yt, we set y1 equal to the actual number of

incidents in 1970:1 and generated the values through 1999:4 using our estimated coefficient

values. The resulting series is shown as the fluctuating solid line in Figure 2.22 For comparison

purposes, we also include the actual number of incidents and the effects of the interventions

(now updated through 1999:4) that were shown in Figure 1.

The intervention and the F-ARMA models both suggest (i) an increase in DEATH

incidents after the installation of metal detectors in 1973 (METAL), (ii) an increase near 1979

(around the time of FUND), (iii) a sharp decline at the time of embassy fortifications in 1985

(EMB85), and (iv) a relatively constant time profile through 1992. Overall, the F-ARMA model

tracks the actual series much better than the intervention model. There are, however, some

interesting comparisons to be drawn from the different estimates of the intervention and Fourier

models. As displayed in Figure 2, the intervention model in equation (7) estimates that metal

detectors had a long-run impact of 7.79 incidents per quarter with the full impact on the DEATH

series being attained almost immediately. The Fourier model tells a different story. Beginning

Page 28: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

25

in 1973:1, the estimated number of DEATH incidents rose steadily until the third quarter of

1976. If all of this increase can be ascribed to the deployment of metal detectors, the estimated

long-run impact is 14 DEATH incidents per quarter (22 estimated incidents for 1976:3 minus

eight estimated incidents in 1972:4). Part of the discrepancy between the two estimates might be

that the installation of the detectors was not immediate. The installation of these detectors in US

airports was immediate in 1973:1, while their installation in non-US airports took place more

gradually (Enders et al., 1990).

A very interesting comparison emerges with respect to the POST variable. The

intervention results in equation (7) give the long-run impact of POST to be 4.92 additional

DEATH incidents per quarter. In contrast, the Fourier model estimates that the DEATH series

gradually rose from approximately 11 to 27 incidents throughout the 1991-94 period. Thereafter,

DEATH incidents steadily declined until the end of the sample period.

IMPLICATIONS AND POLICY RECOMMENDATIONS

In this section, we shall draw some implications and policy recommendations in regards

to the events of 11 September 2001, based on the analysis of this paper and our cumulative work

on examining terrorist time series. The attack on the World Trade Center and the Pentagon came

during a time when transnational terrorism was in a relatively low-activity period. Retaliatory

strikes typically produce a shock to the time series that generates higher levels of attacks as

terrorists protest the action (Enders and Sandler, 1993). An intertemporal substitution occurs as

terrorists move attacks planned for the future into the present to demonstrate their displeasure.

The TAR analysis findings indicate that this heightened activity can be sustained for a long

period, because it will be coming during a low-activity period when resources can be shifted

Page 29: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

26

from nonterrorist activities of these terror networks. Thus, nations associated with the alliance

forged by the United States must be vigilant for these increased attacks not only during the

period of military action begun on 7 October 2001, but also well after this period. This means

that national guard at US airports may need a longer deployment than originally planned (i.e.,

longer than six months).

All time series associated with terrorist events display cyclical behavior (Enders et al.,

1992; Enders and Sandler, 1999). This is also true of the time series with one or more casualties

(i.e., death or injuries). In Enders and Sandler (2000:322), the length of the cycles for the

casualties time series is just under two years. Thus, the trough in Figure 2 at the end of 1999 is

anticipated to be followed by a peak toward the end of 2001, which proved to be an accurate

prediction. Our work23 on the relationship between the rise of fundamentalist terrorism and

heightened casualties from terrorist attacks suggests that terrorist attacks as a reaction to

retaliatory strikes will involve a greater number of casualties than, say, the increased terrorism

following the US retaliatory raid on Libya in April 1986.

If there is a basic message from our work on the effects of policy interventions, it is that

piecemeal policy is ineffective.24 That is, efforts to secure US airports and borders will cause

terrorists to stage their attacks at other venues and in other countries against Americans. Quite

simply, terrorists respond to “higher prices” for one mode of attack stemming from a policy

intervention (e.g., better metal detectors and security screening at airports) by substituting into an

alternative mode where measures have not been taken. The installation of metal detectors in

airports cut down on skyjackings but was associated with an increase in other kinds of hostage-

taking events (Enders and Sandler, 1993). Despite recent events in New York and Washington,

DC, Americans are still most vulnerable abroad. Consider the statistics for 2000, during which

there were 423 transnational terrorist attacks worldwide. Although not a single such attack

Page 30: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

27

occurred in the United States, 200 of these attacks were against US people or property (US

Department of State, 2001:1). This poses a real dilemma for the United States, because security

measures abroad cannot be dictated to other countries. Actions by the United States to protect its

diplomatic and military personnel abroad will make its unprotected citizens more inviting

targets.

The kinds of actions that work best accomplishes one of two outcomes: a reduction in

the resources of terrorists or an increased difficulty associated with all modes of attack.

Coordinated strikes to hit the al-Qaida network throughout the world are required to attain the

first outcome. Cooperative efforts worldwide to freeze al-Qaida’s assets would also foster the

first outcome. To raise the “price” of all modes of terrorist attacks, countries would have to

increase security throughout society, which impinges on personal freedoms in liberal

democracies. Moreover, such massive actions would be prohibitively costly to countries. A

cheaper means for accomplishing the second outcome would be better field intelligence so that

any kind of planned terrorist incidents can be stopped in the planning stage.

The fight against transnational terrorism presents a serious collective action problem to

nations confronting the threat of terrorist acts. Destroying a global terrorist network represents a

pure public good to all targeted nations, because its destruction yields benefits that are both

nonrival and nonexcludable among nations (Sandler, 1997:129-138). As such, nations are apt to

free ride on the efforts of the country or countries that perceive the greatest benefits from such

actions. Given the events of 11 September 2001, the country with the most at stake from

destroying this network is the United States, followed by the United Kingdom, which lost the

second greatest number of its citizens in the World Trade Center attack. The US interest is

bolstered by it being the primary target of transnational terrorism for the last couple of decades

(US Department of State, 1989-2001). Despite the invocation of Article 5 of the NATO Treaty,

Page 31: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

28

the rooting out of the al-Qaida and other networks is anticipated to be primarily an American

operation. There is an irony here, because collective action among terrorist groups in sharing

training and financing has been quite substantial. To date, this suggests that terrorists are more

united in their common goals than are countries in addressing the transnational terrorist threat.

Perhaps, the recent horrors will change this collective action failure.

In the terrorists’ attempt for greater brutality and casualties to capture media attention, it

will be difficult to outdo the carnage or terror of 11 September. The casualties from the four

simultaneous skyjackings are equal to the cumulative deaths from all transnational terrorist

events between 1985 and 2000 (US Department of State, 1989-2001). This suggests that

symbolic targets at home and abroad that rival the World Trade Center or the Pentagon may be

chosen for the annual spectacular event that has characterized transnational terrorism over the

last 30 or so years. Another means for achieving greater casualties would be to resort to

weapons of mass destruction (e.g., biological or chemical agents) as portended by the Sarin

attack on the Tokyo subway on 20 March 1995 by Aum Shinrikyo.25 Clearly, transnational

terrorism has taken on a new threat level since 11 September.

This heightened threat level suggests that this date should be investigated as an

intervention point in future time series studies as time progresses. Have the events of this day

changed the pattern of transnational terrorism? For example, do future attacks involve greater

numbers of casualties? Has the mix of attack modes or where terrorist incidents are staged

changed since 11 September? These are questions for future time series investigations. Another

issue concerns the war on terrorism coordinated by the United States that started on 7 October

2001. The effectiveness of this war can be evaluated using intervention analysis, intervention-

VAR techniques, and TAR methods. Given its greater objective to root out terrorist networks,

this retaliatory war might have a more permanent impact than past episodic retaliations.

Page 32: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

29

CONCLUDING REMARKS

Each advance in the study of time series provide a new method that can be applied to the

analysis of transnational terrorism. In the current paper, we have used a regime-switching model

to find turning points in the time series of events, for which one or more persons die. The so-

called DEATH series is used because it is more predictable than less-intense series where

individuals are either injured or unscathed. A regime-switching model offers a better fit than

either a linear AR(1) representation or an intervention representation, with one or more dummy

variables for policy changes. With the regime-switching depiction, increases in activity above

the mean are not sustainable during high-terrorism eras, while there is a 56% persistence for

changes around the mean during low-terrorism eras. This finding has implications for policy or

political decisions that may result in either a regime switch or else a shock, insofar as the

persistence of such shocks depends on whether terrorist activities are already running high or

low.

We also applied a Fourier approximation to the nonlinear estimates of the DEATH series

for 1970:1-1999:4. In so doing, we derive better estimates than those that characterize earlier

articles. Our Fourier-series-based estimates are superior in identifying recent downturns in the

lethality of transnational terrorism in the post-cold war era.

The appropriate technique depends on the issue under investigation – there is no time

series method best for all issues. The TAR model is best applied to a single time series at a time

in contrast to the VAR model. If, for example, the effectiveness of a policy intervention – e.g.,

heightened security measures at US airports in the wake of the 11 September attacks – is under

scrutiny, then intervention analysis applied to the study of multiple time series is the preferred

Page 33: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

30

methodology. When a single time series is pertinent, TAR and intervention analysis can be both

applied to determine which results have the better statistical properties. In the case of the

DEATH series, TAR appeared to be the more appropriate representation.

Page 34: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

31

References

Alexander, Y. and D. Pluchinsky (1992) Europe’s Red Terrorists: The Fighting Communist

Organizations. London: Frank Cass.

Brophy-Baermann, B. and J.A.C. Conybeare (1994) Retaliating Against Terrorism: Rational

Expectations and the Optimality of Rules Versus Discretion. American Journal of

Political Science 38:196-210.

Cauley, J. and E.I. Im (1988) Intervention Policy Analysis of Skyjackings and Other Terrorist

Incidents. American Economic Review Papers and Proceedings 78:27-31.

Chan, K.S. (1993) Consistency and Limiting Distribution of the Least Squares Estimator of a

Threshold Autoregressive Model. The Annals of Statistics 21:520-533.

Davies, R. (1987) Hypothesis Testing When a Nuisance Parameter is Present Only Under the

Null Hypothesis. Biometricka 74:33-43.

Enders, W. and C.W.J. Granger (1998) Unit-Root Tests and Asymmetric Adjustment with an

Example Using the Term Structure of Interest Rates. Journal of Business and Economic

Statistics 16:304-311.

Enders, W., G.F. Parise, and T. Sandler (1992) A Time-Series Analysis of Transnational

Terrorism: Trends and Cycles. Defence Economics 3:305-320.

Enders, W. and T. Sandler (1991) Causality between Transnational Terrorism and Tourism:

The Case of Spain. Terrorism 14:49-58.

Enders, W. and T. Sandler (1993) The Effectiveness of Anti-Terrorism Policies: Vector-

Autoregression-Intervention Analysis. American Political Science Review 87:829-844.

Enders, W. and T. Sandler (1996) Terrorism and Foreign Direct Investment in Spain and

Greece. KYKLOS 49:331-352.

Enders, W. and T. Sandler (1999) Transnational Terrorism in the Post-Cold War Era.

Page 35: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

32

International Studies Quarterly 43:145-167.

Enders, W. and T. Sandler (2000) Is Transnational Terrorism Becoming More Threatening? A

Time-Series Investigation. Journal of Conflict Resolution 44:307-332.

Enders, W., T. Sandler, and J. Cauley (1990) Assessing the Impact of Terrorist-Thwarting

Policies: An Intervention Time-Series Approach. Defence Economics 2:1-18.

Harvey, A.C. (1989) Forecasting, Structural Time Series Models and Kalman Filter.

Cambridge: Cambridge University Press.

Hoffman, B. (1998) Inside Terrorism. New York: Columbia University Press.

Hoffman, B. (1997) The Confluence of International and Domestic Trends in Terrorism.

Terrorism and Political Violence 9:1-15.

Ludlow, J. and W. Enders (2000) Estimating Non-Linear Time-Series Models Using Fourier

Coefficients. International Journal of Forecasting 16:333-347.

Lutepohl, Helmut (1991) Introduction to Multiple Time Series Analysis. Berlin: Springer-

Verlag.

Mickolus, E.F. (1982) International Terrorism: Attributes of Terrorist Events 1968-1977

(ITERATE 2). Ann Arbor, MI: Inter-University Consortium for Political and Social

Research.

Mickolus E.F., T. Sandler, and J.M. Murdock (1989) International Terrorism in the 1980s: A

Chronology of Events, 2 vols. Ames, IA: Iowa State University Press.

Mickolus, E.F., T. Sandler, J.M. Murdock, and P. Fleming (1989), International Terrorism:

Attributes of Terrorist Events 1978-87 (ITERATE 3). Dunn Loring, VA: Vinyard

Software.

Mickolus, E.F., T. Sandler, J.M. Murdock, and P. Fleming (1993), International Terrorism:

Attributes of Terrorist Events 1988-1991 (ITERATE 4). Dunn Loring, VA: Vinyard

Page 36: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

33

Software.

Midlarsky, M.I., M. Crenshaw, and F. Yoshida (1980) Why Violence Spreads: The Contagion

of International Terrorism. International Studies Quarterly 24:262-298.

Nelson, P.S. and J.L. Scott (1992) Terrorism and the Media: An Empirical Analysis. Defence

Economics 3:329-339.

Sandler, T. (1997) Global Challenges: An Approach to Environmental, Political, and Economic

Problems. Cambridge: Cambridge University Press.

Sandler, T. and H.E. Lapan (1988) The Calculus of Dissent: An Analysis of Terrorists’ Choice

of Target. Synthese 76:245-261.

Sandler, T., J.T. Tschirhart, and J. Cauley (1983) A Theoretical Analysis of Transnational

Terrorism. American Political Science Review 77:36-54.

Schmid, A.P. and A.J. Jongman (1988) Political Terrorism: A New Guide to Actors, Authors,

Concepts, Data Bases, Theories, and Literature. New Brunswick, NJ: Transaction

Books.

Scott, J.L. (2001) Media Congestion Limits Media Terrorism. Defence and Peace Economics

12:215-227.

Tong, H. (1983) Threshold Models in Non-Linear Time Series Analysis. New York: Springer-

Verlag.

Tong, H. (1990) Non-Linear Time-Series: A Dynamical Approach. Oxford: Oxford University

Press.

Tong, H. and K.S. Lim (1980) Threshold Autoregression, Limit Cycles and Cyclical Data.

Journal of Royal Statistical Society. Series B (Methodological) 42:245-292.

Tsay, R.S. (1989) Testing and Modeling Threshold Autoregressive Processes. Journal of the

American Statistical Association 84:231-240.

Page 37: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

34

US Department of State (various years, 1989-2001) Patterns of Global Terrorism. Washington,

DC: US Department of State.

Wilkinson, P. (1986) Terrorism and the Liberal State, revised ed. London: Macmillan.

Wilkinson, P. (2001) Terrorism Versus Democracy: The Liberal State Response. London:

Frank Cass.

Page 38: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

35

Footnotes

1. This definition captures the essential features of those in the literature. See Hoffman

(1988, chap. 1), Mickolus (1982), and Schmid and Jongman (1988).

2. Since no claim of responsibility or demands have been made in wake of the attacks,

no one knows for sure what these atrocities were intended to achieve. If the attacks were

directed by Osama Bin Laden, as the evidence suggests, then his demands are the ones listed in

parentheses.

3. The seminal study on the terrorist dilemma confronting a liberal democracy is

Wilkinson (1986).

4. Articles that analyze trends and cycles include Cauley and Im (1988), Enders, Parise,

and Sandler (1992), and Enders and Sandler (1999). A pioneering analysis by Midlarsky,

Crenshaw, and Yoshida (1980) was the first to employ the autocorrelation function in the study

of terrorist time series.

5. The causality between transnational terrorism and Spanish tourism was investigated

by Ender and Sandler (1991), whereas the relationship between terrorism and foreign direct

investment for a few select countries was studied by Enders and Sandler (1996).

6. On these transboundary externalities, see Sandler and Lapan (1988).

7. Diminishing returns to terrorists’ resources are reflected by 0, 0, 0,t tR R RRg g g> > <

and 0,RRg < where subscripts on the respective gain function indicate first- and second-order

partial derivatives. These partials indicate that resources have a positive, but declining, marginal

impact on gain.

8. Studies on the aftermath of retaliatory raids have consistently found an heightened

level of terrorism following such raids (Enders and Sandler, 1993; Brophy-Baermann and

Conybeare, 1994).

Page 39: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

36

9. With the start of the post-cold war era, there is a ratcheting down of the number of

terrorist events as state-sponsors reduced their support of transnational terrorism, and Russia and

the United States had few faceoffs (Enders and Sandler, 1999, 2000; Hoffman, 1998).

10. The impact of these interventions was shown in Enders and Sandler (1993, 1999,

2000) and Enders et al. (1990).

11. For a more in-depth description of the sources for ITERATE, consult Mickolus,

Sandler, and Murdock (1989, vol. 1, pp. ix-xxvi). This source also has the working definition for

transnational terrorism that the coders were instructed to apply.

12. This substitution into more deadly events is also shown in Enders and Sandler

(1993).

13. AIC is calculated as T•rss + 2•k, where T = number of usable observations, rss =

residual sum of squares, and k = number of parameters estimated. SBC is calculated as T•rss +

ln(T)•k. Note that the SBC tends to select the more parsimonious model since it heavily

penalizes the inclusion of additional coefficients (k).

14. AR(p) refers to an autoregressive model with a lag length of p periods.

15. To allow for the different intercepts, we must include It and (1 – It) as regressors.

16. For the TAR model, the value of τ has to be estimated. Hence, we include it as a

parameter when calculating the AIC and the SBC (i.e., we add 1 to the value of k ).

17. To save space, we do not report the estimated M-TAR models. Moreover, Tsay’s

(1989) method of arranged autoregressions do not yield any evidence of multiple thresholds or of

a delay parameter other than unity. Details are available from the authors on request.

18. Similarly, when there are more than 18, but less than 21.53 incidents, we estimate

that there will be a jump to 21.53 units in the subsequent period. Thus the skeleton of the system

is such that there are two long-run equilibria: 13 and 21.53 DEATH incidents per quarter.

Page 40: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

37

Because the equilibrium value in the high-terrorism state is close to the threshold value of 18,

shocks are more likely to cause the system to shift from the high to the low state than from the

low to the high state.

&'-%t) have the Fourier expansion:

••∑

tT

k2 B + t

T

k2 A + = (t) kk

=1k0

ππαα cossin

and define Fs(t) to be the sum of the Fourier coefficients:

•π•π∑ t

T

k2 B + t

T

k2 A = (t)F kk

s

1=k

s cossin .

Then, for any arbitrary positive number h, there exists a number N such that:

| – Fs(t) | .h for all s / N.

20. The Fourier approximation can also be applied to any changes in the intercept term

and/or any moving-average terms.

21. Davies (1987) provides critical values for the F-statistic but does not provide critical

values for the individual t-statistics. The eliminated coefficients for the mean (i.e., c2 and c4)

each had a t-statistics of less than 1.4 in absolute value. As these coefficients are small relative

to their standard error, the time path of the Fourier model, later shown in Figure 2, is virtually

unaffected by the exclusion.

22. Note that these are not 1-step ahead forecasts – instead, they are analogous to the

fitted values from the intervention model. The series shown represents the fitted values of yt if

*t had been equated to zero.

23. Enders and Sandler (2000) showed that in recent years, each incident is almost 17

percentage points more likely to result in death or injuries. This increased lethality was related

to the shift away from left-wing terrorism to fundamentalist terrorism.

Page 41: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

38

24. For a theoretical model on the ineffectiveness of piecemeal policy, see Sandler and

Lapan (1988).

25. During rush hour, eleven sarin-filled bags planted on five subway trains created

terror, pandemonium, and injuries at fifteen Tokyo subway stations, resulting in the deaths of

twelve people and the hospitalization of more than 5,000.

Page 42: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Interventions Actual

Figure 1: Effects of the InterventionsEstimated through 1996:2

years

Inci

den

ts p

er q

uar

ter

70 73 76 79 82 85 88 91 94 970

5

10

15

20

25

30

35

40

Page 43: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Fourier Actual Intervention

Figure 2: The F-ARMA and Intervention Models

years

Inci

den

ts p

er Q

uar

ter

70 73 76 79 82 85 88 91 94 970

5

10

15

20

25

30

35

40

Page 44: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Table 1. Interventions

Abbreviation Description Starting Date

METAL Metal detectors installed in US airports on 5 January 1973, followed shortly thereafter by their installation in airports worldwide.

1973:1

EMB76 A doubling of the spending to fortify and secure US

embassies beginning in October 1976. 1976:4

FUND The rise of religious fundamentalist-based terrorism

starting with the 4 November 1979 takeover of the US embassy in Tehran. Intervention date established statistically in Enders and Sandler (2000).

1979:4

EMB85 Further increases in spending to secure US embassies by

Public Law 98-533 in October 1985. 1985:4

LIBYA US retaliatory raid against Libya on the morning of 15

April 1986 for its alleged involvement in the terrorist bombing of La Belle Discothèque in West Berlin on 5 April 1986.

1986:2

POST The start of the post-cold war era with the official demise

of the Warsaw Pact on 1 July 1991 and the breakup of the Soviet Union on 20 December 1991.

1991:4

* For just LIBYA, the dummy variable for the intervention is 1 for the quarter beginning the intervention and 0 thereafter. For the other five interventions, the dummy variable remains at the value of 1 for all periods after the intervention

Page 45: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

AN ECONOMIC PERSPECTIVE ON TRANSNATIONAL TERRORISM

by

Todd Sandler School of International Relations University of Southern California

Von Kleinsmid Center 330 Los Angeles, CA 90089-0043

[email protected] 213-740-9695

213-742-0281 (fax)

and

Walter Enders* Department of Economics, Finance, and Legal Studies

University of Alabama Tuscaloosa, AL 35487 [email protected]

205-348-8972 205-348-0590 (fax)

February 2002

*Walter Enders is the Lee Bidgood Chair of Economics and Finance in the School of Business at the University of Alabama. Todd Sandler is the Robert R. and Katheryn A. Dockson Professor of International Relations and Economics. He is a member of the School of International Relations and the Department of Economics at the University of Southern California. Sandler acknowledges research support from the Center for International Studies, University of Southern California to update the ITERATE data for 1999-2000. The authors have profited from helpful comments from Daniel Arce.

Page 46: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

AN ECONOMIC PERSPECTIVE ON TRANSNATIONAL TERRORISM

On 11 September 2001, the world watched aghast as two commercial airliners toppled the

twin towers of the World Trade Center and a third airliner plowed into the Pentagon. Yet a

fourth hijacked plane landed short of its intended Washington, DC target as passengers took

matters into their own hands. Economic methods – both theoretical and empirical – have been

applied by a small group of economists to understand a host of issues associated with such

terrorist events. These issues concern the policy effectiveness of alternative responses (e.g.,

toughening punishments, retaliatory raids, installing technological barriers), negotiation

responses in hostage incidents, the terrorists’ choice of target, the economic impacts of terrorism,

and others.

Terrorism is the premeditated use, or threat of use, of extranormal violence to obtain a

political objective through intimidation or fear directed at a large audience. An essential aspect

of this definition concerns the presence of a political objective (e.g., getting the United States out

of the Persian Gulf states) that the terrorist acts or campaigns of terror are designed to achieve.

Incidents that have no specific political demand are criminal rather than terrorist acts – e.g.,

extortion for profit. Another crucial ingredient is the use of extranormal violence or brutality to

capture news headlines. As the public becomes numb to their acts of violence, terrorists respond

with more ghastly actions to recapture media attention. Thus, the escalation experienced on 11

September 2001 came as no surprise to those who study terrorism. Moreover, terrorists often

direct their violence and threats toward a vulnerable target group, not immediately involved with

the political decision-making process that they seek to influence. The two planes that were

crashed into the World Trade Center fit this pattern, while the planes that were intended for

targets in Washington, DC do not fit this pattern. In a deliberate attempt to create a general

atmosphere of fear, terrorists strike at a variety of targets with alternative modes of operations

Page 47: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

2

(e.g., assassinations, bombings, kidnappings), thus making it difficult for the authorities to

anticipate the venue of the next incident. Such actions make attacks appear to be random, so that

a targeted society must expend large amounts of resources to protect a wide range of

vulnerabilities. This simulated randomness provides terrorists with a cost advantage over the

stronger authorities who must defend against the threat that they pose (Hirshleifer, 1991).

Because people tend to overrespond to unlikely catastrophic events while ignoring more likely

daily dangers (e.g., dying in a car accident), terrorists succeed in achieving society-wide anxiety

with a minimal amount of resources.

When a terrorist incident in one country involves victims, targets, institutions,

governments, or citizens of another country, terrorism assumes a transnational character. In the

World Trade Center tragedy, citizens from over 80 countries lost their lives at the hands of

terrorists who crossed into the United States from abroad. Obviously, the four hijackings on 11

September constitute transnational terrorist attacks. The kidnappings of foreigners in Lebanon

during the 1980s, as a protest against Israeli-occupied territory, also represent transnational

terrorism. Transnational terrorist incidents are transboundary externalities, insofar as actions

conducted by terrorists or authorities in one country may impose uncompensated costs or

benefits on people or property of another country. As such, myriad market failures are

associated with collective actions to curb international terrorism.

The application of economic methods to the study of terrorism began with Landes (1978),

who applied the economics of crime and punishment to the study of skyjackings in the United

States. Economic methodology is particularly well-suited to provide insights over and beyond

those from a political science approach, the latter of which has stressed definitions, institutional

factors, and case studies in an inductive framework (see, e.g., Crenshaw, 1992; Hoffman, 1998;

Wilkinson, 1986; Wilkinson and Stewart, 1987). First, economic analysis can account for the

Page 48: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

3

strategic interactions among opposing interests – e.g., the terrorists and the authorities, between

two targeted countries. Second, rational-choice models, based on microeconomic principles, can

be applied to ascertain how terrorists are apt to respond to policy-induced changes to their

constraints. The same methods can be used to analyze how governments react to terrorist-

induced changes to their policymaking environment. Third, the theory of market failures can

underscore how independent pursuits of well-being by the agents may be at odds with socially

efficient outcomes. Thus, governmental failures may result from well-intentioned policies.

Fourth, various economic empirical methods can be applied to evaluate theoretical predictions

and policy recommendations.

The primary purpose of this article is to demonstrate novel insights already gained from

applying an economic perspective to a political problem. A second purpose is to highlight the

role of game theory and other modern economics tools in the study of transnational terrorism. A

third purpose is to present some new applications of economic methods to this crucial problem

area.

A Look at the Data

To provide a perspective of the nature of the transnational terrorist threat, we compile

Table 1 based on data from the US Department of State (1988-2001). This table indicates the

annual number of transnational terrorist events, the associated deaths, the number of wounded,

and the number of attacks against US people and/or property. A number of essential facts can be

drawn from these numbers. First, transnational terrorism on average results in relatively few

deaths, especially when compared with the annual 40,000 people killed on US highways, so that

the events on 11 September are clear outliers. In fact, the deaths on this single day is

approximately equal to all transnational terrorist-related deaths recorded during the entire 1988-

Page 49: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

4

2000 period. Second, transnational terrorism appears to follow a cyclical pattern with much of

the 1990s being a relatively calm era. Something that cannot be seen from Table 1 is that a high

proportion of total casualties for a given year is typically associated with a couple of

“spectacular” events – e.g., the simultaneous bombings of the US Embassies in Nairobi, Kenya

and Dar es Salaam, Tanzania account for 291 deaths and almost 5,000 injuries in 1998 (US

Department of State, 1999). Third, attacks against US interests account for a relatively high

proportion of events. This is particularly noteworthy from an externality viewpoint, because

relatively few incidents take place on US soil – in 1998 and 2000, there were no such events,

while, in 1999, there was just one such event (US Department of State, 1999-2001).

By having relatively secure borders, the United States must rely on foreign governments

to protect US citizens and property while abroad. Terrorists that target US interests – e.g.,

Revolutionary Organization 17 November in Greece – may operate with impunity if the risks to

foreigners are of little concern to the local government.1 This leads to underdeterrence of

terrorism from a multi-country viewpoint (Lee, 1998). If, instead, much of the threat is to a host

country’s interests, then overdeterrence may result as the country does not account for the

transference externality of causing the terrorists to switch their attacks to another less-protected

country. In the overdeterrence scenario, each country engages in a Prisoners’ Dilemma “arms

race” to deflect the common terrorist threat to an alternative venue (Sandler and Lapan, 1988).

Unless such actions decrease the overall level of attacks, each country expends resources without

reducing the overall threat or securing their citizens’ safety, which is particularly relevant when

these citizens are targeted in other countries. This is a real concern for the United States, which

has deflected almost all attacks on its interests to foreign soil.

Data

Page 50: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

5

Except for some annual totals, government-collected data sets have not been made

available to researchers. RAND also maintains data on significant transnational terrorist

incidents and has made it available to some researchers. Edward Mickolus (1980, 1982)

developed a data set, International Terrorism: Attributes of Terrorist Events (ITERATE) for

1968-77. This incident-based data set was extended to cover 1978-87 and 1988-91 by Mickolus,

Sandler, Murdock, and Fleming (1989, 1993). More recently, Fleming (2001) has updated some

40 variables for 1992-98, while Sandler has updated select variables for 1999-2000. ITERATE

uses a host of sources for its information, including the Associated Press, United Press

International, Reuters tickers, the Foreign Broadcast Information Service (FBIS) Daily Reports,

and major US newspapers (e.g., the Washington Post, New York Times).

ITERATE poses a number of shortcomings that researchers must take into account when

testing theories. By relying on newspaper accounts, ITERATE is better at chronicling the

actions of terrorists (e.g., number of terrorists in a hit squad, terrorists’ actions during

negotiations) than in recording those of the authorities. In select instances, government strategy

is revealed by newspapers and is coded by ITERATE. Because ITERATE is an events data set,

researchers must rely on event counts rather than on continuous measures of intensity unless

casualty counts are used (Enders and Sandler, 2000, 2001). ITERATE picks up newsworthy

transnational terrorist incidents, so that there is some bias, which must be recognized. The bias

is worsened since mid-1996 when the FBIS Daily Reports was no longer available to ITERATE

coders.

Despite these difficulties, ITERATE is suited to a wide range of empirical tasks. For

example, it can display trends and cycles for newsworthy events for forecasting purposes (e.g.,

Cauley and Im, 1988; Enders, Parise, and Sandler, 1992). The data have even been used to

investigate terrorist and government bargaining behavior in hostage-taking events – i.e.,

Page 51: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

6

kidnapping, skyjackings, and takeover of facilities (barricade and hostage-taking events) – by

Atkinson, Sandler, and Tschirhart (1987). This latter study applied a time-to-failure model,

where the length of an incident is related to choice variables of the adversaries – e.g., sequential

release of hostages, allowing deadlines to pass uneventfully, number of hostages secured.

Based on ITERATE data, we display two quarterly time series – all transnational

incidents and bombings – in Figure 1 for 1970-2000. From Figure 1, we can see that

transnational terrorism displays peaks and troughs. Bombings are the favorite mode of operation

of terrorists, accounting for about half of all transnational terrorist incidents on average in any

given year. Additionally, the bombing time series tracks the all-incident series rather well. The

latter half of the 1990s represents a downturn in transnational terrorism due, in large part, to

fewer states sponsoring terrorism in the post-Cold War era (Enders and Sandler, 1999). In

Figure 2, the quarterly time series for assassinations and hostage-taking events are displayed for

1970-2000. Cycles are again prevalent. The two time series display far fewer incidents per

quarter than bombings. If terrorists are rational actors, as we suppose, then they should respond

to risk and engage less frequently in those events that are more risky and logistically complex,

such as assassinations and hostage taking (Sandler, Tschirhart, and Cauley, 1983). Insofar as

terrorists must allocate scarce resources from a budget (resource) constraint to alternative tactics,

choices among attack modes are interdependent.

In Figure 3, we display the quarterly percentage of incidents with casualties (i.e., deaths

or injuries) for the 1970-2000 period. This time series is noteworthy because it indicates that

since the early 1990s, transnational terrorist incidents, although down in number, are more likely

to end in injuries or death for targeted individuals. Terrorist experts have documented a change

in the makeup and motivation of the general perpetrators of terrorism since the takeover of the

US Embassy in Tehran in November 1979 (Hoffman, 1998). From the late 1960s until the latter

Page 52: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

7

1980s, transnational terrorism has been primarily motivated by nationalism, separatism, Marxist

ideology, and nihilism (Wilkinson, 1986). In the 1990s, the motivation of terrorism has changed

with “the emergence of either obscure, idiosyncratic millennium movements” or religious-based

fundamentalist groups (Hoffman, 1997, p. 2). Since the beginning of 1980, the number of

religious-based groups has increased as a proportion of the active terrorist groups: 2 of 64

groups in 1980, 11 of 48 groups in 1992, 16 of 49 groups in 1994, and 25 of 58 groups in 1995

(Hoffman, 1997, p. 3).

With the earlier prevalence of leftist-based organizations that wanted to win the hearts

and minds of the people, such terrorist groups avoided casualties except of individuals

characterizing the establishment or the “enemy.” Today, fundamentalist terrorist groups

purposely seek out mass casualties, viewing anyone not with them as a legitimate target. Thus,

the events of 11 September with their massive casualties of innocent people of all ages came as

no surprise to those of us who study terrorism and warned of an ominous changing nature of

transnational terrorism. In a recent time-series-based study, Enders and Sandler (2000) show

that a significant rise in casualties from transnational incidents can be traced back to the takeover

of the US Embassy in Tehran, as speculated by Hoffman (1998). In recent years, an incident is

almost 17 percentage points more likely to result in death or injury compared with the earlier

eras of leftist terrorism.

Trends and Cycles

Judging by the public’s and media’s reaction to 11 September, one might conclude that

international terrorism is on the rise, but Figures 1 and 2 (displayed earlier) indicate just the

opposite trend. This misperception may be due to the increasing likelihood of an incident

resulting in casualties, making incidents on average more newsworthy. The standard procedure

Page 53: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

8

for ascertaining the form of a deterministic trend is by fitting a polynomial in time (t), where

additional trend terms (i.e., t, t2, t3) are added until the associated coefficient is no longer

statistically significant. For 1968-2000, we investigate trends for six time series extracted from

ITERATE: hostage taking, bombings (of all types), threats and hoaxes (i.e., threatened future

incidents or a false claim for a concurrent incident – a bomb aboard a plane, when there is no

bomb), assassinations, incidents with casualties, and all transnational terrorist incidents. Table 2

indicates the polynomial trend estimates for these six series (where time = t), all of which are

characterized by a nonlinear trend. The t-ratios associated with the coefficient estimates are

indicated in parentheses beneath the constant and the time trend terms. Five of the six series are

represented by a quadratic trend with a negative coefficient for the squared time term. This

characterization reflects the fact that series tended to rise in the late 1960s and to decline in the

late 1990s. Only the threats and hoaxes series is represented by a more complicated cubic trend;

nevertheless, this series also displays a similar inverted U-shaped pattern.

In Table 2, the next-to-the-last column on the right reports the F-statistics and their

“prob” values in brackets, representing the statistical significance of the overall regression.

These significance levels are all zero to three digits, which are strongly supportive of the fitted

nonlinear trend equations. Such fitted trends are not useful for very long-term forecasting,

because there is little reason to believe that the number of incidents will continue to decline.

Instead, the fit of the nonlinear trend cautions against simple statements about a decidedly

upward or downward trend to any form of international terrorism. Such proclamations are

common in the media and the political science literature.2 The trend analysis suggests that there

is persistence in each of the incident series – high and low levels of terrorism come in waves or

cycles. Shocks to any incident series are not permanent, so that there is a reversion toward a

long-run mean.

Page 54: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

9

Cycles in terrorism data have been attributable to a number of factors. Alexander and

Pluchinsky (1992) explain fluctuations in terrorism using demonstration and copycat effects.

Heightened public sensitivity following a successful terrorist attack induces other terrorists to

strike when media reaction is likely to be great. The anthrax attacks following the events of 11

September appear to correspond to this pattern. Economies of scale in planning terrorist

incidents by terrorist groups or networks may also lead to the bunching of attacks. Cycles may

also stem from the attack-counterattack process between the terrorists and authorities. Public

opinion following a spate of attacks can prompt governments’ periodic crackdowns that

temporarily create a lull in transnational terrorism. These downturns are subsequently followed

by countermeasures and recruitment by the terrorists as they prepare for a new offensive. Chalk

(1995) indicates that cycles based on public-opinion pressure swings are in the three to five year

range, insofar as time is required for the public to unite and successfully make their demands on

officials to do something – a prediction borne out by time series investigations (Enders and

Sandler, 1999).

In our past work, we find that each type of terrorist series has its own characteristic cycle

that hinges on the logistical complexity of the attack mode. Enders and Sandler (1999) and

Enders, Parise, and Sandler (1992) argue that logistically complex events such as skyjackings,

large suicide car bombings, and assassinations will have longer cycles than less sophisticated

events as the attack-counterattack interaction among adversaries takes longer. Such complex

missions utilize relatively large amounts of resources as compared to small explosive bombings,

threats, and hoaxes. Given their resource constraints, terrorists can more easily gear up for a

campaign dominated by small bombs than one relying on more resource-intensive events.

The theory of Fourier series allows a wide class of functions to be expressed in terms of

sine and cosine components. To uncover the underlying cycles in a series, a researcher must

Page 55: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

10

regress the detrended values of a series on all frequencies in the interval [1, T/2], where T is the

number of observations. The frequency of a series indicates how fast the underlying cycle is

completed – a low (high) frequency implies a long (short) cycle. A graph depiction the

proportionate variation explained by each frequency (called the periodogram) has large peaks

representing the crucial underlying frequencies. Some series with obvious cycles, like sunspots

or average daily temperatures, will display a periodogram with a single focal frequency. Given

the stochastic behavior of terrorists and the measures applied to curb terrorism, there is unlikely

to be one deterministic frequency that dominates the periodicity for any of the six series. Thus,

we use a different approach than trying to identify one particular frequency. Series with long

periods will have most of their variance explained by the low frequencies, whereas series with

short periods will have most of their variance explained by high frequencies.

In accordance with spectral analysis, we detrended each series using the fitted polynomial

trends in Table 2. The last two columns of Table 2 report the total variance of each series and

the proportion of this variance accounted for by the lowest 15 percent of the frequencies.3 We

anticipate that the logistically complex incident types will have relatively large amounts of this

proportion attributable to the low frequencies. The all-events series has a large variance of

1335.56 with just 25.2 percent corresponding to the relatively low frequencies. In marked

contrast, the more complex events of assassinations and those involving casualties have smaller

variances with more of this variance (41.1 and 52.7 percent, respectively) attributed to low

frequencies. Threats and hoaxes display the greatest evidence of short cycles with just 24.7

percent of the variance explained by the longest cycles. The variance results for hostage taking

and bombing events imply moderately short cycles. Only in the case of hostage taking are our

priors not realized.

Page 56: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

11

Game Theory and Hostage Taking

To date, there have been seven economic analyses of hostage-taking events – i.e.,

Atkinson, Sandler, and Tschirhart (1987), Lapan and Sandler (1988), Selten (1988), Islam and

Shahin (1989), Sandler and Scott (1987), Scott (1991), and Shahin and Islam (1992). The first

three studies stress game-theoretic aspects, while the latter four studies do not. We focus our

remarks around the Lapan and Sandler (1988) study, which is the most general of these three

game-theoretic studies. The question posed by their investigation is whether or not a stated

policy by which a government precommits never to negotiate with hostage takers will have the

intended consequence of keeping terrorists from ever taking hostages. The conventional wisdom

states that if terrorists know ahead of time that they have nothing to gain that they will never

abduct hostages. This belief has become one of the four pillars of US policy with respect to

addressing transnational terrorism – i.e., “make no concessions to terrorists and strike no deals”

(Malvesti, 2001; US Department of State, 2001, p. iii).

The underlying game tree is displayed in Figure 4, where the government goes first and

chooses a level of deterrence, D, which then determines the likelihood, θ, of a logistical failure

(i.e., failure to secure hostages). Because deterrence expenditure (equivalent to D) must be paid

by the government in all states of the world, it is analogous to an insurance premium and is,

hence, part of the cost to the government’s payoff, listed above that of the terrorists, at the four

endpoints to this simple game in Figure 4. More risk-averse governments choose higher

deterrence levels and experience less hostage taking at home. Once deterrence is decided, the

terrorists must then choose whether or not to attack. The probability of an attack, Ω, depends on

whether the terrorists’ expected payoffs from a hostage-taking attack are positive.4 If hostages

are apprehended (i.e., logistical success occurs), then the government must decide whether or not

to capitulate to terrorists’ demands, where p is the likelihood of government capitulation. The

Page 57: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

12

probability of a hostage-taking incident increases with the likelihood of a logistical success, the

probability of a government capitulation (if hostages are secured), and the benefit of a successful

operation, m. In contrast, the likelihood of an attack decreases with smaller terrorist payoffs

associated with logistical and negotiating failures – i.e., smaller |c| and .m!

The conventional wisdom for the never-to-capitulate policy hinges on at least four

implicit assumptions: (i) the government’s deterrence is sufficient to stop all attacks; (ii) the

government’s pledge is fully credible to all would-be hostage takers; (iii) the terrorists’ gains

from hostage taking only derives from the fulfillment of their demands; and (iv) there is no

uncertainty concerning the payoffs. Each of these assumptions may not hold in practice.

Deterrence will not stop all attacks if the terrorists perceive that there is a positive expected

payoff from taking hostages.5 Even if the government’s pledge is believed by the terrorists (i.e.,

p = 0), conditions on m! exists, so that the terrorists can derive a positive gain from securing

hostages when getting no concessions.6 This may arise when media exposure from holding the

hostages is sufficient reward in itself. If, however, the government’s pledge is not completely

credible (i.e., p > 0) owing to past concessions, then the terrorists’ expected payoff is greater than

in the case of a credible governmental pledge, and so an attack becomes more imminent.7 When

a terrorist group is sufficiently fanatical that it views failure as having a positive payoff (i.e.,

m! > –c > 0), then the expected payoff is always positive even when θ = 1 and deterrence is

insufficient to make failure a certainty.

At the endpoints of the game, the payoffs may themselves be uncertain. In this regard,

we focus on the payoffs to government from the four possible outcomes to the game. With no

attack, the government incurs only the cost of deterrence. If an attack ensues but fails (i.e., no

hostages are taken), then the government incurs the cost of a (> 0) in addition to deterrence

expense; if, however, an attack succeeds, then the government experiences an added cost of h for

Page 58: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

13

capitulating and n for not capitulating. The game is more interesting (and realistic) by allowing

either h or n, or both to be uncertain. When, instead, h and n are known beforehand, the

government’s response would be to not capitulate provided that h > n. In the latter case,

conventional wisdom applies. Next, suppose that n is a random variable, which may assume a

large value for some hostages (e.g., a soldier or member of parliament). The government is now

guided by comparing h with the expected value of n, and then choosing the smallest, which may

involve conceding to terrorist demands (e.g., the Israeli release of 1,150 Arab prisoners in a

negotiated swap for three Israeli soldiers in May 1985)8 when the expected value of n exceeds h.

For the scenario when both h and n are random, the choice then hinges on choosing the

negotiation response that minimizes the expected cost. A precommitment strategy to never

concede to hostage takers’ may be time inconsistent when a government later discovers that the

cost of holding firm is too high owing to cost randomness. Although the government has every

intention to fulfill its pledge, its inability to deter all incidents and the terrorists’ ability to capture

the “right” hostage means that a government may, at times, renege on its pledge.

The game representation can be made more realistic by allowing multiple periods and

reputation costs. A government concession in one period to hostage takers makes terrorists raise

their belief about future concessions. As p increases for future periods, more hostages will be

taken, so that there is an added cost to conceding in any period. This cost is denoted by R for

loss of reputation, and results in capitulation costs to the government, becoming h + R + D(θ) in

Figure 4. Even when reputation cost is included, conceding may not be eliminated unless h + R

exceeds n for all realizations of n. Such a scenario may be achieved through rules – e.g., a

constitutional amendment that imposes sufficiently severe punishment to eliminate any

discretion of government negotiators.

The game can be made still more realistic by including additional sources of uncertainty

Page 59: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

14

in terms of the terrorists’ payoffs. Hostage-taking incidents involve asymmetric information and

uncertainty on the part of both terrorists and governments.9 The beauty of game theory is that it

permits the evaluation of policies while accounting for uncertainty and strategic interactions of

opposing interests. In so doing, easy fixes may not be so straightforward.

Game Theory and Governmental Responses

We have already discussed the transference externality when terrorists target two

different countries and each independently chooses a level of deterrence that fails to account for

associated external cost/benefit. External costs are present when deterrence at home displaces

the attack abroad, while external benefits are relevant when deterrence at home either protects

foreigners or reduces the level of attacks globally. Depending on the opposing external effects,

and there may be others not listed, there may result too much or too little deterrence (Sandler and

Lapan, 1998). The overdeterrence/underdeterrence problem is heightened when a terrorist

network (e.g., al-Qaida) operates in upwards of 60 countries and stages their attacks worldwide

(US Department of State, 2001). Underdeterrence is particularly acute in countries sympathetic

to a group’s grievances when the group focuses their attack on foreigners. As the number of

potential targets increase, transference efforts may be especially large. By forming a global

network, terrorists limit the effectiveness of countries’ efforts to thwart terrorism as externalities

are maximized through countries’ uncoordinated decisions. Terrorists will naturally seek out the

weakest link – i.e., the country with the least security – for the venue for their next attack. To

address these weaknesses, prime targets, such as the United States, have instituted programs to

assist such weakest-link countries in bolstering their counterterrorist capabilities. In fact, this

assistance is another of the four pillars of US antiterrorism policy (US Department of State,

2001; Mavesti, 2001). Ironically, US efforts to induce other countries to secure their airports and

Page 60: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

15

public places make the United States a more attractive target, as 11 September sadly

demonstrated.

If the terrorist networking advantage is to be countered, then targeted nations must learn

to coordinate their own efforts at counterterrorism. This poses a special problem because nations

are loathed to sacrifice their autonomy over security matters to a supranational collective. With

this in mind, terrorist experts have often called for piecemeal policy where intelligence is shared

but not deterrence decisions (e.g., Kupperman, 1987, p. 577; Wilkinson, 1987). Such piecemeal

responses may be inadvisable when the strategic incentives are taken into account. Suppose that

a terrorist network targets three countries, each of which are engaged in overdeterrence to

transfer the attack abroad. Further suppose that intelligence allows the targeted countries to

better judge the marginal effectiveness of diverting attacks by revealing the terrorists’ preference

for alternative targets. As these nations acquire this information, they become better adept at

diverting attacks, thereby augmenting the negative transference externality. The net impact of

this information sharing may be to heighten the “transference race” without providing more

security, so that the added deterrence cost simply makes the three countries worse off. This

results in a second-best outcome in which the change in one policy parameter (i.e., increased

information sharing) which would, under full cooperation, improve efficiency, may worsen

inefficiency when a second policy (i.e., coordination of deterrence) is not chosen optimally. A

similar second-best scenario may characterize other partial responses – e.g., greater actions to

apprehend terrorists without coordinating efforts to increase punishments. The failure to

coordinate retaliatory responses until 7 October 2001 is another piecemeal response that may

have led to inefficiencies. Thus, the application of game theory again raises policy concerns

previously ignored in the terrorism literature.

Page 61: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

16

Building a Coalition against Terrorism

Actions to coordinate retaliation against either a terrorist organization or a state-sponsor

of terrorism has typically been characterized as a Prisoners’ Dilemma (e.g., Lee, 1988) with all

countries playing their dominant strategy to sit back and do nothing. This representation follows

because a country’s own cost of retaliating is often greater than its perceived benefit (Sandler,

1997, p. 133). That is, the cost is private to the retaliator but the benefit is purely public –

nonexcludable and nonrival – to potential targeted countries. Perceived retaliation cost may be

higher than the retaliator’s derived benefit, since the retaliator often attracts subsequent terrorist

attacks as protests for its actions (Brophy-Baermann and Conybeare, 1994; Enders and Sandler,

1993). In the past, a targeted country responds to maintain its political legitimacy in a liberal

democracy (Wilkinson, 1986) – i.e., to be viewed as trying to protect lives and property. For a

targeted country, these political benefits may offset the net negative economic gains associated

with retaliation,10 so that it acts alone. Countries not directly in the terrorists’ cross hairs will

only weigh the net negative economic benefits and free ride.

The forging of an alliance to wage war on terrorism in Afghanistan after 11 September

2001 appears to abide by a different underlying game form than the Prisoners’ Dilemma for

select countries that have participated in the retaliatory response against the Taliban and Osama

bin Laden. We shall focus on the two most ardent participants – the United States and the

United Kingdom. In Figure 5, we represent an underlying retaliation game in ordinal form,

where payoffs are rank ordered from highest (4) to lowest (1). The payoffs for the row player –

the US – are listed first, followed by those of the column player – the UK – in each of the four

strategic combinations. The ordinal payoffs displayed indicate that the highest payoffs come

from these two countries jointly retaliating, followed by the next-largest payoff for free riding

when the other country retaliates. The worst payoff corresponds to retaliating on one’s own,

Page 62: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

17

followed by the second-worst payoff when neither country retaliates. This game differs from the

standard Prisoners’ Dilemma by having the ordinal payoffs of the 3s and 4s switched. That is,

the heinous nature of the 11 September attacks and its human toll on American and British

citizens at the World Trade Center increased the ordinal payoff for joint retaliation and decrease

this payoff from free riding, as compared with earlier terrorist incidents, including the downing

of Pan Am Flight 103 over Lockerbie, Scotland on 21 December 1988.11

For the assurance game displayed in Figure 5, there is no dominant strategy that gives

higher payoffs no matter what the other country does, but there are two pure-strategy Nash

equilibria, where either both countries retaliate or both do nothing. In this scenario, an alliance

can be forged provided that one country leads and begins to retaliate, which was the role that the

United States assumed. Other countries that have come along once the retaliatory strikes were

well underway were Japan, Germany, and Italy. US leadership, coupled with initially successful

operations, brought these others into the alliance by more than name only. Still other alliance

members would only go along with US actions through private inducements that made being an

ally a dominant strategy.

Rational-Choice Representations

Beginning with the Landes (1978) study of skyjackings, economists characterize

terrorists as rational actors who maximize expected utility or net payoffs subject to constraints.

Arguments in these constraints may consist of terrorists’ resource endowments or actions taken

by the authorities to thwart terrorism. In the Landes (1978) model, potential hijackers will

engage in a hijacking provided that the associated expected utility exceeds other nonskyjacking

means of furthering their goals. Based on this utility comparison, Landes (1978) specifies an

offense (i.e., number of skyjackings) function, whose independent variables include the

Page 63: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

18

hijackers’ subjective estimate of the likelihood of apprehension, their estimate of the conditional

probability of imprisonment (if apprehended), and other actions by the authorities (e.g., the

presence of US sky marshals on flights). Using data on US hijackings for 1961-76, Landes

demonstrates that greater prison sentences and enhanced likelihood of apprehension are

significant deterrents. He also indicates that the installation of metal detectors on 5 January 1973

led to between 41 and 50 fewer hijackings in the United States during 1973-76.

In a subsequent analysis, Enders and Sandler (1993) examine a wide range of policy

interventions, including metal detectors, fortification of embassies, retaliatory raids, and the

Reagan “get-tough-on-terrorists” laws. The theoretical model for the terrorists that underlies

their study is analogous to the consumer-choice model. Terrorists maximize utility or expected

utility derived from the consumption of basic commodities, produced from terrorist and

nonterrorist activities. For example, al-Qaida terrorists may gain utility from a reduced political

resolve on the part of the United States to remain in the Persian Gulf as Americans lose their

lives in terrorist attacks (e.g., the destruction of the Al Khubar Towers housing US airmen and

others on 25 June 1996 near Dhahran, Saudi Arabia). This weakening of US resolve is the basic

commodity that can be produced with a number of alternative attack modes. Substitution

possibilities among terrorist tactics arise when alternative modes of operations produce the same

basic commodities (e.g., political instability, media attention) in varying amounts. Substitution

is enhanced when attack modes possess closely related outcomes and are logistically similar.

This is clearly the case for hijackings and other kinds of hostage events. Complementarity

results when combinations of attack modes are required to produce one or more basic

commodities. When threats follow real attacks, both actions assume a heightened effectiveness

and are then complementary.

To produce these basic commodities, a terrorist group must choose between nonterrorist

Page 64: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

19

and terrorist activities, while being constrained by resources. In the latter choice, terrorists must

further choose between different modes of terrorist attacks based on the perceived “prices”

associated with alternative operations. Choices are many and include the intended lethality of

the act, its country of location, and whom or what to target. The expenditure on any activity

consists of the activity’s per-unit price times the activity’s level. Each mode of operation has a

per-unit price that includes the value of time, resources, and anticipated risk to accomplish the

act. The securing and maintenance of a kidnapping victim in a hidden location is logistically

more complex and requires more resources than leaving a small bomb in a trash bin in a railroad

station, so that the former has a greater per-unit price. In choosing a venue, the price is

anticipated to differ based on security measures taken by the authorities, so that a country with

more porous borders will be the staging ground for attacks against targets from other more

secure countries. The prices confronting the terrorists for each tactic are determined, in large

part, by the government’s allocation of resources to thwart various acts of terrorism. If, for

example, embassies are fortified, then attacks against embassy personnel and property within the

mission’s ground become more costly for the terrorists – i.e., there is a rise in the price of such

attacks. Similarly, metal detectors in airports increase the relative price of skyjackings as

compared with other kinds of terrorist acts, including kidnappings.

Government policies aimed at a single type of terrorist event (e.g., the installation of

bomb-sniffing equipment in airports) adversely changes its relative price and results in a

substitution into now less expense modes of attack. Thus, Landes’ (1978) measure of the

success of metal detectors, in terms of fewer skyjackings, does not go far enough, because the

application of this technology may have induced a large number of other kinds of events.

Similarly, to judge the success of embassy fortification, a researcher must also examine

assassinations and other attacks against embassy personnel once outside of the compound.

Page 65: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

20

To account for these substitutions, Enders and Sandler (1993) apply vector autoregression

(VAR) analysis to allow for the potential interactions among various terrorist time series (e.g.,

skyjackings and other hostage events) in response to government policies. They find that metal

detectors decreased skyjackings and threats, but increased other kinds of hostage incidents, not

protected by detectors. The trade-off between events were about one for one (also see Enders,

Sandler, and Cauley, 1990; Im, Cauley, and Sandler, 1987). Both substitutions and

complementarities are uncovered. Fortification of US embassies and missions reduced attacks

against such installations, but were tied to a disturbing increase in assassinations of officials and

military personnel outside of protected compounds. In addition, Enders and Sandler (1993)

establish that the US retaliatory raid against Libya on April 1986 (for its suspected involvement

in La Belle Discothèque in West Berlin on 4 April 1986) was associated with an immediate

increase in terrorist attacks against US and UK interests. This increase was shortly followed by a

temporary lull as terrorists built up depleted resources. Apparently, the raid caused terrorists to

intertemporally substitute attacks planned for the future into the present to protest the retaliation.

Within a relatively few quarters, terrorist attacks resumed the same mean number of events.12

There are a number of ways to institute antiterrorist policies that address these likely

substitutions and complementarities. First, the government must make the terrorists substitute

into less harmful events. Second, the government must go after the terrorists’ resource

endowment (i.e., its finances, its leadership, its membership) if an overall decrease in terrorism is

to follow. Efforts to infiltrate groups or to freeze terrorist finances have this consequence.

Third, the government must simultaneously target a wide range of terrorist attack modes, so that

the overall rise in the prices of terrorist attacks becomes analogous to a decrease in resources.

Success in raising the price of all modes of terrorist attacks would induce terrorists to shift into

legal protests and other nonterrorist actions to air grievances. Based on the above, we can

Page 66: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

21

conclude that a reliance on technological barriers merely causes a substitution into other attack

modes in the short run. In the long term, terrorists will develop ingenuous countermeasures (i.e.,

plastic guns, bottles of flammable liquid) to circumvent the technology. Thus, there is a dynamic

strategic interaction present, where authorities must be ever vigilant to be improving the

technology by anticipating ways of circumventing such barriers. This vigilance must lead to

periodic upgrades in the technology prior to the terrorists exposing the technology’s weakness

through a successful attack. Unfortunately, authorities have been reactive in practice by only

responding after a technological barrier’s weakness has been exploited, so that the public

remains vulnerable until a new technological fix is found and installed.

Other Kinds of Substitutions

Substitution effects abound in the study of terrorism and involve not only actions of the

terrorists, as described above, but also actions of the targets. For targets, the economic literature

addresses two kinds of substitutions. First, there are studies that examine the tourists’ choice of

vacation spot based on the perceived threat of terrorism and other costs. An alteration in travel

risks, arising from increased terrorist incidents in a country, raises the price of a holiday there in

comparison to other vacation venues, not confronted with terrorism. In a study of Spain, Enders

and Sandler (1991) employ VAR analysis to demonstrate that a typical transnational terrorist

incident is estimated as scaring away just over 140,000 tourists when all monthly impacts are

combined. Companion studies by Enders, Sandler, and Parise (1992) and Drakos and Kutan

(2001) establish and quantify terrorism-induced substitutions in tourism for Greece, Austria,

Italy, Turkey, Israel, and other terrorism-ridden countries. Countries, like Greece, that have not

addressed transnational terrorist attacks directed at foreigners lose significant foreign-exchange

earnings as a consequence. The cost of terrorism comes in many forms.

Page 67: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

22

Second, target-based substitutions involve foreign direct investment (FDI). Investors

decide where to invest based on their perceived economic risks, political risks, and monetary

returns. An increase in transnational terrorism directed at FDI (e.g., attacks on Euskadi ta

Askatasuna (ETA) in the Basque region of Spain) is sure to divert such investment. Enders and

Sandler (1996) show that an “average” year’s worth of terrorism reduced net FDI in Spain by

13.5 percent annually, and it reduced net FDI in Greece by 11.9 percent annually. These

reductions translated into declines in real net FDI of $488.9 million and $383.5 million,

respectively, or the equivalent of 7.6 percent and 34.8 percent of annual gross fixed capital

formation in Spain and Greece. Transnational terrorism displayed significant economic cost, not

counting the billions spent on barriers and deterrence.

Toward a Benefit-Cost Analysis of Terrorist-Thwarting Policies

As a future research project, economists should assess the benefits and cost of specific

policies to thwart terrorism. Such an exercise has not been adequately done and poses some real

challenges. The cost side is much easier than the benefit side for measurement purposes since

figures are available in, say, the United States as to what is paid to fortify our embassies and

missions, or to guard US airports. Consider the cost associated with airport security. To the cost

of guards and screening equipment must be added the value of lost time as travelers are screened

at US airports.

On the benefit side, calculations are less transparent and more cleverness is needed on

behalf of the researcher. One way to estimate a portion of this benefit would be to compute the

reduced loss of life attributable to airport security measures – i.e., fewer people killed in

skyjackings. If the net number of such lives saved, after adjusting for substitutions into other

Page 68: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

23

life-threatening terrorist actions, can be measured, then the average “value of a statistical life”

can be applied to translate these lives into a monetary figure. To this figure, a researcher must

also compute and add the reduced losses in property values (i.e., from destroyed planes)

attributable to the fewer hijackings. In addition, a portion of the value of net air travel revenues

must be considered as a benefit arising from a heightened sense of security stemming from

security upgrades. The events of 11 September clearly underscore that there is a cost to a breach

in airport security as the public loses its confidence in air travel. Any of these components are

fraught with measurement difficulties, because there may be other intervening factors at work –

e.g., air travel was already in a slump prior to 11 September.

Every policy to thwart terrorism would entail its own stream of benefits and costs.

Invariably, the benefit calculations are problematic. The US-led retaliation against al-Qaida and

the Taliban in Afghanistan has well-defined costs in terms of deployed soldiers, ordnance,

diplomacy, and side payments to “allies.” But the true savings or benefits from fewer future acts

of terrorism, in terms of lives and property saved, is so much more difficult to calculate. Time-

series techniques, engineered by Enders and Sandler to measure losses to tourism or to FDI from

terrorism, can be utilized following the retaliation to roughly estimate the decline in terrorist

incidents and their economic value.

Concluding Remarks

Although economic methods have enlightened the public on a number of issues

concerning transnational terrorism, not addressed by the political science literature, there are

many other issues to analyze. For instance, there is a need for applying more dynamic game

methods – i.e., differential game theory – if the waxing and waning of terrorist organizations

(e.g., Red Brigades, Red Army Faction) are to be understood. Clearly, past successes and

Page 69: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

24

failures determine the size of these groups over time. The terrorists try to increase their

organization’s size through enhanced resources, successful operations, and recruitment, while the

government tries to limit the group’s size through raids, intelligence, group infiltration, and

actions to thwart successes. This dynamic strategic interaction needs to be modeled and

empirically tested. In addition, researchers must better assess the role of information and

intelligence on behalf of the terrorists and the authorities. Given how little governments really

know about the strength of the terrorists that they confront – e.g., the US government has almost

no clue about the size of al-Qaida,13 asymmetric information characterizes efforts to thwart

terrorism. Similarly, the terrorists are ill-informed about the resolve of the government and the

amount of resources that it is willing to assign to curbing terrorism. Additionally, there is a need

to model terrorist campaigns – i.e., the choice of the sequence and composition of attacks used

by terrorists. As researchers better understand these choices, more effective policy responses can

be devised that adjust for the strategic interaction.

Page 70: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

25

Footnotes

1. Since 1973, the 17 November group has engaged in over 140 attacks and 22

assassinations yet no member has been brought to justice (Wilkinson, 2001, p. 54).

2. In fact, there is reasonable evidence to support the claim that each of the incident

series is stationary. Using an augmented Dickey-Fuller unit-root test, we can reject the null

hypothesis of a unit-root in all series, but that of threats and hoaxes, at the .05 level. For this

latter series, we can reject the null of a unit-root at the .10 level.

3. We report the proportion of the variance explained by the frequencies in the interval

[1, 0.15•T/2]. Since we are somewhat skeptical of the fitted polynomial trends, we also obtained

results using only demeaned data. These results are very similar to those discussed below.

4. If * [(1 ) ] [ (1 ) ],c c pm p m< = − θ θ • + − ! then the terrorists are better off attacking even

though they receive –cθ for a logistical failure and (1 )[ (1 ) ]pm p m− θ + − ! for a logistical success.

We have c < c* when the expected payoff from a logistical success, which accounts for

negotiation success or failure, exceeds the expected payoff from a logistical failure. In Figure 4,

Ω corresponds to *

0( ) ,

cf c dc∫ where f(c) is the probability density for c which reflects the

unknown resolve of the terrorists.

5. The terrorists’ perceived net expected payoff equals: (1 ) [ (1 ) ] .pm p m c− θ • + − − θ!

6. The condition is that (1 ) .m c− θ > − θ!

7. When p > 0, expected benefits increase by (1 )( )pm pm− θ − ! compared with the p = 0

case. A reasonable assumption is that ,m m> ! so that winning concessions is better than not

gaining concessions.

8. The Arab prisoners released included Kozo Okomato, a Japanese Red Army Faction

member, who was the sole surviving terrorist in the Lod Airport massacre of 1972, which left 27

Page 71: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

26

people dead and 78 injured.

9. On asymmetric information models of terrorism, see Lapan and Sandler (1993) and

Overgaard (1994).

10. Economic benefit refers to the direct benefit derived from retaliation, while

economic cost refers to the expenditure of resources to carry out the retaliation and other

subsequent losses associated with the retaliation. We use the term economic benefit to

distinguish it from political benefit stemming from maintaining legitimacy.

11. Britain lost the second greatest number of citizens of any country at the World Trade

Center. Despite Pan Am 103 flying out of Heathrow Airport and crashing in the United

Kingdom (Lockerbie, Scotland), Britain lost relatively few of its citizens in this incident.

12. Analogous results are found in Brophy-Baermann and Conybeare (1994) for

retaliations by Israel against Palestinian terrorists.

13. In the latest Patterns of Global Terrorism, al-Qaida strengths is given as “may have

several hundred to several thousand members” (US Department of State, 2001, p. 69).

Page 72: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

27

References

Alexander, Yonah and Dennis Pluchinsky. 1992. Europe’s Red Terrorists: The Fighting

Communist Organizations. London: Frank Cass.

Atkinson, Scott E., Todd Sandler, and John T. Tschirhart. 1987. “Terrorism in a Bargaining

Framework.” Journal of Law and Economics. 30:1, pp. 1-21.

Brophy-Baermann, Bryan and John A.C. Conybeare. 1994. “Retaliating Against Terrorism:

Rational Expectations and the Optimality of Rules versus Discretion.” American Journal

of Political Science. 38:1, pp. 196-210.

Cauley, Jon and Eric I. Im. 1988. “Intervention Policy Analysis of Skyjackings and Other

Terrorist Incidents.” American Economic Review. 78:2, pp. 27-31.

Chalk, Peter. 1995. “The Liberal Democratic Response to Terrorism.” Terrorism and Political

Violence. 7:4, pp. 10-44.

Crenshaw, Martha. 1992. “Current Research on Terrorism: The Academic Perspective.”

Studies in Conflict and Terrorism. 15:1, pp. 1-11.

Drakos, Konstantinos and Ali M. Kutan. 2001. “Regional Effects of Terrorism on Tourism:

Evidence from Three Mediterranean Countries.” unpublished manuscript.

Enders, Walter, Gerald F. Parise, and Todd Sandler. 1992. “A Time-Series Analysis of

Transnational Terrorism: Trends and Cycles.” Defence Economics. 3:4, pp. 305-20.

Enders, Walter and Todd Sandler. 1991. “Causality between Transnational Terrorism and

Tourism: The Case of Spain.” Terrorism. 14:1, pp. 49-58.

Enders, Walter and Todd Sandler. 1993. “The Effectiveness of Anti-Terrorism Policies:

Vector-Autoregression-Intervention Analysis.” American Political Science Review.

87:4, pp. 829-44.

Enders, Walter and Todd Sandler. 1996. “Terrorism and Foreign Direct Investment in Spain

Page 73: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

28

and Greece.” KYKLOS. 49:3, pp. 331-52.

Enders, Walter and Todd Sandler. 1999. “Transnational Terrorism in the Post-Cold War

Era.” International Studies Quarterly. 43:1, pp. 145-67.

Enders, Walter and Todd Sandler. 2000. “Is Transnational Terrorism Becoming More

Threatening.” Journal of Conflict Resolution. 44:3, pp. 307-32.

Enders, Walter and Todd Sandler. 2001. “Patterns of Transnational Terrorism, 1970-99:

Alternative Time Series Estimates.” unpublished manuscript.

Enders, Walter, Todd Sandler, and Jon Cauley. 1990. “UN Conventions, Technology and

Retaliation in the Fight Against Terrorism: An Econometric Evaluation.” Terrorism

and Political Violence. 2:1, pp. 83-105.

Enders, Walter, Todd Sandler, and Gerald F. Parise. 1992. “An Econometric Analysis of

the Impact of Terrorism on Tourism.” KYKLOS. 45:4, pp. 531-54.

Fleming Peter. 2001. International Terrorism: Attributes of Terrorist Events 1992-1998

(ITERATE 5 update). Personal communication.

Hirshleifer, Jack. 1991. “The Paradox of Power.” Economics and Politics. 3:3, pp. 177-200.

Hoffman, Bruce. 1997. “The Confluence of International and Domestic Trends in Terrorism.”

Terrorism and Political Violence. 9:2, pp. 1-15.

Hoffman, Bruce. 1998. Inside Terrorism. New York: Columbia University Press.

Im, Eric I., Jon Cauley, and Todd Sandler. 1987. “Cycles and Substitutions in Terrorist

Activities: A Spectral Approach.” KYKLOS. 40:2, pp. 238-55.

Islam, Muhammad Q. and Wassim N. Shahin. 1989. “Economic Methodology Applied to

Political Hostage-Taking in Light of the Iran-Contra Affair.” Southern Economic

Journal. 55:4, pp. 1019-24.

Kupperman, Richard N. 1987. “Vulnerable America,” in Contemporary Research on

Page 74: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

29

Terrorism. Paul Wilkinson and A.M. Stewart, eds. Aberdeen, UK: University of

Aberdeen Press.

Landes, William M. 1978. “An Economic Study of US Aircraft Hijackings, 1961-1976.”

Journal of Law and Economics. 21:1, pp. 1-31.

Lapan, Harvey E. and Todd Sandler. 1988. “To Bargain or Not to Bargain: That Is the

Question.” American Economic Review. 78:2, pp. 16-20.

Lapan, Harvey E. and Todd Sandler. 1993. “Terrorism and Signalling.” European Journal

of Political Economy. 93:3, pp. 383-97.

Lee, Dwight R. 1988. “Free Riding and Paid Riding in the Fight Against Terrorism.”

American Economic Review. 78:2, pp. 22-6.

Malvesti, Michele L. 2001. “Explaining the United States’ Decision to Strike Back at

Terrorists.” Terrorism and Political Violence. 13:2, pp. 85-106.

Mickolus, Edward F. 1982. International Terrorism: Attributes of Terrorist Events, 1968-

1977. (ITERATE 2). Ann Arbor, MI: Inter-University Consortium for Political and

Social Research.

Mickolus, Edward F., Todd Sandler, Jean M. Murdock, and Peter Fleming. 1989.

International Terrorism: Attributes of Terrorist Events, 1978-1987. (ITERATE 3).

Dunn Loring, VA: Vinyard Software.

Mickolus, Edward F., Todd Sandler, Jean M. Murdock, and Peter Fleming. 1993.

International Terrorism: Attributes of Terrorist Events, 1988-1991. (ITERATE 4).

Dunn Loring, VA: Vinyard Software.

Overgaard, Per Baltzer. 1994. “Terrorist Attacks as a Signal of Resources.” Journal of

Conflict Resolution. 38:3, pp. 452-78.

Sandler, Todd. 1997. Global Challenges. Cambridge, UK: Cambridge University Press.

Page 75: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

30

Sandler, Todd and Harvey E. Lapan. 1988. “The Calculus of Dissent: An Analysis of

Terrorists’ Choice of Targets.” Synthese. 76:2, pp. 245-61.

Sandler, Todd and John L. Scott. 1987. “Terrorist Success in Hostage-Taking Incidents.”

Journal of Conflict Resolution. 31:1, pp. 35-53.

Sandler, Todd, John T. Tschirhart, and Jon Cauley. 1983. “A Theoretical Analysis of

Transnational Terrorism.” American Political Science Review. 77:1, pp. 36-54.

Scott, John L. 1991. “Reputation Building in Hostage Incidents.” Defence Economics. 2:3,

pp. 209-18.

Selten, Reinhard. 1988. “A Simple Game Model of Kidnappings.” in Models of Strategic

Rationality. Reinhard Selten, ed. Boston, MA: Kluwer Academic.

Shahin, Wassim N. and Muhammad Q. Islam. 1992. “Combating Political Hostage-Taking:

An Alternative Approach.” Defence Economics. 3:4, pp. 321-7.

United States Department of State. various years. Patterns of Global Terrorism. Washington,

DC: US Department of State.

Wilkinson, Paul. 1986. Terrorism and the Liberal State, rev. ed. London: Macmillan.

Wilkinson, Paul. 1987. “Pathways Out of Terrorism for Democratic Societies,” in

Contemporary Research on Terrorism. Paul Wilkinson and A.M. Steward, eds.

Aberdeen, UK: University of Aberdeen Press.

Wilkinson, Paul. 2001. Terrorism Versus Democracy: The Liberal State Response. London:

Frank Cass.

Wilkinson, Paul and A.M. Stewart, eds. 1987. Contemporary Research on Terrorism.

Aberdeen, UK: University of Aberdeen Press.

Page 76: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Table 1 Transnational Terrorism: Events 1968-2000

Year Number of Events Deaths Wounded Attacks on US Interests 2000 423 405 791 200 1999 392 233 706 169

1998 273 741 5,952 111 1997 304 221 693 123

1996 296 314 2,652 73 1995 440 163 6,291 90

1994 322 314 663 66

1993 431 109 1,393 88 1992 363 93 636 142 1991 565 102 233 308

1990 437 200 675 197

1989 375 193 397 193 1988 605 407 1,131 185

1987 665 612 2,272 149 1986 612 604 1,717 204

1985 635 825 1,217 170 1984 565 312 967 133

1983 497 637 1,267 199 1982 487 128 755 208

1981 489 168 804 159 1980 499 507 1,062 169

1979 434 697 542 157

1978 530 435 629 215 1977 419 230 404 158

1976 457 409 806 164 1975 382 266 516 139 1974 394 311 879 151

1973 345 121 199 152

1972 558 151 390 177 1971 264 36 225 190

1970 309 127 209 202 1969 193 56 190 110

1968 125 34 207 57

Source: US Department of State, Patterns of Global Terrorism (1988-2001) and tables provided to Todd Sandler in 1988 by the US Department of State, Office of the Ambassador at Large for Counterterrorism.

Page 77: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Table 2 Trend and Other Statistical Properties of Transnational Terrorist Incidents

Incident Type Constanta Time (Time)2 (Time)3 F–statb Variance Percentc

Hostage taking 5.901 0.219 –0.001 13.11 32.223 0.278 (3.832) (4.093) (–3.202) [0.000] Bombings 34.449 1.139 –0.010 15.87 842.470 0.314 (4.442) (4.230) (–5.021) [0.000] Threats & Hoaxes 8.595 –0.276 0.010 –0.000 11.34 87.170 0.247 (2.540) (–1.256) (2.572) (–3.340) [0.000] Assassinations –1.521 0.400 –0.003 43.49 21.472 0.411 (–1.229) (9.299) (–8.830) [0.000] Casualties 9.726 0.579 –0.004 10.74 119.479 0.527 (2.441) (4.497) (–4.635) [0.000] All Events 41.689 2.435 –0.019 30.79 1335.560 0.252 (4.270) (7.185) (–7.743) [0.000] a t-ratios are in parentheses. b Prob values are in brackets under the F-statistics. c Proportion of variance of the detrended, fitted-polynomial series that is accounted for by the lowest

15 percent of the frequencies (i.e., the longest cycles).

Page 78: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 1

0

50

100

150

200

250

300

3501

970

197

2

197

3

197

5

197

6

197

8

197

9

198

1

198

2

198

4

198

5

198

7

198

8

199

0

199

1

199

3

199

4

199

6

199

7

199

9

200

0

Inci

den

ts p

er Q

uar

ter

BombingsAll

All Incidents and Bombings

Page 79: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 2

0

5

10

15

20

25

30

35

19

70

19

72

19

73

19

75

19

76

19

78

19

79

19

81

19

82

19

84

19

85

19

87

19

88

19

90

19

91

19

93

19

94

19

96

19

97

19

99

20

00

Inci

den

ts p

er Q

uar

ter

Hostage Incidents

Assassinations

Assassinations and Hostage Incidents

Page 80: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 3

0

10

20

30

40

50

60

70

80

19

70

19

72

19

73

19

75

19

76

19

78

19

79

19

81

19

82

19

84

19

85

19

87

19

88

19

90

19

91

19

93

19

94

19

96

19

97

19

99

20

00

Per

cen

t

Proportion of Incidents with Casualties

Page 81: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

!

Page 82: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 5 Ordinal Game Matrix for Retaliation

UK

Retaliate Do Nothing

Retaliate 4, 4 1, 3

US

Do Nothing 3, 1 2, 2

Page 83: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

WHAT DO WE KNOW ABOUT THE SUBSTITUTION EFFECT IN TRANSNATIONAL TERRORISM?

by

Walter Enders* Department of Economics, Finance, and Legal Studies

University of Alabama Tuscaloosa, AL 35487 [email protected]

Todd Sandler School of International Relations University of Southern California

Von Kleinsmid Center 330 Los Angeles, CA 90089-0043

[email protected]

April 2002

*Walter Enders is the Lee Bidgood Chair of Economics and Finance in the School of Business at the University of Alabama. Todd Sandler is the Robert R. and Katheryn A. Dockson Professor of International Relations and Economics. He is a member of the School of International Relations and the Department of Economics at the University of Southern California. Sandler acknowledges research support from the Center for International Studies, University of Southern California to update the ITERATE data for 1999-2000.

Page 84: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

The success of the terrorist attacks on the World Trade Center and the Pentagon on 11

September 2001 (henceforth, 9/11) has resulted in profound economic and social consequences

for the United States. In addition to the loss of life and property, total costs of the attacks are

staggering. With the economy already on the brink of recession, the unemployment rate rose by

almost 1%.1 Some sectors bore the brunt of the loss in business and consumer confidence. Wall

Street closed for a week; on its re-opening, various stock market indices fell substantially and

investment funds seemed to dry up. The airline industry was temporarily shut down, the tourism

industry was especially hard-hit, and several airlines never recovered. The opportunistic anthrax

attacks that followed caused major disruptions of the mail.

The worldwide response to fighting terrorism has been equally dramatic. The U.S.-led

coalition known as “Operation Enduring Freedom” quickly achieved its aim of eliminating the

Taliban regime in Afghanistan. In total, seventeen nations contributed more than 16,500 troops

to the initial operation. Other efforts included the enhancement of airport security and directives

from nearly 150 countries to freeze terrorist assets totaling at least $104.8.

Within the United States, President Bush created the Office of Homeland Security and

the National Defense Authorization Act (S. 1438, 8 December 2001). This Act earmarked funds

for extending the war on terrorism, which includes countermeasures against potential biological

and chemical attacks. Future years promise even greater anti-terrorism measures. President

Bush’s proposed budget for 2003 directs $37.7 billion to homeland security (an $18.2 billion

increase over 2002). In particular, the budget proposal includes $11 billion for border security,

$6 billion to defend against bioterrorism, $3.5 billion (a 1,000-percent increase) for police,

firefighters and Emergency Medical Teams, and $700 million to coordinate the antiterrorism

1 All data used in this section were obtained from the official website of the President of the United States: www.whitehouse.gov.

Page 85: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

2

measures of the various branches of government.

Undoubtedly, a massive anti-terrorist campaign will reduce the overall level of terrorism.

Nevertheless, an important strategic question remains, since some anti-terrorism policies are apt

to be more successful than others. As surveyed in this paper, economists and political scientists

have investigated the effectiveness of alternative policy responses (e.g., toughening punishments,

retaliatory raids, installing technological barriers). Each anti-terrorism policy can influence a

terrorist group’s choice of operations by either affecting their resources or the relative costliness

of different kinds of attacks. Such policies can have an “income effect” or “substitution effect”

or both. The income effect involves the overall level of available resources – e.g., freezing

terrorists’ assets reduces their “war chest” and their overall ability to conduct a campaign of

terror. If a government action increases the resource outlays necessary to undertake a particular

type of operation, then there is a motive to substitute into some less costly operation that

achieves a similar outcome at less cost. For example, the installation of screening devices in US

airports in January 1973 made skyjackings more difficult, thus encouraging terrorists to

substitute into other kinds of hostage missions or to stage a skyjacking from an airport outside of

the United States.

Unlike the two examples above, the income and substitution effects of an anti-terrorism

policy are often interrelated. For example, the seizure of a cache of explosive devices has a clear

income effect (since resources decline) and a substitution effect (since terrorists are less likely to

stage incidents that rely on explosives). The essential point is that the overall effectiveness of

any anti-terrorism policy depends on the direct and indirect effects that arise through various

substitutions. The purpose of this chapter is to provide a careful examination of the terrorists’

decision-making process, so as to understand and predict the likely responses.

1. Transnational Terrorism

Page 86: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

3

Since the events of 9/11, the popular press has run articles arguing over the precise

meaning of “terrorism.”2 We define terrorism as the premeditated use, or threat of use, of

extranormal violence to obtain a political objective through intimidation or fear directed at a

large audience. An event, no matter how brutal, is not a terrorist incident unless it involves the

presence of a political objective. Incidents that have no specific political motive are criminal

rather than terrorist acts: a barroom shooting is a criminal act, while the assassination of an

ambassador to coerce political change is a terrorist act. Another fundamental ingredient in the

definition is the creation of widespread intimidation or fear. Unlike warfare, where the aim is to

destroy opposing combatants, terrorists also seek to affect those not immediately involved with

the political decision-making process. The 9/11 attack on the World Trade Center clearly fits

this pattern.

As part of the attempt to create a general climate of intimidation, terrorists strike at a

variety of targets using attack modes ranging from skyjackings to simple threats and hoaxes.

The mix of operations makes it difficult for the authorities to predict the nature and location of

the next incident. From the perspective of the authorities, terrorist incidents appear to be

random, so that society must expend relatively large amounts of resources to protect against all

forms of potential attacks.

Most terrorist events directed against the United States do not occur on U.S. soil. The

kidnapping and murder of reporter David Pearl in Pakistan, the destruction of the Al Khubar

Towers housing US airmen in June 1996 near Dhahran, Saudi Arabia, and the bombs destroying

the U.S. embassies in Kenya and Tanzania in August 1998 are but three gruesome examples of

transnational terrorism. Terrorism is transnational when an incident in one country involves

2 Carr (2002) raises a number of issues concerning the appropriate definition of terrorism. Slate (http://slate.msn.com//?id=2062267) contains a discussion of the premise that terrorism necessitates that the victims be non-combatants.

Page 87: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

4

perpetrators, victims, targets, institutions, governments, or citizens of another country.

Obviously, the four skyjackings on 9/11 constitute transnational terrorist attacks since the events

were staged by individuals who crossed into the United States from abroad and because victims

came from many countries. However, the bombing of the Murrah Federal Building in Oklahoma

City by Timothy McVeigh in April 1995 was not a transnational terrorist incident.

From the late 1960s until the late 1980s, transnational terrorism was primarily motivated

by nationalism, separatism, Marxist ideology, anti-racism, nihilism, and the desire for economic

equality (Wilkinson 1986). In the 1990s, a driving motivation of terrorism has changed with "the

emergence of either obscure, idiosyncratic millennium movements" or religious-based groups

(Hoffman 1997, 2; 1998, 185-99). When religion provides the dominant objective of a group

that employs terrorist tactics, it is identified as a religious terrorist group (e.g., Hamas, Algerian

Armed Islamic Group (GIA), Hezbollah, Egyptian Gamat al-Islamiya). Since the start of 1980,

Hoffman (1997) reports that the number of religious-based groups has increased as a proportion

of the active terrorist groups: 2 of 64 groups in 1980; 11 of 48 groups in 1992; 16 of 49 groups in

1994; and 25 of 58 groups in 1995. This increase can be attributed to a growth of religious

fundamentalism worldwide, the diffusion of the Islamic revolution from Iran, and the approach

of the millennium. With this motivational change for some terrorists, Hoffman (1997, 1998) and

Juergensmeyer (1997) view the new generation of terrorists as posing a more deadly threat than

earlier groups.

The demise of many leftist groups in the late 1980s and 1990s is attributable to at least

three factors: (i) domestic efforts by some terrorism-prone countries (e.g., France, Germany,

Spain, the United Kingdom) to capture and to bring to justice group members; (ii) reduced state

sponsorship of left-wing groups by East European and Middle Eastern countries (Chalk 1995;

Clutterbuck 1994; Jongman 1992); and (iii) the reduced interest in Marxism following the

Page 88: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

5

collapse of many communist regimes. These factors were bolstered by collective initiatives by

the European Union to foster cooperation in terms of extradition, shared intelligence, and

accreditation of foreign diplomats (Chalk 1995; Wilkinson 1992; Zagari 1992). In recent years,

NATO has also begun a program to address collectively the risks posed by transnational

terrorism (Wilcox 1997). Another recent development in terrorism has been the increase in

“splinter” groups that are less disciplined, often more violent, and more nebulous than the parent

group (Hoffman 1997, 1998). The IRA splinter group responsible for the Omagh bombing in

Northern Ireland on 15 August 1998 is a clear-cut example. They did not follow standard IRA

procedures and issued a warning that herded people nearer to the subsequent blast. Some days

later, the group apologized and ceased operations. If members’ actions are not constrained, then

a few fanatical individuals can cause great carnage.

The greater prevalence of religious groups has apparently increased the lethality of post-

Cold War terrorism, because such groups view civilians as legitimate targets of a "decadent"

society. Religious groups that declare a Jihad or holy war against another nation consider its

people, not just its officials, as the enemy. Moreover, religious terrorist groups act out of a

desire to satisfy their own goals (e.g., ascend to heaven) rather than to win favor with an external

constituency. Violence may be viewed as a purifying act. Although it is tempting to attribute

the increased casualties per incident, documented below, to better technology available to

terrorists, most of the incidents have not really relied on new technologies. Old-fashioned bombs

were used at Oklahoma City, Nairobi, and most other targets. The difference today is that these

bombs are set to explode where and when maximum carnage will result.

2. The Choice-Theoretic Model of Terrorism

The choice-theoretic model of rational terrorists considers a terrorist group as choosing

how to allocate scarce resources to maximize the expected value of its objective function. The

Page 89: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

6

model developed by Landes (1978) considers a potential skyjacker contemplating the forcible

diversion of a commercial aircraft for political purposes. A simplified version of the Landes’

model considers three states of the world: there is no skyjacking, the skyjacking is successful,

and the skyjacking fails.

In order to highlight the risky nature of terrorism, we assume that utility in the no-

skyjacking state is certain; if the terrorist decides not to attempt to undertake the skyjacking,

utility is given by U N. If, however, the skyjacking occurs, the outcome is uncertain. Expected

utility can be represented by:

EU SKY = π U S + ( 1 – π )U F, (1)

where EU SKY = expected utility if there is a skyjacking;

π = skyjacker’s subjective estimate of the probability of a successful skyjacking;

1 – π = skyjacker’s subjective estimate of the probability of a failed skyjacking;

U S = utility if the skyjacking is successful;

U F = utility if the skyjacking fails.

The terrorist will attempt the skyjacking if the expected utility derived from undertaking

the skyjacking exceeds the utility level UN when there is no skyjacking:

U N < EU SKY = π U S + ( 1 – π )U F. (2)

Thus, anything that lowers U N or raises EU SKY increases the probability of a skyjacking.

Landes’ model is useful for understanding the choice between legal and illegal terrorist

activities. Given that utility from success exceeds utility from a failure [ i.e., U S > U F ], it

follows that an increase in the probability of a success will make it more likely that the

skyjacking will occur. Formally, the change in expected utility from a skyjacking due to a

change in π is:

Page 90: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

7

/ 0.SKY S FdEU d U U= − >π (3)

Hence, if the authorities undertake a policy (such as enhanced airport security) that

reduces the probability of a successful skyjacking (lowering π), the Landes’ model predicts that

the terrorists will be more likely to forego the skyjacking, owing to the associated reduction in

EU SKY. Policies that lower the utility from a skyjacking failure, such as longer jail sentences,

also reduce the expected utility from skyjackings, thus decreasing the likelihood of such events.

Moreover, policies that limit the utility from success, such as reduced media coverage, also

reduces the number of skyjackings.

Although some Hamas and al-Qaida terrorists engage in suicide missions, the vast

majority of terrorists do not resort to such attacks and respond predictably to security

enhancements and other policy actions. Nevertheless, the model is capable of addressing suicide

attacks. If a terrorist is concerned with living, then U F is likely to be low, thereby inhibiting

EU SKY from exceeding U N – the necessary requirement for an attack. A fanatical terrorist, who

does not fear death and may welcome it, has a higher U F, which makes an attack more likely in

(2). Fanaticism brings U F closer to U S in (3); thus the policy effectiveness of lowering the

success probability diminishes. If, for example, U F = U S in (3), then efforts to lower π have no

effect on EU SKY. Consequently, policy becomes completely ineffective. Fanatical terrorists

must be apprehended or killed for attacks to stop.

Landes presented two regressions for US skyjackings based on US Federal Aviation

Administrative data on skyjackings for the 1961-1976 period. The first regressed the quarterly

total of skyjackings on the probability of apprehension, the probability of conviction, sentencing,

and other policy efforts. The second regressed the time interval between skyjackings and the

same set of variables. Both regressions found the length of sentence and the probability of

apprehension to be significant deterrents. For most regressions, the probability of conviction

Page 91: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

8

was marginally significant. Landes also estimated that between 41 and 50 fewer skyjackings

occurred in the U.S. from the start of 1973 following the installation of metal detectors in US

airports.

More generally, substitutions can be analyzed with a household production function

(HPF) approach for which the utility of a terrorist group is a function of a shared political goal.

The HPF model was first applied to transnational terrorism by Enders and Sandler (1993). Given

the groups’ budget constraint, this shared goal is produced from a number of basic commodities

that may include both terrorist and non-terrorist activities. To be more specific, basic

commodities may include political instability, media publicity, an atmosphere of fear, or

extortion. Alternative terrorist attack modes can be substitutable if they produce the same basic

commodities. Substitution possibilities are augmented when attack modes are logistically similar

and yield the same basic commodities in nearly identical proportions. An assassination of a key

public official or a skyjacking might be substitutes if they provide a terrorist group with similar

amounts of media attention. Complementarity results when a combination of attack modes is

required to produce one or more basic commodities or when the success of one type of attack

reinforces the effects of a second type of attack. For example, in the wake of 9/11, the anthrax

mailings had an especially demoralizing (complementary) effect on a public already sensitized to

terrorism.

The advantage of the HPF approach is that it allows for substitutions between legal and

illegal activities and for substitutions within the set of illegal terrorist activities. Choices within

the set of terrorist activities are many and include the intended lethality of the act, its country of

location, and whom or what to target (Sandler and Lapan, 1988). In each period, an overall

resource constraint limits the terrorist group’s expenditures to a magnitude not exceeding its

monetary and non-monetary resource endowments. The expenditures on any activity consist of

Page 92: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

9

the product of the activity’s level and its per-unit price. Each terrorist and non-terrorist tactic has

a per-unit price that includes the value of time, the use of personnel, funding and capital

equipment, including weapons. A skyjacking is a high-priced incident because it is logistically

more complex to plan and execute and thus requires more resources than do many other types of

incidents. At the other extreme, threats and hoaxes require few resources and are low-priced

incidents. Nevertheless, such incidents can add to the overall level of fear and intimidation. The

recipients of various powders disguised as anthrax felt the same initial fear and undertook the

same precautions as did the recipients of the real thing.

In addition to such technological considerations, the prices terrorists pay for each tactic

are influenced by anti-terrorism policies. If, for instance, the government were to secure its

embassies or military bases, then attacks against such facilities would become more costly on a

per-unit basis. If, moreover, the government were not at the same time to increase the security

for embassy and military personnel when outside their facilities, then attacks directed at these

individuals (e.g., assassinations) would become relatively cheaper.

The HPF approach yields a number of important predictions concerning the substitution

phenomenon. The critical result is that a government policy that increases the relative price of

one type of terrorist tactic produces a substitution out of the now-more-costly tactic into those

terrorist and non-terrorist activities whose prices are now relatively less costly. If, for example,

embassies are fortified, then attacks against embassy personnel and property within the mission’s

ground become more costly for the terrorists – i.e., there is a rise in the price of such attacks.

Similarly, in choosing a venue, the price is anticipated to differ based on security measures taken

by the authorities; therefore, a country with more porous borders will be the staging ground for

attacks against targets from other, more secure, countries. A further prediction of the model is

that complementary tactics would respond in a similar fashion to relative price changes. For

Page 93: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

10

example, assassinations and bombings tend to be substitutes, while bombings and threats are

complementary. Thus, the model predicts that a policy that makes it more costly to obtain

assault weapons (an important input in an assassination) will reduce the number of assassinations

but increase the number of bombings and threats. In contrast, government interventions that

raise the price of all terrorist tactics or that reduce terrorists’ resources will cause non-terrorist

activities to increase relative to terrorist actions. However, there is no reason to suppose that this

type of policy will induce substitutions among the various attack models.

To be more formal, suppose that a group only uses two kinds of operations – hostage

taking (h) and bombings (b). Further, suppose that the per-unit costs of each kind of operation

are Ph and Pb for hostage taking and bombings, respectively. In general, these unit costs will

depend on the level of operations and on the anti-terrorism expenditures of the authorities:

Ph = Ph(h, gh) , 0and 0h h hP h P g∂ ∂ ≥ ∂ ∂ ≥ (4)

Pb = Pb(b, gb) , 0and 0b b bP b P g∂ ∂ ≥ ∂ ∂ ≥ (5)

where gh and gb are the government’s anti-terrorism expenditures on hostage-takings and

bombings, respectively.3

Taking as given the government’s anti-terrorism expenditures and their own total level of

resources (R), the terrorists choose h and b to maximize their utility

U(h, b), (6)

subject to:

R = Ph(h, gh) h + Pb(b, gb) b. (7)

Under the standard assumptions, it is possible to show that hostage taking and bombings

3 Notice that in our 2-incident example, we abstract from direct substitutability and complementarity. In a more general setting, we could allow the price of bombings to depend on the number of hostage takings and the price of hostage-takings to depend on the number of bombings. Moreover, anti-terrorism spending directed towards one type of incident might be expected to increase the price of the alternative incident types.

Page 94: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

11

decrease when the authorities manage to limit the terrorist’s resource base R. Moreover, actions

by the authorities to increase the unit cost of, say, hostage taking cause terrorists to switch some

operations to the now relatively cheaper bombing events.

A third choice of terrorists involves an intertemporal allocation of resources. Analogous

to other investors, terrorists can invest resources to earn a rate of return, r, per period. When

terrorists want to augment operations, they can cash in some of their invested resources.

Suppose that terrorists have a two-period horizon and must decide terrorist activities today (T0)

and tomorrow (T1) based on resources today (R0) and tomorrow (R1). The intertemporal budget

constraint is:

1 1 0 0(1 )( ),T R r R T= + + − (8)

where tomorrow’s terrorism equals tomorrow’s resource endowment plus (minus) the earnings

on savings (the payments on borrowings) from the initial period. Terrorists maximize an

intertemporal utility function, 0 1( , ),U T T subject to (8) and, in so doing, decide terrorist activities

over time. Thus, terrorists can react to shocks by augmenting operations not only from curbing

non-terrorist activities, but also through an intertemporal substitution of resources.

Unlike a standard intertemporal optimizing framework, the capital market is not perfect –

terrorist groups cannot fully borrow against their expected future income levels. As such, there

may also exist a liquidity constraint. If high-terrorism periods are to be supported by an

intertemporal substitution, it may be difficult for terrorists to maintain a prolonged campaign. As

such, particularly long and intense terrorist campaigns are not as readily sustained as lower levels

of conflict. This prediction may not characterize non-resource-using threats and hoaxes.

We can summarize some of the key predictions and implications of the household

production approach as follows:

Page 95: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

12

Substitutions across attack modes: An increase in the probability of success, a decrease in the relative price, or an increase in the payoff of any one type of attack mode will increase that type of attack.

Effects of government policies: Government policies aimed at a single type of terrorist

event (e.g., the installation of bomb-sniffing equipment in airports) adversely changes its relative price and results in a substitution into now less expense modes of attack. Thus, Landes’ (1978) measure of the success of metal detectors, in terms of fewer skyjackings, does not go far enough, because the application of this technology may have induced a large number of other kinds of events.

Substitutions across countries: A decrease in the probability of success or a reduction in

the payoff in successfully attacking any one country will reduce the number of attacks on that country. Given their available resources, terrorists wll move planned attacks into similar, relatively less-protected countries. Intertemporal Substitutions: High-terrorism states deplete resources and so are followed by low-terrorism states. Particularly long and intense terrorist campaigns are not as readily sustained as are lower campaign levels.

3. Evidence of the Substitution Effect

The data we use is constructed from the source files of ITERATE (International

Terrorism: Attributes of Terrorist Events). ITERATE was originally developed by Edward

Mickolus (1982) and has been extended by Mickolus, Sandler, Murdock, and Fleming (1989,

1993) and Fleming (2001). Todd Sandler updated select variables through 1999-2000.

ITERATE uses information from publicly available sources to construct a chronology of

transnational terrorist events. The sources for ITERATE include the Associated Press, United

Press International, Reuters tickers, the Foreign Broadcast Information Service (FBIS) Daily

Reports, and major US newspapers (e.g., the Washington Post, New York Times).

Figure 1 displays the quarterly totals of all transnational terrorist events over the 1968:1 -

2000:4 period. In contrast to the impression cast by the media, the number of transnational

terrorist incidents has been declining since 1993. Bombings are the favorite mode of operation

of terrorists, accounting for about half of all transnational terrorist incidents on average in any

Page 96: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

13

given year. As is evident from the figure, transnational terrorism displays a number of sharp

peaks and troughs. Some of the fluctuations are due to landmark political events. The jump in

1979 can be attributed to the political ramifications surrounding the takeover of the U.S. embassy

in Tehran (Enders and Sandler, 2000). The spike in 1986 is associated with the U.S. retaliatory

raid against Libya that occurred on 15 April 1986. The latter half of the 1990s represents a

downturn in transnational terrorism due, in large part, to fewer states sponsoring terrorism in the

post-Cold War era (Enders and Sandler, 1999).

Substitutions and religious based terrorism

Despite the decline in overall terrorism, Figures 2 and 3 paint a grim picture. Figure 2

shows the number of individuals KILLED per quarter in all transnational events, and Figure 3

shows the quarterly proportion of incidents with CASUALTIES and the proportion with deaths.

Notice that the values of the KILLED series have generally increased since 1993. Over the

entire sample period, an average of 63 individuals have been killed in each quarter. Beginning in

1993, the average number of deaths has increased to 79 per quarter. This pattern is reinforced by

the data shown in Figure 3. The proportion of incidents with CASUALTIES (the dashed line in

the figure) has remained fairly stable since 1973; however, the proportion of incidents with

deaths has more than doubled over the same period. In fact, the proportion of casualty incidents

without deaths (i.e., those with only wounded individuals) has declined. In recent years, there

has been little difference between the proportion of incidents with casualties and the proportion

of incidents with deaths. The strong impression from Figures 1-3 is that the number of incidents

has been declining while the typical incident is becoming much more lethal. The increase in the

proportion of deadly incidents is consistent with the HPF model. Enders and Sandler (2000)

trace the increase in the severity of a typical terrorist incident to the takeover of the US Embassy

in Tehran. The change in the composition of terrorists from less leftist groups to more religious

Page 97: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

14

groups means that terrorists no longer fear death. Moreover, fundamentalist terrorist groups

purposely seek out mass casualties, viewing anyone not with them as a legitimate target. As

such, the typical incident is more likely to involve the death of a terrorist and/or the public.

The assassination series shown in Figure 4 includes both successful and failed

assassinations. As such, the values shown exceed the number of assassinations resulting in

deaths. Notice that the overall pattern of the series follows the pattern of transnational incidents

shown in Figure 1. The disturbing feature is that assassinations are declining while the number

of incidents with deaths is increasing; as such, more KILLED incidents involve non-protected

persons and multiple victims.

Substitutions and government policy interventions

Enders and Sandler (1993, 1995) apply vector autoregression (VAR) analysis to capture

the potential interactions among various terrorist attack modes (e.g., skyjackings and other

hostage events) in response to government policies. They find that the installation of metal

detectors in airports (begun in 1973) decreased skyjackings and threats, but increased other kinds

of hostage incidents, not protected by detectors. Specifically, metal detectors were estimated to

reduce skyjackings and threats and hoaxes by 13 and 9.5 incidents per quarter, respectively.

However, the number of other hostage-taking incidents and assassinations rose by almost 10

incidents per quarter. The measured trade-off between skyjacking and other logistically complex

events was nearly one for one (also see Enders, Sandler, and Cauley, 1990; Im, Cauley, and

Sandler, 1987). In terms of the HPF approach, the installation of metal detectors in US airports

increased the relative price of a skyjacking. Skyjackings fell and so did the complementary

threats and hoaxes. This policy intervention had primarily a substitution effect, because it did

not deplete the resources, knowledge, or wherewithal of the terrorists. Substitutions across

attack modes were also found to be important when the United States fortified its embassies in

Page 98: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

15

1985 in accord with public law 98-533. Although direct attacks on embassies were reduced, an

indirect consequence was that the number of political assassinations was increased by 5.4

incidents per quarter.

Intertemporal Substitutions

Both Brophy-Baermann and Conybeare (1994) and Enders and Sandler (1993) examine

the effects of retaliatory raids on intertemporal substitutions. Brophy-Baermann and Conybeare

(1994) find that retaliations by Israel against Palestinian terrorists had no lasting effects on the

level of terrorism. They posit a model such that rational terrorists select a long-run or ‘natural’

rate of attacks. The actual level of attacks will differ from the ‘natural’ level only in the presence

of an unanticipated event. In 1972, Israel conducted nine air raids against PLO camps in Syria in

retaliation for Black September’s attack on Israeli athletes in the 1972 Munich Olympic games.

These attacks were estimated as increasing the number of PLO attacks against Israel by 9.39

incidents on impact. After three quarters, the PLO attacks were only 0.5 incidents above the

natural rate. Five other Israeli attacks were found to have no long-run statistical effect on PLO

terrorism.

Similarly, Enders and Sandler (1993) establish that the US retaliatory raid against Libya

on April 1986 (for its suspected involvement in the bombing of the La Belle Discothèque in

West Berlin on 4 April 1986) was associated with an immediate increase in terrorist attacks

against US and UK interests. The raid involved eighteen US F-111 fighter-bombers being

allowed to take off from UK airbases in Lakenheath and Upper Heyford. The planes were

deployed from UK airbases because European nations, geographically closer to Libya, refused to

allow the United States to use their airbases or their airspace. This endangered the raid since it

forced the US fighters to refuel in midair after flying through the Strait of Gibraltar.

As a result of the raid, terrorist attacks against US and the UK interests were estimated to

Page 99: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

16

have increased by 39 incidents. However, the attacks had very little persistence as there was a

temporary lull while terrorists built up depleted resources. In the long run, the mean number of

attacks directed against US and UK interests was found to be unchanged. The evidence seems to

be that retaliatory raids induce terrorists to intertemporally substitute attacks planned for the

future into the present to protest the retaliation. Within a relatively few quarters, terrorist attacks

resumed the same mean number of events.

However, the Israeli raids against the PLO and the US raid against Libya did destroy

some of the terrorists’ resource base, so that one must wonder why overall terrorism did not

diminish as a result. One answer is that the retaliations were not sufficient to destroy a

significant portion of the terrorists’ bases or personnel. A second answer is that the raids

actually made it easier for terrorists to recruit new members and to raise funds. A third answer is

that Libya was not responsible for a lot of transnational terrorism.

Enders and Sandler (2002) find additional evidence of intertemporal substitutions using a

threshold autoregressive (TAR) model. The HPF model implies that high-terrorism states are

difficult to maintain if there are important liquidity constraints. In the midst of an intense

terrorist campaign, weapons, funds, and personnel may be depleted. In contrast, a low-terrorism

state can be maintained almost indefinitely; during this time, terrorists can recruit individuals,

raise funds, and acquire weapons. As such, low-terrorism states should be more persistent than

high-terrorism states. Enders and Sandler (2002) let yt denote the number of incidents with

deaths over the 1970:1-1999:4 period and estimate the TAR model (with t-statistics in

parenthesis):

yt = [ 21.53 ] It + [ 7.09 + 0.47yt-1 ] (1 – It ), (9) (23.02) (3.12) (2.41)

Page 100: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

17

where: 1

1

1 18

0 18.t

tt

if yI

if y−

≥= <

The threshold model suggests that there is no single long-run equilibrium value for the

number of incidents; instead, there are high- and low-terrorism regimes or states. In the low state

(i.e., when the number of incidents is less than 18), the system gravitates toward 13 incidents per

quarter [7.09 ÷ (1.0 – 0.47) ≈ 13]. If, however, the number of incidents exceeds the threshold,

there tends to be an immediate jump to 21.53 incidents. Whenever the number of incidents

exceeds this threshold due to a shock or event, there will be an immediate decline to 21.53

incidents in the subsequent quarter. The high-incident state can be maintained until a shock of

sufficient magnitude causes a switch of regime; however, the number of events in this

heightened state cannot be maintained at more than 21.53 incidents. Insofar as the estimated

standard deviation of is equal to 6.14, the magnitude of a typical shock is likely to cause a regime

switch.

Policy Implications

The findings that substitution effects are important have a number of implications for

government policymaking. Clearly, governments must act to reduce the terrorists’ resource

endowments (i.e., their finances, leadership, and membership) if an overall decrease in terrorism

is to follow. Efforts to infiltrate and undermine terrorist groups and to freeze their assets have

the consequence of reducing the overall amount of terrorism.

Even some piecemeal policies that cause substitutions by focusing on only part of the

overall terrorism problem may have some net positive impacts. To the extent that the National

Defense Authorization Act leads to a reduction in the likelihood of biological terrorism,

substitutions into other attack modes will occur. The desirability of such policies is that they

may force terrorists to substitute into less harmful events. Anti-terrorist policies can be most

Page 101: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

18

effective when the government simultaneously targets a wide range of terrorist attack modes, so

that the overall rise in the prices of terrorist attacks becomes analogous to a decrease in

resources. A government must maintain the resolve to fight terrorism. Terrorists do not have the

same ability as governments to maintain a sustained offensive. A short-lived governmental

effort to fight terrorism will afford the group time to regroup and replenish its resources.

Success in raising the price of all modes of terrorist attacks and/or in reducing terrorists’

resources would induce them to shift into legal protests and other nonterrorist actions to air

grievances.

Similarly, the development of technological barriers to thwart terrorism causes a

substitution into other attack modes in the short run. In the long term, terrorists will develop

ingenious countermeasures to circumvent the technology. Immediately after airport vigilance

was increased as a result of 9/11, Richard Reid (aka Tariq Rajah) was discovered on a flight from

Paris to the United States with an explosive device in his shoes. Now that airport security

routinely inspects shoes, plastic guns, electronic jamming equipment, bottles of flammable liquid

or other explosive devices are predicted to be hidden on (or in) the terrorist or in carry-on

luggage. Thus, there are dynamic strategic interactions; authorities must be vigilant to improve

technology by anticipating ways of circumventing current technological barriers. This vigilance

must lead to periodic upgrades in the technology prior to the terrorists exposing the technology’s

weakness through a successful attack.

4. What We Do Not Know About the Substitution Effect

ITERATE poses a number of shortcomings that researchers must take into account when

testing theories. First, since it relies on public sources such as newspaper accounts, ITERATE

picks up only newsworthy transnational terrorist incidents. However, what is deemed

Page 102: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

19

“newsworthy” changes over time as the public becomes desensitized to terrorism. For example,

ITERATE contains the following incident:

November 5, 1985— GREECE — Police discovered a bomb in a suspicious-looking cloth bag planted between the first and second floors of an Athens building at 8 Xenophon Street. The building housed the offices of Trans World Airlines. Bomb experts removed the bomb and detonated it without mishap.

Given the increased severity of terrorist events, such an attempted bombing might not be

prominently reported in the newspapers. Thus, ITERATE might suggest that certain types of

terrorist events may have declined simply because they are no longer reported. Of course, this

bias is more likely for threats, hoaxes, and bombings without casualties than for incidents with

deaths. The bias has worsened since mid-1996, when the FBI’s Daily Reports became

unavailable to ITERATE coders. Moreover, by relying on newspaper accounts, ITERATE is

better at describing the actions of terrorists than of the authorities. In some instances,

government strategies are revealed and coded in ITERATE. However, anti-terrorism initiatives

may have been undertaken in secret in response to an undisclosed terrorist threat. To circumvent

such limitations of ITERATE, the US government should give proven researchers access to the

unclassified portions of its more inconclusive data sets. The same is true of the RAND-St.

Andrews data set on incidents, which we have tried unsuccessfully to acquire. The true biases in

these data sets can only be ascertained by testing the same hypothesis with alternative data sets.

Clearly, there is much to learn about the substitution effect. Only a portion of the problem

concerns data limitations. Instead of presenting a “laundry list” of unknowns, we conclude with

three useful directions for future research involving substitutions associated with terrorist

negotiations, terrorist recruitment, and terrorist networks.

Atkinson, Sandler, and Tschirhart (1987), Sandler and Scott (1987), Lapan and Sandler

Page 103: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

20

(1988), Selton (1988), Islam and Shahin (1989), Scott (1991), and Shahin and Islam (1992)

examine the effects of negotiating with terrorists. If terrorism becomes successful, the HPF

model predicts that terrorists will devote more of their resources to terrorist activities and that

new terrorist groups will emerge. However, the extent to which a concession to one terrorist

group induces additional terrorist incidents needs to be satisfactorily established.

As posited, the HPF model treats the resources of a group as given. Nevertheless, groups

can obtain resources through publicity. An extremely heinous or highly visible attack may

provide a signal that the responsible group is particularly influential or powerful. Such attacks

may lower recruiting costs so that major campaigns become more sustainable. This means that

the recruiting decisions are not independent of the mode of attack.

The HPF model analyzes the choice-theoretic decision of a single terrorist group. If

terrorists are tied together implicitly through similar hatreds (e.g., of Israel and the United

States), then multiple terrorist groups may simultaneously act as a unified whole. However,

there may be important network externalities or interdependencies not directly captured by the

HPF model of a single group. Since attack modes may be complementary, the actions of one

group may affect the behavior of other groups. For example, attacks by al-Qaida may make it

more desirable for a second terrorist group to also attack the US interests. Moreover, strikes

against terrorists in Afghanistan may make it easier for terrorists elsewhere to recruit individuals

and resources. Such complementarities may induce terrorists worldwide to take on the

appearance of a single group even though they have no direct links with each other.

Page 104: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

21

References

Atkinson, Scott E., Todd Sandler, and John T. Tschirhart. 1987. “Terrorism in a Bargaining

Framework.” Journal of Law and Economics. 30:1, pp. 1-21.

Brophy-Baermann, Bryan and John A.C. Conybeare . 1994. “Retaliating Against Terrorism:

Rational Expectations and the Optimality of Rules versus Discretion.” American Journal

of Political Science. 38:1, pp. 196-210.

Carr, Caleb. 2002. The Lessons of Terror: A History of Warfare Against Civilians, Why It Has

Always Failed and Why It Will Fail Again. New York: Random House.

Chalk, Peter. 1995. “The Liberal Democratic Response to Terrorism.” Terrorism and Political

Violence. 7:4, pp. 10-44.

Clutterbuck, Richard. 1992. “Keeping track of terrorists after 1992.” Terrorism and Political

Violence 4, pp. 301-6.

Enders, Walter and Todd Sandler. 1993. “The Effectiveness of Anti-Terrorism Policies:

Vector-Autoregression-Intervention Analysis.” American Political Science Review.

87:4, pp. 829-44.

Enders, Walter and Todd Sandler. 1995. “Terrorism: Theory and Applications” in Handbook

of Defense Economics. Keith Hartley and Todd Sandler, eds. Elsevier: Amsterdam. pp.

213 - 49.

Enders, Walter and Todd Sandler. 1999. “Transnational Terrorism in the Post-Cold War

Era.” International Studies Quarterly. 43:1, pp. 145-67.

Enders, Walter and Todd Sandler. 2000. “Is Transnational Terrorism Becoming More

Threatening.” Journal of Conflict Resolution. 44:3, pp. 307-32.

Enders, Walter and Todd Sandler. 2002. “Patterns of Transnational Terrorism, 1970-99:

Alternative Time Series Estimates.” International Studies Quarterly. forthcoming.

Page 105: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

22

Enders, Walter, Todd Sandler, and Jon Cauley. 1990. “UN Conventions, Technology and

Retaliation in the Fight Against Terrorism: An Econometric Evaluation.” Terrorism

and Political Violence. 2:1, pp. 83-105.

Fleming Peter. 2001. International Terrorism: Attributes of Terrorist Events 1992-1998

(ITERATE 5 update). Personal communication.

Hirshleifer, Jack. 1991. “The Paradox of Power.” Economics and Politics. 3:3, pp. 177-200.

Hoffman, Bruce. 1997. “The Confluence of International and Domestic Trends in Terrorism.”

Terrorism and Political Violence. 9:2, pp. 1-15.

Hoffman, Bruce. 1998. Inside Terrorism. New York: Columbia University Press.

Im, Eric I., Jon Cauley, and Todd Sandler. 1987. “Cycles and Substitutions in Terrorist

Activities: A Spectral Approach.” KYKLOS. 40:2, pp. 238-55.

Islam, Muhammad Q. and Wassim N. Shahin. 1989. “Economic Methodology Applied to

Political Hostage-Taking in Light of the Iran-Contra Affair.” Southern Economic

Journal. 55:4, pp. 1019-24

Jongman, Albert J. 1992. “Trends in International and Domestic Terrorism in Western

Europe.” 1968-1988. Terrorism and Political Violence 4, pp. 26-76.

Juergensmeyer, Mark. 1997. “Terror mandated by God.” Terrorism and Political Violence 9,

pp. 16-23.

Lapan, Harvey E. and Todd Sandler. 1988. “To Bargain or Not to Bargain: That Is the

Question.” American Economic Review. 78:2, pp. 16-20.

Landes, William M. 1978. “An Economic Study of US Aircraft Skyjackings, 1961-1976.”

Journal of Law and Economics. 21:1, pp. 1-31.

Mickolus, Edward F. 1982. International Terrorism: Attributes of Terrorist Events, 1968-

1977. (ITERATE 2). Ann Arbor, MI: Inter-University Consortium for Political and

Page 106: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

23

Social Research.

Mickolus, Edward F., Todd Sandler, Jean M. Murdock, and Peter Fleming. 1989.

International Terrorism: Attributes of Terrorist Events, 1978-1987. (ITERATE 3).

Dunn Loring, VA: Vinyard Software.

Mickolus, Edward F., Todd Sandler, Jean M. Murdock, and Peter Fleming. 1993.

International Terrorism: Attributes of Terrorist Events, 1988-1991. (ITERATE 4).

Dunn Loring, VA: Vinyard Software.

Sandler, Todd and Harvey E. Lapan. 1988. “The Calculus of Dissent: An Analysis of

Terrorists’ Choice of Targets.” Synthese. 76:2, pp. 245-61.

Sandler, Todd and John L. Scott. 1987. “Terrorist Success in Hostage-Taking Incidents.”

Journal of Conflict Resolution. 31:1, pp. 35-53.

Scott, John L. 1991. “Reputation Building in Hostage Incidents.” Defence Economics. 2:3,

pp. 209-18.

Selten, Reinhard. 1988. “A Simple Game Model of Kidnappings,” in Reinhard Selten (ed.),

Models of Strategic Rationality (Boston, MA: Kluwer Academic).

Shahin, Wassim N. and Muhammad Q. Islam. 1992. “Combating Political Hostage-Taking:

An Alternative Approach.” Defence Economics. 3:4, pp. 321-7.

Wilcox, Phillip C., Jr. 1997. “The Western Alliance and the Challenge of Combating

Terrorism.” Terrorism and Political Violence 9, pp. 1-7.

Wilkinson, Paul. 1986. Terrorism and the Liberal State, rev. ed. London: Macmillan.

Wilkinson, Paul. 1992. “The European Response to Terrorism: Retrospect and Prospect.”

Defence Economics 3, pp. 289-304.

Zagari, M. 1992. “Combating terrorism: Report to Committee of Legal Affairs and Citizen’s

Rights of the European Parliament.” Terrorism and Political Violence 4, pp. 288-300.

Page 107: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

24

Figure 1: All Incidents

0

50

100

150

200

250

300

350

1968 1972 1976 1980 1984 1988 1992 1996 2000

Qu

arte

rly

To

tals

Figure 2: Individuals Killed

0

50

100

150

200

250

1968 1972 1976 1980 1984 1988 1992 1996 2000

Qu

arte

rly

To

tals

Page 108: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

25

Figure 3: Proportions of Casualty and Death Incidents

0%

5%

10%

15%

20%

25%

1968 1972 1976 1980 1984 1988 1992 1996 2000

Casualties Deaths

Figure 4: Assassinations

0

5

10

15

20

25

30

35

1968 1972 1976 1980 1984 1988 1992 1996 2000

Qu

art

erl

y T

ota

ls

Page 109: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

AN EVOLUTIONARY GAME APPROACH TO FUNDAMENTALISM AND CONFLICT

by

Daniel G. Arce M. and Todd Sandler*

Final Version: July 2002

Abstract

This paper investigates the evolutionary equilibria of a clash of cultures game where conflict results from failures to share social power in individual pairings. Members of a general subpopulation are matched with those of a fundamentalist subpopulation, the latter being more cohesive and insistent that their identity traits define the norms for, and outcomes of, social, economic, and political interaction. Simulations of the evolutionary dynamics reveal a tradeoff between the intolerance of fundamentalism and the likelihood of a takeover. This tradeoff is reversed if fundamentalism is falsifiable: affording non-fundamentalists the ability to signal fundamentalist traits produces a bandwagon effect. JEL Classification: D74, C73

*Arce is the Robert D. McCallum Distinguished Professor of Economics & Business, and Sandler is the Robert R. and Katheryn A. Dockson Professor of International Relations & Economics. Arce’s and Sandler’s research was funded through the McCallum and Dockson endowments, respectively. We have profited from comments by Werner Güth, Christoph Engel, and Timur Kuran on an earlier draft. Comments from the participants at the Wörlitz conference are also gratefully acknowledged. The authors assume full responsibility for the paper’s contents.

Page 110: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

AN EVOLUTIONARY GAME APPROACH TO FUNDAMENTALISM AND CONFLICT

1 Introduction

Economists have increasingly turned their attention to the study of conflict since KENNETH

BOULDING [1962] published Conflict and Defense: A General Theory. Although four decades

have now elapsed, BOULDING’S emphasis on equilibrium, strategic interactions, and dynamics

continues to characterize modern treatments of conflicts. Conflict can stem from myriad causes

that include contests over resources, political identity, social control, or grievances. Despite the

end of the Cold War and the superpower confrontation, conflict remains prevalent today as

interstate conflict has given way to intrastate conflicts in the form of civil wars (MURDOCH AND

SANDLER [2002]) and subnational clashes among rivalry interests.

There are a number of theoretical foundations to the study of conflict. One foundation

depends on contests or tournaments in which opposing interests use their resources to vie with

one another for a prize (DIXIT [1987], HIRSHLEIFER [2001], SANDLER [2000a]). This literature is

closely akin to the theory of rent seeking, which involves an agent or collective expending

resources to obtain a return that results in no gain to society – i.e., a directly unproductive

activity. For these contests and rent-seeking activities, the conflictual outcome is affected by a

contest success function, which defines appropriative outcome based on the relative “inputs” of

fighting effort (HIRSHLEIFER [2000]). Another theoretical basis of conflict comes from a general-

equilibrium representation, in which a government must allocate resources to stay in power when

confronted by an aggrieved subpopulation, whose resources are being appropriated (GROSSMAN

[1991]). A third foundation for conflict can come from population dynamics, for which

subgroups’ traits or (dissimilar) values can lead to conflict (HIRSHLEIFER [1998], SKYRMS

[1996]). This third basis of conflict is dependent on evolutionary game theory, which predicts

Page 111: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

2

that those displaying the “fittest” strategy choices, as determined by their resulting payoffs, will

survive, multiply, and characterize the population.

In this paper, we put forward an evolutionary game approach to analyze fundamentalism

and conflict, consistent with the coexistence of both fundamentalist and non-fundamentalist

subpopulations in the same society. The analysis relies on the Nash demand game (NASH

[1953]), played between pairings of individuals drawn from the society, and SKYRMS’ [1996]

model of evolutionary justice. In pairwise interactions, individuals must bargain over the extent

of social control, for which an equal footing gives each half of the one-unit pie up for

negotiations. One player gains a social dominance over another if his or her take exceeds .5.

The fundamentalist subpopulation is assumed to be sufficiently dogmatic to never settle for a

minority share of social control. We use simulations of the underlying evolutionary dynamics to

show that whether fundamentalist mores characterize social interactions depends upon the

distribution of demands within each subpopulation, and, surprisingly, is inversely related to the

level of fundamentalist intolerance or greediness.

The model is then extended to provide an evolutionary game underpinning to KURAN’S

[1989] novel and important notion of preference falsification, where individuals present public

preferences that may differ from their true private preferences in order to maximize their well-

being. Preference falsification is particularly appropriate for dealing with fundamentalists who

provide more favorable terms for those (i.e., fundamentalist or otherwise) who display

fundamentalist traits (e.g., dress, customs, views). The analysis is also descriptive of any regime

– e.g., communist or fascist – where signaling loyalty is rewarded with preferential treatment that

allows one to “fit in.” A rich set of population dynamics is shown to derive from either the

initial demand proportions of the constituent subgroups or the intolerance of fundamentalists to

those not signaling fundamentalist characteristics. Under some circumstances, even a relatively

Page 112: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

3

small percentage of the general subpopulation abiding by a fundamentalist orientation may be

sufficient to lead to a fundamentalist domination over time if intolerance (i.e., greedy demands)

is sufficiently high. Furthermore, fundamentalist intolerance of non-abiders is now

complementary to this process.

Our analysis is in the spirit of recent political science papers where evolutionary game

theory is offered as a basis for understanding ethnic conflict (GOETZE AND JAMES [2001],

JOHNSON [2001], ROSS [2001], SALTER [2001]). Evolutionary game theory treats conflict as

dynamic, so that those in conflict may change over time depending on the efficacy of strategies

played. Moreover, our model accounts for rewards to those who signal in-group loyalty, a

behavior that is consistent with RUSSELL HARDIN’S [1995] notion of One for All, where group

identity can promote collective action. Unlike these earlier contributions, we develop an explicit

model to capture evolutionary dynamics. In particular, we represent a dynamic analysis where

subgroups can change in numbers over time and fundamentalists can differentiate their

treatments of others depending on group actions and identity. Finally, our study differs from

BRETON AND DALMAZZONE [2002], for which the emergence of political extremism hinges on

information control and not on evolutionary dynamics.

The remainder of the paper contains five sections. The basic SKYRMS [1996] model is

presented in Section 2 for a single homogeneous population, where conflicts result from

incompatible demands leading to zero payoffs. In Section 3, our evolutionary game depiction of

the “clash of cultures” extends the Skyrms model to heterogeneous populations consisting of

fundamentalists and a more general subpopulation. Section 4 applies replicator dynamics to

simulate the evolution of ethnopolitical conflicts under alternative population and intolerance

parameters. In Section 5, the analysis permits fundamentalists to make fair demands when

matched with others displaying fundamentalist traits or norms. This behavior not only

Page 113: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

4

encourages preference falsification by non-fundamentalists, but also gives rise to interesting

population dynamics. Concluding remarks are drawn in Section 6.

2 The Basic Model

In social interactions, paired agents compete for superiority or control over his or her

counterpart. GIURIATO AND MOLINARI [2002] characterize this control when applied to two rival

groups – fundamentalist and the government – as the share of political power, which varies

between zero (no power) and one (complete power), over the rival group. GURR [1994] similarly

asserts that such rivalries can ultimately lead to conflict over the distribution of access to state

power, which we extend to the notion of social control. Culturally distinct people in mixed

societies are often locked in rivalries over the way that societal norms are consistent with their

distinct identity traits. A larger amount of social control means that an agent has more say over

norms, income distribution, justice, and other social divisions. Because we focus on population

dynamics among heterogeneous groups, the unit of analysis that drives these dynamics is the

division of social control among paired individuals, drawn from different cultural groups.

If two or more groups disagree about the distribution of social control, then a conflict

ensues. Our focus is on dyads, with the goal of displaying the evolution of conflict in pairwise

interactions among individuals belonging to two groups with distinct identities. Rather than being

a limiting assumption, our concentration on dyadic interactions among members of the general

and fundamentalist subpopulations focuses the analysis where the potential for conflict is the

greatest. Such dyads result in equilibrium characteristics for the competing subpopulations that

are truly the collective result of individual fitness instead of corporate or hierarchically decreed

behavior. By correlating fitness with social control, we adapt a longstanding game – the Nash

demand game – that SKYRMS [1996] employs to examine issues of social justice. In the Nash

Page 114: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

5

demand game, two players must agree on how to divide a 1-unit good. Each player

simultaneously proposes a share for himself or herself. In terms of our context, a player’s demand

is the minimal amount of social control that he or she is willing to accept. If the proposals are

jointly feasible (their sum is less than or equal to one), then each gets what he or she demands;

otherwise, each receives zero (conflict ensues). Conceptually, this payoff structure allows for

“anti-conflicts” where both parties receive less than what is available (jointly feasible, but

inefficient demands). This feature gives players a strong incentive to increase their demands as

much as possible without losing compatibility (NASH [1953, 131]). The problem of social control

therefore becomes one of coordinating demands in an efficient manner. A priori there is no

assumption of efficiency, but evolutionary pressure will ultimately lead to efficient outcomes. The

game captures the dichotomy between mutual identity and individual self-interest because

cooperative ethnopolitical interactions occur only if each group receives a degree of social control

that meets or exceeds their demand.

SKYRMS [1996] turns the analysis of the Nash game on its head. The usual procedure is

to take the demands of the players as given – i.e., more is better – and find the equilibrium split

given these demands under varying game forms. Instead, SKYRMS posits various types of

demands related to social norms such as fairness and greediness, and analyzes which would

survive in the long-run via an evolutionary framework. This is our point of departure.

Specifically, SKYRMS indicates the following types of demands:

Modest (M): demand xM, where 0 ≤ xM < .5;

Fair (F): demand exactly half, xF = .5; and

Greedy (G): demand more than .5, 1 ≥ xG > .5.

Definition: Πi(xi,xj) defines the fitness of an individual making demand xi in a pairwise

Page 115: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

6

encounter with another individual xj; i, j = M, F, G. In the Skyrms game, this payoff is:

(1) Πi(xi,xj) = i i jx if x x 1,

0, otherwise.

+ ≤

Suppose that there is a large population of individuals and that they are randomly matched in

a pairwise fashion to play the Nash demand game. The entries in each cell of Box 1 represent the

outcomes of matching between any combination of modest, fair, and greedy types, as dictated by

Eq. (1). Reading across the M-row of Box 1, the first entry indicates that M-types earn a fitness or

payoff of xM each in pairwise encounters amongst themselves. As previously discussed, such an

inefficient pairing is expected to lead to more competitive future demands and does not bias the

efficiency of our results. In the second entry, when paired with an F-type, the M-type’s fitness is xM

and the F-type’s fitness is .5. In the final entry of this row, an (M,G) matching yields fitness of xM

and xG for the M- and G-types, respectively. The other six sets of payoffs are computed in a similar

manner. If, for example, two F-types are paired, then each receives .5. The pairing of F- and G-

types results in conflict with each receiving 0, as is the case when two G-types are paired.

[Box 1 near here]

This game has several important properties. First, it is an example of a symmetric game,

which has the following two characteristics:

a. Each player has the same strategy set, S.

b. If Πr and Πc are the row and column player’s fitness/payoff functions, respectively, then

Πr[x,y] = Πc[y,x] for all pure strategies x, y ∈ S.

Payoff symmetry implies that an individual who makes demand x against another making

demand y earns the same fitness regardless whether he or she is the row or column player.

Page 116: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

7

Second, the concept of a payoff as a measure of fitness indicates that the relative return of

one demand when matched with another (or itself) determines the likelihood that a particular

demand will characterize the population. The lower the relative payoff, the more likely a demand

will eventually be driven out in the evolutionary sense. Over time, the success of a particular

demand is also affected by the distribution of demands within the population. For example, when

greedy types predominantly demand .6, and fitness is as determined in Eq. (1), we need only

consider modest types who demand .4, because this is the demand that earns them the highest

possible fitness in pairwise encounters with greedy types. The reverse could also be said (xG = 1 –

xM) for the survival of greedy types in a population where there is only one predominant xM

demand. As in SKYRMS, we therefore assume that xM = 1 – xG throughout. To capture this

symbiosis in terms of evolutionary dynamics, we make the following set of definitions:

Definition: If ρi is the proportion of individuals in the population making demand xi, and

ρ = (ρ1,ρ2,....,ρN) is the (finite) distribution of all demands, N

ii 1

1,=

ρ =∑ then the expected fitness of

type ‘i’ in the population is: N

i i i j jj 1

E[x , ] (x , x ) •=

ρ = Π ρ∑ .

Definition: The population mean fitness of distribution ρ is E[ρ,ρ] = N

i ii 1

• E[x , ]=

ρ ρ∑ .

A demand has a higher fitness if it receives a better than average return. The average returns

received will be a function of the proportions of the population choosing each of the strategies, so

that we are dealing with the possible equilibria of a dynamic process (HIRSHLEIFER [1982, 15]).

Definition: The growth rate, iρ! , of demand xi behaves according to the evolutionary

replicator dynamic if:

Page 117: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

8

(2) i i i•[E[x , ] E[ , ]]ρ = ρ ρ − ρ ρ! .

The replicator dynamic states that the growth rate of demand xi is proportional to the difference

between the expected fitness of types xi relative to the mean population fitness. If i-types

(i = F, M, G) do better than the average fitness, then they will grow within the population;

otherwise, the process of natural selection will cause them to die out. The replicator dynamic

predicts the following growth rate for each type in Box 1:

M M M M M M M F M F G G M•[E[x , ] E[ , ]] •[x • x •.5• ( ) • x • ]ρ = ρ ρ − ρ ρ = ρ − ρ + ρ ρ + ρ + ρ ρ! ;

F F F F M F M M F M F G G M•[E[x , ] E[ , ]] •[.5• ( ) • x •.5• ( ) • x • ]ρ = ρ ρ − ρ ρ = ρ ρ + ρ − ρ + ρ ρ + ρ + ρ ρ! ;

G G G G G M M M F M F G G M•[E[x , ] E[ , ]] •[x • • x •.5• ( ) • x • ]ρ = ρ ρ − ρ ρ = ρ ρ − ρ + ρ ρ + ρ + ρ ρ! .

Instead of finding all equilibrium points for this system of differential equations, we are

particularly interested in those distributions that are dynamically stable. An equilibrium is

asymptotically stable if when slightly perturbed – say, by a mutant invasion of the population –

the system tends to return back to the equilibrium point of the evolutionary dynamics. To this

end, MAYNARD SMITH AND PRICE [1973] made the following definition:

Definition: Distribution ( )1 2 N, ,...,ρ = ρ ρ ρ is evolutionary stable for a symmetric game if:

a. It is a population characteristic that ρrow = ρcolumn = ρ.

b. This distribution fends off mutant invasions that are represented by the alternative

distribution ρm, as specified by the first-order condition (F.O.C) and second-order condition

(S.O.C.):

(F.O.C.) m mE[ , ] E[ , ] ρ ρ ≥ ρ ρ ∀ ρ .

(S.O.C.) m m m mIf E[ , ] E[ , ], then E[ , ] E[ , ]ρ ρ = ρ ρ ρ ρ > ρ ρ .

Page 118: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

9

In game-theoretic terms, ρ can be interpreted as a mixed strategy that is an evolutionary stable

strategy (ESS). The condition (a) and the F.O.C. imply that ρ is a symmetric Nash equilibrium.

The S.O.C. is an additional stability condition indicating that if ρm is an alternative best reply to

ρ, then ρ is a better reply to ρm than ρm is to itself. The S.O.C. implies that ESS is a refinement

of Nash equilibrium; indeed, it is a stricter refinement than properness.1 If ρi = 1, then we have

an ESS in pure strategies. ESS is our equilibrium concept because TAYLOR AND JONKER [1979]

establish that it is a sufficient condition for the asymptotic stability of equilibrium points for the

replicator dynamic.

Result 1 [SKYRMS, 1996]: The ESSs for the Nash demand game given in Box 1 are

( M F Gˆ ˆ ˆρ , ρ , ρ ) = (0, 1, 0) and M F G ( , , )ρ ρ ρ = (xM/xG , 0, (xG – xM)/xG).

In biological terms, the first population distribution, (0,1,0), can be interpreted as a

monomorphism, since every individual in this population exhibits the fairness trait. The second

population distribution, (xM/xG , 0, (xG – xM)/xG), can be interpreted as a polymorphism, with

(xM/xG) percent of the population making modest demand xM, and the remainder making greedy

demand xG. If the percentage of M-types exceeds xM/xG, then G-types acquire an advantage

within the population and Mρ! will decrease via the process of natural selection. In equilibrium,

neither the M-types nor the G-types earn a higher expected payoff than the other.

Rather than predicting the particular split that will occur in the Nash demand game,

SKYRMS’ analysis is novel because it identifies the types of demands than can characterize a

population. The strategies employed by individuals become the units of selection, as opposed to

the individuals who employ such strategies. This facilitates our analysis of fundamentalism at a

population level, where identity traits may define ethnopolitical conflict. For example, even 1 In contrast to properness, for n × n symmetric games where n ≥ 3, there may be no ESS (e.g., rock-paper-scissors).

Page 119: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

10

though Skyrms’ game is played amongst a homogeneous population, the polymorphic

equilibrium distribution allows for conflict – with probability G G • 0ρ ρ > , a pairwise matching

results in conflicting demands. In the following section, we analyze demands when two

heterogeneous subpopulations interact in the Nash demand game, where one’s demands more

closely resemble the identity traits and cohesiveness of a fundamentalist subpopulation.

3 Clash of Cultures

A clash of cultures between fundamentalists and a general subpopulation is coming to characterize

parts of the globe today (HUNTINGTON [1996]). In northern Africa, this clash involves Islamic

fundamentalists and other population subgroups in Egypt, Algeria, and Sudan (SANDLER [2000b]).

This ethnic conflict may spread to Tunisia and other southern Mediterranean countries. Islamic

extremism also poses political and social instabilities for Turkey (GIURIATO AND MOLINARI

[2002]) and Saudi Arabia. In Israel, Jewish fundamentalists are in conflict with other more

moderate groups, and present a barrier to the peace process, as the 1995 assassination of Prime

Minster Yitzhak Rabin so clearly demonstrated. Fundamentalists have kept Afghanistan at war

for over two decades. Within nearby states, Islamic fundamentalists represent significant political

and social challenges in Pakistan, Uzbekistan, and Tajikistan. In India, Sikh and other extremists

represent a clash of cultures with the general subpopulation. Fundamentalists also pose threats in

the Philippines (Abu Sayyaf Islamic fundamentalists) and Indonesia (Laskar Jihad).

When a fundamentalist subpopulation interacts with a more general subpopulation, the

effect is two-fold. First, the fundamentalists are generally more cohesive; there are organizational

economies of scale associated with a singleness of purpose. Second, fundamentalists are, by

definition, less likely to compromise on societal issues. In this context, we interpret the greedy

strategy as a way of asserting sufficient influence to change the way in which culture, religion,

Page 120: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

11

politics, language, status, and other traits determine the outcome of a transaction. Another

interpretation is that fundamentalism signals one’s unwillingness to compromise on these issues.

Our definition of fundamentalism purposely avoids specific reliance on issues such as

religion, violence, irrationality and other characterizations that can misrepresent or too narrowly

define what is a widespread phenomenon. Instead, we represent fundamentalism in terms of group

cohesiveness and an inability to compromise over issues such as morality in private life, corruption in

public state life, and deficiencies in the rule of law, all of which translate into demand for social

control.2 The fundamentalist subpopulation consists of both “zealots” and “followers.” In fact, many

economists have experienced fundamentalism of this type in their academic departments, where some

subgroup gains control over the departmental agenda and will never settle for modest demands. Such

academic fundamentalists exercise decisions on the rankings of journals, hiring, and acceptable

research topics. They often direct the seminar series and determine the prestige afforded to

colleagues’ accomplishments.

At the very least, fundamentalists do not propose minority status for themselves on the

cultural/ethnic issues that define their identity, which implies that fundamentalists eliminate the

modest/moderate strategy from their strategy set. We can use the Nash demand game to examine

whether this interpretation of fundamentalism affects the coordination of social control. Such a

comparative static is an explicit part of evolutionary game theory, where the strategies themselves are

the units of selection rather than the players. Peaceful coexistence often characterizes inter-ethnic

relations (FEARON AND LAITIN [1996]), so that the F strategy remains relevant for fundamentalists.

Fairness implies relatively equal social control irrespective of cultural/ethnic identity. If a more

general subpopulation is represented by the row strategies and the fundamentalist subpopulation is

represented by the column strategies, then the interaction between these two subpopulations is

2 We thank GEORG ELWERT for a discussion of these issues at the Wörlitz conference.

Page 121: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

12

displayed in Box 2.

[Box 2 near here]

For this interaction, the Nash demand game is no longer symmetric, so that the replicator

dynamics and definition of ESS do not directly apply. The notion of replicator dynamics can,

however, be adapted by recognizing that, in pairwise matching between agents from distinct

subpopulations, an individual from the row subpopulation only meets individuals from the

column subpopulation. That is, an individual does not meet a colleague or mutant from his or

her own subpopulation, which implies that the S.O.C. for an ESS is vacuous, so that only the

F.O.C. applies. Hence, the asymptotic stability of an incumbent strategy of a subpopulation

requires that it must perform strictly better against the other subpopulation than does any other

(mutant) strategy from its own subpopulation. In such a situation, we must specify distinct

distributions, ρ and σ for the row and column subpopulations, respectively. The replicator

dynamics corresponding to our cross-population discussion of fitness (TAYLOR [1979]) are

defined as:3

(3) i i i i row r•[E[x , ] E[ , ]] for x S S ,ρ = ρ σ − ρ σ ∈ =!

(4) j j j j column c•[E[y , ] E[ , ]] for y S S .σ = σ ρ − σ ρ ∈ =!

Again, a simple static characterization holds for the asymptotic stability for fixed points of these

coupled differential equations:

Result 2 [SELTEN, 1980]: (xi,yj) is an ESS for an asymmetric game if and only if it is a

3 Result 2 is a direct function of SELTEN’S requirement that pairwise matchings occur as in a truly asymmetric contest; i.e., those in ρ-subpopulation (σ-subpopulation) do not meet others in the ρ-subpopulation (σ-subpopulation) in contests that determine social control. Hence, one need not consider mutants representing alternative best replies within the same subpopulation, thus implying that the F.O.C. must hold with strict inequality. By contrast, WÄRNERYD [1993] considers an evolutionary model (in an unrelated context) where matchings within and across subpopulations are possible and the equilibrium occurs in mixed strategies.

Page 122: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

13

strict Nash equilibrium.

Strategy pair (xi,yj) is a strict Nash equilibrium when xi is the unique best reply to yj, and

vice versa. Hence, an ESS cannot occur in mixed strategies, because, by definition, any pure

strategy that is played with positive measure receives the same expected payoff. Result 2 is

stated in terms of pure strategies with foresight of this consequence.

From the perspective of our analysis of fundamentalism, SELTEN’S result states that the

equilibria in clash of cultures can only be monomorphic outcomes. This is entirely the aim of

fundamentalist attempts at social control – first, to remove any heterogeneous elements within its

own subpopulation (cohesively raising ethnic identity), and second, to impose its doctrine as the

cultural norm for interaction throughout society. Application of this result to the clash of

cultures game illustrates this point.

Result 3: The ESSs for the game in Box 2 are (F,F) and (M,G).

In contrast to the analysis of the Nash demand game among a single population, now all equilibria are

monomorphic. The monomorphism of the fundamentalist subpopulation is not surprising. What is

novel is that ESS requires the general subpopulation to be monomorphic as well, which is a direct

consequence of SELTEN’s [1980] result. Fairness in both subpopulations is a distinct possibility, but

if any group is to gain the lion’s share, it is the fundamentalist subpopulation – as identified by the

(M,G) equilibrium.

4 The Evolution of Ethnopolitical Conflict

One of the most important contributions of evolutionary game theory is that it provides a theory

of population dynamics that determines how equilibrium is reached. The initial distribution of

demands is unlikely to be monomorphic. If, indeed, the fundamentalist subpopulation rules out

Page 123: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

14

moderate behavior – as in the clash of cultures game – the degree to which this creates conflict is

a likely predictor of whether the (F,F) or (M,G) equilibrium prevails. The replicator dynamic

allows us not only to focus on the equilibrium outcome, but also to predict the evolutionary path

over generations of pairwise matchings leading to that equilibrium. We are particularly

interested in how initial demand distributions – among the general subpopulation and/or

fundamentalists – determine which equilibrium results. For this exercise, we use the discrete

version of the replicator dynamics (THOMAS [1986]), where for the initial population distribution

(ρ0,σ0), the distribution at generation k + 1 is given by:

(5) k k k

k 1 i i ii k k k

E[x , ] expected fitness of x under distribution ρ

E[ , ] mean fitness of distribution ρ+ ρ σρ = =

ρ σ,

(6) k k kj j jk 1

j k k k

E[y , ] expected fitness of y under distribution σE[ , ] mean fitness of distribution σ

+ σ ρσ = =

σ ρ.

Eq. (5) states that the proportion of players in the non-fundamentalist subpopulation that make

demand xi in the next generation (k + 1) depends only on how non-fundamentalists do against the

fundamentalists (in generation k), rather than amongst themselves. This is the essence of SELTEN’S

[1980] result, and is reflected in the fact that the fitness of demand xi ∈ Si in the general

subpopulation is determined only through its matching with demand yj ∈ Sj from the fundamentalist

subpopulation. Such matchings occur in generation k according to distribution σk. The numerator of

(5) measures the expected fitness of xi ∈ Si against the fundamentalist subpopulation, σjk, weighted

by the proportion of the general subpopulation, ρik, that makes demand xi. The denominator

measures the average expected fitness of the general subpopulation when distributed according to ρk,

and each individual is matched with a fundamentalist according to distribution σk. If non-

fundamentalist demand xi does better (worse) against the fundamentalists than the mean fitness, this

Page 124: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

15

type will increase (decrease) in generation k + 1. Similar intuition holds for (6) – the evolution of

fundamentalist demands depends on the success (failure) of their dealings with non-fundamentalists.

The growth and possible convergence of the demands in the fundamentalist and non-

fundamentalist subpopulations are, in part, determined by the distribution of demands in the

opposing population. Eqs. (5) and (6) reflect a coupled symbiosis – whether or not a

subpopulation converges to distribution ρ* (σ*) not only depends on the initial distribution of its

own demand ρ0 (σ0), but also on that of the coupled subpopulation, σ0 (ρ0). The asymptotic

stability of such a distribution is characterized by SELTEN’S [1980] theorem, stated in result 2.4

The implications of fundamentalism and the potential for conflict can be derived through

a simulation of the discrete replicator dynamics for the clash of cultures game. This simulation

depends on three variables: the greedy demand (xG), assumed to be the same in either

subpopulation;5 the initial distribution (ρ0) in the general subpopulation; and the initial

distribution over fundamentalist demands (σ0). The results for each triple can be summarized by

the graphical depiction of ρFk in Figures 1 and 2. According to result 3, only (F,F) and (M,G)

are asymptotically stable. It follows that if ρFk = 1, the system converges to the (F,F)

equilibrium; if, however, ρFk = 0, the system converges to (M,G).

[Four-panel Figure 1 near here]

In each of the four panels of Figures 1 and 2, the vertical axis depicts the ratio of F-types

in the general subpopulation, ρF, while the horizontal axis indicates the number of generations.

For example, in panel a of Figure 1, a greedy type demands xG = .6 and half of the general

subpopulation is initially fair (ρF0 = .5). If half of the fundamentalist subpopulation is initially

fair (σG0 = .5), the system converges to the (F,F) equilibrium, as ρF

k→1. Yet, the conventional

4 See also TAYLOR [1979]. 5 As xG is dominated for the general subpopulation in Box 2, it is played with probability zero by the general subpopulation in our simulations.

Page 125: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

16

wisdom is that it is unlikely that the fundamentalist subpopulation will be so compromising, with

half of its members making fair demands. If, instead, we allow σG0 = .6, Figure 1a illustrates

that the system converges to the (M,G) equilibrium (ρFk→0). For a larger proportion of greedy

fundamentalists, the convergence to the (M,G) equilibrium is even faster. What the simulation

illustrates is that when the fundamentalists are not overly insistent in their demands (xG = .6),

they do not need an initially high level of cohesiveness in order for their identity traits to define

social control. The system converges to (M,G) even though initially only 60% of the

fundamentalists are greedy.

In sharp contrast, Figure 1d illustrates that if we have ρF0 = .5, but the fundamentalist

subpopulation is more obstinate, demanding xG = .9, the system converges to an (F,F)

equilibrium even if 80% of the fundamentalist subpopulation is greedy. The intuition is that,

from such a starting point, fair elements of the fundamentalist subpopulation do much better than

greedy ones against the non-fundamentalist subpopulation. In order for xG = .9 to lead to the

(M,G) outcome, at least 90% of the fundamentalist subpopulation must initially be making this

demand (σG0 = .9). Figures 1a-1d demonstrate that as fundamentalists show less tolerance

(increasing xG), greater proportions of their initial subpopulation distribution must possess this

intolerance if (M,G) is to be the equilibrium.

[Four-panel Figure 2 near here]

Figure 2 presents four panels – 2a-2d – where 80% of the general subpopulation is

initially fair. Even for a small degree of fundamentalist intolerance, xG = .6, in Figure 2a, 90%

of the initial fundamentalist subpopulation must be intolerant for the equilibrium to converge to

(M,G). As xG increases, the speed of convergence to (F,F) increases. In Figure 2d, convergence

to (F,F) occurs within eight generations, even when 90% of the fundamentalists possesses greedy

demands of xG = .9.

Page 126: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

17

Result 4: For the clash of cultures game, the following holds:

i. Intolerant fundamentalism (increasing xG) requires initially greater cohesion (a higher σG0) if

they are to take social control. This can be seen by consulting panels a-d of Figures 1 and 2.

Higher fundamentalist demands, xG, require a more cohesive fundamentalist subpopulation

in order for fundamentalism – (M,G) – with a subservant general subpopulation to prevail.

ii. The success of fundamentalism depends on the existence of moderate behavior in the

non-fundamentalist subpopulation. This can be seen through side by side panel

comparisons of Figures 1 and 2. As ρM0 decreases (ρF

0 increases), implying that the

general subpopulation is less willing to acquiesce to fundamentalist demands, the (F,F)

outcome prevails.

iii. Dogmatic fundamentalists (xG = 1) die out quickly. This is because modest elements of

the general subpopulation would earn a fitness of zero when matched against greedy

fundamentalists. If the greedy demand is 1, then the system converges to the (F,F)

equilibrium (not illustrated).

iv. We extend FEARON AND LAITIN’S [1996] study of peaceful and cooperative ethnopolitical

interactions – based on the Prisoner’s Dilemma – to the case of the Nash demand game.

The (F,F) equilibrium occurs for a wide array of initial population distributions and greedy

demands.

5 Preference Falsification

As there are countless incidents of peaceful inter-ethnic relations (e.g., Jordan and Morocco)

despite the presence of fundamentalist groups, the xF demand remains relevant for the

fundamentalist subpopulation. One of the stated goals of fundamentalism is to transform the

general subpopulation, so that fundamentalist traits and norms determine access to state power.

Page 127: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

18

An often-observed aspect of fundamentalism is the willingness to make fair demands for

pairwise matchings with others who observe fundamentalist behavior. Notice that we are careful

not to say that fundamentalists make fair demands only with other fundamentalists. When there

are two distinct subpopulations, what is important is the willingness of non-fundamentalists to

behave according to fundamentalist doctrine. If fundamentalism operates in this vein, then the

opportunities are ripe for preference falsification as a means to maximize payoffs and fitness. In

Afghanistan, for example, non-Taliban women wore Burqas and men grew beards as a signal of

their adherence to Taliban mores. In academic departments, non-fundamentalists may mimic

fundamentalist traits so that they are treated better. If, for example, the empiricists are the

fundamentalists, then some theorists may co-author papers with empiricists to enhance their

position.

Our use of preference falsification provides an evolutionary game foundation to the

influential work of TIMUR KURAN [1989, 1991], for which the truthful revelation of preferences

depends on threshold choices for participating in a revolution and the size of a revolutionary

collective. In our model, preference falsification or truthful expression hinges on population

dynamics driven by fitness. As such, the initial demands of non-fundamentalists, as well as the

intolerance (greed) of the fundamentalists, determine whether non-fundamentalists falsify their

preferences by signaling fundamentalist traits. Thus, the underlying “thresholds” for truthful

revelation is dependent on population dynamics and preference parameters. Shocks that change

the population proportions – e.g., US bombing of Afghanistan on 7 October 2001 – can either

augment non-fundamentalist proportions (i.e., ρF) or decrease fundamentalist proportions (i.e.,

σG), so that preference falsification decreases sufficiently, thereby ending an intolerant

fundamentalist regime.

Suppose that non-fundamentalists and fundamentalists alike have access to such a

Page 128: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

19

strategy, which signals their willingness to adhere to fundamentalist doctrine, thereby avoiding

cross-population conflict. That is, fundamentalism affords falsifiable behavior to the general

subpopulation such that adherence to this behavior reduces cross-cultural friction. In this

scenario, the following definition proves important:

Definition: A falsifiable fundamentalist strategy, ℑ , is a conditional strategy6 that is

greedy when matched with any strategy other than itself, and fair when matched with others

exhibiting the ℑ -traits. Formally, we have the following strategy:

(7) G

Demand .5 when matched with a from the other subpopulation, and

demand x in all other subpopulation matchings.

ℑℑ =

When falsifiable behavior replaces greediness in the clash of cultures game, the results of

pairwise matchings are given in Box 3. The analyses of Boxes 1, 2, and 3 therefore represent a

natural progression from a situation where fundamentalists eliminate moderate demands in an

attempt to gain social control (Box 1 to Box 2) to one in which they allow for preference

falsification (ℑ ) in a further bid for social control (Box 2 to Box 3). The latter eliminates the

greedy demand, because it is dominated by ℑ .

[Box 3 near here]

By allowing the general subpopulation to avoid intolerance only by adhering to

fundamentalist’s terms, the fundamentalists create a model of behavior – alternative to fairness – that

is aligned with their identity traits. Fundamentalists prefer that social power sharing be done on their

terms, rather than a general principle of fairness. Iran after the 1979 revolution, which brought

Ayatollah Khomeini to power, conforms to this scenario, because individuals who signaled their

adherence to the strict Islamic doctrine were integrated into the society. Similar situations

6 See DAWKINS [1980] for an introductory discussion of conditional strategies.

Page 129: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

20

characterize present-day Algeria, Nazi Germany under Hitler, or any regime where tolerance is solely

based on displaying certain identity traits. In contrast to the clash of cultures – where greediness is a

dominated strategy for the general subpopulation (in strategy set Sr) – falsification is not a dominated

strategy for this subpopulation. Indeed, even if preference falsification comes at some cost, ℑ is an

undominated strategy, provided that Πr(ℑ ,ℑ ) > xM – i.e., preference falsification is not too costly. In

this way, the results presented below are not tied to the requirement that Πr(ℑ ,ℑ ) = .5. We have

similar results for simulations in which falsification is costly, i.e., .5 > Πr(ℑ ,ℑ ) > xM.

The game has two ESSs – (F, F) and (ℑ ,ℑ ). At first, the ℑ strategy may appear as little

more than fairness, but an illustrative comparison of two simulations demonstrates that sharing

under fundamentalist terms differs substantially from fairness. Consider the case where the

fundamentalist subpopulation is not initially cohesive; there is a 60:40 split among ℑ - and F-types.

Further assume that the greedy demand is .6. In our first simulation, the initial general

subpopulation distribution is (ρM0, ρF

0, ρℑ0) = (.45, .05, .50). This is illustrated in panel a of Figure

3 where, in contrast to Figures 1 and 2, the evolution of all three types in the general subpopulation

are depicted for an initial fundamentalist distribution (σℑ = .6). The system then converges to the

(ℑ ,ℑ ) outcome. As expected, if more of the general subpopulation is inclined toward ℑ at the outset

(as compared to F), then (ℑ ,ℑ ) results.

[Three-panel Figure 3 near here]

The key to the effectiveness of the ℑ strategy’s impact on the general subpopulation is seen

through a second simulation, where the initial ℑ and F proportions for the non-fundamentalists are

reversed. Suppose that just 5% of the modest types in the general subpopulation are at the outset

willing to behave according to ℑ . That is, given that there are rewards for behaving according to

ℑ , we ask what happens if even a tiny proportion of the modest elements of the general

Page 130: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

21

subpopulation opts for ℑ instead, as represented under the distribution (ρM0, ρF

0, ρℑ0) = (.45, .50,

.05). Panel b of Figure 3 illustrates that once such a perturbation occurs, preference falsification

occurs in an extreme way, ultimately resulting in the (ℑ ,ℑ ) equilibrium. From this initial ρ0, the

replicator dynamics produce a situation where by generation 13 the general subpopulation is

almost entirely modest, and 70% of the fundamentalist subpopulation will share with those

elements in the general subpopulation who adopt their cultural identity (σℑ13 = .7 – not illustrated).

Hence, the situation is not stable; (ρM13, σℑ

13) ≈ (1, .7) is not an ESS and the replicator dynamics

bear this out. The general subpopulation further evolves, completely switching to the ℑ strategy!

The convergence to (ℑ ,ℑ ) is unexpected and indicates that ℑ has a much larger basin of attraction

than F, even though each yields .5 payoffs in symmetric matches. The fundamentalist

subpopulation increases monotonically in ℑ – it is becoming more cohesive – and by generation

46 the overall distribution is (ρℑ46, σℑ

46) = (1, 1). This outcome is asymptotically stable, as it is an

ESS for the game in Box 3. Allowing for falsification therefore undermines the robustness of the

fairness outcome and facilitates the acceptance of fundamentalist terms in the general

subpopulation.

Another novel result is that our prior observation that increased greediness requires a

more cohesive fundamentalist subpopulation no longer applies when fundamentalism is

falsifiable. Panels b and c of Figure 3 reveal that, when xG is increased from .6 to .8, the intra-

state distribution rapidly converges to (ℑ ,ℑ ) even though σℑ0 is unchanged at 60% (and ρℑ

0 =

.05). This follows because the benefits of modest demands have decreased relative to falsifiable

ones. Payoffs for xM are .4 in Figure 3b and are just .2 in Figure 3c. Without a falsifiable trait,

the success of increased greediness hinges on the cohesiveness among the fundamentalist

subpopulation (an increase in σG0) (see Figures 1 and 2). For falsifiable traits, more extreme

Page 131: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

22

fundamental demands, in sharp contrast, result in rapid convergence to the entire population

displaying fundamentalist traits. This bandwagon effect occurs even for small ρℑ0. Thus, we

have:

Result 5: When the identity traits of fundamentalism are falsifiable and conditionally

fair, then :

i. The falsifiable strategy has a larger basin of attraction than fairness.

ii. Extreme demands applied to anyone not adhering to fundamentalist identity traits will not

only increase the cohesiveness of the fundamentalist subpopulation, but will also cause

the general subpopulation to capitulate rapidly.

As noted by KURAN [1991], the breakdown of preference falsification can result in the

rapid elimination of a regime – e.g., the Milosevic regime in Bosnia, the 1989 Velvet Revolution

in Czechoslovakia, the Taliban in Afghanistan, and the communist regime in East Germany.

With less preference falsification, intolerance is unable to sustain a fundamentalist regime when

the proportion of the general subpopulation making fair demands is large, or the cohesiveness of

the hardline fundamentalists is reduced. Similarly, when members of an academic department

stop falsifying their preferences owing to the departure of a few intolerant colleagues, the overall

acceptance of alternative viewpoints may return, rapidly.

6 Concluding Remarks

This paper has put forth an evolutionary game-theoretic basis of conflict between subpopulations

making different demands for control. The underlying dynamics of our approach to conflict,

where paired individuals cannot agree on a division, is quite different from the (static) rent-

seeking conflict models so prevalent in the literature. Both the evolutionary game and the rent-

Page 132: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

23

seeking approaches have their relative strengths and weaknesses. The former is particularly

suited to displaying population dynamics and convergence to an equilibrium where a single type

or trait is in control. Additionally, the evolutionary representation provides a dynamic

framework for KURAN’S [1989, 1991] theory of preference falsification, whereby a non-

fundamentalist subpopulation can co-exist in equilibrium with a fundamentalist one by taking on

the latter’s identity traits. In so doing, greater greed by the fundamentalists to those not

displaying their traits may bolster the fundamentalist’s hold, unlike the case with no preference

falsification. This chameleon behavior by non-fundamentalists may be consistent with rapid

regime changes in response to either the elimination of preference falsification or changing

population distributions brought about by external shocks. Although chameleon behavior can

ensure co-existence between fundamentalists and non-fundamentalists, this behavior is apt to

eliminate non-chameleons from the general subpopulation who make modest or fair demands,

owing to the large basin of attraction for preference falsification. Thus, co-existence through

signaling may come at a high price as Afghanistan sadly demonstrated to the world.

A wide variety of conflict relationships can be examined by evolutionary game theory.

Games other than the Nash demand game can form the basis for future analyses. Additionally,

elements of rent seeking can be introduced into our framework, so that relative efforts by

opposing interests can help determine fitness results among paired encounters with and without

preference falsification.

Page 133: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

24

References

BOULDING, K. E. [1962], Conflict and Defense: A General Theory, Harper & Row: New York.

BRETON, A. AND S. DALMAZZONE [2002], “Information Control, Loss of Autonomy, and the

Emergence of Political Extremism”, pp. 44 – 66 in: A. Breton, G. Galeotti, P. Salmon and

R. Wintrobe (eds.), Political Extremism and Rationality, Cambridge University Press:

Cambridge.

DAWKINS, R. [1980], “Good Strategy or Evolutionary Stable Strategy?”, pp. 331 – 361 in G. W.

Barlow and J. Silverberg (eds.), Sociobiology: Beyond Nature/Nurture, Westview Press:

Boulder, CO.

DIXIT, A. [1987], “Strategic Behavior in Contests”, American Economic Review, 77, 891 – 898.

FEARON, J. D. AND D. D. LAITIN [1996], “Explaining Interethnic Cooperation”, American Political

Science Review, 90, 715 – 735.

GIURIATO, L. AND M. C. MOLINARI [2002], “Rationally Violent Tactics: Evidence from Modern

Islamic Fundamentalism”, pp. 183 – 216 in: A. Breton, G. Galeotti, P. Salmon and R.

Wintrobe (eds.), Political Extremism and Rationality, Cambridge University Press:

Cambridge.

GOETZE, D. AND P. JAMES [2001], “What Can Evolutionary Theory Say about Ethnic Phenomena?”,

pp. 3 – 18 in: P. James and D. Goetze (eds.), Evolutionary Theory and Ethnic Conflict,

Praeger: Westport, CT.

GROSSMAN, H. [1991], “A General Equilibrium Model of Insurrections”, American Economic

Review, 81, 912 – 921.

GURR. T. R. [1994], “Peoples Against States: Ethnopolitical Conflict and the Changing World

System”, 1994 Presidential Address, International Studies Quarterly, 38, 347 – 377.

HARDIN, R. [1995], One for All: The Logic of Group Conflict, Princeton University Press:

Page 134: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

25

Princeton, NJ.

HIRSHLEIFER, J. [1982], “Evolutionary Models in Economics and Law”, Research in Law and

Economics, 4, 1 – 60.

— [1998], “The Bioeconomic Causes of War”, Managerial and Decision Economics, 19, 457 –

466.

— [2000], “The Macrotechnology of Conflict”, Journal of Conflict Resolution, 44, 773 – 792.

— [2001], The Dark Side of the Force: Economic Foundations of Conflict Theory, Cambridge

University Press: Cambridge.

HUNTINGTON, S. P. [1996], Clash of Civilizations and the Remaking of World Order, Simon &

Schuster: New York.

JOHNSON, G. R. [2001], “The Roots of Ethnic Conflict: An Evolutionary Perspective”, pp. 19 –

38 in: P. James and D. Goetze (eds.), Evolutionary Theory and Ethnic Conflict, Praeger:

Westport, CT.

KURAN, T. [1989], “Sparks and Prairie Fires: A Theory of Unanticipated Political Revolution”,

Public Choice, 61, 41 – 74.

— [1991], “The East European Revolution of 1989: Is It Surprising That We Were Surprised?”,

American Economic Review, 81, 121 – 125.

MAYNARD SMITH, J. AND G. R. PRICE [1973], “The Logic of Animal Conflict”, Nature, 241, 15 –

18.

MURDOCH, J. C. AND T. SANDLER [2002], “Economic Growth, Civil Wars, and Spatial

Spillovers”, Journal of Conflict Resolution, 46, 91 – 110.

NASH, J. [1953], “Two-Person Cooperative Games”, Econometrica, 21, 128-140.

ROSS, M. H. [2001], “Contributions of Evolutionary Thinking to Theories of Ethnic Conflict and

Its Management”, pp. 71 – 94 in: P. James and D. Goetze (eds.), Evolutionary Theory

Page 135: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

26

and Ethnic Conflict, Praeger: Westport, CT.

SANDLER, T. [2000a], “Economic Analysis of Conflict”, Journal of Conflict Resolution, 44, 723

– 729.

— [2000b], “Challenges to NATO in the Mediterranean and Beyond”, pp. 71 – 92 in: J. Brauer

and K. Hartley (eds.), The Economics of Regional Security: NATO, the Mediterranean,

and Southern Africa, Harwood Academic Publishers: Amsterdam.

SALTER, F. [2001], “A Defense and an Extension of Pierre van den Berghe’s Theory of Ethnic

Nepotism”, pp. 39 – 70 in: P. James and D. Goetze (eds.), Evolutionary Theory and

Ethnic Conflict, Praeger: Westport, CT.

SELTEN, R. [1980], “A Note on the Evolutionary Stable Strategies in Animal Conflicts”, Journal

of Theoretical Biology, 84, 93 – 101.

SKYRMS, B. [1996], Evolution of the Social Contract, Cambridge University Press: Cambridge.

TAYLOR, P. D. [1979], “Evolutionary Stable Strategies with Two Types of Players”, Journal of

Applied Probability, 16, 76 – 83.

— AND L. B. JONKER [1978], “Evolutionary Stable Sets and Game Dynamics”, Mathematical

Biosciences, 40, 145 – 56.

THOMAS, L. C. [1986], Games, Theory and Applications, Ellis Horwood: Chichester, UK.

WÄRNERYD, K. [1993], “Anarchy, Uncertainty, and the Emergence of Property Rights”, Economics

and Politics, 5, 1 – 14.

Daniel G. Arce M. Department of Economics Rhodes College 2000 N. Parkway Memphis, TN 38112-1690 USA E-mail: [email protected]

Todd Sandler School of International Relations University of Southern California Von Kleinsmid Center 330 Los Angeles, CA 90089-0043 USA E-mail: [email protected]

Page 136: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Box 1: Skyrms’ Game (xM = 1 – xG)

M F G Modest (M) xM, xM xM, .5 xM, xG

Fair (F) .5, xM .5, .5 0, 0 Greedy (G) xG, xM 0, 0 0, 0

Box 2: Clash of cultures

F G Modest (M) xM, .5 xM, xG

Fair (F) .5, .5 0, 0 Greedy (G) 0, 0 0, 0

Box 3: Falsifiable Fundamentalism

F ℑ Modest (M) xM, .5 xM, xG

Fair (F) .5, .5 0, 0 Falsifiable (ℑ ) 0, 0 .5, .5

Page 137: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 1

Page 138: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 2

Page 139: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 3

Page 140: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Terrorism and Game Theory

By

Todd Sandler School of International Relations University of Southern California

And

Daniel G. Arce M.

Department of Economics Rhodes College

Forthcoming

Simulation & Gaming

Vol. 34 (3) September 2003

Page 141: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Terrorism and game theory

Abstract

This article examines how game-theoretic analyses of terrorism have provided some policy

insights that do not follow from nonstrategic analyses. Some new game-theoretic applications

are indicated that concern terrorist targeting of businesses, officials, and the general public,

where targets can work at cross-purposes as they attempt to deflect the attack. Other novel

applications involve government choice among alternative anti-terrorism policies, and

government concessionary policy when terrorists are either hard-liners or moderates in their

viewpoint. Directions for future research are also indicated.

KEYWORDS: game theory, terrorism, transnational terrorism, deterrence, preemption,

concessionary policy, target choice, asymmetric information

Page 142: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Terrorism and Game Theory

Over the last two decades, a small group of analysts in economics and political science

have applied game theory to study terrorism,1 which involves the premeditated use or threat of

use of violence or force on the part of terrorists to achieve a political objective through

intimidation or fear. For example, Sandler et al. (1983) present some rational-actor models that

depict the negotiation process between terrorists and government policymakers for incidents

where hostages or property are seized and demands are issued. In their model, terrorists’

valuation of the likely concession to be granted by a government is based on a probability

distribution, conditioned on past governmental concessions. Their analysis illustrates that the

terrorists’ choices and actions are influenced by those of the government and vice versa.

Moreover, each adversary acts on its beliefs of the opponent’s anticipated actions.

Since 11 September 2001 (hereafter 9/11), there are many papers being written by

scholars who apply game theory to the study of terrorism. Game theory is an appropriate tool for

examining terrorism for a number of reasons. First, game theory captures the strategic

interactions between terrorists and a targeted government, where actions are interdependent and,

thus, cannot be analyzed as though one side is passive. Second, strategic interactions among

rational actors, who are trying to act according to how they think their counterparts will act and

react, characterize the interface among terrorists (e.g., between hard-liners and moderates) or

among alternative targets (e.g., among targeted governments, each of which is taking protective

measures). Third, in terrorist situations, each side issues threats and promises to gain a strategic

advantage. Fourth, terrorists and governments abide by the underlying rationality assumption of

game theory, where a player maximizes a goal subject to constraints. Empirical support for

terrorists’ rationality is given credence by their predictable responses to changes in their

constraints – e.g., the installation of metal detectors in January 1973 led to an immediate

Page 143: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

2

substitution away from skyjackings into kidnappings (Enders, & Sandler, 1993, 1995; Sandler, &

Enders, 2004). Fifth, game-theoretic notions of bargaining are applicable to hostage negotiations

and terrorist campaign-induced negotiations over demands. Sixth, uncertainty and learning in a

strategic environment are relevant to all aspects of terrorism, in which the terrorists or

government or both are not completely informed.

The purpose of this keynote article is to review how game theory has been applied in the

literature on terrorism. Another purpose is to present some new applications that include

terrorists’ choice of target (i.e., business people, officials, and tourists), governments’ choice

between preemption and deterrence, and government concessionary policy when terrorists are of

two minds – hard-liners and moderates. These applications illustrate how game theory can be

fruitfully employed to enlighten policymaking.

A brief look at the literature

One of the pillars of US anti-terrorism policy is never to negotiate or capitulate to the

demands of hostage-taking terrorists (US Department of State, 2002, p. xii). This same no-

negotiation stance has been taken by other countries, such as Israel. The logic to this policy is

that if a target adheres to its stated no-negotiation policy, then would-be hostage takers would

have nothing to achieve and so would stop abducting hostages. This outcome implicitly assumes

that terrorists only gain from achieving their demands and that both sides are completely

informed so that the subgame perfect equilibrium is to pledge not to concede. Obviously,

something is incomplete about this logic, because terrorists continue to take hostages and even

the staunchest advocates of the no-negotiation policy have reneged on their pledge. For

example, the Reagan administration bartered arms for the release of Rev. Benjamin Weir, Rev.

Lawrence Jenco, and David Jacobsen during the 1985-86 “Irangate” scandal; Israel was prepared

Page 144: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

3

to trade prisoners for the school children taken Maalot in May 1974.

Lapan and Sandler (1988) elucidate the policy’s incompleteness with a game in extensive

form where the government first chooses the level of deterrence, which, in turn, determines the

logistical failure or success of terrorists when they engage in a hostage mission. A higher level

of deterrence elevates the likelihood of logistical failure. Based on their perceived likelihoods of

logistical and negotiation success, the terrorists decide whether or not to attack. If their expected

payoffs from hostage taking are positive, then they attack. The game can end in four ways: no

attack; an attack that results in a logistical failure; a successful attack that ends with the terrorists

obtaining their demands; and a successful attack that results in no concessions. Information is

incomplete because the government does not know the payoffs associated with not capitulating

prior to hostage incidents. If a sufficiently important person is secured, then the government

may regret its no-negotiation pledge, because the expected costs of not capitulating may exceed

that of capitulating. That is, the no-negotiation policy is time inconsistent if sufficiently valuable

hostages are captured. Even when the government’s pledge not to negotiate is believed by the

terrorists, a fanatical group may still engage in a hostage mission when a positive payoff is

associated with either a logistical or negotiation failure by advertising the cause or achieving

martyrdom.

Lapan and Sandler (1988) demonstrate that the effectiveness of the no-negotiation

strategy hinges on the credibility of the government’s pledge, the absence of incomplete

information, the terrorists’ gains being solely tied to a negotiation success, and sufficient

deterrence spending to eliminate logistical success. In practice, each of these implicit

assumptions is suspect. Efforts to restrain a government’s discretionary action in hostage

scenarios – say, through a constitutional amendment or costly punishment – are required to

eliminate a government’s ability to renege on its stated policy. Lapan and Sandler (1988)

Page 145: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

4

examine the importance of reputation costs in a multi-period model. Their analysis stands in

stark contrast to nonstrategic hostage-taking models by Islam and Shahin (1989) and Shahin and

Islam (1992), where there are no explicit strategic interactions and feedback between adversaries.

Atkinson et al. (1987) uses an extension to Nash’s bargaining game, where time involved

in negotiations is included (Cross, 1969, 1977). The duration of the incident and the bargains

consummated depend on the costs of bargaining, the impatience of the adversaries, the duration

of the incident, and the discovery of bluffs (i.e., threats not carried out). These authors utilize

real-world data from hostage-taking incidents to test the underlying model of bargaining.

Another application of game theory involves terrorists’ choice of targets for a three-

player game involving two targeted nations and a common terrorist threat (Sandler, & Lapan,

1988; Sandler, & Siqueira, 2003). Each nation independently chooses its deterrence

expenditures, which again determines the terrorists’ logistical failure probability on that nation’s

soil. The terrorists pick the venue with the highest expected payoff for their attack. Each

nation’s choice of deterrence confers benefits and costs on the other target. By transferring the

attack abroad, each nation imposes an external cost on its counterpart; however, by limiting

attacks and their severity at home, each nation provides an external benefit to foreign residents.

Moreover, an external benefit arises whenever the deterrence efforts of the nations sufficiently

degrade the terrorists’ expected benefits, so that they attack no one. The more fanatical are the

terrorists, the less likely is the no-attack scenario. Sandler and Lapan (1988) show that the Nash

equilibrium where each nation chooses its deterrence in isolation may result in too much or too

little deterrence when compared with a social optimum, depending on the pattern of external

costs and benefits.3 If, for example, attacks in either country leads to no collateral damage on

foreign residents or interests, then the countries will engage in a deterrence race as each tries to

transfer the potential attack abroad, where it has no residents.4 In a globalized society where a

Page 146: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

5

country’s risks from a terrorist attack are equal everywhere, independent deterrence choices

imply too little deterrence as each country fails to account for the protection that its efforts confer

on foreign residents (Sandler, & Siqueira, 2003).

The game-theoretic approach reveals a couple paradoxes. Countries may work at cross-

purposes when deterring terrorist attacks. Although the United States (US) is the target of

approximately 40% of all transnational terrorist attacks, virtually all of these attacks occurred

abroad in recent years with 9/11 being a noticeable exception (Sandler, 2004). US

overdeterrence means that it experiences attacks where it has little authority to do anything about

them. Additionally, efforts to share intelligence on terrorists’ preferences and resources may

exacerbate this overdeterrence if deterrence decisions are not coordinated as nations use this

information to augment efforts to transfer the attacks abroad (Sandler, & Lapan, 1988; Enders, &

Sandler, 1995). This is a standard second-best result in economics in which there are two

relevant policy variables – share intelligence and coordinate deterrence – but joint action only

involves a single variable. This result highlights the beauty of a strategic approach. Standard

intuition suggests that pooling information should enhance welfare, but this is not the case if this

sharing worsens the deterrence race that wastes resources without necessarily increasing security

against a determined terrorist group.

Another game-theoretic representation analyzes a situation of asymmetric information

where the terrorists know their true strength, but the targeted government must guess the

terrorists’ resources based on the level of their attacks. These attacks are intended to apply

sufficient pressures, in terms of costs, to a government, so that it concedes to terrorist demands.

In a deterministic setting, the outcome of the struggle between the adversaries would be known

even before the first play of the game, because, in the absence of ties, a finite game of perfect

information has a unique subgame perfect equilibrium. If, for example, the government is aware

Page 147: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

6

that the terrorists possess sufficient resources to force the government to surrender eventually,

then the optimal strategy is for the government to concede at the outset and suffer no attack

damage. If, moreover, a well-informed terrorist group understands that it has insufficient

resources to obtain its political demands, then it is optimal either to abandon the campaign or

expend all of its resources at the outset.

A more interesting and relevant scenario is when the government is incompletely

informed about the terrorists’ capability.5 Lapan and Sandler (1993) analyze this scenario in

which a signalling equilibrium may allow a government to limit its expected costs from attacks,

even though the likelihood of surrender may increase. In this scenario, the extent of terrorist

incidents may provide information to the government about the type of terrorist group – strong or

weak – that it confronts. Attacks therefore serve as a signal that the government can process to

adjust its posterior beliefs concerning the resources of the terrorists (also, see Overgaard, 1994).

Such updated beliefs permit the government to decide whether to capitulate or resist. The

terrorists face an interesting tradeoff – the use of large amounts of their resources at the outset

may correctly or incorrectly convince the government that they are strong, but this outlay results

in less future attacks if the government is unconvinced. A perfect Bayesian equilibrium for the

two-period signalling game is derived in which the government prefers the associated partial-

pooling equilibrium, where the government surrenders to groups whose first-period attacks

exceed a certain threshold, over the never-surrender equilibrium. The pooling equilibrium is

associated with some regret when the government misjudges the terrorists’ true strength based on

initial attacks. Intelligence is valued, because it can reduce this regret by curtailing the variance

of government priors.

Another interesting application of game theory to terrorism involves accommodations

reached between terrorists and a host government (Lee, 1988; Lee, & Sandler, 1989). In such

Page 148: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

7

scenarios, a terrorist organization has an implicit understanding that it can operate with impunity,

provided that its attacks do not create collateral damage for the host country. This

accommodation can undo efforts of other countries to retaliate against a terrorist group by

reducing their cooperative payoffs. Thus, nations now have three options in their reaction to

terrorists and their sponsors: do nothing, retaliate against the terrorists and their sponors, or

accommodate the terrorists. The last option helps the terrorists at the expense of the cooperating

nations. Lee (1988) shows that this third option dominates the other two, thereby resulting in a

PRISONER’S DILEMMA where some nations seek such accommodations and, in so doing,

undo the accomplishments of others to curtail the terrorist threat. Once again, pursuit of self-

interest may harm others owing to strategic considerations.

Proactive versus reactive policies

Governments’ anti-terrorism policies are either proactive or reactive. Proactive policy

involves aggressively going after the terrorists and eliminating their resources, infrastructure, and

personnel, while reactive policy concerns protective measures either to divert the attack or limit

its consequences. A preemptive strike against the terrorists or their state sponsors (for example,

the Taliban in Afghanistan) is an example of a proactive policy. Because a preemptive attack, if

successful, eliminates the terrorist threat for all potential targets, there is a tendency to free ride

or rely on the efforts of others.

This is illustrated in matrix a in Figure 1 in which two players – the US and the European

Union (EU) – must decide whether or not to preempt a common terrorist threat. Suppose that

preemption by each country confers 4 in benefits on both countries at a cost of 6 to the country

doing the preemption. If, therefore, the US preempts and the EU free rides, then the EU receives

4 in benefits, while the US nets –2 (= 4 – 6) as costs of 6 are deducted from derived benefits of 4.

Page 149: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

8

The payoffs are reversed when the US free rides, while the EU takes action. If, however, both

countries preempt, then each receives 2 in net benefits, as preemption costs are deducted from

gross benefits of 8 (= 2 × 4). The resulting game is a PRISONER’S DILEMMA where no one

takes an aggressive stance against the terrorists.

Figure 1 about here

In matrix b, a different scenario is depicted where, unlike the EU, the US gains a net

benefit from its own preemption, because it is the favorite target for transnational terrorists.

Suppose that US preemption gives it 8 in benefits while conferring just 4 in benefits to the EU as

the US counters its greater threats. Further suppose that preemption by the EU gives 4 in

benefits to both countries. Preemption is again assumed to cost 6. If the US preempts alone,

then it nets 2 (= 8 – 6), while the EU still gets a free-riding gain of 4. If, instead, the EU

preempts alone, then the US receives 4 as the free rider and the EU receives –2. When both the

US and the EU preempt, the US nets 6 [= (8 + 4) – 6] and the EU nets 2. Now, the US has a

dominant strategy to preempt and the EU has a dominant strategy to free ride, leading to the

asymmetric-dominant Nash equilibrium in the upper right-hand cell of matrix b. This game

representation may well characterize the US position after 9/11, where US action was going to

yield high payoffs to the US government. With the collapse of the twin towers of the World

Trade Center and the damage to the Pentagon, the US had to take some kind of decisive action to

maintain legitimacy.

Up to this point, the status quo of doing nothing resulted in a 0 payoff. Suppose,

however, that no action whatsoever leads to a world under siege by terrorists. In this scenario,

the absence of any preemption may imply a negative payoff, which for matrix a would result in a

CHICKEN game whenever this payoff is less than –2 (not shown in Figure 1), the payoff from

acting alone. For CHICKEN, the Nash equilibria has some country responding. A

Page 150: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

9

COORDINATION game may also apply to preemption if both countries must combine forces to

achieve the positive payoffs of 2 (= 2 × 4 – 6). This game is displayed in matrix c in Figure 1. If

only a single country preempts, then there are no benefits, but the preemptor incurs a cost of 4 –

thus, the off-diagonal payoffs are (–4, 0) and (0, –4). The two pure-strategy Nash equilibria in

matrix c correspond either to both countries preempting or neither preempting. Thus,

preemption may be consistent with a number of different game forms depending upon symmetry,

penalties for the status quo, preemption thresholds, or other considerations. Even though

preemption confers free-rider benefits, a PRISONER’S DILEMMA may not result.

Next, consider other proactive policies and their associated game forms. In the case of

group infiltration, the nation conducting the operation often secures benefits over and above

those conferred on other potential targets. This follows because the infiltrator can exploit the

intelligence first and will target those terrorist groups that pose the greatest risks to its interests.

As a consequence, an asymmetric dominance is likely to apply, not unlikely the preemption

scenario in matrix b in Figure 1. If, however, the infiltrator receives no special advantages, then

a PRISONER’S DILEMMA is anticipated. Retaliation against a state sponsor of terrorism, such

as the US raid against Libya in April 1986 or the US-led attack against Afghanistan following

9/11, is an analogous situation to preemption with lots of potential free-rider benefits. As such,

the same game forms as those associated with preemption, are relevant. When intelligence is

collected as a proactive policy, the asymmetric-dominance scenario is appropriate, especially if

one nation is more often the target of transnational terrorist attacks. The intelligence collector

gains relative to free riders.

Reactive responses include deterrence, embassy fortification, and UN conventions. For

deterrence, each target takes protective actions to divert the attack. Any nation that spends less

on deterrence becomes the more desirable target. This scenario often leads to a deterrence race,

Page 151: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

10

best described as a PRISONER’S DILEMMA with too much action (Sandler, 2003).6 An

analogous scenario characterizes embassy fortification, since the least-fortified embassy becomes

the target of opportunity for the terrorists. All potential targets increase fortification

expenditures, but do not necessarily eliminate the attack if the terrorists are bent on attacking

someone. For UN conventions, a PRISONER’S DILEMMA results when it comes time to

enforce the convention as each nation sits back waiting for others to act for the good of all. UN

conventions on outlawing terrorism and its modes of operation (e.g., skyjackings, attacks against

diplomatic personnel) have been shown to have no impact whatsoever in accord with the Nash

equilibrium of no enforcement, associated with the PRISONER’S DILEMMA representation of

enforcing UN conventions (Enders et al., 1990).

Table 1 about here

Table 1 summarizes the different proactive and reactive policies and their associated

game forms.

Alternative targets

To illustrate the deterrence decision, we apply the model from the literature (Sandler, &

Lapan, 1988; Sandler, & Siqueira, 2003) to a novel choice where a terrorist group can target a

business (B) or tourist (T) venue. As such, this terrorist choice of targets may involve domestic

or transnational terrorism. The terrorists are assumed to stage their attack at a single venue in

each period.7 Additionally, the terrorist group is assumed to be fanatical (i.e., gaining a net

benefit even if the mission fails), so that the group will attack one of the two venues.8 Figure 2

depicts the associated deterrence game tree where the targets go first and choose their level of

deterrence or deterrence costs – i.e., D(θB) for the business target and D(θT) for the tourist target.

By choosing their deterrence expenditure to thwart attacks, the two targets affect the terrorists’

Page 152: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

11

perceived probability of success or failure, where θB and θT are the probabilities of logistical

failure when the business or tourist venue is attacked, respectively. Thus, 1 – θB and 1 – θT are

probabilities of logistical success for attacks at these two venues. Deterrence costs increase with

θB at an increasing rate, so that D′(θB) > 0 and D″(θB) > 0. The same is true for deterrence costs

spent to protect tourists.

Figure 2 about here

The terrorists move second where they decide whom to attack, in which their attack

probability πi against target i (= B, T) depends on their perceived probabilities of failure – i.e.,

πi(θi, θj) for i, j = B, T and i ≠ j. This probability function is assumed continuous with ∂πi/∂θi < 0

and ∂πi/∂θj > 0, so that information is not complete with respect to terrorists’ beliefs and values.

The assumed partial derivatives indicate that efforts to decrease success in venue i through

greater deterrence lowers the likelihood of attack there and transfers the attack to the other

venue, so that independent deterrence decisions may work at cross-purposes.

Because terrorists are assumed fanatical, the game can end in four outcomes: terrorist

failure or success at the business target, or terrorist failure or success at the tourist target. Within

the four bold parentheses in Figure 2, the payoffs to business, tourists, and the terrorists are listed

in descending order. Both targets confront costs that they want to minimize, while the terrorists

receive benefits that they want to maximize. Terrorists’ payoffs mi and ni (i = B, T) are not

necessarily known with certainty, so that the terrorists must make an educated choice of target

based on their anticipated gain from success and failure at each of the two potential targets.

We shall focus on the actions of the targets. The business (tourist) target must pay

deterrence costs regardless of the game’s outcomes; hence, this expense is like an insurance

premium, paid in good and bad states. In Figure 2, the payoffs are depicted so that there is no

collateral damage on tourists at a business venue. There are, however, collateral damage of a or

Page 153: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

12

h on business interests when a tourist venue is attacked. That is, a terrorist attack on an airport is

sure to affect tourists and business people, while a terrorist attack on a specific business is

unlikely to harm tourists. Some symmetry of costs is assumed in which a direct attack on a

business or tourist location causes damage of A for a failure and H for a success, where H > A.

For collateral costs to business interests, terrorist success is more costly that failure – i.e., h > a.

Based on Figure 2, the expected costs to business from a business attack is:

l(θB) = θBA + (1 – θB)H, (1)

while the analogous costs to tourists from a tourist attack is:

l(θT) = θTA + (1 – θT)H. (2)

The collateral damage from a terrorist attack on business interests is:

v(θT) = θTa + (1 – θT)h, (3)

while the collateral damage from a business attack on tourist interests is:

v(θB) = 0. (4)

Given the assumption on A, H, a, and h, l(θi) decreases as θi increases for i = B, T, and v(θT)

decreases as θT increases, because expected damage falls as terrorist failure becomes more likely.

When acting independently, the expected costs of terrorism to business – denoted by CB – is:

CB = D(θB) + πBl(θB) + πTv(θT). (5)

Owing to the absence of collateral damage, the cost to tourists is:

CT = D(θT) + πTl(θT) + 0. (6)

A Nash equilibrium corresponds to each target choosing its respective deterrence level to

minimize these expressions while taking the other target’s deterrence as given.

To ascertain the relative efficiency of the Nash solution, we must find the social ideal and

compare it with the Nash equilibrium. This ideal is obtained when the deterrence levels are

Page 154: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

13

chosen for the two targets to minimize the aggregate cost C:

C = D(θB) + D(θT) + πB(θB, θT)[l(θB)] + πT(θB, θT)[l(θT) + v(θT)]. (7)

For the business target, the comparison is accomplished in a couple of steps. First, we derive the

first-order condition for minimizing costs to the business target by taking the derivative of CB

with respect to θB. This condition includes marginal deterrence costs, the potential harm to

business interests as attacks are diverted to the tourist site, and the marginal benefits of diverting

attacks and limiting damage of a business attack. Second, we minimize social cost, C, with

respect to θB. Third, we evaluate these first-order conditions for social cost at the θB that satisfies

the Nash equilibrium where ∂CB/∂θB = 0,9 denoted by NθB . This evaluation leads to just,

( )N πθ 0θ

TT

B

l∂ >∂

,

since there is no collateral damage on tourists at the business site. This term represents the

external costs that the independent deterrence decision of the business target imposes on tourists

by transferring more attacks to them. This inequality accounts for the potential deterrence race

and implies that business interests independently spend too much on deterrence. Because there

are no tourists to protect at the business venue, there is no opposing external benefits coming

from this deterrence spending.

A different situation characterizes the deterrence decision of the tourist target, because

diversion of a potential attack protects business visitors to the tourist venue in two ways: (1) it

limits the damage to business interests by increasing the likelihood of terrorist failure, and (2) it

makes business interests safer at the tourist site by diverting the attack. To these external

benefits, there is also the external cost of a greater likelihood of attack at the business venue as

the attack is diverted. Thus, whether the tourists’ Nash equilibrium implies underdeterrence or

overdeterrence hinges on which of these opposing influences dominates.10 Compared with the

Page 155: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

14

deterrence choice of the business target where there are no opposing external benefits, the

tourists will either underdeter or overdeter to a smaller extent.

There is also a collective action rationale why tourists may actually underdeter and are

less adept at deflecting attacks than a business target. Business firms or their employees at risk

need only act unilaterally to increase their protection; in contrast, tourists at risk must mount a

collective response (which is highly unlikely) or lobby the government for help. This lobbying

effort is anticipated to take a long time before there is any government response and, in the

meantime, tourists or the public at large remain vulnerable. Moreover, tourist targets are varied

and diffused, while business targets are generally more specific and easier to guard. Tourist

attacks have resulted in better protection at airports, monuments, bridges, and some public

places, but not every location can be equally protected, which results in targets of opportunity for

terrorists.

Next consider what would happen if the two targets were officials and businesses (or the

general public). Now officials are better equipped to solve the collective action problem, since

they can allocate public funds to protect themselves as has been done at US embassies and other

government buildings. Thus, it is no wonder that the smallest number of transnational terrorist

attacks are now against the military and government targets. Both the general public and

businesses face the largest number of attacks (US Department of State, 2002, p. 174). As

alternative targets divert attacks, those least able to do so become the victims.

Deterrence or preemption

As shown in the last section, many terrorism-related games involve at least three players.

Another instance concerns two targeted governments – the US and UK – that must choose

whether to focus their anti-terrorism policy on deterrence or preemption. Deterrence diverts the

Page 156: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

15

attack by making such acts more difficult, while preemption seeks out the terrorists by

eliminating their base of operations and resources. Each player has two choices: each

government can either concentrate on deterrence or preemption, while the terrorists can either

execute a spectacular terrorist event (e.g., 9/11 or the 1998 simultaneous bombings of the US

Embassies in Nairobi, Kenya and Dar es Salaam, Tanzania) or a normal terrorist event.

For a spectacular terrorist event, preemption costs exceed deterrence costs, while, for a

regular terrorist event, deterrence costs exceed preemption costs. The US-led October 2001

attack on the Taliban and al-Qaida in Afghanistan was an effort to preempt future spectacular

events and was extremely expensive. When a government protects against a spectacular event,

intelligence can limit deterrence costs, so that only key sites are afforded increased security.

Deterrence can, however, be quite expensive for normal terrorism, since potential targets

everywhere must be guarded. Because regular events are planned by terrorists with less security

precautions than spectaculars, preemption costs are anticipated to be less costly than protecting

such a target-rich environment. To simplify the mathematics without changing the strategic

aspects of the underlying game, we normalize deterrence costs for spectaculars to 0 and let C be

preemption costs above and beyond deterrence costs for such events. Similarly, we normalize

preemption costs for regular terrorism to 0 and let c be deterrence costs above and beyond

preemption costs for such events.

The three-player deterrence-preemption game is displayed in normal form in Figure 3,

where the US chooses the row, the UK the column, and the terrorist group the matrix. Matrix a

corresponds to a spectacular, whereas matrix b corresponds to a normal terrorist event. In each

cell, the first payoff is that of the US, the second is that of the UK, and the third is that of the

terrorist group. The payoffs depend on the following “technologies” of deterrence and

preemption. To thwart a spectacular event with certainty, both the US and UK must preempt. If

Page 157: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

16

only one country preempts and the other deters, then the event occurs with probability p in the

country doing the preempting. If, however, neither country preempts and a spectacular event

occurs, then it is logistically successful. A “best-shot” technology of preemption applies to a

normal terrorist event; i.e., preemption by either country is sufficient to make the event fail with

certainty.

Figure 3 about here

To compute the payoffs in Figure 3, we must define a couple more terms: S is the

terrorists’ payoff for a successful spectacular, and T is their payoff for a successful normal event,

where S > T. Deterrence by a single nation deflects the attack to the other target, while

deterrence by both countries makes the US the target of choice. With the US being the target of

40% of all transnational terrorist attacks, this is a reasonable assumption. In matrix a, if both

countries deter, then the spectacular is successful against US interests, so that the US loses S

(hence, the –S payoff), and the terrorist group gains S. Owing to our cost normalization, UK’s

deterrence cost is 0. If only one country deters and the other preempts, then the former nets 0

and the latter endures an expected cost of –pS – C, which equals the expected loss from the

attack and the spent preemption costs. The terrorists receive an expected payoff of pS over and

above the costs of the operation.11 In the case of mutual preemption, the spectacular is averted,

so that the countries only cover their preemption costs of C, while the terrorist group loses the

costs of their operation, L, which may include fallen comrades and wasted resources.

Next, consider the payoffs in matrix b, associated with a normal terrorist attack. Mutual

deterrence will lead to a terrorist attack on the US, whose net payoff is the damage, –T, plus the

costs of deterrence, –c. With no preemption, the attack is not stopped. The UK loses just its

costs of deterrence, which has shifted the attack to the terrorists’ preferred target – the US. The

terrorists obtain a gain of T, equal for the simplicity to the US losses. When one country

Page 158: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

17

preempts and the other deters, the attack is foiled, so that the former nets 0 and the latter pays its

deterrence costs. The terrorists lose their logistical costs of l, where l is less than L, since more

planning and effort goes into a spectacular. Finally, if both countries preempt, then each nets 0

and the terrorists lose their logistical costs.

There are two potential pure-strategy Nash equilibria for this game. For normal events,

preemption is a dominant strategy for both countries because preemption costs are less than

deterrence costs and preemption can remove the threat. Even though only one country needs to

preempt, both have incentive to do so despite the redundancy of effort. When the payoffs in the

lower right-hand cell in matrix b and matrix a are compared for the terrorists, they prefer

planning the normal event. Thus, the lower right-hand cell is a Nash equilibrium. For a

spectacular, the two countries do not necessarily have a dominant strategy, because S is so large

compared with C, we anticipate that (1 – p)S > C unless the probability of a terrorist success is

near certainty.12 If, however, this inequality does not hold, then the pure-strategy Nash

equilibrium in matrix a is in the upper left-hand cell since S > T for the terrorists. Given a Nash

equilibrium in matrix a and b, there is also a mixed-strategy equilibrium involving a

randomization of strategies. The existence of an equilibrium in both matrices means that the

failure of the targeted governments to coordinate their preemption policy will mean that a

spectacular will succeed on occasions, despite the huge costs that such events imply. This

outcome accords with the facts, where spectaculars with hundreds of deaths occur about once

every two years (Quillen, 2002a, 2002b; US Department of State, 2002).

The outcome of this game is also descriptive of real-world policy where nations rarely

coordinate their deterrence or preemption decisions. In matrix a, this coordination failure leads

to insufficient preemption so that spectacular events occur, whereas, in matrix b, this

coordination failure results in too much preemption. If the Nash equilibrium is as indicated in

Page 159: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

18

matrix a of Figure 3, then observation of deterrence by the terrorists encourages a spectacular

insofar as S > T and pS > –L, which holds whether the terrorists observe US or UK deterrence.

If, however, the terrorists only observe preemption by either country, then they require more

information to make the best choice (i.e., pS > –l and –L < –l).

Granting concessions and terrorist types

An unresolved issue in the literature on negotiating with terrorists is the unintended

consequences of increasing violence by conceding to the demands of the more moderate

elements within a terrorist organization. The appeasement of the moderates isolates hard-liners,

thereby leaving an adverse selection of terrorists more inclined to violence. Adverse selection

involves one side of a transaction being more informed than another, which implies asymmetric

information. In the classic example of a used car market, the uninformed buyers reduce their

offers on cars to an average price where many reliable cars are taken off the market, so that a

preponderance of “lemons” remain (Akerlof, 1970).

Figure 4 about here

Figure 4 displays a model of bargaining between a government (G) and a terrorist group

with moderate (M) and hard-line (H) members in proportion p and 1 – p, respectively. Hard-

liners make demands of H, while moderates make demands of M, where H > M. The

government moves first and makes an offer, Ω, of either M or H to the terrorist group. The

government is uncertain about the actual distribution between hard-liners and moderates; hence,

nature (N) moves first and selects the terrorist group’s composition so that the government faces

hard-liners (node GH) in proportion p and moderates (node GM) in proportion 1 – p.

Due to the government’s lack of information about terrorists, nodes GH and GM are

contained within the same information set, thereby implying that the government cannot tailor

Page 160: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

19

one offer to moderates and another to hard-liners. Given H > M, there is an incentive for

moderates to posture as hard-liners, because they are better off receiving an offer of H from the

government, the acceptance of which yields a payoff of H – M > 0, as indicated by the third-

from-the-left payoff in Figure 4. In contrast, the acceptance on an offer of M gives the

moderates the baseline payoff of zero as their demands are met.

The government’s benefits from an agreement (prior to deducting the offer) are B when

hard-liners accept and b when moderates accept, where B > b ≥ M and H > b. Although either

terrorist type accepts an offer of H, the government experiences a cost, b – H < 0, from appearing

weak when it concedes H to moderate terrorists. If the government offers H to hard-liners, then

the terrorists accept, giving the hardliners a payoff of 0 and the government a net payoff of B –

H, which may be positive. When, alternatively, hard-liners reject an offer of M, we assume that

they resort to terrorism and violence. For simplicity, we assume that this terrorism costs hard-

liners V to commit, while it inflicts damages of V on the government – the (–V, –V) payoffs. We

assume that M – H < –V, so that hard-liners prefer a terrorist attack to accepting a moderate offer.

Rearranging this inequality makes the definition of a hard-liner more apparent: M < H – V

implies that hard-liners are willing to engage in violence at cost V to obtain demand H in lieu of

the moderate concessions. Since moderates are satisfied with M, there is no net benefit to them

or to the government if they reject such an offer, leading to the far-right (0, 0) payoffs.

What kind of offer should a government make? If it concedes a moderate offer, then

hard-liners will reject it, while moderates will accept it. Given the uncertainty over the

composition of the terrorist organization, the government’s expected payoff for a moderate offer

is:

–pV + (1 – p)(b – M). (8)

In comparison, both hard-liners and moderates will accept an offer of H. The expected payoff

Page 161: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

20

for the government is:

p(B – H) + (1 – p) (b – H). (9)

We are concerned when a moderate offer leaves an adverse selection of hard-liner terrorists for

the government to contend with. The government makes a moderate offer only if the expected

payoff in eq. (8) is as least as great as that in eq. (9), which holds for:

(H – M)/(V + B – M) ≥ p. (10)

If the government’s belief that it is facing hard-line terrorists, p, is less than the left-side of eq.

(10), then an adverse selection results, in which moderates are placated and hard-liners resort to

violence. This outcome is contrary to the ultimate goal of the government to end violence.13 A

notable feature of eq. (10) is that the benefits to making a moderate offer, b, do not even figure

into the equilibrium condition.

The possibility of adverse selection increases with hardliners’ demands, H. Moreover,

this likelihood falls with higher costs of violence, V. As B approaches H in value, so that

government’s and hard-liners’ preferences converge, V becomes the sole determinant of the

adverse-selection equilibrium. This may explain why the Diaspora or state sponsors are essential

in perpetuating violence, even though the government and hard-liners agree on the need for a

solution. Subsidies from outside interests reduce V and lead to an adverse selection that

perpetuates hostilities.

Unanswered questions and future directions

There are many unanwered questions with respect to terrorism, for which game theory

can be fruitfully applied. In terms of noncooperative game theory, there is no true multi-period

analysis of terrorist campaigns, where the terrorist resource allocation is studied over time. The

closest analysis is that of Lapan and Sandler (1993) and Overgaard (1994), where terrorists

Page 162: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

21

signal their alleged strength in the initial period, but only a two-period analysis is presented. A

many period investigation is required where the conflict between terrorists and the government

has an unknown (probabilistic) endpoint that is influenced by actions of the adversaries. Ideally,

information must be treated as incomplete or imperfect when investigating the temporal and

strategic aspects of terrorist campaigns.

Another area for study involves the use of differential game theory to examine how

terrorist organizations – their personnel and resources – are influenced by successful and failed

operations. By applying a differential game framework, the analyst can display the dynamics of

the strategic choices of the terrorists and the government in which the underlying constraints

capture the rate of change over time of resource supplies based on terrorists’ operations and the

government’s policy choices. The genesis and demise of terrorist groups can be analyzed based

on strategic considerations. If, for example, this demise is understood, then governments may

better plan their anti-terrorist policies. Do some policies (i.e., harsh reprisals) actually encourage

recruitment, opposite to the government’s intent? This question and others can then be

addressed.

To date, cooperative game theory has not been applied to the study of terrorism. In

contrast to governments that have not cooperated effectively, terrorists have formed elaborate

cooperative networks (Arquilla, & Ronfeldt, 2001). Terrorists share training facilities,

intelligence, operatives, innovations, and logistical methods. This cooperation is motivated by

the weakness of terrorists who must pool resources and knowledge if they are to threaten much

stronger governments. Terrorists often harbor common resentment of governments which unite

their interests. Moreover, terrorists are in repeated interactions with one another, where leaders

have no known endpoints unlike officials in democratic governments whose time horizons are

quite finite. These repeated interactions allow terrorist groups to maintain agreements through

Page 163: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

22

trigger tit-for-tat mechanisms that punish defections. A careful cooperative game-theoretic

analysis of terrorist groups can provide some useful insights in assessing the true threat of

terrorism. Terrorists’ cooperation allows them to prod government defensive measures to

uncover the weakest link, to which they dispatch their best-shot team to create maximum

damage.

Concluding remarks

Strategic interaction between terrorists and governments, among targeted governments,

and among terrorists make game theory an appropriate tool to enlighten policymakers on the

effectiveness of anti-terrorist policies. This article takes stock of past game-theoretic

applications to the study of terrorism. The article also presents novel applications and suggests

some future applications. Since 9/11, academic interest in modeling and studying terrorism is

increasing greatly.

Page 164: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

23

Notes

1. The relevant literature includes Lapan and Sandler (1988, 1993), Lee (1988),

Overgaard (1994), Sandler (2003), Sandler and Enders (2004), Sandler and Lapan (1988), Scott

(1991), and Selten (1988).

2. Terrorists’ high success rate and their ranking of tactics based on risk, time, and

potential confrontation with authorities also support the rationality assumption (Sandler et al.,

1983).

3. At the social optimum, the sum of the two countries deterrence spending is minimized

in order to identify the cooperative outcome.

4. As for an arms race, a PRISONER’S DILEMMA applies in a 2 × 2 representation

(Sandler, 2004).

5. Scott (1989) examines terrorism when the terrorists are uninformed about the type of

government that they confront, but Scott does not consider a signalling equilibrium.

6. This deterrence race is analogous to the problem of the open-access commons, where

mutual action in the form of exploitation of the shared resource leads to a PRISONER’S

DILEMMA and a suboptimal Nash equilibrium (Sandler, & Arce M., 2003).

7. Of course, multiple attacks can be easily addressed, but, for simplicity, we assume a

single attack per period.

8. Other scenarios are addressed in Sandler and Lapan (1988). As groups have become

more religious-based over the last two decades, the act itself gives a positive payoff to the

terrorists.

9. For more complex and different scenarios, these steps are displayed in detail in

Sandler and Siqueira (2003).

10. Overdeterrence or underdeterrence depends on the sign of the following composite

Page 165: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

24

term:

( ) ( ) ( )N N N ,T BT T T B

T T

v v lπ ππ θ θ θθ θ

∂ ∂′ + +∂ ∂

where the first two terms are negative and the third term is positive. If the overall sum is

negative (positive), then there is underdeterrence (overdeterrence).

11. This payoff could be easily changed to pS – L with no change in the analysis.

Moreover, a cost less than L could be deducted. Our simple model in Figure 3 only allows the

government to choose between preemption and deterrence. In reality, governments preempt and

deter at the same time. To allow for this possibility, one should view the government strategies

in the model as a greater reliance on deterrence or preemption. Different payoff arrays and

alternative underlying “technologies” of deterrence and preemption can be incorporated into the

model. A rich number of interesting models and outcomes can be displayed, as noted by

Hirofumi Shimizu.

12. This inequality implies that –pS – C > –S.

13. There is, indeed, nothing in the model that restricts us from setting B equal to V.

Page 166: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

25

References

Akerlof, G. (1970). The market for lemons: Qualitative uncertainty and the market mechanism.

Quarterly Journal of Economics, 84, (3), 488–500.

Arquilla, J., & Ronfeldt, D. (2001). Networks and netwars. Santa Monica, CA: RAND.

Atkinson, S. E., Sandler, T., & Tschirhart, J. T. (1987). Terrorism in a bargaining framework.

Journal of Law and Economics, 30, (1), 1–21.

CHICKEN. Rapaport, A., & Chaman, A. M. (1969). The game of chicken. In I. R. Buchler and

H. G. Nutini (Eds.), Game theory in the behavioral sciences (pp. 151–175). Pittsburg:

University of Pittsburg Press.

COORDINATION. Watson, J. (2002). Strategy: An introduction to game theory. New York:

W. W. Norton.

Cross, J. G. (1969). The economics of bargaining. New York: Basic Books.

Cross, J. G. (1977). Negotiations as a learning process. Journal of Conflict Resolution, 21, (4),

581–606.

Enders, W., & Sandler, T. (1993). The effectiveness of anti-terrorism policies: Vector-

autoregression-intervention analysis. American Political Science Review, 87, (4), 829–

844.

Enders, W., & Sandler, T. (1995). Terrorism: Theory and applications. In K. Hartley & T.

Sandler (Eds.), Handbook of Defense Economics, Vol. 1 (pp. 213–249). Amsterdam:

North-Holland.

Enders, W., Sandler, T., & Cauley, J. (1990). UN conventions, technology and retaliation in the

fight against terrorism: An economic evaluation. Terrorism and Political Violence, 2,

(1), 83–105.

Islam, M. Q., & Shahin, W. N. (1989). Economic methodology applied to hostage-taking in

Page 167: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

26

light of the Iran-Contra affair. Southern Economic Journal, 55, (4), 1019–1024.

Lapan, H. E., & Sandler, T. (1988). To bargain or not to bargain: That is the question.

American Economic Review, 78, (2), 16–20.

Lapan, H. E., & Sandler, T. (1993). Terrorism and signalling. European Journal of Political

Economy, 9, (3), 383–397.

Lee, D. R. (1988). Free riding and paid riding in the fight against terrorism. American

Economic Review, 78, (2), 22–26.

Lee, D. R., & Sandler, T. (1989). On the optimal retaliation against terrorists: The paid-rider

option. Public Choice, 61, (2), 141–152.

Overgaard, P. B. (1994). Terrorist attacks as a signal of resources. Journal of Conflict

Resolution, 38, (3), 452–478.

PRISONER’S DILEMMA. Tucker, A. (1950). A two person dilemma. In E. Rasmussen (Ed.),

Readings in games and economics (pp. 7–8). Malden, MA: Blackwell, 2001.

Quillen, C. (2002a). A historical analysis of mass casualty bombers. Studies in Conflict &

Terrorism, 25, (5), 279–292.

Quillen, C. (2002b). Mass causalty bombings chronology. Studies in Conflict & Terrorism, 25,

(5), 293–302.

Sandler, T. (1992). Collective action: Theory and applications. Ann Arbor: University of

Michigan Press.

Sandler, T. (1993). Collective action and transnational terrorism. World Economy, 26, (4),

forthcoming.

Sandler, T., & Arce M., D. G. (2003). Pure public goods versus commons: Benefit-cost duality.

Land Economics, 79, (3), forthcoming.

Sandler, T., & Enders, W. (2004). An economic perspective on transnational terrorism.

Page 168: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

27

European Journal of Political Economy, 20, (1), forthcoming.

Sandler, T., & Lapan, H. E. (1988). The calculus of dissent: An analysis of terrorists’ choice of

targets. Synthèse, 76, (2), 245–261.

Sandler, T., & Siqueira, K. (2002). Global terrorism: Deterrence versus preemption.

Unpublished manuscript, University of Southern California.

Sandler, T., Tschirhart, J. T., & Cauley, J. (1983). A theoretical analysis of transnational

terrorism. American Political Science Review, 77, (4), 36–54.

Scott, J. L. (1991). Reputation building in hostage incidents. Defence Economics, 2, (2), 209–

218.

Selten, R. (1988). A simple game model of kidnappings. In R. Selten (Ed.), Models of strategic

rationality (pp. 77–93). Boston: Kluwer Academic Press.

Shahin, W. N., & Islam, M. Q. (1992). Combating political hostage-taking: An alternative

approach. Defence Economics, 3, (4), 321–327.

United States Department of State (2002). Patterns of global terrorism. Washington, DC: US

Department of State.

Page 169: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

28

Todd Sandler is the Robert R. and Katheryn A. Dockson Professor of International Relations &

Economics, University of Southern California. He has used game theory in the study of

terrorism since 1983. In 2003, he is a co-recipient of the National Academy of Sciences’ Estes

award for excellence in science for his research on terrorism. Daniel G. Arce M. is the Robert

D. McCallum Distinguished Professor of Economics & Business, Rhodes College. He has

applied game theory in economics and international relations to a wide variety of problems. His

teaching and research interests involve many aspects of game theory.

ADDRESS: TS: School of International Relations, University of Southern California, Von

Kleinsmid Center 330, Los Angeles, CA 90089-0043, USA; telephone +1 213-

740-9695; fax +1 213-742-0281; e-mail: [email protected].

DGAM: Department of Economics, Rhodes College, 2000 North Parkway,

Memphis, TN, 38112-1690, USA; telephone +1 901-843-3121; fax +1 901-843-

3736; e-mail: [email protected].

Page 170: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

EU Preempt Do not preempt

Preempt

2, 2

–2, 4

US

Do not preempt

4, –2 Nash

0, 0

Matrix a: PRISONER’S DILEMMA

EU Preempt Do not preempt

Preempt

6, 2

Nash 2, 4

US

Do not preempt

4, –2

0, 0

Matrix b: Asymmetric-Dominance Equilibrium

EU Preempt Do not preempt

Preempt

Nash 2, 2

–4, 0

US

Do not preempt

0, –4 Nash

0, 0

Matrix c: COORDINATION

FIGURE 1. Three alternative game forms for preemption

Page 171: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

!"#$%&'

Page 172: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

UK UK

Deterrence Preemption Deterrence Preemption

Deterrence

–S, 0, S

0, –pS – C, pS

Deterrence

–T – c, –c, T

–c, 0, –l

US Preemption

Nash –pS – C, 0, pS

–C, –C, –L

US

Preemption

0, –c, –l

Nash 0, 0, –l

Matrix a: Spectacular Event Matrix b: Normal Event

FIGURE 3. Two-country choice of deterrence versus preemption

Page 173: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

(

) *

) *

+,

-

-".

".

!"#/% 0-

1

2

Page 174: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Policies Alternative game forms Proactive policies Preemption Group infiltration Retaliation Intelligence

! PRISONER’S DILEMMA, CHICKEN, COORDINATION,

Asymmetric-Dominance Equilibrium ! Asymmetric-Dominance Equilibrium, PRISONER’S

DILEMMA ! PRISONER’S DILEMMA, CHICKEN, COORDINATION,

Asymmetric-Dominance Equilibrium ! Asymmetric-Dominance Equilibrium

Reactive policies Deterrence Embassy fortification UN conventions

! PRISONER’S DILEMMA (deterrence race) with action ! PRISONER’S DILEMMA with action ! PRISONER’S DILEMMA in terms of enforcement

TABLE 1. Policy choices and underlying games

Page 175: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

© Blackwell Publishing Ltd 2003, 9600 Garsington Road, Oxford, OX4 2DQ, UKand 350 Main Street, Malden, MA 02148, USA

779

Blackwell Publishing LtdOxford, UKTWECThe World Economy0378-5920© 2003 Blackwell Publishing Ltd (a Blackwell Publishing Company)June 20032661000Original ArticleCOLLECTIVE ACTION AND TRANSNATIONAL TERRORISMTODD SANDLER

Collective Action and

Transnational Terrorism

Todd Sandler

This paper applies modern tools of economic analysis to examine the nature of transnational terrorism and associated collective action concerns that arise in the aftermath of September 11. Throughout the paper, the strategic interaction between rational terrorists and targeted governments are underscored. Networked terrorists draw on their collective strengths to exploit a maximum advantage over targetedgovernments’ inadequate and uncoordinated responses. A wide range of issues are explored including governments’ deterrence races, undersupplied pre-emption, and suicidal attacks. Myriad substitutions by terrorists limit government anti-terrorism policy effectiveness. A host of policy responses are evaluated in light of economic analysis and past econometric evidence.

1. INTRODUCTION

O

N a clear, crisp morning, US peace and security was forever shattered byfour hijackings on 11 September, 2001 (henceforth, 9/11) that resulted in

the collapse of the World Trade Centre (WTC) towers, the destruction of asection of the Pentagon, and the passenger-induced plane crash on a rural Penn-sylvania field. Within a mere 90 minutes, the potential threat of terrorism and thevulnerabilities of America became understood by a traumatised public. In today’stechnology-based society, an everyday object could be transformed into a wea-pon of mass destruction (WMD). Apparently, al-Qaida terrorists surpassed theirwildest dreams of robbing Americans of their serenity and security. Their hein-ous attack captured headlines for months and will continue to do so for yearsto come on 9/11 anniversaries or as the perpetrators are brought to justice. Bybroadcasting much of the disaster live, including the toppling of the north andsouth WTC towers, the media unwittingly assisted in magnifying the potentialrisks that modern-day terrorism poses. This heightened state of anxiety probablyinduced the anthrax terrorist to act so as to capitalise on the insecurity andhysteria that had already gripped the nation. That is, the mailing of anthrax letterswas a complementary incident for the 9/11 hijackings, thereby allowing the twoincidents to have a greater influence than either would have had on its own.Although those responsible for the two sets of events surely differed, the timingof the anthrax letters was not coincidental.

The events of 9/11 marked the largest ever terror attack on US soil – oranywhere – and resulted in the deaths of just under 3,000 people. The secondlargest terrorist attack on US soil had been the bombing of the Alfred P. MurrahBuilding in Oklahoma City on 19 April, 1995, where 168 people died, while thethird largest attack had been the bombing of Wall Street on 16 September, 1920,

TODD SANDLER is the Robert R. and Katheryn A. Dockson Professor of International Relationsand Economics at the University of Southern California, School of International Relations. Thispaper was presented as a Leverhulme Globalisation Lecture at the University of Nottingham.

Page 176: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

780 TODD SANDLER

© Blackwell Publishing Ltd 2003

where 34 people died and 200 were injured.

1

The Wall Street time bomb, left ina horse-drawn carriage, had been technologically unsophisticated, similar to theMurrah building bomb and the 26 February, 1993, bomb at the north tower of theWTC. The 1993 WTC bombing resulted in a 100

×

100 foot crater in the under-ground parking garage (US Department of State, 1994); a slightly different place-ment of this bomb could have imploded the building with greater loss of life than9/11. Based on these last two US incidents, we see that terrorism has been a threatfor some time, while mass-casualty terrorism has been tried well before 9/11.

Terrorists bent on mass destruction only have to be ‘fortunate’ once, whilesociety must be fortunate daily to avoid such catastrophes.

2

Another asymmetrybetween terrorists and the targeted society involves resources: society must pro-tect everywhere to be secure, so that homeland security is very expensive, whileterrorists can concentrate their best effort at a single vulnerable point, so thatterrorism is a cost-effective activity. This is well-illustrated by the 1993 bomb offertiliser, diesel fuel, and icing sugar at the WTC. Even though this bomb costjust $400, it caused $550 million in damages (Hoffman, 1998). Yet another asym-metry involves information, in which the terrorists know their own capabilities,unlike the targeted government, which is not fully informed about the terrorists’resources.

Terrorism is the premeditated use, or threat of use, of extra-normal violenceor brutality to gain a political objective through intimidation or fear of a targetedaudience. To qualify as terrorism, an act must be politically motivated; that is,the act must attempt to influence government policy at home or abroad. Incidentsthat are solely motivated for profit and do not directly or indirectly support apolitical objective are not considered to be terrorism. The political motives ofterrorism are varied and may include Marxism, nihilism, religious freedom,racism, separatism, anti-capitalism, anti-US dominance, or other goals. Since the1979 November takeover of the US Embassy in Tehran, some terrorism hasbeen motivated by the establishment of an Islamic state.

3

To create an atmosphereof fear where everyone feels vulnerable, terrorists

simulate randomness

whenchoosing targets. As the authorities focus on a likely venue, the terrorists oftenstrike elsewhere at less-watched targets. Frequently, terrorists direct their vio-lence against a large audience, not directly involved with the political decisionthat they seek to influence. On 9/11, the plane that crashed into the Pentagon and

1

On mass casualty bombings since 1946, see Quillen (2002a and 2002b). For Quillen, a bombcauses mass casualties if more than 24 people die.

2

This asymmetry paraphrases what the IRA terrorists said in a letter after they learned that their12 October, 1984, bombing of the Grand Hotel in Brighton had narrowly missed killing PrimeMinister Margaret Thatcher. Their letter said, ‘Today, we were unlucky. But remember we haveonly to be lucky once. You will have to be lucky always’ (Mickolus et al., 1989, vol. 2, p. 115).

3

The takeover of the US Embassy in Tehran is a watershed event, which marks the rise ofreligious terrorism in recent decades (Hoffman, 1998; and Enders and Sandler, 2000).

Page 177: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

COLLECTIVE ACTION AND TRANSNATIONAL TERRORISM 781

© Blackwell Publishing Ltd 2003

the one that was intended for the US Capitol marked departures from this pat-tern by targeting decision makers. Extra-normal violence is employed not only tograb headlines but also to elevate anxiety levels, so that the general populationoverreacts to these low probability but high-cost events. As the public becomesdesensitised to the violence, terrorists have escalated the lethality of their attacks.

Terrorism falls into two essential categories: domestic and transnational.Domestic terrorism is home grown and has consequences for only the host coun-try, its institutions, people, property, and policies. In a domestic terrorist incident,the perpetrators and targets are from the host country. Through its victims, tar-gets, institutions, supporters, or terrorists,

transnational terrorism

involves morethan one country. If an incident begins in one country but terminates in another,then it is transnational terrorism, which would be the case for a hijacking of aplane in country A that is made to fly to country B. The toppling of the WTCtowers was transnational, because victims came from many different countries,the mission was planned abroad, and the terrorists were foreigners. An incidentmay be transnational if its implications transcend the host nation’s borders.Transnational terrorist incidents represent

transboundary externalities

, insofaras actions conducted by terrorists or authorities in one country may imposeuncompensated costs or benefits on people or property of another country. In aglobalised world of augmented cross-border flows, there is a blurring of thedistinction between domestic and transnational terrorism.

When terrorist events have significant transnational consequences, numerouscollective action concerns arise. Targeted countries may either work at cross-purposes or fail to cooperate to address the terrorist threat. For example, deter-rence efforts by two or more countries to deflect an attack from the same terroristnetwork may create a deterrence race as each country overspends. In someinstances, the deflection may result in a country’s people or property being hitabroad, where the country has little say over terrorism-thwarting efforts. Theabsence of cooperation may involve a country single-handedly mounting apre-emption on the terrorists and their bases. The purely public benefits, derivedfrom the annihilation of a common terrorist threat, lead to free riding, especiallywhen a powerful country is anticipated by other targeted countries to act. Asimilar retaliator’s dilemma characterises actions to punish a state-sponsor ofterrorism. Ironically, terrorists’ ability to form global networks not only solvestheir collective action problem but exacerbates the collective action problem forthe target countries.

4

The purpose of this paper is to investigate the nature of transnational terrorismand some of the collective action issues that it poses in the aftermath of 9/11. Inparticular, rationality is investigated from alternative viewpoints that includethe terrorist group’s leaders, suicide bombers, and the targeted government.

4

On terrorist networks, see Arquilla and Ronfeldt (2001).

Page 178: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

782 TODD SANDLER

© Blackwell Publishing Ltd 2003

Additional difficulties, associated with the deterrence and pre-emption dilemmasof targeted governments, are discussed. These governments’ cooperative failuresare shown to play into the hands of networked terrorists, who utilise their collec-tive strengths to augment these governments’ inadequate and non-cooperative re-sponses. Other collective action failures on the part of governments that involveintelligence and duplication of efforts are investigated. Another purpose is toidentify what works and what does not against terrorism. Finally, the costs ofterrorism are addressed for a globalising society.

2. A LOOK AT THE PAST

Table 1 provides a perspective on the nature of transnational terrorist incidentsfrom data published by the US Department of State (1988–2002) or else madeavailable by the Office of the Ambassador at Large for Counterterrorism, USDepartment of State. The coverage is the 1968–2001 period, which representsthe era of transnational terrorism, which really began following the Arab-Israeliconflict in 1967 and the subsequent Israeli occupation of captured territory. Thecolumns in Table 1 indicate the year, the number of transnational terrorist events,deaths from these events, wounded from these events, and attacks on US interests.

A number of essential insights can be drawn from these numbers. First, withthe exception of 2001, transnational terrorism on average results in relatively fewdeaths, especially when compared with the annual 40,000 people killed on justUS highways. In fact, the deaths on 9/11 are approximately equal to all trans-national terrorist-related deaths recorded during the 1988–2000 period. Second,transnational terrorism follows a cyclical pattern with much of the 1990s beinga relatively calm era.

5

Third, attacks on US interests account for a high propor-tion of events, even though relatively few transnational terrorist incidents tookplace on US soil. In 1998 and 2000, there were no such events, while, in 1999,there was just one such event (US Department of State, 1999–2001). This isespecially noteworthy from a transnational externality perspective and under-scores that US success in deflecting attacks abroad has

not

secured the safetyof US interests. Fourth, some years may represent outliers in terms of deaths,wounded, or attacks on US interests. For example, a single noteworthy event –known in the terrorism literature as a ‘spectacular’ – may account for a spike inthe number of dead or injured. Obviously, 9/11 is such an event regarding deaths.In 1998, the simultaneous bombings of the US Embassies in Nairobi, Kenya andDar-es-Salaam, Tanzania, accounted for 291 deaths and almost 5,000 injuries(US Department of State, 1999). The presence of outliers means that statistical

5

The cyclical nature of transnational terrorism is established with rigorous statistical analysis inEnders and Sandler (1995 and 1999), and Im et al. (1987).

Page 179: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

COLLECTIVE ACTION AND TRANSNATIONAL TERRORISM 783

© Blackwell Publishing Ltd 2003

analysis must take them into account. Fifth, except for the casualty figures, trans-national terrorism in 2001 does not appear to be different from other years. Thislack of difference would be confirmed by examining other measures not dis-played in Table 1 – for example, terrorist modes of attacks, venue for attacks, orworldwide distribution of attacks. Terrorist modes of attacks include bombings,kidnappings, assassinations, skyjackings, threats, and other kinds of events.

TABLE 1Transnational Terrorism: Events 1968–2001

Year Number of Events Deaths Wounded Attacks on US Interests

2001 348 3,572 612a 2192000 426 405 791 2001999 395 233 706 1691998 274 741 5,952 1111997 304 221 693 1231996 296 314 2,652 731995 440 163 6,291 901994 322 314 663 661993 431 109 1,393 881992 363 93 636 1421991 565 102 233 3081990 437 200 675 1971989 375 193 397 1931988 605 407 1,131 1851987 665 612 2,272 1491986 612 604 1,717 2041985 635 825 1,217 1701984 565 312 967 1331983 497 637 1,267 1991982 487 128 755 2081981 489 168 804 1591980 499 507 1,062 1691979 434 697 542 1571978 530 435 629 2151977 419 230 404 1581976 457 409 806 1641975 382 266 516 1391974 394 311 879 1511973 345 121 199 1521972 558 151 390 1771971 264 36 225 1901970 309 127 209 2021969 193 56 190 1101968 125 34 207 57

Note:a Data on the number of wounded in the WTC attack is not available and, thus, is not part of this figure.

Source: US Department of State, Patterns of Global Terrorism (1988–2002) and tables provided to ToddSandler in 1988 by the US Department of State, Office of the Ambassador at Large for Counterterrorism.

Page 180: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

784 TODD SANDLER

© Blackwell Publishing Ltd 2003

Recent analyses show that the underlying motive behind transnational terror-ism has become less driven by Marxist left-wing beliefs and more directed byreligious fundamentalism.

6

Of course, a mixture of motives still justify trans-national terrorism, but the dominant drivers have changed. With this shift to morereligious-based terrorism has come a greater willingness on the part of terroriststo cause casualties. For example, religious groups that declare a Jihad or holywar against another nation consider its people, not just its officials, as the enemyand, thus, legitimate targets. Moreover, religious terrorist groups act out of adesire to satisfy their own goals (for example, ascent to heaven) rather than towin favour with an external constituency. Violence may be viewed as a purifyingact, justified for its own sake, so that claims of responsibility or a list of demandsare not issued. Even though the number of transnational terrorist events is gen-erally lower in the post-Cold War era, the greater violence prediction is borneout by statistical analyses – the likelihood of death or injury for each event isnow 17 percentage points greater per incident (Enders and Sandler, 2000).

3. SUICIDE ATTACKS

In recent times, the importance of suicide attacks has increased; 9/11 illus-trates the carnage that a suicidal mission can wreak. The presence of suicidalpilots allowed the planes to be guided into the WTC towers and the Pentagon. Abomb placed on board these same flights is unlikely to have caused the samedeath toll and destruction on the ground. In addition, Hamas’ use of suicidebombers against Israeli targets has increased greatly during 2002, thereby aug-menting public awareness of such attacks. Suicidal missions are, of course, notnew and can be traced back to Japanese kamikaze pilots during World War II.Kamikaze planes were loaded with explosives to create maximum damage toenemy targets such as ships.

One must ponder a rationality argument for suicide bombers. Alternativeexplanations have, however, been offered to justify suicide missions. Wintrobe(2001) characterises suicidal terrorists as rational individuals, who engage in anextreme trade-off between their autonomy and group solidarity. Wintrobe’ssimplistic analysis hinges on an individual’s desperate search for group accep-tance and cohesion as driving a suicidal terrorist into a

corner

solution, wheregroup solidarity is more valuable than one’s very existence.

7

Wintrobe, however,

6

On the changing motives of terrorists, see Hoffman (1997 and 1998), Enders and Sandler (2000)and Wilkinson (2001 and 2002).

7

Wintrobe’s (2001) argument bears some similarity to Hardin’s (1995)

One for All

theory toexplain the logic of group conflict, where the collective action problem can be overcome throughgroup identity that bolsters individuals’ self-interest when engaging in extreme behaviour againstmembers of a hated opponent group. Self-sacrifice is not a necessary outcome in Hardin’s theory.

Page 181: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

COLLECTIVE ACTION AND TRANSNATIONAL TERRORISM 785

© Blackwell Publishing Ltd 2003

rejects that rewards in heaven can motivate a rational self-sacrifice in a suicidemission.

To show that self-sacrifice is rational, one must demonstrate that the utilityassociated with the suicidal mission is at least as large as the utility of the statusquo. If the utility of the status quo is sufficiently low owing to an absence ofeconomic opportunities or to a sense of injustice, or if the utility of the suicideact is sufficiently high owing to group approval or other rewards, then a terroristmay rationally choose the corner trade-off of self-sacrifice.

There is no reason to dismiss heavenly rewards as one, but not the only, factorthat can tip the utility comparison in favour of a suicide mission. Compensationpaid by Iraq to the family of Palestinian suicide bombers can also tip the balance,especially when the status quo offers grim economic realities. If heavenlyrewards, martyrdom, or family compensation are relevant, then an intertemporalutility comparison is necessary in which the decision maker places value onpostmortem utility. Everyday acts of purchasing life insurance or church attend-ance suggest the relevancy of postmortem utility in individuals’ decision calcu-lus. The suicide mission can also be motivated by deceit, where the terrorist isnot told the true nature of the mission. There is some evidence that the twoterrorists, who drove a yellow Mercedes truck full with explosives into the USMarine barracks at Beirut International Airport on 23 October, 1983, were notinformed about the suicidal nature of their mission (Mickolus et al., 1989, vol. 1).After setting the bomb to detonate, the bombers jumped from the cab of thetruck and tried to run to safety, but did not get very far. In some instances, theterrorists may be forced to take the action because of threats made to their family.Thus, many considerations can induce a terrorist to make the ultimate trade-off,ending at a corner solution.

While poverty can play a role in limiting the operative’s status-quo utility,there is no reason why poverty must be a factor if group identity or heaven’srewards are large. In a recent study of Hezbollah martyrs, an inverse relationshipbetween poverty and participation in suicidal missions was found; this is contraryto what the media say (Krueger and Maleckova, 2002). Hezbollah suicidal ter-rorists did not tend to be poor nor poorly educated in the sample. The study didnot, however, include the employment opportunities of these suicidal terrorists.

8

Education is a necessary, but not a sufficient, condition for obtaining a good job.Nevertheless, this study suggests that the size of the expected utility from carry-ing out the suicidal mission may have to be large, insofar as the utility of thestatus quo is not necessarily small.

Important participants in suicidal missions who have been left out of theanalysis to date are the terrorist leaders and strategists – for example, Osama bin

8

In the case of Israeli Jewish settlers, individuals who attacked Palestinians in the West Bank weregenerally from high-paying jobs. These settlers were not on suicide missions.

Page 182: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

786 TODD SANDLER

© Blackwell Publishing Ltd 2003

Laden and Ramzi Binalshibh – who dispatch terrorists to their death. It is note-worthy that the higher echelon of al-Qaida, Hamas, and Hezbollah do notsacrifice themselves. Their calculus is impeccable – they preserve their organisa-tion by employing low-cost resources in the form of dispensable young men (andsometimes women) to create maximum anxiety in a targeted audience. Theinverse relationship between poverty measures and participation in suicide mis-sion is probably due to these leaders choosing people to carry out the missionwho possess the requisite intelligence for logistical success. Moreover, the attain-ment of a level of education is a signal of a person’s determination to carrythrough on commitments. Suicidal missions can create particularly high anxietyin a targeted society, because a determined suicide bomber can not only mimicthe identity of the target audience (for example, dress like a devout Jew), but canalso create maximum damage by detonating the bomb at the most opportunemoment. Such missions underscore both the determination of the terrorists andthe vulnerability of the targeted audience.

A final participant is the targeted government, charged with protecting thelives of its citizens. Suicide missions present a real dilemma to these govern-ments. In general, deterrence policies work best if they can create price changesassociated with terrorist operations that induce terrorists to substitute from moreharmful activities into less harmful ones. The presence of a corner solutionfor the terrorist operative and also for the terrorist leader implies that policieswhich reduce suicidal missions’ probabilities of success have no influence what-soever on these agents’ choices (Enders and Sandler, 2003). This then impliesthat the government must either apprehend or kill suicidal terrorists for attacksto stop.

4. COOPERATION FAILURES AND THEIR COSTS

Unlike the governments that they target, terrorists have progressed in solvingtheir collective action problem. From the early 1970s, terrorist groups engagedin transnational acts have been tied either explicitly or implicitly to networksconsisting of left-wing terrorist groups united in their goal to overthrow demo-cratic governments (Alexander and Pluchinsky, 1992), Palestinian groups unitedin their aim to establish a homeland or to destroy Israel, and fundamentalistterrorist groups united in their goal to create nations founded on fundamentalistprinciples (Hoffman, 1998; and US Department of State, 2001). Terrorist net-works cooperate on many levels, including training, financial support, logisticalhelp, intelligence, weapon acquisition, pooling resources, and the exchange ofoperatives – for example, operatives were exchanged in the 21 December, 1975,attack on the Organisation of Petroleum Exporting Countries ministerial meetingin Vienna, and in the 27 June, 1976, hijacking of Air France flight 139 (Alexander

Page 183: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

COLLECTIVE ACTION AND TRANSNATIONAL TERRORISM 787

© Blackwell Publishing Ltd 2003

and Pluchinsky, 1992).

9

The al-Qaida network operates in upwards of 60 coun-tries and stages their attacks worldwide. This network includes such groups asAbu Sayyaf (the Philippines), Egypt’s Islamic Group, Harakat ul-Mujahidin(Pakistan), Islamic Movement of Uzbekistan, Al-Jihan (Egypt), and bin Laden’sown group (US Department of State, 2001). Even left-wing groups and Palestin-ian groups have been known to train together and to have other ties (Hoffman,1998; and Wilkinson, 1986 and 2001), so that separate networks have explicitlinks to one another. These networks’ common hatred of the United States andIsrael means that heightened attacks by groups in one part of the world can sparkincreased attacks in other parts of the world. This implicit coordination shows upas distinct cycles of peaks and troughs in transnational terrorist activities.

10

The ability of terrorists to cooperate heightens the inefficiencies associatedwith governments’ inability to cooperate, except episodically – for example, inbuilding the coalition to defeat the Taliban and to attack al-Qaida camps andbases in Afghanistan. This inability of governments to cooperate is first illus-trated for deterrence and pre-emption.

a. The Deterrence Race

In the top panel of Figure 1, a symmetric deterrence game is displayed for twocountries –

A

and

B

– that are confronted by a common terrorist threat. Supposethat increased deterrence gives a private, country-specific gain of 6 to the deter-ring country at a

cost

of 4 to

both

countries. For the deterring country, cost arisesfrom deterrence expense and the increased likelihood of experiencing damagesabroad if the attack is deflected there. For the non-deterring country, the coststems from the damages that it can suffer from attacks diverted to its soil. If thereis a host-country disadvantage from damages, then this damage can exceed thatof the other country. For simplicity, the damage and deterrence expense of thedeterring country is equated to the damage cost of the non-deterring country –hence, the common cost of 4.

Based on country-specific gains of 6 and the public cost of 4 stemming fromeach country’s deterrence, the payoffs listed in panel

a

arise, where country

A

’spayoff is on the left and country

B

’s payoff is on the right in each cell. If, forexample, each country increases its deterrence, then each receives

2 (= 6

2

×

4); if, however, only one country augments its deterrence, then the deterringcountry nets 2 (= 6

4) and the other country suffers the spillover cost of

4.The deterrence game has a dominant strategy since

2 >

4 and 2 > 0, so that

9

These specific incidents are described in Mickolus (1980) under their specific dates. The hijack-ing of Air France flight 139 is famous because of the eventual storming of the plane at the Entebbeairport in Uganda by Israeli special forces.

10

See the statistical results in Enders and Sandler (1999).

Page 184: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

788 TODD SANDLER

© Blackwell Publishing Ltd 2003

the payoffs associated with increased deterrence are larger than the correspond-ing payoffs associated with the status quo for each of two countries.

11

Eachcountry plays its dominant strategy and augments deterrence, thereby ending upat the Nash equilibrium of mutual action where payoffs are less desirable thanmutual inaction. The former is a Nash equilibrium, because neither countrywould

unilaterally

want to change its strategy and return to the status quo. Thedeterrence scenario in Figure 1 is a Prisoners’ Dilemma, analogous to an armsrace, where countries spend more but do not necessarily become more secure.With fanatical terrorists who will not be deterred from attacking some country,deterrence will not necessarily improve security, especially in a globalised worldwhere a country’s citizens can be attacked at home or abroad. Thus far, thedeterrence analysis suggests

over-deterrence

in which each country does notaccount for the external cost that their efforts to deflect the attack generate foranother country. For this scenario, the greater the number of countries, thegreater the extent of over-deterrence.

11

This analysis of deterrence is analogous to models presented in much greater detail in Sandlerand Lapan (1988) and Sandler and Siqueira (2002).

FIGURE 1Deterrence and Pre-emption Games

Page 185: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

COLLECTIVE ACTION AND TRANSNATIONAL TERRORISM 789

© Blackwell Publishing Ltd 2003

Under-deterrence may characterise the deterrence game for an alternative setof payoffs. Suppose that a country’s people or property is most vulnerable abroadowing to secure borders at home. Further suppose that the host country experi-ences little collateral damage from an attack on its soil. In this case (not dis-played in Figure 1), there will be under-deterrence, because the host country willnot account for the external benefit that its deterrence confers on foreign visitors,targeted by host-country terrorists.

12

In the general case, the deterrence scenario has both external cost and externalbenefit. External cost arises as deterrence deflects an attack abroad, while exter-nal benefit stems from either the protection afforded to foreigners or the elimina-tion of an attack altogether. Thus, a wide range of strategic scenarios and resultsare possible depending on whether external cost or benefit is stronger.

b. Pre-emption Game

In the bottom panel of Figure 1, a canonical

pre-emption game

is displayed,in which each of two targeted countries must decide whether or not to launch apre-emptive attack against a common terrorist or state-sponsor threat. The pre-emptive strike is intended to weaken the terrorists or their sponsors, so that theypose a less significant challenge. For comparison purposes, payoffs analogous tothe symmetric deterrence game in Figure 1 are chosen. If a sole country pre-empts, then it confers a public benefit of 4 on itself and the other country at acost of 6 to just itself. In the off-diagonal cells in the bottom matrix, the countrydoing the pre-emption nets

2 (= 4

6), while the free rider receives 4. Whenneither country pre-empts, each receives 0, whereas mutual pre-emption gives 8(= 2

×

4) in benefit at a cost of 6 for a net payoff of 2, as listed, for bothcountries. The dominant strategy is not to pre-empt, since 0 >

2 and 4 > 2.Mutual inaction results in the Nash equilibrium of this Prisoners’ Dilemma game.

Even though in their most basic form, the deterrence and pre-emption games leadto Prisoners’ Dilemma, there are essential collective action differences in thesetwo collective action problems. First, the Nash equilibrium for the deterrence gamerequires mutual action, while the Nash equilibrium for the pre-emption gamerequires mutual inaction. Second, the matrix games are negative transposes of oneanother, in which the Nash payoffs are more damaging for the deterrence game.

13

Third, whereas the deterrence game has both over-deterrence and under-deterrence

12

This scenario characterises the Greek authority’s inability to deter 17 November terrorist attacksagainst US, NATO, and other foreign targets in Greece. In the summer of 2002, an accidentalexplosion – and not clever police work – led to the first arrests of 17 November members. Since1973, 17 November carried out 146 attacks and murdered 22 people prior to these arrests (Wilkin-son, 2001, p. 54).

13

The deterrence game is analogous to the commons problem, while the pre-emption game isanalogous to the pure public good problem (Sandler and Arce, 2002).

Page 186: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

790 TODD SANDLER

© Blackwell Publishing Ltd 2003

scenarios, owing to the presence of external cost and benefit as the game isgeneralised, the pre-emption game involves too little pre-emption owing to thepresence of just external benefits. Fourth, deterrence efforts may be complemen-tary, while pre-emption efforts are always substitutable unless a threshold levelof action is required. Thus, increased deterrence by one country should augmentthese efforts by the other country, whereas pre-emption actions by one countryshould limit these efforts by the other country.

c. A Maximal Externality

The deterrence and pre-emption dilemmas have plagued international effortsat a coordinated response for the last 35 years from the start of the modern eraof transnational terrorism. The deterrence and pre-emption dilemmas are but twomanifestations of the unwillingness of nations collectively to confront the terroristthreat. Similar dilemmas involve retaliation against a state-sponsor of terrorismor the pooling of intelligence. The application of game theory to the study of terrorismshows that there may be a rational basis – for example, the playing of a dominantstrategy – for these collective action failures. Nevertheless, one must wonderwhy terrorists solve their collective action dilemma, but governments do not.

Governments place great weight on the importance of their autonomy overnational security. Only during times of great threat (such as after 9/11) or war donations eschew their autonomy and form tight alliances to present a united frontagainst an adversary. In contrast, the terrorists are always at grave risks from amore powerful opponent, so that they have little choice but to pool their limitedresources and rely upon one another. In addition, the terrorists are relatively unitedin their hatred of a few countries – the United States, Israel, and the United Kingdom.Countries perceive their risks differently – that is, some are worried about beingthe target of an attack and others are not – and possess economic interests that maybe at odds with addressing the terrorist threat. If, for example, country

A

has lucra-tive contracts with a country that helps sponsor terrorism, then country

A

will notsupport hostile actions against this alleged state-sponsor. Moreover, terrorists takea long-term view of their struggle and consider their interactions with other groupsas continual; in contrast, governments take a short-term view (limited by the elec-tion period) of the terrorist threat and do not necessarily consider their interactionwith other governments as continual. As a consequence, the terrorists view the under-lying game as infinitely repeated, while the governments do not, so that cooperationbecomes a potential solution for the terrorists but not for the government.

14

By forming a global network and exploiting targeted countries’ uncoordinatedresponses, terrorists not only limit the effectiveness of these countries’ efforts tocounter terrorism, but are also able to maximise the externalities (and, hence,

14

On such repeated games and cooperative solutions, see Sandler (1992, Ch. 3).

Page 187: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

COLLECTIVE ACTION AND TRANSNATIONAL TERRORISM 791

© Blackwell Publishing Ltd 2003

inefficiency) that governments impose on one another. Uncoordinated responseson the part of governments mean that there is a weakest-link vulnerability for theterrorists to exploit. For example, by not maintaining airport security to anagreed-upon global standard, some airports present an easier target than others.Terrorists will probe airport security until these weakest links are uncovered andthen direct attacks there. Such terrorist actions are no different from those of avirus that seeks out and attacks a more vulnerable host. In a globalised worldwhere a country’s citizens can be targeted anywhere, the consequences of terror-ist cooperation coupled with government non-cooperation is that targets’ truelevel of protection is very small. The external cost imposed by the most inade-quate prophylaxis is exacerbated further, because the terrorist network dispatchesits

best-shot

response in the form of its best placed and trained squad. Hence,terrorist targets experience the maximal external cost possible, while the terroristsgain the maximal external benefit. This nightmarish outcome continues today.

This combination of collective action success and failure on the part of terror-ists and governments, respectively, highlights the unusual challenge that trans-national terrorism really poses to the world. Today, a country cannot rely on itsown efforts to ensure its citizens’ safety. As Table 1 illustrates, the United Statesexperiences the largest share of transnational attacks even though few occur athome. So what is the solution? The answer is easier said than accomplished.Unlike the terrorists, nations must also form a global network to face off againstthe terrorist networks. Short of terrorists using WMD, governmental networks onpar with those of the terrorist will not be formed; instead, there will be partialcooperation – for example, sharing of select intelligence.

Ironically, partial cooperation can worsen the inefficiency as compared tonon-cooperation. Suppose that countries are deciding whether or not to coordi-nate efforts on deterrence and intelligence. Further suppose that countries decideto share intelligence but not deterrence efforts, which is a common outcome.Among other things, the intelligence provides information as to the terrorists’preferred target – that is, which country it wants to attack. Knowledge of terrorists’preferences assists the would-be targets to better deflect the attack, so that aneven greater level of over-deterrence results.

15

This ‘second-best’ outcome is notuncommon in economics when only one of two choice variables is controlled.

5. ANOTHER COLLECTIVE ACTION FAILURE

To date, nations have relied on their own commando forces to address hostageexigencies at home or abroad involving their citizens. Thus, the United States hasDelta Force, while virtually every EU country maintains its own force. This

15

This outcome is shown mathematically in Enders and Sandler (1995) and Sandler and Lapan (1988).

Page 188: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

792 TODD SANDLER

© Blackwell Publishing Ltd 2003

failure to pool resources means that economies of scale are not exploited, so thatthe average cost of these squads is much higher than they need be. Moreover,since each country’s force is dispatched less often when compared with a multi-country force, learning economies, which shift down the average cost per deploy-ment, are not captured. The infrequent use of these commandos means that theydo not acquire the experience to hone their skills in real deployments. Of course,the presence of parallel forces indicates that efforts are duplicated, which is anadditional waste of resources. Because a squad may have to be dispatched somedistance away to address a hostage mission abroad (for example, Delta Force wassent to the Mediterranean during the

Archille Lauro

ship hijacking), a countrymust either maintain a network of bases worldwide or else risk the news mediaalerting the hostage takers of the commandos’ travel progress (as CNN did dur-ing the

Archille Lauro

incident). A multi-country squad can establish such aglobal network at a more reasonable per country expense than associated with asingle country’s effort. Once again, nations cherish their autonomy and balk atsuch cooperative approaches. Countries do not want to obtain other countries’ per-mission to deploy such forces during a crisis. Consequently, anti-terrorist effortsremain expensive and generally independent among nations.

6. IS THE WORLD DIFFERENT AFTER 9/11?

Following the events of 9/11, the world better understands the threat thattransnational terrorism poses. Before 9/11, only 14 transnational terrorist inci-dents involved more than 100 deaths and none had over 500 deaths (Hoffman,2002, p. 304). Although the events of 9/11 have dramatically changed our livesin terms of our risk assessment of terrorism and governments’ efforts to ensureour safety, terrorists’ activities have not altered much because of 9/11. That theauthorities had dismissed the use of a commercial airliner as a murderous bombis rather incomprehensible given some earlier events. On 5 September, 1986,hijackers took over Pan American flight 73, a Boeing 747, at the Karachi airportwith the aim of crashing it into an Israeli city (Mickolus et al., 1989, vol. 2, pp. 452–7).This plan was never executed, because commandos stormed the plane in Karachiwhile it was still on the tarmac. The true intentions of the terrorists were revealedduring the 1988 trial of those captured. Another unmistakable omen was the24 December, 1994, hijacking of an Air France passenger plane in Algiers by ArmedIslamic Group (GIA) terrorists, dressed in Air Algerie uniforms. Their missionwas to crash the Algiers-Paris flight into a crowded area of Paris with great lossof life. In a stopover in Marseille, a French anti-terrorist commando squad stormedthe plane and killed the four hijackers before they could wreak death and destruc-tion from the sky (Oklahoma City National Memorial Institute for the Preventionof Terrorism, 2002, website at http://db.mipt.org). Another portentous event was

Page 189: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

COLLECTIVE ACTION AND TRANSNATIONAL TERRORISM 793

© Blackwell Publishing Ltd 2003

the capture of Ramzi Youssef, the mastermind of the 1993 bombing of the WTCand an al-Qaida associate, in the Philippines in 1996. At the time of his capture,he had plans to use a dozen commercial airliners to destroy a variety of targetsincluding the Central Intelligence Agency (CIA) headquarters in Virginia.

These forerunners to 9/11 indicate that the threat of catastrophic incidents withmassive casualties has been around since 1986. As such, 9/11 marked the daywhen the terrorists were very lucky and their target very unlucky. Although 9/11was a watershed event of transnational terror, given its horrible consequences, itis better viewed as a reality check than the start of a new type of terrorism.Annual death tolls will remain like those of Table 1 with deaths well below 1,000on average in any given year. There has been little change in the pattern of globalterrorism since 9/11, except that the total number of events are somewhatsmaller, but not greatly so, owing to the disruption in al-Qaida operations inAfghanistan. Given the massive casualties of 9/11, authorities are quite worriedabout terrorist use of WMD in the form of chemical, biological, radiological, ornuclear (CBRN) attacks. Nevertheless, many terrorist experts believe that greatervigilance should be directed toward conventional methods rather than CBRNattacks (Hoffman, 2002; and Wilkinson, 2002).

Global efforts to thwart terrorism have only changed marginally. The globalresponse is still US-led, which is not surprising because US interests remainthe favourite target of international terrorists. As such, the United States gains themost country-specific benefits from their anti-terrorism ‘war.’ With US actions inAfghanistan, the Philippines, and Iraq, US interests will continue to attract the lion’sshare of transnational terrorist attacks. Unlike other countries, the United Stateshas the power-projection capabilities to move massive forces to troublespotsquickly; as such, the United States affords free-rider opportunities for others.

Although the US-led retaliation against the Taliban on 7 October, 2001, forharbouring Osama bin Laden involved other nations as allies, the current fightagainst terrorist networks is mostly nation driven. Nations still refuse to extraditeterrorists and to integrate their anti-terrorism efforts, except in terms of the shar-ing of intelligence. Concern for national autonomy still dominates against effortsto mount a united front against terrorists. Even international actions to freezeterrorist assets have not progressed much after some initial headway immediatelyfollowing 9/11. International cooperation remains a collective action failureexcept for a few bright spots – for example, the capture in 2003 of an al-Qaidacell in Spain and US-UK cooperation.

7. WHAT WORKS AND WHAT DOES NOT AGAINST TERRORISM?

One possible recommendation as to what works is to eliminate the causesof terrorism under the presupposition that, with no grievances or perceived

Page 190: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

794 TODD SANDLER

© Blackwell Publishing Ltd 2003

injustices, there will be no terrorism. There are some obvious difficulties withthis quick fix. If terrorists can extort any political change that they desire byeither threatening or performing violent acts, then democratically elected govern-ments would lose their intended purpose, because the voters’ choices can becircumvented by well-armed minorities. Obviously, the legitimacy of a liberaldemocracy, whose mandate rests on the protection of lives and property, wouldbe greatly weakened. Part of these property rights is the ability of duly-electedofficials to pursue policies that reflect the wishes of the electorate. If governmentsseek to correct any claimed injustice, then an aggrieved minority can inducesizeable redistributions of wealth to them by threatening terrorism unless suchinequities are redressed. Such extortion-based redistributions undermine propertyprotection. Once terrorists discover a causal link between alleged grievances andgovernment actions, there will be no stemming the growth of terrorism as atactic. Moreover, social discontent is a dynamic factor that is constantly chang-ing; efforts to rectify one social wrong do not eliminate new injustices tomorrow.In fact, tomorrow’s injustice may stem from addressing yesterday’s injustice.

a. Barriers and Fortifications

Given the absence of a simple panacea for transnational terrorism, potentialtargets have relied on technological barriers to thwart a particular type of attack.The installation of metal detectors to screen airline passengers is, perhaps, thebest instance of such barriers. These metal detectors were installed in US airportsbeginning 5 January, 1973. Shortly thereafter, these devices were placed in air-ports worldwide to monitor passengers and their carry-on luggage on domesticand international flights. Prior to January 1973, skyjackings worldwide averagedover 16 per quarter or 64 per year. Shortly after metal detectors were installed,there was an immediate and permanent drop of almost eleven skyjackings perquarter (Enders et al., 1990a). This is a rather dramatic impact that was long-lasting. A similar effectiveness was experienced following the fortification of USembassies and missions in October 1976: prior to the fortification, there wereabout eight attacks per quarter against US diplomatic targets; after the fortifica-tion, there were just over three attacks per quarter against US diplomatic targets(Enders et al., 1990b, Table 2).

But this is not the whole story. When one mode of attack is made moredifficult or expensive to conduct, terrorists have substituted other relatively cheaperevents. If, for example, skyjackings are more difficult due to metal detectors, thenother hostage-taking events are now relatively cheaper. Similarly, recent effortsto secure commercial airliners from terrorists’ attempts to use them as massivebombs will induce terrorists to look to the use of cargo planes to accomplish suchmissions. If the effectiveness of an anti-terrorism policy is to be analysed prop-erly, then its influence on other related modes of attack must be investigated.

Page 191: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

COLLECTIVE ACTION AND TRANSNATIONAL TERRORISM 795

© Blackwell Publishing Ltd 2003

When the impact of metal detectors is examined more closely, these detectorsare seen to decrease skyjackings and threats, but to increase other kinds ofhostage incidents and assassinations, not protected by the detectors. For example,Enders and Sandler (1993, Table 4) show that the installation of metal detectorsin 1973 is associated with 14 fewer skyjackings per quarter, and almost 12additional hostage incidents per quarter (not involving planes) and 7 more assas-sinations per quarter. Enhanced embassy security, while effective at reducingembassy attacks, had the unintended consequence of increasing assassinations ofdiplomatic and military personnel when they left secured compounds. This sub-stitution is toward events that are more costly to society than those being pro-tected. This outcome suggests that piecemeal policy, in which a single attackmode is considered when designing anti-terrorism action, is inadequate. Terroristsubstitution among attack modes must be anticipated. Policies that decreaseterrorist resources are particularly effective, because they should result in anacross-the-board decrease in attacks.

Even when barriers and fortifications work and do not cause more costlysubstitutions, the authorities must be ever-vigilant to outguess the next terroristinnovation. There is, thus, a dynamic concern with such barriers and fortification,which are static inhibitors that invite the terrorists to invent novel circumven-tions. Hence, plastic guns replaced metal ones and bottles of inflammable liquidsreplaced hand grenades, because these innovations can pass undetected throughmetal detectors. Not only have the authorities failed to second guess the terror-ists, but the authorities have been slow to respond to innovations. Media accountsof innovations allow terrorists to rapidly adopt the breakthroughs of others, mak-ing such innovations pure public goods.

b. What Kinds of Substitutions Are There?

Thus far, substitutions among attack modes have been stressed. Another typeof substitution is across countries. As discussed earlier, more secured bordersdeflect attacks elsewhere. Terrorist attacks aimed at foreign direct investmentinfluence the flow of capital and cause investors to transfer their capital to coun-tries, where terrorist risks are smaller (Enders and Sandler, 1996). Thus, sub-stitutions may characterise different agents associated with the terrorism problem.If, analogously, terrorist attacks put tourists at risk, then tourism may be negat-ively impacted (Enders et al., 1992), as in the case of the hijacking on TWAflight 847 on 14 June, 1985. This flight departed Athens enroute for Rome with145 passengers and 8 crew before it was first diverted to Beirut. This protractedhijacking was not resolved until 30 June 1985, with the release of the remaining39 hostages (Mickolus et al., 1989, vol. 2, pp. 221–5). Greek tourism sufferedgreatly as tourists chose alternative holiday venues, because this hijacking andothers exposed security weaknesses at the Athens airport.

Page 192: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

796 TODD SANDLER

© Blackwell Publishing Ltd 2003

An intertemporal substitution may involve terrorists’ timing of incidents. Forexample, a retaliatory raid by a targeted government may unleash a wave ofterrorist incidents against the retaliator(s) as terrorists move events planned forthe future into the present to protest the raid (Enders and Sandler, 1993). Laterterrorism may temporarily decline as terrorists replace expended resources. Con-sequently, the news media may mistakenly view the temporary lull as a positiveresult from the raid. These and other substitutions (for example, terrorists chang-ing their target of opportunity from business people to tourists, as the formeracquire bodyguards) highlight the interdependency of decisions of terrorists andauthorities. If the analysis or policy is too focused, then important consequencesand trade-offs will be missed.

c. Evaluation of Other Policies: Domestic Laws, International Conventions, and Retaliation

When dealing with domestic crime, nations have instituted laws with stiffpunishments in the hopes of deterring crime by making would-be criminalsweigh the consequences of their contemplated actions. If the society has thepolice force to bring criminals to justice and courts to impose harsh sentences,then offences may be reduced. Similar reasoning may persuade governments torely on domestic laws and international conventions to curb transnational terror-ism. Unfortunately, the anti-terrorism effectiveness of such laws and conventionsare very disappointing, as shown by past empirical investigations. For example,the so-called Reagan get-tough laws with terrorism (Public Law (PL) 98-473 andPL 98-553 signed by President Reagan in October 1984) were shown to haveno statistical effect whatsoever against US-directed terrorist acts (Enders et al.,1990a and 1990b).

PL 98-473 requires up to life imprisonment for individuals taking US hostageseither within or outside of the United States. This law also raised penalties fordestroying aircraft or placing a bomb aboard an aircraft. PL 98-553 authorisesthe US Attorney General to pay rewards for information leading to the apprehen-sion or conviction, inside or outside the United States, of terrorists who targetedUS interests (Pearl, 1987, p. 141; and Mickolus et al., 1989, vol. 2). These lawsfailed to deter terrorism for a number of reasons. First, because most terrorist actsagainst US people or property occur abroad, the United States must rely onforeign governments to extradite criminals, which for capital offences is highlyunlikely. Second, by staging their events abroad, terrorists greatly discount theability to be brought to justice. US successes in capturing terrorists abroad havebeen sufficiently few in number prior to 9/11 that there has been little influenceon terrorists’ anticipated probabilities of being brought to US justice. Third,fundamentalist terrorists, who are prepared to make the supreme sacrifice, areundeterred by policy-induced marginal changes in risks.

Page 193: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

COLLECTIVE ACTION AND TRANSNATIONAL TERRORISM 797

© Blackwell Publishing Ltd 2003

Over the years, nations have formed international conventions and resolutionsto thwart terrorist acts. Two early instances include the 1971 Montreal Conven-tion on the Suppression of Unlawful Acts against the Safety of Civil Aviation(Sabotage) and the 1977 UN General Assembly Resolution 3218 on the Safetyof International Civil Aviation.16 Although well-intended, neither of thesetreaties appeared to have much effect on aviation’s safety from terrorism. Othersignificant anti-terrorism treaties include the following: the UN Convention onthe Prevention and Punishment of Crimes against Internationally ProtectedPersons, Including Diplomatic Agents (adopted by the United Nations on14 December, 1973), the UN Security Council Resolution against Taking Hostages(adopted by a 15-0 vote on 18 December, 1985), the UN General AssemblyResolution 2551 on the Forcible Diversion of Civil Aircraft in Flight (adoptedon 12 December, 1969), the Hague Convention on the Suppression of UnlawfulSeizure of Aircraft (adopted on 16 December, 1970), and the UN GeneralAssembly Resolution 2645 on Aerial Hijacking (adopted on 25 November,1970). Conventions are more binding than resolutions, since resolutions aremerely agreements in principle and do not imply any real commitment on thepart of the adopters. Conventions, in contrast, require that the nations rely ontheir own judicial system to implement and enforce the agreement. But in neithercase is there a central enforcement agency that can force the nations to comply.Without such an enforcement mechanism, signatories will do what is convenientfrom their viewpoints – a Prisoners’ Dilemma is apt to underlie the pattern ofpayoffs, not unlike the pre-emption or deterrence games.

When the average number of attacks is examined both before and after theadoption of these conventions and resolutions, there is no statistically significantreduction in the post-treaty number of attacks for the relevant attack modes(crimes against protected persons or skyjackings) (Enders et al., 1990a). This isconvincing evidence that these UN conventions and resolutions really had noimpact. To acquire the requisite support from the world community, these anti-terrorism treaties were drafted so as to permit too many loopholes and too muchautonomy on the part of the signatories. A more effective treaty-making processinvolved neighbouring nations agreeing to control a common terrorism problemthat presented significant and localised effects. Thus, Spain and France havemade progress in concerted efforts to control Basque terrorism.

Prior to the US ‘war on terrorism,’ retaliatory raids had very little long-runimpact on terrorism. One study examines the impact that Israeli retaliatory raidshad following significant terrorist incidents (Brophy-Baermann and Conybeare,1994). Retaliations investigated included the raid on Palestine Liberation Organ-isation (PLO) bases in Syria following the Black September massacre of Israeliathletes during the 1972 Olympic Games; the attack on Palestinian guerrilla

16 See Alexander et al. (1979) for the text of the treaties on the suppression of terrorist acts.

Page 194: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

798 TODD SANDLER

© Blackwell Publishing Ltd 2003

bases in Lebanon following a March 1978 Haifa bus hijacking; and the bombingof Palestinian bases in Lebanon following a June 1982 assassination attemptagainst the Israeli ambassador in London. This study finds that such raids onlytemporarily suppressed terrorism: within three quarters, terrorism had returned toits old mean values. Another study shows that the US raid on Libya in 1986 hadthe unanticipated consequences of actually raising the level of terrorism in theimmediate aftermath as terrorists lashed out against the United States and theUnited Kingdom (Enders and Sandler, 1993). Within a matter of months, terror-ism was back to its old level.

The long-run effectiveness of the US-led retaliation against al-Qaida will notbe known for years to come. Nevertheless, some conclusions seem self-evident.Given the sustained level of attack against al-Qaida and the unprecedented (butstill modest) international cooperation, US-led actions to suppress internationalterrorism will be longer lived than in the past. The al-Qaida network has not onlylost significant assets (for example, training camps, safe and inaccessible havens,and key strategists), but it has also had linkages within the network disrupted.Grievances against America will surely worsen, because of US actions, so thatattacks have been returning as the network reconfigures itself. It is, however,anyone’s guess as to the future effectiveness of a reconfigured al-Qaida com-pared with its capabilities prior to 7 October, 2001.

d. No-negotiation Strategy

One of the four pillars of US anti-terrorism policy is never negotiate andcapitulate to hostage-taking terrorist demands. The logic behind this policy is thatif a nation adheres to this stated no-negotiation policy, then would-be hostagetakers would have little to gain. For the policy to work, the nation must preserveits reputation (Lapan and Sandler, 1988). Virtually every nation that confrontsterrorism has, at times, violated its pledge never to negotiate with hostage takers.The Reagan administration’s barter of arms for the release of Rev. BenjaminWeir, Rev. Lawrence Jenco and David Jacobsen during 1985–6 is a violation ofthis pledge that resulted in the ‘Irangate’ scandal (Mickolus et al., 1989, vol. 2).Even Israel, the staunchest supporter of the no-negotiation strategy, has madenotable exceptions in the case of the school children taken hostage at Maalot inMay 1974, and during the hijacking of TWA flight 847.17 The effectiveness ofthe conventional policy never to negotiate with terrorists hinges on a number ofcrucial implicit assumptions. First, the government’s pledge is completely cred-ible to would-be hostage takers. Second, there is no uncertainty concerning pay-offs. Third, the terrorists’ gains from hostage taking only derive from ransoms

17 These events are described in Mickolus (1980, pp. 453–4) and Mickolus et al. (1989, vol. 2,pp. 219–25).

Page 195: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

COLLECTIVE ACTION AND TRANSNATIONAL TERRORISM 799

© Blackwell Publishing Ltd 2003

received. Fourth, the government’s expenditures on deterrence are sufficient todeter all attacks. Each of these assumptions is tenuous in practice.

If the terrorist group realises a net gain from a negotiation failure, as it mayif it values media exposure or martyrdom, then the government’s proclamationsand its level of deterrence cannot necessarily forestall an attack, so that hostagesare abducted. Once hostages are taken, the government must weigh the expectedcosts of not capitulating against those of capitulating. Conceivably, the govern-ment may view the cost of not capitulating as too high for the right hostage, evenwhen accounting for lost reputation. In such situations, the government renegeson its pledge. If would-be hostage takers believe that they can impose costssufficient for a targeted government to renege on its stated policy, then they willabduct hostages, because the credibility of the government’s pledge depends onan uncertain outcome. Each time a government caves in, the terrorists will updateor raise their beliefs about future capitulations. That is, learning based on pastactions allows terrorists (and the governments) to update their beliefs in an inter-active fashion. When a government reneges and negotiates, it emboldens terror-ists to take additional hostages. In so doing, a capitulating government imposesa public bad on future domestic governments and on governments worldwide.Constitutional constraints or congressional hearings, which impose huge costs onthese officeholders who capitulate, may be only means of raising the cost ofcapitulation sufficiently to make a precommitment never to negotiate a policywithout regrets, once hostages are captured. Such actions would severely restrictdiscretionary action for the good of the world community.

8. WHAT ARE THE ECONOMIC COSTS OF TERRORISM?

Given the annual number of people murdered by international terrorism, theassociated security spending may appear excessive. President Bush’s proposedbudget for 2003 earmarks $37.7 billion to homeland security, which representsan $18.2 billion increase over 2002 (www.whitehouse.gov). This expendituredoes not include the tens of billions spent to bring down the Taliban in Afghan-istan and smash al-Qaida’s operations there. One must wonder how many of the40,000 lives lost each year on US highways would be saved if some of thismoney went to making US highways safer. If lives lost are the only considera-tion, then clearly margins have not been equated and more lives can be saved bya reallocation of spending. There is, however, the all-important political benefitfrom the security outlay that the government appears in control. When this secu-rity perception is achieved, there is the psychological benefit derived by a trau-matised public from feeling safer. This security benefit is difficult to evaluate,but is certainly very high. The perception of security is arguably more importantthan the reality for such a political benefit.

Page 196: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

800 TODD SANDLER

© Blackwell Publishing Ltd 2003

Homeland security is expensive, because terrorists force governments toprotect myriad targets, insofar as an attack can take place almost anywhere. High-profile targets – bridges, monuments, government buildings, and public places –receive the most security. Deterrence expenditure is an insurance payment thatmust be paid regardless of the outcome – that is, it is not refunded when noterrorist attack ensues. Unfortunately, the enhanced security may not be all thateffective despite great efforts, because the terrorists will merely look for a less-watched alternative target. If the attack is diverted to where both the symbolicvalue and lives lost are more limited, then there is a return on the deterrenceinvestment. Of course, the alternative of doing nothing would just mean that theterrorists would succeed with the most damaging attack as they did on 9/11.

After 9/11, the stock markets took a precipitous drop owing to the initialshock, associated uncertainty, and dire consequences to select industries. Manypeople viewed this tremendous loss in equity values as a new cost to terrorism.Prior to 9/11, the economic cost from terrorism was documented in two areas:reduced foreign direct investment for small countries and reduced tourism.18 Theattacks on 9/11 suggest that equity cost may be great. While there is no questionthat some industries (for example, the airline and travel industries) sufferedgreatly, the interesting thing about 9/11 is that the drop in equity prices wastemporary, with most stocks rebounding rather quickly in the ensuing months.A single act of terrorism, or even a sustained campaign, cannot really destroyconfidence in an intricate and diversified economy as that of the United States orthe global community. A massive attack can, however, temporarily shakeconfidence and cause stock prices to drop. An instructive exercise is to comparethe impact on stock values of corporate fraud, as characterised by Enron andWorld.com, with the impact on these values of 9/11. With corporate fraud, equityprices have remained depressed for months and months, because corporate fraudstrikes at the very confidence needed to hold equity shares.

9. CONCLUDING REMARKS

Modern-day transnational terrorism taxes the ingenuity of governments world-wide. Countries can limit their exposure at home by relying on barriers, fortifica-tion, and intelligence; but this protection comes at a great cost and will nevermake a society invulnerable. Given the pervasive transnational externalities asso-ciated with today’s terrorism, the real global challenge relates to the need forgreater international cooperation among governments that are loath to sacrificeautonomy. Cooperation is required in terms of deterrence, pre-emption, intelli-gence, and punishment of terrorists. Because these decisions are interdependent,

18 These losses are documented in Enders and Sandler (1996) and Enders et al. (1992), respectively.

Page 197: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

COLLECTIVE ACTION AND TRANSNATIONAL TERRORISM 801

© Blackwell Publishing Ltd 2003

partial or piecemeal cooperation may achieve little. Not all of the associatedexternalities are negative, so that governments may engage in too much of someterrorism-thwarting activities and too little of others. Consequently, global actionand inaction may be problematic at times. As long as governments place moreweight on their autonomy than on their effectiveness in confronting this commonexigency, terrorists will succeed in maximising their effectiveness while limitingthe effectiveness of the targeted governments. The entire dilemma has been madeworse, because terrorists have successfully addressed their collective action prob-lem through the formation of networks, while governments have not.

No matter the ultimate fate of al-Qaida, transnational terrorism will remain athreat. In the 1980s, the Abu Nidal Organisation was the most feared group, butnow it poses a much diminished threat, especially with the death of Abu Nidalin Iraq during 2002. Dangerous groups will come and go, but terrorism will stay.More worrying, terrorists will continue to innovate and devise ghastly plots thatwill some day exceed the horrors of 9/11. Over the years, the escalation of theterrorist spectacular in terms of carnage reflects the need of the terrorists toshock, in order to capture headlines that publicise their cause. In addition, terror-ists will continue to exploit technological innovations, such as the Internet, totheir advantage. But the authorities can also exploit these technologies to theterrorist disadvantage by, for example, tracking their messages and disruptingtheir websites. Globalisation, and the increase in cross-border flows that it entails,will not only make it more difficult to protect against terrorism, but it will alsocreate more vulnerable ‘choke’ points that terrorists can exploit to adversely affectinternational commerce.

REFERENCES

Alexander, Y. and D. Pluchinsky (1992), Europe’s Red Terrorists: The Fighting CommunistOrganizations (Frank Cass, London).

Alexander, Y., M. A. Browne and A. S. Nanes (1979), Control of Terrorism: International Docu-ments (Crane Russak: New York).

Arquilla, J. and D. Ronfeldt (2001), Networks and Netwars: The Future of Terror, Crime, andMilitancy (RAND: Santa Monica, CA).

Brophy-Baermann, B. and J. A. C. Conybeare (1994), ‘Retaliating against Terrorism: RationalExpectations and the Optimality of Rules versus Discretion’, American Journal of PoliticalScience, 38, 1, 196–210.

Enders, W. and T. Sandler (1993), ‘The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis’, American Political Science Review, 87, 4, 829–44.

Enders, W. and T. Sandler (1995), ‘Terrorism: Theory and Applications’, in K. Hartley andT. Sandler (eds.), Handbook of Defense Economics, Vol. I (North-Holland, Amsterdam),213–49.

Enders, W. and T. Sandler (1996), ‘Terrorism and Foreign Direct Investment in Spain and Greece’,KYKLOS, 49, 3, 331–52.

Enders, W. and T. Sandler (1999), ‘Transnational Terrorism in the Post-Cold War Era’, Inter-national Studies Quarterly, 43, 1, 145–61.

Page 198: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

802 TODD SANDLER

© Blackwell Publishing Ltd 2003

Enders, W. and T. Sandler (2000), ‘Is Transnational Terrorism Becoming More Threatening? ATime-Series Investigation’, Journal of Conflict Resolution, 44, 3, 307–32.

Enders, W. and T. Sandler (2003), ‘What Do We Know about the Substitution Effect in Trans-national Terrorism?’, in A. Silke and G. Ilardi (eds.), Researching Terrorism: Trends, Achieve-ments, Failures (Frank Cass, Ilford, UK, forthcoming).

Enders, W., T. Sandler and J. Cauley (1990a), ‘UN Conventions, Technology and Retaliation inthe Fight against Terrorism: An Econometric Evaluation,’ Terrorism and Political Violence, 2,1, 83–105.

Enders, W., T. Sandler and J. Cauley (1990b), ‘Assessing the Impact of Terrorist-ThwartingPolicies: An Intervention Time Series Approach’, Defence Economics, 2, 1, 1–18.

Enders, W., T. Sandler and G. F. Parise (1992), ‘An Econometric Analysis of the Impact ofTerrorism on Tourism’, KYKLOS, 45, 4, 531–54.

Hardin, R. (1995), One for All: The Logic of Group Conflict (Princeton University Press, Princeton,NJ).

Hoffman, B. (1997), ‘The Confluence of International and Domestic Trends in Terrorism’, Terror-ism and Political Violence, 9, 2, 1–15.

Hoffman, B. (1998), Inside Terrorism (Columbia University Press, New York).Hoffman, B. (2002), ‘Rethinking Terrorism and Counterterrorism Since 9/11’, Studies in Conflict

& Terrorism, 25, 5, 303–16.Im, E. I., J. Cauley and T. Sandler (1987), ‘Cycles and Substitutions in Terrorist Activities: A

Spectral Approach’, KYKLOS, 40, 2, 238–55.Krueger, A. B. and J. Maleckova (2002), ‘Education, Poverty, Political Violence and Terrorism:

Is There a Causal Connection?’, NBER Working Paper 9074 (National Bureau of EconomicResearch).

Lapan, H. E. and T. Sandler (1988), ‘To Bargain or Not to Bargain: That Is the Question’, Amer-ican Economic Review, 78, 2, 16–20.

Mickolus, E. F. (1980), Transnational Terrorism: A Chronology of Events 1968–1979 (GreenwoodPress, Westport, CT).

Mickolus, E. F., T. Sandler and J. M. Murdock (1989), International Terrorism in the 1980s: AChronology of Events, 2 vols. (Iowa State University Press, Ames, IA).

Oklahoma City National Memorial Institute for the Prevention of Terrorism (2002), websitehttp://db.mipt.org

Pearl, M. A. (1987), ‘Terrorism – Historical Perspective on US Congressional Action’, Terrorism,10, 2, 139–43.

Quillen, C. (2002a), ‘A Historical Analysis of Mass Casualty Bombers’, Studies in Conflict &Terrorism, 25, 2, 279–92.

Quillen, C. (2002b), ‘Mass Casualty Bombings Chronology’, Studies in Conflict & Terrorism, 25,5, 293–302.

Sandler, T. (1992), Collective Action: Theory and Applications (University of Michigan Press, AnnArbor, MI).

Sandler, T. and D. G. Arce (2003), ‘Pure Public Goods versus Commons: Benefit-Cost Duality’,Land Economics, 79, 3 (forthcoming).

Sandler, T. and H. E. Lapan (1988), ‘The Calculus of Dissent: An Analysis of Terrorists’ Choiceof Targets’, Synthese, 76, 2, 245–61.

Sandler, T. and K. Siqueira (2002), ‘Global Terrorism: Deterrence Versus Preemption Games’,Unpublished Manuscript (University of Southern California, Los Angeles, CA).

United States Department of State (various years), Patterns of Global Terrorism (Washington, DC,US Department of State).

Wilkinson, P. (1986), Terrorism and the Liberal State (rev. ed., Macmillan, London).Wilkinson, P. (2001), Terrorism Versus Democracy: The Liberal State Response (Frank Cass,

London).Wilkinson, P. (2002), ‘Editorial’, Terrorism and Political Violence, 13, 4, vii–x.Wintrobe, R. (2001), ‘Can Suicide Bombers Be Rational?’, Unpublished Manuscript (University of

Western Ontario, London, Ontario).

Page 199: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

TOO MUCH OF A GOOD THING? THE PROACTIVE RESPONSE DILEMMA

by

Peter Rosendorff and Todd Sandler School of International Relations University of Southern California

Von Kleinsmid Center 330 Los Angeles, CA 90089-0043

Office Phone: 213-740-9695 Office Fax: 213-742-0281 Home Fax: 323-256-7900

[email protected]

[email protected]

Final Revision: June 2004

AUTHORS’ NOTE: Rosendorff is the Director of the Center for International Studies and Associate Professor of International Relations and Economics. Sandler is the Robert R. and Katheryn A. Dockson Professor of International Relations and Economics. Both authors are also members of the Department of Economics. Both acknowledge research support from the Center for International Studies, University of Southern California. The authors have profited from comments provided by an anonymous referee, Barry O’Neill, Geoffrey Heal, and Bruce Russett on an earlier draft.

Page 200: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

TOO MUCH OF A GOOD THING? THE PROACTIVE RESPONSE DILEMMA

Abstract

This paper presents a two-player proactive response game: the targeted government first

chooses its measures to weaken the terrorists, and the terrorists then choose the type of event –

normal or spectacular – whose outcome is dependent on proactive responses and nature. Unlike

previous analyses, proactive policy has a downside by increasing grievances and, consequently,

terrorist recruitment. If the government responds too harshly, its actions can empower the

terrorists by providing a larger constituency. Aggressive antiterrorist actions, encouraged by a

high perceived loss from terrorism and low marginal proactive costs, may result in spectacular

events with dire consequences. If spectaculars are transferred abroad to soft targets, then

proactive operations may be excessive from a global viewpoint as external costs are ignored.

The analysis explains why some target nations engage in a modest level of offense, while a

prime target chooses a large level.

Keywords: proactive measures; terrorist recruitment; externalities; noncooperative games;

international cooperation; terrorist spectaculars.

Page 201: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

TOO MUCH OF A GOOD THING? THE PROACTIVE RESPONSE DILEMMA

Since 9/11, there is an enhanced interest in applying theoretical and statistical modeling

to examine terrorism (see, e.g., Azam forthcoming; Blomberg, Hess, and Weerapana 2004;

Bueno de Mesquita 2004; Heal and Kunreuther 2004; Li and Schaub 2004; Sandler and Enders

2004). Models are also being applied to investigate the effectiveness of alternative

counterterrorism policies (Arce and Sandler 2004; Enders and Sandler 1993, 1995; Sandler and

Arce 2003). Countermeasures to the threat of terrorism fall into two categories: defensive and

proactive measures. Defensive policies include hardening targets, installing technological

barriers, securing borders, deploying sky marshals, and issuing identity cards. Often such

actions deflect the intended attack to a softer target, thereby creating collateral damage. In

contrast, proactive actions involve direct strikes against a terrorist group or its assets, retaliation

against a state sponsor (e.g., a country providing a safe haven), gathering intelligence,

assassinating terrorists, or infiltrating a terrorist group. These proactive policies are intended to

weaken a terrorist group or compromise its security for the purpose of limiting and ultimately

ending the group’s operations.

Proactive tactics against a terrorist group – for example, the US-led attack in Afghanistan

against the Taliban and al-Qaida or Israel’s assassination of Hamas terrorists (Sheikh Ahmed

Yassin and Abdel Aziz Rantisi) in 2004 – are characterized in the literature as a pure public

good, because a weakened terrorist group poses less of a threat to all potential targets (Sandler

2003; Sandler and Siqueira 2003; Sandler, Tschirhart, and Cauley 1983). For international

terrorism, such benefits are received by all targeted countries and do not diminish when shared

by more at-risk countries. As a transnational pure public good, a proactive response is

anticipated to be undersupplied because the provider does not include the marginal benefits

conferred on other likely targets when deciding its provision level.

Page 202: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

2

At the international level, a proactive response is anticipated to be taken by the prime

target of terrorist attacks, insofar as this nation derives greater benefits from such actions (Arce

and Sandler 2004). Given that 40% of transnational terrorist attacks are against US people or

property,1 the United States has understandably provided the most proactive measures against the

al-Qaida network after 9/11. During fiscal year 2004, the United States allocated almost $53

billion to combating terrorism with defensive measures accounting for $23.9 billion (US General

Accounting Office 2004). Much of the rest went to proactive efforts of the Department of

Defense and other US departments and agencies.2

Proactive operations that bomb alleged terrorist assets, hold suspects without charging

them, assassinate suspected terrorists, curb civil freedoms, or impose retribution on alleged

sponsors may have a downside by creating more grievances in reaction to heavy-handed tactics

or unintended collateral damage. Such operations can lose government support and thereby

empower terrorists through more favorable world opinion and a larger constituency.

Consequently, proactive measures may promote recruitment to the terrorist network, thus

offsetting some of the favorable effects. At the transnational level, recruitment represents a

public bad that may impact countries differently depending on their relationship with the

proactive country. This recruitment depends not only on the terrorist success in an event, where

success encourages recruitment, but also on the nature of the event – i.e., a normal event with a

modest impact or a spectacular event with a high death toll or a symbolic nature. Spectaculars

grab headlines and remain in the public’s consciousness long after the event. The term

“spectaculars” is used officially and in the literature to describe influential terrorist attacks. Such

events further recruitment to the terrorist group.

The purpose of this paper is to analyze a government’s proactive decision when it may

not only harm the terrorist group by limiting its ability, but also help the group attract recruits

Page 203: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

3

and legitimacy. This tradeoff epitomizes the liberal democratic dilemma in responding to a

terrorist threat – a government that responds by too little appears unable to protect its citizens

and loses popular support, while a government that responds by too much appears tyrannical and

encourages opposition (Wilkinson 2001). Major proactive campaigns may actually promote

large-scale or newsworthy spectaculars if the recruitment consequence of repressive actions is

sufficiently strong; thus, too much reliance on offensive actions may result in a disastrous

outcome. Because such spectaculars can occur anywhere owing to the globalization of terrorism,

the collateral damage from excessive measures may take place half a world away from the nation

whose actions incited the grievance and recruitment. As such, proactive operations are best

understood as generating both public benefits and costs. A secondary, but related, purpose is to

contrast the US approach following 9/11 with that of the European Union (EU). The former tries

to eliminate the terrorist risk through a “war on terror,” while the latter manages the risk with

greater reliance on defensive actions.

BASIC GAME SET UP

The underlying game is played by two players: a target government (E) and a terrorist

group (T). In Figure 1, the game is displayed with the corresponding payoffs at the game’s four

possible outcomes. The target government moves first and chooses a proactive level, [ )1, ,θ ∈ ∞

followed by the terrorists who choose the type of attack – spectacular (s) or normal (n). Nature

then determines the outcome based in part on the proactive response. The cost of proactive

measures is ( )P θ , where the marginal cost is positive. For simplicity, ( )P θ is assumed to

equal , where 0.p pθ > Spectaculars are major newsworthy terrorist events with either a high

death toll or a watershed character (e.g., the 1972 Munich Olympic attack on the Israeli athletes),

Page 204: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

4

while normal events are all other terrorist incidents. Even though just six people died, the 1993

bombing of the World Trade Center was a spectacular event, because over 1000 people were

injured, it caused over $500 million in damages, it struck a major landmark, and its remains in

the news over a decade later. The downing of an airliner or an armed massacre at an

international airport (e.g., the armed attack at Vienna’s Schwechat and Rome’s Fiumicino

Airports on 27 December 1985) are also spectaculars with lasting impacts. Although

spectaculars yield a higher payoff to the terrorists than a normal event, spectaculars have a

smaller success probability, ( ) ,sπ θ than a normal event, whose success probability is ( ).nπ θ

In particular, we assume that 1nπ θ= and ( )1 ,s rπ θ= where 1r > so

.n sπ π> (1)

At the four endpoints in the game tree of Figure 1, the payoffs of the government and the

terrorists are displayed with the government’s payoffs listed above those of the terrorists. If a

spectacular is successful, then the government loses both S and the cost of its proactive response.

The cost of a proactive measure is analogous to an insurance premium, paid in all states of the

world; thus, ( )P θ is part of the government’s loss in all four outcomes. For successful

spectaculars, the terrorists gain S plus a recruitment benefit of ssc θ , positively dependent on the

proactive effort. The marginal recruitment benefit from a successful spectacular is ssc .

Although the terrorists gain what the government loses, the game is not zero-sum because of the

second term in the two payoffs. If, however, the spectacular fails, the government just loses its

proactive expense, while the terrorists lose L but may gain recruitment benefits of fsc θ with

0fsc ≥ and ss fsc c> , since success generates more recruits than failure. In the 5 September 1972

Munich Olympics attack, the Black September terrorists failed when the West German police

Page 205: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

5

opened fire in a rescue attempt at Fürstenfeldbruck airbase prior to the terrorists boarding a

Lufthansa Boeing 727 to take them and the hostages to Cairo. Despite Black September’s failure

to achieve any of its demands or to escape the scene, the Munich incident resulted in “thousands

of Palestinians” rushing to join the terrorist organization in the weeks that followed (Hoffman

1998, 71).

We now turn to the two sets of payoffs at the bottom right of the game tree,

corresponding to a normal event’s success and failure. For success, the government loses N and

its proactive costs, where S > N because a normal event has a smaller associated loss than a

spectacular event. The terrorists gain N plus a recruitment benefit of snc θ . The marginal

recruitment gain associated with a successful normal incident is less than that associated with a

successful spectacular – i.e., .sn ssc c< Obviously, our parameters are chosen to keep the analysis

simple while capturing the essential aspects of the underlying situation. The model is

sufficiently general to allow for ,sn fsc c! so that recruitment for failed spectaculars may exceed

or fall short of successful normal events. Finally, the payoffs for a failed normal event is ( )P θ−

and 0 for the government and terrorists, respectively. The 0 merely indicates that we have

normalized this payoff for simplification so the other payoffs to the terrorists are above this

value.

BASELINE MODEL: NO RECRUITMENT

To highlight the influence of recruitment on the analysis, we first present the case where

there is no recruitment, which comes the closest to the literature, except that we consider the

terrorists’ choice between spectaculars and normal events.3 Thus, we assume that

0ss sn fsc c c= = = in Figure 1. To solve for the subgame perfect equilibrium to the game, we

Page 206: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

6

apply backward induction by first solving for the terrorists’ choice of events and then

conditioning the government’s choice on that of the terrorists. This procedure identifies the

subgame perfect equilibrium to this two-player game. The terrorists choose between a

spectacular and a normal event according to:

( ) ( ); ; ,T TEU s EU nθ θ! (2)

where TEU is the terrorists’ expected utility, which equals

( )1 1.S L L N

rθ θ+ − ! (3)

This last inequality follows from the no-recruitment payoffs and the relevant success

probabilities. The terrorists engage in a spectacular if and only if

,S L rN

rLθ θ+ −= ≥! (4)

and execute a normal event otherwise, where θ! denotes the critical level of proactive response

that induces a spectacular. Since 1θ ≥ , a necessary condition for the terrorists to choose a

spectacular in the subgame perfect equilibrium is that ,S N r> which follows from equation

(4).4

If the gain, S, from a spectacular rises, then 1 0;S rLθ∂ ∂ = >! thus, θ! is more apt to

exceed ,θ thereby making spectaculars more likely. When either the terrorists’ losses from a

failed spectacular rises or the relative likelihood of a spectacular’s success falls (as r rises), θ!

falls in value and a spectacular is less likely.5 These comparative static results agree with

intuition.

To complete the search for a subgame perfect equilibrium, we now turn to the

government’s choice of proactive measures, conditioned on the terrorists’ choice of events. The

government chooses θ to

Page 207: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

7

( ) ( ) ( ) ( ) max 1s sS P Pθ θ π θ θ π θ θ≤ − − + − − !

( ) ( ) ( ) ( ) max 1 ,n nN P Pθ θ π θ θ π θ θ> − − + − − !

which can be rewritten as

( )max p S rθ θ θ θ≤ − − !

( )max .p Nθ θ θ θ> − − !

The Kuhn-Tucker conditions6 associated with the top problem in equation (6) results in a

subgame perfect equilibrium, in which the terrorists choose a spectacular and the government

chooses a proactive response where

.s

S S L rN

rp rLθ θ + −= ≤ =! (7)

The bottom portion of equation (6) involves a subgame perfect equilibrium where the terrorists

choose a normal event and the government chooses a proactive level,7

.n

N S L rN

p rLθ θ + −= > =! (8)

If, therefore, the government wants to limit spectaculars, then it must choose a sufficiently large

proactive response since s nθ θ> , which follows from .S N r>

This is readily displayed in Figure 2 where payoffs are measured on the y-axis and the

proactive level on the x-axis. The ( );TEU n θ curve is a rectangular hyperbola with asymptotes

at the two axes. When 1θ = , this expected value equals N [see the right-hand side of equation

(3)]. Similarly, the ( );TEU s θ curve is a rectangular hyperbola but with a horizontal asymptote

at −L . The critical value of θ! corresponds to the intersection of the terrorists’ expected utility

curves. In Figure 2, the subgame perfect equilibrium where the government chooses a proactive

level of N p and the terrorists engage in a normal event is displayed by the vertical line,

max

max (6)

(5)

Page 208: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

8

where ( );TEU n θ exceeds ( );TEU s θ . If, however, the government’s proactive level of

S rpθ = exceeds 1 but is less than or equal to ,θ! then ( );TEU s θ exceeds or equals

( );TEU n θ and proactive operations are insufficient to prevent spectaculars. Without

recruitment, we find that sufficient governmental offense eliminates spectaculars by weakening

the terrorists so they must engage in more modest operations. In the absence of empowerment

and recruitment, there cannot be too much of a good thing because proactive campaigns do not

incite greater terrorism. If the government just wants to eliminate spectaculars, then it equates θ

to θ! to save on proactive costs. The reason that this is not necessarily the subgame perfect

equilibrium is that the government also limits its expected losses through its proactive response;

hence, its optimal choice of θ may lie well to the right of θ! as proactive costs are traded off

against reduced losses from fewer attacks. The likelihood of spectaculars are low when θ lies

near to .θ!

PROACTIVE CHOICES WITH RECRUITMENT

Now we return to the game tree and allow the terrorists’ payoffs at three of the outcomes

to include marginal recruitment benefits ( )0, 0, and 0ss fs snc c c> > > from a spectacular

success, a spectacular failure, and a normal success. A spectacular success leads to the greatest

recruitment, while the productivity for recruitment in the other two cases depends on the relative

values of fsc and snc . For all three cases, the heavy-handedness of the government, as measured

by the size of ,θ induces recruitment so proactive measures now have a downside.

Once again, we use backward induction to find the subgame perfect equilibrium for this

game. Terrorists now choose a spectacular when

Page 209: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

9

( ) ( )1 1,ss fs fs snS L c c L c N c

rθ θ θ θ

θ θ+ + − − + ≥ + (9)

because ( ) ( ); ; ,T TEU s EU nθ θ≥ and engage in a normal event otherwise. Equation (9) can be

rewritten as:

( ) ( ) ( )2 ,fs ss fs snrc c c rL S L r N cθ θ θ+ − − + + ≥ + (10)

which gives two critical values θ and θ where equation (10) is satisfied as an equality. In

Figure 3, the parabola with a y-intercept at S + L and a minimum at ( ) 2fs ss fsc rL c rc+ −

corresponds to the left-hand relationship in equation (10), while the solid straight upward-sloping

line with y-intercept at rN corresponds to the right-hand relationship in equation (10). The lower

( )θ and upper ( )θ bounds of θ distinguish the type of event chosen by the terrorists. For

modest proactive levels of ( ), ,θ θ θ∈ the terrorists choose a normal event, while for θ θ≤ or

,θ θ≥ the terrorists engage in spectaculars. To the left of θ , the terrorists execute spectaculars

because proactive operations are too small to weaken them. Proactive measures are, however,

sufficiently large to the right of θ to recruit members and give the terrorists enough resources to

accomplish spectaculars.

In light of the anticipated choices of the terrorists, the target government must choose a

proactive response to

( ) ( ) ( ) ( ) ,max 1s sS P Pθ θ θ θ π θ θ π θ θ≤ ≥ − − + − −

( ) ( ) ( ) ( ) ( ) ,max 1 .n nN P Pθ θ θ π θ θ π θ θ∈ − − + − −

Recruitment has not altered the government objective from that of equation (6), but it has altered

the regions that determine the type of event. The subgame perfect equilibria to the game with

recruitment can be completely specified for all values of the exogenous parameters as follows:

(11)

max

Page 210: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

10

If ( )θθθ ,∈n , then nθθ = and the terrorists choose a normal event; if ( )θθθ ,∉n and θθ ≤s or

θθ ≥s , then sθθ = and the terrorists choose a spectacular; and if ( )θθθ ,∈s and θθ <n , then

θθ = and the terrorists are indifferent between a normal and a spectacular.

One subgame perfect equilibrium has the government choosing N pθ = between θ

and θ and the terrorists responding with a normal event. When the marginal costs, p, of

proactive measures are low, a rational government may choose a proactive level above ,θ

hoping to make the likelihood of a successful spectacular small. Unfortunately, rational

terrorists would choose a spectacular event owing to anticipated recruitment benefits. For

S rpθ = between 1 and θ , the terrorists again engage in spectaculars, because they have a

relatively high success probability. The government must anticipate the terrorists’ derived

payoffs especially from recruitment in order not to respond to such a degree that the terrorists are

pushed to execute spectaculars with potentially disastrous outcomes. In terms of a proactive

campaign, there can be too much of a good thing when it creates grievances and swells terrorists’

ranks. There can also be too little proactive measures when recruitment is not significant so that

the pure publicness of such actions is the main consideration. Hence, governments must choose

an offensive that is neither excessive nor insufficient if spectaculars are to be avoided.

SOME COMPARATIVE STATICS

Suppose that the relative difficulty of spectaculars increases so nπ exceeds sπ by a larger

amount. This is captured by an increase in r, which has two effects in Figure 3. First, it shifts up

the straight line by increasing its intercepts while making it steeper – see dashed line

( )snr N c θ+! where r r>! . By itself, this change widens the range of normal events as seen in the

Page 211: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

11

diagram by the θ range where the dashed line lies above the parabola. Second, the change in r

influences the parabola as follows:

( ) ( )2

2 .fs ss fs

fs

rc c c rL S Lc L

r

θ θθ θ

∂ + − − + + = −∂

(12)

If the net payoff to the terrorists from a failed spectacular is negative (i.e., fsL c θ> ), then the

parabola shifts down (not shown) and this reinforces the increase in the range of normal events

as r increases. When, instead, recruitment benefits are sufficiently large with failure, the

parabola shifts up (not shown) and the net effect on the range of normal events depends on

whether the shift up of the straight line exceeds that of the parabola. We again see that

recruitment influences can go against conventional wisdom, because enhanced riskiness of

spectaculars may not necessarily curtail spectaculars. The 1972 Munich Olympics attack

sparked other attempted spectaculars, despite the improvement in commando forces – e.g., the

German Grenzschutzgruppe Neun (GSG-9) – that raised r.8

Next consider an increase in fsc or the marginal recruitment effect during a failed

spectacular. Taking a partial derivative of the parabola with respect to fsc gives 2 0,rθ θ− >

since 1rθ > . Thus, an increase in this recruitment benefit reduces the range of normal events,

thereby augmenting the range of spectaculars. If fsc is sufficiently raised, the parabola then lies

everywhere above the straight line and only spectaculars result. In a real sense, martyrdom is a

means of raising fsc by promoting a belief that even death in attacks (successful or otherwise)

has sufficient reward for the cause by attracting other zealots to engage in large-scale events with

deadly consequences. Pape (2003) indicates that suicide missions kill on average 13 people,

while a nonsuicide mission kill on average less than 1 person.

An increase in the marginal recruitment effect, ssc , of successful spectaculars shifts up

Page 212: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

12

the parabola by θ and, in so doing, decreases the range of normal events. In contrast, an

enhanced marginal recruitment effect, snc , of successful normal events steepens the ( )snr N c θ+

straight line without altering its vertical intercept. The comparative static change equals 0,rθ >

so that the range of normal events widens. Obviously, these two marginal recruitment influences

have opposing predictions on the range of normal events. If both ssc and snc increase by the

same amount, the latter influence dominates since rθ θ> so that normal events become more

prevalent. This outcome arises from the lower success probability associated with spectaculars.

An increase in S – the payoff from spectaculars in the absence of recruitment gains –

raises the vertical intercept of the parabola and augments the range of spectaculars. This agrees

with the earlier result regarding S when there is no recruitment; thus, the spectacular region

expands with gains to a spectacular’s success, regardless of recruitment.

The final comparative static change concerns an increase in L or the terrorists’ loss from

failed spectaculars. Taking a partial derivative of the parabola with respect to L, we get:

( ) ( )2

1 0,fs ss fsrc c c rL S L

rL

θ θθ

∂ + − − + + = − + <∂

(13)

since 1.rθ > In Figure 3, an increase in L augments the vertical intercept of the parabola, but

shifts the parabola down and to the right so the normal range expands.

FURTHER IMPLICATIONS

Target countries have different abilities to counter terrorism, which affect their marginal

proactive costs (p). To put things in perspective, we assume that one country – say, the United

States (US) – has a lower p than another target – say, the EU – but are identical in terms of other

parameters. This cost difference may stem from the US having better technology or intelligence

Page 213: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

13

to counter terrorism. Ceteris paribus, a low p encourages a larger proactive response. This

scenario is depicted in Figure 4 for the parabola and straight line whose intersection delineates

normal events for ( ),θ θ θ∈ from spectaculars outside these bounds. In Figure 4, the small p for

the US encourages sufficient proactive measures to trigger a spectacular owing to terrorist-

perceived recruitment gains. In contrast, the EU’s high p limits its proactive operations and

results in a normal event.

If the United States places a high value on terrorism-related losses (S) from a spectacular,

or the terrorists value comparable US losses over those from other countries, then this also raises

the level of US proactive measures by raising S, thus increasing the likelihood of spectaculars

against US interests. Targets such as the World Trade Center (WTC) had a high S value owing

to the potential loss of life, its symbol of US dominance in globalization, and its potential

financial consequences. Given the failed attempt in 1993 to bring down the north tower of the

WTC, the S value was particularly high.

In fact, the scenario depicted in Figure 4 appears to capture US and EU reactions

following 9/11. Because US losses from 9/11 far exceeded those of any other country, the Bush

administration and the American public clearly put very high values on future losses –

understandably, S increased in relation to that of countries less harmed by 9/11. This

characterization of US perceptions is consistent with survey findings reported by Davis and

Silver (2004) in which Americans felt sufficiently threatened after 9/11 to sacrifice some civil

liberties for greater security. US superiority in military power and intelligence compared with

other target countries also made for a relatively low p. Past and current US efforts to secure its

borders and guard against terrorist attacks lowered p relative to other countries, which increased

US proactive response and promoted further spectaculars – e.g., the attempted shoe bombing by

Page 214: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

14

Richard Reid of American Airlines flight 63 on 22 December 2001, en route to Miami from

Paris.9 A sizable portion of proactive spending gets included in a country’s military budget.

Unlike most European countries, the US defense budget grew greatly following 9/11. A recent

study of the composition of terrorist events indicates that the proportion of deadly bombings has

increased greatly since 9/11 and the subsequent US-led war on terror (Enders and Sandler 2004).

This suggests that a greater reliance on proactive operations may be encouraging deadlier

attacks.

There is an interesting transnational externality associated with our analysis. Insofar as

terrorists stage their attacks where targets are softer, US proactive measures are apt to result in

spectaculars against US interests being staged abroad where defensive measures are inferior to

post-9/11 measures in the United States. Thus, the US war on terror has implications for

countries not part of this effort, because greatly elevated US proactive measures can deflect

spectaculars to these countries. Examples include the simultaneous bombings of two Bali

nightclubs killing foreigners including Americans on 12 October 2002, and the simultaneous

truck bombings of a residential complex in Riyadh, Saudi Arabia, housing foreigners including

Americans on 12 May 2003. Typically, proactive measures are viewed as being undersupplied

owing to their purely public good representation (see, e.g., Sandler and Siqueira 2003), where

only external benefits are derived by other countries. The analysis here indicates that such

actions can also create external costs as spectaculars are encouraged and shifted abroad. If

proactive policy implies both external benefits and external costs, then its supply can be too

little, excessive, or just right. When external benefits dominate, a proactive response is

undersupplied; when, however, external costs dominate, a proactive response is oversupplied. In

the unlikely event that external benefits exactly match external costs, proactive policy is optimal

despite the provider acting independently.

Page 215: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

15

There is one consideration that may curtail excessive proactive measures by a nation with

a low p and high S. Even though the attacks may be shifted abroad, the terrorists still target

some of the offensive country’s assets. If the latter incorporates these costs on its interest abroad

in its calculus, then it will curtail its proactive response somewhat. Any internalization of these

external costs will, however, be incomplete, because the host country’s losses are unlikely to

influence the proactive country’s decision. For example, on 20 November 2003, two massive

suicide truck bombs exploded at the British Consulate and the British HSBC bank headquarters

in Istanbul, Turkey. Although the bombs were against British interest, all but three of the 30 or

so dead were Turkish Muslims.10 As attacks are transferred abroad, host countries sustain

collateral damage, ignored by the proactive country when deciding its counterterrorism policy.

CONCLUDING REMARKS

If proactive measures are cheap or if the perceived costs of future attacks are high, the

subgame perfect equilibrium may involve a targeted government engaging in relatively large

amounts of proactive operations that induce terrorists to resort to occasional spectaculars to tap

into recruitment benefits. Unquestionably, the experience of 9/11 raised S for the United States,

whose marginal proactive costs are relatively low compared with other countries. Since 9/11, the

relatively large US proactive campaign is consistent with the model presented and may be

excessive from a global standpoint as transference externalities imposed on other countries are

not taken into account when the United States decides its proactive options. As a consequence,

there may indeed be too much proactive operations with unintended fall-out.

Although this paper has focused on a two-player game between the terrorists and a

targeted state, an n-player game underlies proactive decisions where players consist of the 1n−

possible target nations and the terrorist network. In choosing their proactive measures, the

Page 216: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

16

targeted states fail to adjust for the externalities that they impose on one another, which then

allows the terrorists to exploit vulnerabilities from states’ uncoordinated actions. If resources are

to be allocated efficiently to counterterrorism, nations must act in unison. The international

community is far from accepting this basic insight.

Page 217: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

17

Footnotes

1. This percentage is computed from Sandler (2003, Table 1), whose data comes from the

Department of State.

2. Spending on terrorist-related intelligence is not available.

3. This analysis differs from Sandler and Arce (2003), which only allowed for a discrete

choice of preemption but permitted a three-player interaction involving two targeted

governments and a terrorist group.

4. By equation (4), we have 1S L rN

rL

+ − ≥ or ,S L

rN L

+≤+

from which S N r> follows

because S S L

N N L

+>+

when S N> and 0L > as assumed.

5. These comparative static results depend on:

2

0rN S

L rL

θ∂ −= <∂

! and

( )( )2 0.

L S L

r rL

θ − +∂ = <∂

!

The first inequality follows from .S N r>

6. The Lagrangian is ( ) ,S

pr

θ λ θ θθ

− − + −

!

where λ is a nonnegative Lagrangian multiplier. The first-order Kuhn-Tucker conditions

satisfy:

( )2 0p S rθ λ− + − = and 0,θ >

and

( ) 0θ θ− ≥! and 0.λ ≥

7. The Lagrangian is ( )Npθ λ θ θ

θ − − + −

! and the relevant Kuhn-Tucker conditions

Page 218: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

18

give equation (8) since 0λ = and 0.θ >

8. The GSG-9 pulled off a daring rescue mission of hijacked Lufthansa flight 181, while

it was on the ground in Mogadishu, Somalia, on 18 October 1977. The rescue mission freed the

hostages with just minor injures to four hostages (Mickolus 1980, 734-40). Stun grenades were

used to gain a jump on the terrorists. Clearly, r had risen after Munich.

9. In Figure 4, a reduced p shifts S rpθ = to the right.

10. The blast at the Consulate killed the UK Consul General Roger Short, 58.

Page 219: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

19

REFERENCES

Arce M., Daniel G., and Todd Sandler. 2004. Counterterrorism: A game-theoretic approach.

Unpublished manuscript, School of International Relations, University of Southern

California.

Azam, Jean-Paul. Forthcoming. Suicide bombing as intergenerational investment. Public

Choice.

Bueno de Mesquita, Ethan. 2004. Conciliation, commitment, and counter-terrorism: A formal

model. International Organization 58( ), forthcoming.

Blomberg, S. Brock, Gregory D. Hess, and Akila Weerapana. 2004. Economic conditions and

terrorism. European Journal of Political Economy 20 (2):463-78.

Davis, Darren W., and Brian D. Silver. 2004. Civil liberties vs. security: Public opinion in the

context of the terrorist attacks on America. American Journal of Political Science 48

(1):38-46.

Enders, Walter, and Todd Sandler. 1993. Effectiveness of anti-terrorism policies: Vector-

autoregression-intervention analysis. American Political Science Review 87 (4):829-44.

______. 1995. Terrorism: Theory and applications. In Handbook of defense economics,

Vol 1, edited by Keith Hartley and Todd Sandler, 213-49. Amsterdam: North-Holland.

______. 2004. After 9/11: Is it all different now? Unpublished manuscript, School of

International Relations, University of Southern California, Los Angeles, CA.

Heal, Geoffrey, and Howard Kunreuther. 2004. IDS models of airline security. Unpublished

manuscript, Graduate School of Business, Columbia University, New York, NY.

Hoffman, Bruce. 1998. Inside terrorism. New York: Columbia University Press.

Li, Quan, and Drew Schaub. 2004. Economic globalization and transnational terrorism.

Journal of Conflict Resolution 48 (2):230-58.

Page 220: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

20

Mickolus, Edward F. 1980. Transnational terrorism: A chronology of events, 1968-1979.

Westport, CT: Greenwood Press.

Pape, Robert A. 2003. The strategic logic of suicide terrorism. American Political Science

Review 97 (3):343-61.

Sandler, Todd. 2003. Collective action and transnational terrorism. World Economy 26 (6):779-

802.

Sandler, Todd, and Daniel G. Arce M. 2003. Terrorism and game theory. Simulations &

Gaming 34 (3):319-37.

Sandler, Todd, and Walter Enders. 2004. An economic perspective on transnational terrorism.

European Journal of Political Economy 20 (2):301-16.

Sandler, Todd, and Kevin Siqueira. 2003. Global terrorism: Deterrence versus preemption.

Unpublished manuscript, School of International Relations, University of Southern

California, Los Angeles, CA.

Sandler, Todd, John Tschirhart, and Jon Cauley. 1983. A theoretical analysis of transnational

terrorism. American Political Science Review 77 (1):36-54.

United States General Accounting Office. 2004. Combating terrorism: Evaluation of selected

characteristics in national strategies related to terrorism. GAO-04-408T. Washington,

DC: US General Accounting Office.

Wilkinson, Paul. 2001. Terrorism versus democracy: The liberal state response. London:

Frank Cass.

Page 221: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Page 222: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Page 223: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

! !

""

Page 224: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Page 225: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

AFTER 9/11: IS IT ALL DIFFERENT NOW?

by

Walter Enders Department of Economics, Finance, and Legal Studies

University of Alabama Tuscaloosa, AL 35487 [email protected]

205-348-8972 205-348-0590 (fax)

and

Todd Sandler

School of International Relations University of Southern California

Von Kleinsmid Center 330 Los Angeles, CA 90089-0043

[email protected] 213-740-9695

213-742-0281 (fax)

Final Revision: September 2004

Keywords: after 9/11; terrorism; time series; intervention analysis; war on terror; forecasts; Bai-Perron test. Contact author: Todd Sandler AUTHORS’ NOTE: Walter Enders is the Bidgood Chair of Economics and Finance at the University of Alabama. Todd Sandler is the Robert R. and Katheryn A. Dockson Professor of International Relations and Economics at the University of Southern California. Sandler acknowledges research support from the Center for International Studies, University of Southern California. The replication data set is available at http://www.yale.edu/unsy/jcr/jcrdata.htm. We have profited from comments of anonymous referees.

Page 226: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

AFTER 9/11: IS IT ALL DIFFERENT NOW?

Abstract Using time-series procedures, we investigate whether transnational terrorism changed following

9/11 and the subsequent US-led “war on terror.” Perhaps surprising, little has changed in the

time series of overall incidents and most of its component series. When 9/11 is prejudged as a

break date, we find that logistically complex hostage-taking events have fallen as a proportion of

all events, while logistically simple, but deadly, bombings have increased as a proportion of

deadly incidents. These results hold when we apply the Bai-Perron procedure where structural

breaks are data identified. This procedure locates earlier breaks in the mid-1970s and 1990s.

Reasonable out-of-sample forecasts are possible if structural breaks are incorporated fairly

rapidly into the model.

Page 227: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

AFTER 9/11: IS IT ALL DIFFERENT NOW?

Thousands of dangerous killers, schooled in the methods of murder, often supported by outlaw regimes, are now spread throughout the world like ticking time bombs, set to go off without warning… In a single instant, we realized that this will be a decisive decade…(Bush 2002).

President Bush’s “State of the Union” remarks strongly suggest that everything changed

on 11 September 2001 (henceforth, 9/11) with the world now confronting a far-flung network of

terrorists, bent on heinous attacks. While there is no question that perceptions changed and

deep-seated fears arose that fateful day, there has been no data-based analysis on how

transnational terrorism (i.e., terrorism with international implications or genesis) differs, if at all,

since 9/11. The perception on the street and the reporting in the news media is that terrorism is

now different. But is transnational terrorism really different after 9/11 and, if so, how is it

different?

The four simultaneous hijackings on 9/11 represent watershed terrorist events in a

number of ways. First, the carnage associated with 9/11 was unprecedented: the number of

people killed was as great as all deaths from transnational terrorism for 1988-2000 (Sandler

2003). Prior to 9/11, no terrorist incident, domestic or transnational, resulted in more than 500

casualties (Quillen 2002a, 2002b; Hoffman 2002). Second, 9/11 demonstrated that terrorists did

not require a weapon of mass destruction (WMD) to cause mass casualties and over $90 billion

in losses. Third, 9/11 underscored the brutality that some fundamentalist terrorists will

undertake. Terrorist experts had warned prior to 9/11 that religious-based terrorists viewed

nonbelievers as legitimate targets and sought maximum carnage (Hoffman 1997). Fourth, 9/11

created a greater vigilance on the part of industrial countries that have greatly augmented their

expenditure on homeland security. Since 2002, the budget supporting the activities of the US

Department of Homeland Security (DHS) grew by over 60% to $36.2 billion for fiscal year 2004

Page 228: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

2

(DHS 2003). An even greater expenditure goes to fighting the “war on terror” beginning with

the invasion of the Taliban and al-Qaida in Afghanistan on 7 October 2001. Other spending

involves augmenting intelligence capabilities and underwriting efforts to enhance international

cooperation, including the freezing of terrorist assets.

Using linear time-series methods on quarterly data of transnational terrorist incidents

from 1970 through the second quarter of 2003 (i.e., 2003:2), this paper shows how transnational

terrorism has changed following 9/11 and the subsequent war on terror. In particular, we apply

formal tests for structural breaks in a number of time series including incidents involving

casualties, hostages, and bombings as well as proportion series made from these basic series. We

first look for structural breaks at 9/11 and then apply the Bai and Perron (1998, 2003) procedure

to identify breaks at unknown dates based on the data. When compared, the alternative methods

provide consistent evaluations of the impact of 9/11 on the pattern of transnational terrorism.

We use the identified break to obtain one-step-ahead and multi-step-ahead forecasts.

The analysis demonstrates that the basic time series – e.g., the all-incident series,

bombings, and incidents with casualties – displayed no changes after 9/11. Incidents remained at

their low pre-9/11 levels. What changed was the composition of events with terrorists relying on

deadly bombings to a greater extent than ever before and engaging in a very low proportion of

complex hostage-taking missions.

BACKGROUND

Terrorism is the premeditated use or threat of use of violence by individuals or

subnational groups to obtain a political or social objective through intimidation of a large

audience beyond that of the immediate victims. Although definitions of terrorism have varied,

violence and political motives are always key ingredients.1 By making attacks appear to be

Page 229: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

3

random, terrorists intimidate a larger audience and enhance its anxiety. The targeted society

must then expend large outlays to protect a wide range of vulnerabilities. Terrorists rely on

numerous modes of attack that include hostage taking, bombings, suicide attacks, assassinations,

armed attacks, and threats. Terrorism can be divided into two categories: domestic and

transnational. Domestic terrorism begins and ends in the host country: the perpetrators and

targets are homegrown. Moreover, domestic incidents have ramifications for only the host

country. When, however, a terrorist incident in one country involves victims, targets,

institutions, or citizens of another country, terrorism assumes a transnational character. The

hijackings on 9/11 are transnational terrorist events for a number of reasons: the incidents were

planned abroad; the terrorists came from outside of the United States; support came from abroad;

victims were from over 80 countries; and the incidents had economic and security implications

worldwide. The near-simultaneous bombings of the US embassies in Nairobi, Kenya, and Dar es

Salaam, Tanzania, on 7 August 1998 as well as the two suicide car bombings aimed at British

targets in Istanbul on 20 November 2003 are transnational terrorist incidents.

We are interested in examining transnational terrorism before and after 9/11, because this

form of terrorism poses the greatest threat to developed countries. Since the late 1980s, most

industrial countries have relatively little domestic terrorism (Hoffman 1998; Wilkinson 2001).

The al-Qaida network with its affiliate terrorist groups in some 60 nations engages in

transnational terrorism. Changes in visa procedures, airport security, target fortification, and

other counterterrorism measures indicate that transnational terrorism represents the greater

concern to the authorities. By augmenting international flows of all kinds, globalization has

given potential terrorists greater cover and ability to cause larger economic repercussions from

their attacks. Because 9/11 was a transnational event, the impact of 9/11, if any, is anticipated to

be on transnational terrorism.

Page 230: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

4

Once economists turned their attention to analyzing terrorism, they have emphasized that

terrorists are rational actors who maximize some goal subject to resource constraints (Landes

1978; Sandler, Tschirhart, and Cauley 1983). These constraints are influenced by governments’

counterterrorism policies that can change the expected price associated with different terrorists’

actions. Terrorists have been shown to respond rapidly to changes in relative risks stemming

from government actions: terrorists switched intended targets away from recently fortified

venues to relatively softer targets (Enders and Sandler 1993; Sandler and Enders 2004). Thus,

efforts following 9/11 to curb hijackings and attacks on embassies through increased security and

better intelligence should induce terrorists to use other modes of attack so that hostage-taking

events (e.g., skyjackings, and barricade and hostage-taking missions) should decrease both in

number and as a proportion of total terrorist events following post-9/11 measures.

Another important factor in anticipating a potential change in the pattern of transnational

terrorism involves the changing motives of terrorists since the November 1979 takeover of the

US embassy in Tehran and the Soviet invasion of Afghanistan in the same time period (Hoffman

1998). From the late 1960s until the latter 1980s, transnational terrorism has been primarily

motivated by nationalism, separatism, Marxist ideology, and nihilism (Wilkinson 2001). These

terrorists were interested in maintaining a constituency and, hence, tried to limit casualties. By

the 1990s, a driving force of transnational terrorism was religious-based fundamentalist groups

that are less constrained by social norms and view violence against all nonbelievers including

women and children as a sacramental duty (White 2003). The affiliates of the al-Qaida network

abide by this desire to cause casualties. Since the start of 1980, religious-based groups grew

from 2 of 64 active terrorist groups to about half of 58 active groups in 1995 (Hoffman 1997, 3).

Enders and Sandler (2000) demonstrated that events with casualties rose from 1979:4 onwards as

fundamentalist-based terrorism grew.

Page 231: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

5

Another crucial consideration in understanding the potential pattern of transnational

terrorism following 9/11 involves the US-led war on terror, which has targeted al-Qaida and its

allied groups. Recent reports estimated that about two-thirds of al-Qaida leaders have been

either killed or captured; such attrition would severely limit the amount of command and control

that al-Qaida’s highest echelon can exercise over its far-flung cells (Gerges and Isham 2003).

These same reports indicated that al-Qaida has had 3,400 suspects arrested worldwide since 9/11

and has lost many operatives during the Afghanistan War in 2001. Additionally, significant

financial assets ($135 million since 9/11) of the network have been frozen (The Economist

2003), which also compromises al-Qaida’s capabilities. These manpower, leadership, and

financial losses are anticipated to limit the network’s ability to engage in logistically complex

modes of attacks such as hostage taking. As a consequence, the al-Qaida network will turn to

logistically simple, but deadly, bombings. Such bombings can also be more attractive than

assassinations, which can be logistically complex and yield just a single victim. Given events

following 9/11 and the preferences of many of today’s terrorist groups for carnage, we anticipate

fewer hostage-taking events and assassinations and a greater reliance on deadly bombings. Such

expected changes in the composition of the overall series of transnational terrorism would be

more evident by analyzing the proportion of hostage-taking attacks or the proportion of deadly

attacks due to bombings.

Other structural breaks are anticipated prior to 9/11. The modern era of transnational

terrorism began in 1968 following the Arab-Israeli conflict and Israel’s subsequent occupation of

captured territory. In frustration, the Palestinians resorted to international terrorism to publicize

their cause to the global community and gain recognition by the Israelis (Hoffman 1998). The

level of transnational terrorism hit a new plateau in the early to mid-1970s as Palestinian

frustration achieved new heights and their terrorist methods were copied by non-Palestinian

Page 232: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

6

groups. For example, left-wing nihilist groups sprung up throughout Western Europe (Alexander

and Pluchinsky 1992) and ethno-nationalist movements worldwide employed transnational

terrorism to further their cause.

Another potential structural break is anticipated in the early 1990s following the end of

the Cold War when many of the left-wing terrorist groups in Europe (e.g., in France, Germany,

Spain, Portugal, and the United Kingdom) either ended their operations or were brought to

justice (Alexander and Pluchinsky 1992; Chalk 1996). This terrorism decline was also due to a

reduced interest in Marxism following the collapse of so many communist regimes. At the same

time, there was less state sponsorship of leftist terrorists by East Europeans and Middle Eastern

countries (Chalk 1996; Clutterbuck 1994). These factors in combination should lead to structural

downturns in terrorism in the early 1990s following the Gulf War, which generated some

terrorist backlash. Although terrorism is expected to decrease in the early 1990s, this time frame

also marked the rising influence of fundamentalist terrorism, so that a greater degree of

casualties is expected to characterize the anticipated reduced level of terrorism.

DATA

Data on transnational terrorist incidents were drawn from International Terrorism:

Attributes of Terrorist Events (ITERATE), a data set that records the incident date, location, type

(e.g., bombing or hostage event), number of people killed, and number of people wounded.

ITERATE relies on the world’s news print and electronic media for its information with a large

reliance on the Foreign Broadcast Information Service (FBIS) Daily Reports, which surveyed a

couple hundred of the world’s newspapers and related sources. By splicing together earlier

ITERATE data sets, ITERATE 5’s “common” file contains 40 or so key variables common to all

transnational terrorist incidents from 1968:1 to 2003:2 (Mickolus et al. 2004). Coding

Page 233: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

7

consistency for ITERATE events data was achieved by applying identical criteria and

maintaining continuity among coders through the use of overlapping coders and monitors.

ITERATE excludes terrorist incidents associated with declared wars or major military

interventions and guerrilla attacks on military targets of an occupying force. Even though

ITERATE records events on a daily basis, we used quarterly, rather than monthly or weekly, data

to avoid periods with zero or near-zero observations which would violate the underlying

normality assumptions of the time-series techniques applied.

We extracted eight primary time series to do our structural analysis. The ALL series

includes quarterly totals of all types of transnational terrorist incidents; the most important

component of this quarterly series is BOMBINGS, accounting for over half of all annual terrorist

attacks on average. BOMBINGS combines seven types of events: explosive bombings, letter

bombings, incendiary bombings, missile attacks, car bombings, suicide car bombings, and mortar

and grenade attacks. The HOSTAGE series includes quarterly totals of kidnappings,

skyjackings, nonaerial hijackings, and barricade and hostage-taking missions, whereas

assassinations (denoted by ASSNS) consist of politically motivated murders. Two additional

primary series are: (i) a quarterly DEATH series recording the number of terrorist incidents

where one or more individuals (including terrorists) died; and (ii) a more-inclusive

CASUALTIES series recording the quarterly total number of incidents where one or more

individuals were injured or died. We further broke down the bombing series by identifying the

quarterly number of bombings with one or more deaths (i.e., BOMB_K) and the number of

bombings with one or more casualties (i.e., BOMB_CAS).

To analyze the composition of terrorist incidents, we constructed a number of proportion

series. By dividing the quarterly entries of the HOSTAGE series by the number of overall

terrorist incidents, we obtained the quarterly share of hostage events denoted by P_HOSTAGE.

Page 234: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

8

Similar divisions for ASSNS and BOMBINGS gave P_ASSNS and P_BOMBINGS. We also

divided the quarterly totals of events with casualties or deaths by the quarterly totals of all events

to construct the proportion of terrorist events with casualties and the proportion with deaths

indicated by P_CASUALTIES and P_DEATHS. These two proportion series can show whether

a typical incident is more threatening during the 1990s when the overall incident totals are down.

If, for example, these incident proportions shift up in the 1990s, then victims in an incident are

more likely to be injured or killed. Finally, we divided the quarterly total of deadly bombings

and bombings with casualties by the quarterly total of deaths and casualties, respectively, to give

the proportion of deadly incidents due to bombings (i.e., P_DEATHS_B) and the proportion of

incidents with casualties due to bombings (i.e., P_CAS_B). These two constructed time series

indicate whether a greater share of injurious terrorist events is now due to bombings.

TESTING FOR STRUCTURAL BREAKS AT 9/11

To determine whether the various incident series behave differently after 9/11, we first

estimated each series as an autoregressive process. Consider the AR(p) model:2

1

0 1 1 10

,p

t t i t i ti

y a y yρ β ε−

− + − −=

∆ = + + ∆ +∑ (1)

where ty is the number of incidents of a particular type occurring in time period t. For each

series, the lag length was selected by estimating equation (1) beginning with p = 6. If the t-

statistic for βp was not statistically different from zero at the 5% significance level, we reduced

the p by one and repeated the entire procedure. Once the lag length was determined, we tested

for a unit root using a Dickey-Fuller test. If we reject the null hypothesis that ρ = 0, it is then

possible to estimate the series and perform hypothesis tests using standard asymptotic

distribution theory. We performed the tests without including time as a regressor, because there

Page 235: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

9

is no evidence of a deterministic trend in any of the incident series. The presence of a unit root

may signify the presence of a structural break; i.e., Dickey-Fuller tests can have low power to

reject the null of a unit root in the presence of a structural break (Perron 1989).

PRIMARY SERIES

The results of the estimations for the eight primary incident series are shown in the top

half of Table 1. For the ALL series, the lag length is such that p = 3 (so that we used two lagged

changed for the augmented Dickey-Fuller test) and the estimated value of ρ is −0.31. Since the

t-statistic for the null hypothesis that ρ = 0 is −3.20, we can reject the presence of a unit root at

the 2.5% significance level. The critical values at the 2.5%, 5%, and 10% significance levels are

−3.17, −2.89, and −2.58, respectively. Diagnostic checks indicated that the model is adequate in

that the Ljung-Box Q-statistics using 4 and 8 lags of the residuals have prob-values of 0.95 and

0.77, respectively. An examination of the top half of the table shows that only the ASSNS

(denoting assassinations) and CASUALTIES series are candidates to have unit roots. For

CASUALTIES, we could reject the null hypothesis of a unit root at the 10%, but not 5%,

significance level. The prob-value for the ASSNS series is just over 10%.

In an attempt to resolve the ambiguity regarding the CAUSALTIES and ASSNS series,

we used Perron’s (1989) test for a unit root in the presence of a structural break. Because 9/11 is

very close to the end of the data, it is not surprising that the prob-values for this test are nearly

identical to those of the Dickey-Fuller test. Insofar as the two tests can have low power in the

presence of a structural break near the end of the data set, we do not difference the

CAUSALTIES and ASSNS series. The results using the first differences of these two series are

virtually identical to those reported in Table 1.

To test for a structural break at 9/11, we modified equation (1) by estimating an equation

Page 236: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

10

of the form:

0 1 21

,p

t i t i Pt Lt ti

y a a y D Dα α ε−=

= + + + +∑ (2)

where PtD and LtD are dummy variables representing 9/11. In equation (2), PtD is a dummy

variable such that PtD = 1 if t = 2001:3 and PtD = 0 otherwise. This type of pulse variable is

appropriate if the 9/11 attacks induced a temporary change in the ty series. The magnitude of

1α indicates the initial effect of 9/11 on ty and the rate of decay is determined by the

characteristic roots of equation (2). To allow for the possibility that 9/11 had a permanent effect

on the level of ty , the second dummy variable in equation (2) is such that LtD = 0 for t <

2001:3 and DLt = 1 for t ≥ 2001:3. The impact effect of 9/11 on ty is given by 2α , while the

long-run effect is given by 2α /(1 − Σ ai)

For each type of incident series, the fourth column of Table 1 reports 1α , the fifth column

reports 2α , and the sixth column reports the prob-value of the F-test for the joint hypothesis that

1 2 0α α= = . For the ALL series, neither dummy variable is significant at conventional levels

and the joint test does not allow us to reject the null hypothesis that both dummy variables have

zero coefficients. An examination of Table 1 reveals some striking similarities for all of the

series reported. None of the pulse dummy variables are significant at conventional levels for the

eight primary incident series. All of the t-statistics are below 0.6 in absolute value. In fact, only

the HOSTAGE series exhibits any effects as a result of 9/11. The t-statistic for the 2α

coefficient of DL for the HOSTAGE series is −2.35, and the magnitude of the coefficient is

−6.05. This reflects the fact that the number of HOSTAGE incidents fell from a pre-9/11 mean

of almost eleven incidents per quarter to slightly more than 3. However, even this finding is

Page 237: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

11

problematic because a careful inspection of the HOSTAGE series (reported later as Figure 1)

shows that the sharp drop in hostage incidents actually occurred in 1999.

We performed a number of other break tests to determine if they identify 9/11 as a break.

For example, a Chow test for a structural break was conducted by comparing the residual sum of

squares for the pre-9/11 period to that for the entire period; but it did not reveal the presence of a

break for any of the eight primary series. The CUSUM test also showed no evidence of

structural change in any of the series occurring in the neighborhood of 2001:3.

PROPORTION TIME SERIES

We found somewhat different patterns when we looked at the seven proportion series.

The results are reported in the bottom half of Table 1. There are several key results:

1. At the 10% significance level, we reject the null hypothesis of a unit root for all series

except the P_DEATHS and the P_CASUALTIES series. As mentioned earlier, the unit-root test

has low power in the presence of a structural break, so the failure to reject the null hypothesis of

a unit root may be evidence in favor of a structural break. When we performed unit-root tests on

the P_DEATHS and P_CASUALTIES series using only the data through 2001:2, the associated

t-statistics for the null hypothesis that ρ = 0 are −4.27 and −4.85, respectively, leading to a

rejection of a unit root.

2. The pulse dummy variable is statistically significant for the P_DEATHS and

P_CASUALTIES series. For these two series, the t-statistics for the null hypothesis that 1α = 0

are 6.31 and 4.81, respectively. On impact, the proportion of incidents with deaths rose by 54

percentage points and the proportion of incidents with casualties rose by 48 percentage points.

The level dummy variables are, however, not significant at conventional levels. Hence, the

jumps in the P_DEATHS and P_CASUALTIES are not permanent.

Page 238: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

12

3. The level dummy variable is highly significant for the proportion of hostage incidents

(P_HOSTAGE) and the proportion of deadly incidents due to bombings (P_DEATHS_B). The

intercept for the P_HOSTAGE series decreased by 8 percentage points and that for

P_DEATHS_B rose by 25 percentage points. These changes are estimated to be permanent.

The P_HOSTAGE series falls precisely at 9/11. There is some evidence ( )1.74t = − that the

proportion of assassinations (P_ASSNS) decreased by 16 percentage points after 9/11.

Generally, we did not uncover evidence that there were changes in the primary terrorist

series following 9/11. We did, however, uncover evidence that the composition of the terrorist

time series changed. This apparent switch from logistically complex hostage events to less

complex bombings is consistent with our predictions based on post-9/11 pressures on the al-

Qaida leadership and enhanced security given to airports, embassies, and high-profile targets.

The reliance on deadly bombings also agrees with our priors concerning the changing nature of

terrorism.

MULTIPLE STRUCTURAL BREAKS

One criticism of these results is that there might be more than one structural break; e.g.,

Enders and Sandler (2000) reported significant changes in terrorism associated with the increase

in religious fundamentalism. Ignoring the effects of early breaks might cloud the effects of 9/11;

hence, one research strategy is to reestimate equation (2) by including dummy variables for all

such breaks. This strategy is problematic because there is a danger of ex post fitting if break

points are selected as a result of an observed change in the variable of interest. Moreover, a

number of events may roughly coincide with the selected break points. In addition, the efficacy

of the estimates cannot rely on the usual asymptotic properties of an autoregression, because an

increase in sample size does nothing to increase the number of points lying between two break

Page 239: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

13

points. Just as it is difficult to know what dummy variables to include, it can be difficult to know

what factors to exclude. If important events influencing terrorism are excluded from the

estimating equation, there is still a specification problem.

An alternative methodology is to use a purely data-driven procedure to select the break

dates. Bai and Perron (1998, 2003) developed a procedure that can estimate a model with an

unknown number of structural breaks that occur at unspecified dates. For our purposes, the key

feature of the Bai-Perron procedure is that the number of breaks and their timing are estimated

along with the autoregressive coefficients. Bai and Perron (1998, 2003) also showed how to

form confidence intervals for the break dates. This is particularly important because there is

evidence that key changes in some of the incident series actually began prior to 9/11; we want to

ascertain whether the changes are due to 9/11 or to forces already in progress.

The form of the Bai-Perron specification that we considered is:

1

,p

t j i t i ti

y a yα ε−=

= + +∑ (3)

where j = 1, … , m + 1 and m is the number of breaks. Equation (3) allows for m breaks that

manifest themselves by shifts in the intercept of the autoregressive process. Our notation is such

that there are m + 1 intercept terms denoted by jα . The first break occurs at t1 so that the

duration of the first regime is from t = 1 until t = 1t and the duration of the second regime is from

1t + 1 to 2t . Because the m-th break occurs at ,mt t= the last regime begins at mt + 1 and lasts

until the end of the data set. In applied work, the maximum number of breaks needs to be

specified. We allowed for a maximum number of 5 breaks. The procedure also required that we

specified the minimum regime size (i.e., the minimum number of observations between breaks).

Because our data runs through the second quarter of 2003, we used a minimum break size of 6 to

permit a break occurring as late as the first quarter of 2002. In principal, we could allow all

Page 240: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

14

coefficients (including the autoregressive coefficients) to change; but this would necessitate

estimating a separate AR(p) model for each regime. Since the data include only a small number

of post-9/11 observations, this procedure is not possible here. Instead, we adopted what Bai and

Perron call the “partial change” model; this specification allowed us to estimate only one new

coefficient (i.e., the intercept) for each regime.

For each series, Table 2 reports the number of breaks (m), the point estimate of each

break date, the lower and upper bounds of a 95% confidence interval around the break dates

(Lower and Upper, respectively), the sample mean in the first regime (Initial Mean), and the

short-run (SR) and long-run (LR) changes due to the break(s). The short-run effect of break j is

measured by 1j jα α+ − , whereas the long-run effect is measured by (1j jα α+ − )/( 1 − Σ ia ).

The results for the various incident series reinforce the results regarding 9/11, reported in

Section 3. For example, a single structural break, not at 9/11, is found for the ALL series. The

most likely estimate of this break is 1994:3; a 95% confidence interval for the break date spans

the period 1993:4 through 1996:4. This confidence interval is not symmetric around 1994:3,

because the break is unlikely to have occurred much earlier than this date. In the first regime

(i.e., until 1994:3), the initial mean number of incidents per quarter is 106.62. After this break,

we estimated a short-run decline of 46.46 incidents and a long-run decline of 62.63 incidents.

The crucial point is that a 95% confidence interval for the break date does not include 9/11. This

structural break is consistent with our priors about the influence of reduced state sponsorship and

the demise of many terrorist groups in the late 1980s and early 1990s. Given that bombings

constitute half of the ALL series, a similar structural break characterizes BOMBINGS at 1994:1

in Table 2.

The HOSTAGE series experiences a single break after 2000:3 (i.e., the new regime

begins in 2000:4). The 95% confidence interval does include 2001:3; hence, the decline in the

Page 241: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

15

mean number of HOSTAGE incidents from 13.79 to about 3.85 (13.79 − 9.94 = 3.85) may be

attributable to 9/11. There is no evidence of a break in the ASSNS series. Although the time

series for casualties due to bombings and incidents with deaths, each displays two structural

breaks, none of the 95% confidence intervals of these breaks include 9/11. For BOMB_CAS, the

two breaks took place at 1992:3 and 1994:3 as incidents dropped in number but became more

lethal on average as fundamentalist-based terrorism grew in importance. For the DEATHS

series, the structural break at 1975:3 coincides with the growing importance of transnational

terrorism in the early to middle 1970s. In contrast, the structural break for the DEATHS series at

1996:2 came as the number of transnational terrorist events decreased greatly.

In the bottom portion of Table 2, the structural breaks for six proportion series are listed.

These proportion series display a larger number of structural breaks compared with the primary

series. Notably, three of the proportion series – P_HOSTAGE, P_DEATHS_B, and P_DEATHS

– have structural breaks whose confidence intervals include 9/11. In particular, we estimated

four breaks in the P_HOSTAGE series with break dates of 1994:1, 1996:2, 2000:1, and 2001:3.

The confidence interval for this last regime, spanning 2001:1 through 2002:1, is associated with

a short-run decline of 37.6 percentage points. Clearly, terrorists have reduced their reliance on

hostage events since 9/11.

The proportion of incidents with deaths (P_DEATHS) is estimated to have 5 breaks. The

point estimate of the fifth break is 2001:2, so that beginning in 2001:3 the short-run increase in

the proportion of death incidents is 17.8 percentage points. Because the confidence interval for

the fifth break is entirely contained within that for the fourth break, there may have been an

ongoing increase in the proportion of deadly incidents that included the incidents on 9/11.

Nevertheless, the estimates are consistent with the rise in P_DEATHS being primarily due to

more deadly bombs. As shown in the Table 2, there is a short-run jump in P_DEATHS_B of 20

Page 242: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

16

percentage points that is estimated to occur at 2001:2. Moreover, we find no evidence of breaks

associated with 9/11 in the proportion series associated with assassination and casualty incidents.

Table 2 is also consistent with our priors about transnational terrorism becoming more of

a threat in the early to mid 1970s – i.e., the 1975:3 structural break for DEATHS, P_ASSNS, and

P_DEATHS, and the 1974:1 structural break for P_DEATHS_B. Moreover, the structural

breaks for B_DEATHS_B and P_DEATHS during the early to mid 1990s are consistent with our

priors that the period following the Gulf War had deadlier events on average than earlier periods.

Clearly, transnational terrorism changed in character at three times: in the mid-1970s; in the

1990s; and in and around 9/11.

FORECASTING BEYOND 9/11

We now use the previously identified structural breaks to forecast the various incident

series. Based on equation (3), the k-step ahead forecast of t ky + follows from:

1

,p

t t k t j i t t k ii

E y E a E yα+ + −=

= +∑ (4)

where t t kE y + is the expectation of t ky + conditional on the information set at t. Since a break

may occur between period t and period t + k, the appropriate value of αj is unknown at t. We

assumed that a break date becomes known in the period containing the break. Although the

structural break at 9/11 could not be forecasted in period 2001:2, forecasts beginning in 2001:3

can use the fact that a break occurred. Of course, the magnitude of the break is unknown, so its

size must be estimated. As is standard practice, to obtaint t kE y + , we estimated equation (3) with

data through period t and then used the estimated coefficient to form equation (4). If a break in

the intercept occurs in period t + 1 to t + k, the forecasts will be poor, since they do not

Page 243: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

17

incorporate the appropriatejα .3

The break in the HOSTAGE series prior to 9/11 (indicated by a vertical line) is shown in

the top portion of Figure 1, where the HOSTAGE series fluctuates around the pre-break mean of

13.79 incidents per quarter until 2000:3. Thereafter there is a sharp drop in the series, so that the

new long-run mean is about 3.85. The lower portion of Figure 1 shows the 1-step-ahead

(unbroken line) and 8-step-ahead forecast errors, ,t k t t ky E y+ +− for t = 1999:2 through 2003:2.

The two forecast errors are reasonably similar until 2000:4, and the series of 1-step-ahead errors

does not exhibit any unusual behavior at the breakpoint. Clearly, the 1-step-ahead forecasts

quickly capture the influence of a structural break so the forecast errors remain small; however,

the 8-step-ahead forecasts perform poorly beginning with the breakpoint. The forecasts

1998:4 2000:4E y through 2000:3 2002:3E y are all quite negative. Because the long-term forecasts do not

include any information concerning the change in the intercept beginning in 2000:4, they all

perform poorly. These long-term forecasts reinforce the point that the HOSTAGE series began

to decline prior to 9/11. Moreover, the forecasts of the post-9/11 values that use the 2000:3

break date appear adequate.

The actual time series (1970:1 – 2003:2) and the forecast results for the DEATH series

are shown in Figure 2. Although the breaks are not as pronounced as those in Figure 1, the Bai-

Perron break date of 1996:2 seems quite reasonable. The lower forecast portion of the figure

reinforces the point that 1996:2 is a critical point in the data. The 8-step-ahead forecasts sharply

depart from the 1-step-ahead forecasts at 1996:2. In the top portion of Figure 2, there appears to

be a steady increase in the number of DEATH incidents following 9/11. However, the negative

finding concerning a break at 9/11 suggests that such an increase is not atypical. Moreover, the

1-step-ahead and 8-step-ahead forecasts are similar for the post-9/11 period, which is consistent

Page 244: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

18

with 9/11 not being a structural break for the DEATH series.

The upper portion of Figure 3 shows the P_HOSTAGE series. The increases in the series

in 1994:1, 1996:2, and 2000:1 as well as the drop in 2001:3 are quite pronounced. The

appropriateness of the breakpoints is also shown in the lower portion of the figure, because the

long-term forecasts diverge from the 1-step-ahead forecasts at these break dates. For example,

the 8-step-ahead forecasts beginning from 2001:2 are all too high relative to the actual values of

P_HOSTAGE and to the 1-step-ahead forecasts. Thus, a little hindsight to recognize structural

breaks shortly after they occur can greatly assist the accuracy of forecasts.

CONCLUDING REMARKS

Over two years have passed since 9/11. In reaction to these attacks, targeted

governments have bolstered security at airports, embassies, and other high-profile targets. The

US-led offensive against al-Qaida and its network has taken a toll on al-Qaida’s leadership and

finances. As a consequence, post-9/11 policies should have hampered al-Qaida’s ability to direct

operations. We have applied time-series methods to uncover what, if anything, is now different

since 9/11. Surprisingly, little has changed to the series of all transnational terrorist incidents or

its major component of all bombing incidents. Moreover, the DEATHS and CASUALTIES

series have not changed following 9/11. The main influence of 9/11 has been on the composition

of the ALL series. In particular, hostage-taking incidents have fallen after 9/11 as terrorists, bent

on carnage, have substituted into deadly bombings. As a consequence, the proportion of deadly

incidents due to bombings has increased as the proportion of hostage-taking and assassination

attacks have decreased. Given official antiterrorist measures after 9/11, these changes are

understandable as terrorists substitute from hard to soft targets in the wake of security changes.

Additionally, stress on al-Qaida leadership may be responsible for a substitution from logistically

Page 245: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

19

complex attacks (e.g., hostage taking and assassinations) to logistically simpler bombings. The

lack of a reversal to this composition effect in recent quarters suggests that a replacement to al-

Qaida is not yet on the scene.4

When we do not prejudge structural breaks and apply the Bai-Perron method to identify

these jumps, a number of interesting results follow. First, the Bai-Perron findings regarding 9/11

are entirely consistent with our results when 9/11 is prejudged as a structural break. Second,

structural breaks characterize two earlier periods: (i) the early to mid 1970s when transnational

terrorism became more deadly; and (ii) the 1990s when there was a reduction in transnational

terrorism as state sponsorship fell. Third, the 1990s is also seen on average to have more deadly

events. The movement to greater casualties, underscored by 9/11, was foreshadowed by the

proportion series associated with deaths and casualties well before 9/11. Finally, we show that

reasonable forecasts are possible if structural breaks are incorporated fairly rapidly in the

underlying forecast model. Our results suggest that the war on terror has had effects – some

good (e.g., the absence of an increase in incidents and fewer hostage incidents) and some bad

(e.g., a greater reliance on deadly bombings).

Because our work relies on univariate time-series methods, it can be extended in

interesting ways. A number of key series can be estimated as a vector autoregression (VAR).

Unlike a typical VAR, the intervention dummy variables DL and DP can be allowed to affect

each of the series simultaneously. In this way, the impulse responses of all of the series until

9/11 can be obtained jointly. Moreover, cross-equation restrictions can be used to obtain the

overall importance of 9/11. A second limitation of our univariate methodology is that it does not

permit us to attribute changes in the levels of the series to any precise set of economic or political

variables. The fact that many series appear to break in the early 1990s points to a decline in state

sponsorship and the demise of several left-wing groups. Without explicit incorporation of some

Page 246: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

20

explanatory variables in our estimating equations, the causes of the breaks remain suggestive. A

worthwhile extension is to incorporate such variables. When more data points past 9/11 become

available, we can use a VAR approach, modeled after Enders and Sandler (1993), to investigate

the influence of counterterrorism actions imposed after 9/11 (Arce and Sandler 2005[this issue]).

Page 247: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

21

Footnotes

1. Standard definitions of terrorism exclude state terror used by governments to control their

citizens through intimidation. Available data sets exclude state terror.

2. The incident series cannot go below zero and the proportion series cannot go below zero

or above unity. Most of the series do not have zero or near-zero values; the quarterly mean value

of almost all of the series are about two standard deviations from zero. Exceptions are the

ASSNS and BOMB_K series, each of which has a few zero values. Thus, the coefficient

estimates and standard errors are appropriate for all but two series. As a check, we reran Table 1

using the variables in logs for all but the ASSNS and BOMB_K series. We found no substantive

changes in the results for any series. Currently, the Bai-Perron methodology, used below, has

not been extended to include a negative binomial (or Poisson) structure to address any zero

problem for the ASSNS and BOMB_K series.

3. We remind the reader that the multi-step-ahead forecast errors are serially correlated.

4. We must remind the reader that our findings are based on data through 2003:2. Events –

e.g., the insurgency in Iraq and the kidnapping of foreigners – can change patterns in the future.

Page 248: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

22

REFERENCES

Alexander, Yonah, and Dennis Pluchinsky. 1992. Europe’s red terrorists: The fighting

communist organizations. London: Frank Cass.

Arce M., Daniel G., and Todd Sandler. 2005. Counterterrorism: A game-theoretic analysis.

Journal of Conflict Resolution 49 (2): this issue.

Bai, Jushan, and Pierre Perron. 1998. Estimating and testing linear models with multiple

structural changes. Econometrica 66 (1):47-78.

_____. 2003. Computation and analysis of multiple structural change models. Journal of

Applied Econometrics 18 (1):1-22.

Bush, George W. 2002. State of the union. Website at

http://www.whitehouse.gov/news/releases/2002/01/20020129-11.html, accessed 2

January 2004.

Chalk, Peter. 1996. Western European terrorism and counter-terrorism. Houndsmills, UK:

Macmillan.

Clutterbuck, Richard. 1994. Terrorism in an unstable world. New York: Routledge.

Department of Homeland Security. 2003. Budget in Brief. Website at

http://www.dhs.gov/interweb/assetlibrary/FY_2004_Budget_IN_BRIEF.pdf, accessed 20

November 2003.

The Economist. 2003. Al-Qaeda operations are rather cheap. The Economist 369 (8344):45.

Enders, Walter, and Todd Sandler. 1993. The effectiveness of anti-terrorism policies:

Vector-autoregression-intervention analysis. American Political Science Review 87

(4):829-44.

_____. 2000. Is transnational terrorism becoming more threatening? A time-series

investigation. Journal of Conflict Resolution 44 (3):307-32.

Page 249: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

23

Gerges, Fawaz A., and Christopher Isham. (2003). Sign of weakness? Do overseas terror

strikes suggest Al Qaeda inability to hit US? ABC News, November 22, 2003.

Hoffman, Bruce. 1997. The confluence of international and domestic trends in terrorism.

Terrorism and Political Violence 9 (1):1-15.

_____. 1998. Inside terrorism. New York: Columbia University Press.

_____. 2002. Rethinking terrorism and counterterrorism since 9/11. Studies in

Conflict & Terrorism 25 (5):303-16.

Landes, William M. 1978. An economic study of aircraft hijackings, 1961-1976. Journal

of Law and Economics 21 (1):1-31.

Mickolus, Edward F., Todd Sandler, Jean M. Murdock, and Peter Flemming. 2004.

International terrorism: Attributes of terrorist events, 1968-2003 (ITERATE 5). Dunn

Loring, VA: Vinyard Software.

Perron, Pierre. 1989. The great crash, the oil price shock, and the unit root hypothesis.

Econometrica 57 (6):1361-1401.

Quillen, Chris. 2002a. A historical analysis of mass casualty bombers. Studies in Conflict

& Terrorism. 25 (5):279-92.

_____. 2002b. Mass casualty bombings chronology. Studies in Conflict & Terrorism. 25 (5):

293-302.

Sandler, Todd. 2003. Collective action and transnational terrorism. World Economy 26 (6):

779-802.

Sandler, Todd, and Walter Enders. 2004. An economic perspective on transnational

terrorism. European Journal of Political Economy. 20 (2):301-16.

Sandler, Todd, John T. Tschirhart, and Jon Cauley. 1983. A theoretical analysis of

transnational terrorism. American Political Science Review 77 (1):36-54.

Page 250: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

24

White, Jonathan R. 2003. Terrorism: 2002 update, 4th Ed. Belmont, CA:

Wadsworth/Thomson Learning.

Wilkinson, Paul. 2001. Terrorism versus democracy: The liberal state response. London:

Frank Cass.

Page 251: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Table 1: AR Estimation Using 9/11 as a Structural Break Series Lags ρ α1 α2 F Q(4) Q(8) ALL 3 −0.31 −22.26 −15.31 0.47 0.95 0.77 (−3.20) (−0.54) (−0.89) HOSTAGE 2 −0.55 −1.03 −6.05 0.04 1.00 0.98 (−5.38) (−0.16) (−2.35) ASSNS 3 −0.18 −1.99 −0.71 0.77 0.65 0.14 (−2.56) (−0.44) (−0.41) BOMBINGS 3 −0.37 −13.80 −9.55 0.52 0.87 0.39 (−3.64) (−0.48) (−0.84) BOMB_K 2 −0.54 −0.75 0.51 0.95 0.71 0.33 (−5.40) (−0.16) (0.30) BOMB_CAS 6 −0.32 −3.88 0.13 0.87 0.99 0.99 (−3.09) (−0.50) (0.05) DEATHS 2 −0.31 1.80 −0.63 0.95 0.74 0.74 (−3.97) (0.28) (−0.26) CASUALTIES 3 −0.22 −4.83 −1.46 0.87 0.96 0.60 (−2.84) (−0.48) (0.37) P_HOSTAGE 4 −0.28 0.14 −0.08 0.05 0.99 0.87 (−2.77) (1.37) (−2.36) P_ASSNS 3 −0.38 −0.22 −0.16 0.06 0.89 0.46 (−3.74) (−0.93) (−1.74) P_BOMBINGS 3 −0.31 −0.02 0.04 0.62 0.90 0.91 (−3.26) (−0.12) (−0.96) P_DEATHS_B 2 −1.08 −0.26 0.25 0.01 0.82 0.85 (−8.48) (−1.25) (3.32) P_CAS_B 2 −0.99 −0.10 0.07 0.48 0.21 0.18 (−8.30) (−0.57) (1.21) P_DEATHS 4 −0.24 0.54 0.03 0.00 0.84 0.32 (−2.47) (6.31) (0.72) P_CASUALTIES 4 −0.25 0.48 0.04 0.00 1.00 0.96 (−2.36) (4.81) (0.96) Note: t-statistics are in parentheses

Page 252: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Table 2: Estimates of Multiple Structural Breaks Seriesa Break Date Lower Upper Initial Mean SRb Effect LRc Effect ALL 1994:3 1993:4 1996:4 106.62 −46.46 −62.63 HOSTAGE 2000:3 2000:1 2002:3 13.79 −6.69 −9.94 BOMBINGS 1994:1 1993:3 1996:1 61.50 −33.92 −40.43 BOMB_CAS 1992:3 1989:4 1993:3 15.79 11.20 17.17 1994:3 1994:1 1996:1 15.64 23.97 DEATHS 1975:3 1973:2 1976:2 8.89 7.17 11.01 1996:2 1994:2 1998:4 −5.81 −8.91 P_HOSTAGE 1994:1 1991:3 1994:4 0.131 0.102 0.071 1996:2 1994:1 1998:1 0.115 0.079 2000:1 1998:4 2000:4 0.207 0.143 2001:3 2001:1 2002:1 −0.376 −0.259 P_ASSNS 1975:3 1974:1 1975:4 0.039 0.070 0.078 1990:1 1984:4 1993:2 −0.37 −0.041 P_BOMBINGS 1977:4 1973:3 1980:1 0.679 −0.097 −0.180 P_DEATHS_B 1974:1 1972:2 1974:3 0.039 0.050 0.036 1993:2 1992:1 1993:3 0.112 0.079 1997:3 1992:3 2000:2 −0.064 −0.045 2001:2 2000:4 2001:4 0.200 0.142 P_DEATHS 1975:3 1974:3 1976:1 0.103 0.104 0.081 1994:1 1992:3 1994:2 0.167 0.130 1997:1 1995:2 1998:3 −0.144 −0.112 1999:4 1998:1 2002:2 0.108 0.084 2001:2 1999:1 2001:4 0.178 0.139 P_CASUALTIES 1999:4 1995:2 2001:1 0.292 0.123 0.279 aLag lengths are not necessarily those shown in Table 1. bSR denotes the short-run magnitude of the break. cLR denotes the long-run magnitude of the break.

Page 253: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 1: HOSTAGE Incidents and Forecast Errors

HOSTAGE Incidents

Inci

den

ts p

er q

uar

ter

1970 1972 1974 1976 1978 1980 1982 1984 1986 1988 1990 1992 1994 1996 1998 2000 20020

5

10

15

20

25

30

35

1-Step Ahead 8-Step Ahead

1-Step and 8-Step Ahead Forecast Errors

Fore

cast

Err

ors

1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003-15

-10

-5

0

5

10

15

20

25

Page 254: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 2: DEATH Incidents and Forecast Errors

DEATH Incidents

Inci

den

ts p

er q

uar

ter

1970 1972 1974 1976 1978 1980 1982 1984 1986 1988 1990 1992 1994 1996 1998 2000 20020

5

10

15

20

25

30

35

40

1-Step Ahead 8-Step Ahead

1-Step and 8-Step Ahead Forecast Errors

Fore

cast

Err

ors

1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003-20

-15

-10

-5

0

5

10

15

Page 255: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 3: Proportion of Hostage Incidents and Forecast Errors

Proportion of Hostage Incidents

Inci

den

ts p

er q

uar

ter

1970 1973 1976 1979 1982 1985 1988 1991 1994 1997 2000 20030.00

0.08

0.16

0.24

0.32

0.40

0.48

0.56

0.64

1-Step Ahead 8-Step Ahead

1-Step and 8-Step Ahead Forecast Errors

Fore

cast

Err

ors

1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003-0.32-0.24-0.16-0.080.000.080.160.240.320.40

Page 256: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Transnational Terrorism: An Economic Analysis

by

Todd Sandler

School of International Relations University of Southern California

Von Kleinsmid Center 330 Los Angeles, CA 90089-0043

USA [email protected]

Walter Enders

Department of Economics, Finance, and Legal Studies

University of Alabama Tuscaloosa, AL 35487

USA [email protected]

August 2004

Abstract

Both theoretical and empirical techniques are used to put modern-day terrorism into perspective. This paper surveys past contributions, presents updated empirical findings, and suggests new directions for research. Because of strategic interactions among terrorists and targeted government, game theory and economic methods play an important role in identifying novel policy recommendations and behavioral insights. Transnational terrorism and efforts to curtail it involves externalities and market failures. The paper analyzes how terrorists alter tactics in reaction to government policies and how a no-negotiation hostage policy is difficult to institute. JEL classifications: D74, H56 Acknowledgement: This paper is an extended, updated, and modified version of “An Economic Perspective on Transnational Terrorism,” which appeared in the European Journal of Political Economy, 20(2), 2004, pp. 301-316. Portions of this article are being republished with the kind permission of Elsevier B.V. Todd Sandler is the Robert R. and Katheryn A. Dockson Professor of International Relations and Economics at the University of Southern California. Walter Enders is the Bidgood Chair of Economics and Finance at the University of Alabama. The Center for International Studies (CIS) at the University of Southern California supported the updating of the terrorism data for 2003.

Page 257: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

I. Introduction

On 11 September 2001 (henceforth, 9/11), the world watched aghast as two commercial

airliners toppled the twin towers of the World Trade Center (WTC) and a third plowed into the

Pentagon. Yet a fourth hijacked plane landed short of its intended Washington, DC target as

passengers took matters into their own hands. Economic methods – both theoretical and

empirical – have been applied by a small and growing group of economists to understand a host

of issues associated with such terrorist events. These issues concern the policy effectiveness of

alternative responses (e.g., toughening punishments, retaliatory raids, and installing

technological barriers), negotiation responses in hostage incidents, the terrorists’ choice of target,

the economic impacts of terrorism, the provision of terrorism insurance, the curbing of

interdependent risk, and others.

Terrorism is the premeditated use, or threat of use, of extranormal violence by an

individual or a subnational group to obtain a political objective through intimidation or fear

directed at a large audience usually beyond the immediate victims. An essential aspect of this

definition concerns the presence of a political objective (e.g., getting the United States out of the

Persian Gulf states) that the terrorist acts or campaigns are designed to achieve. Incidents that

have no specific political demands are criminal rather than terrorist acts – e.g., extortion for

profit. Another crucial ingredient is the use of extranormal violence or brutality to capture news

headlines. As the public becomes numb to their acts of violence, terrorists respond with more

heinous actions to recapture media attention. Thus, the escalation experienced on 9/11 was part

of an ongoing process. Terrorists often direct their violence and threats toward a vulnerable

target group, not immediately involved with the political decision-making process that they seek

to influence. The two planes that crashed into the WTC fit this pattern, but the other two planes

were targeted against decision makers. In a deliberate attempt to create a general atmosphere of

Page 258: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

2

fear, terrorists strike at a variety of targets with alternative modes of operations (e.g.,

assassinations, bombings, and kidnappings), thus making it difficult for the authorities to

anticipate the venue of the next incident. Such actions make attacks appear to be random, so that

a targeted society must expend large amounts of resources to protect a wide range of

vulnerabilities. This simulated randomness provides terrorists with a cost advantage over the

stronger authorities who must defend against the threat that they pose. Because people tend to

overrespond to unlikely catastrophic events while ignoring more likely daily dangers (e.g., dying

in a car accident), terrorists succeed in achieving society-wide anxiety with minimal resources.

When a terrorist incident in one country involves victims, targets, institutions,

governments, or citizens of another country, terrorism assumes a transnational character. In the

WTC tragedy, citizens from over 80 countries lost their lives at the hands of foreign terrorists

who crossed into the United States from abroad. Obviously, the four hijackings on 9/11

constitute transnational terrorist attacks. During the 1980s, the kidnappings of foreigners in

Lebanon or the near-simultaneous suicide truck bombings at the US Marines barracks and

apartment building housing French Paratroopers, as a protest against Western policies, also

represent transnational terrorism. Transnational terrorist incidents are transboundary

externalities insofar as actions conducted by terrorists or authorities in one country may impose

uncompensated costs or benefits on people or property of another country. As such, myriad

market failures are associated with collective actions to curb international terrorism.

The application of economic methods to the study of terrorism began with Landes (1978),

who applied the economics of crime and punishment to the study of domestic skyjackings in the

United States. Economic methodology is particularly well-suited to provide insights in studying

terrorism. Economic analysis can account for the strategic interactions among opposing interests

– e.g., among rival terrorists, the terrorists and the authorities, and among targeted countries.

Page 259: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

3

Rational-choice models, based on microeconomic principles, can be applied to ascertain how

terrorists are apt to respond to policy-induced changes to their constraints. The same methods

can be used to analyze how governments react to terrorist-induced changes to their policymaking

environment. Altruistic-based intergenerational rewards can even be shown to motivate the

growing use of suicide bombings (Azam, forthcoming). Additionally, the theory of market

failures can underscore how agents’ independent optimization may be at odds with socially

efficient outcomes, so that governmental failures may result from well-intentioned policies. In

addition, various economic empirical methods can be applied to evaluate theoretical predictions

and policy recommendations. Empirical techniques can evaluate the economic consequences of

terrorism – e.g., the impact of terrorism on tourism (Enders, Sandler, and Parise, 1992), foreign

direct investment, (Enders and Sandler, 1996), and per capita GDP (Abadie and Gardeazabal,

2003).

The primary purpose of this article is to survey some crucial insights gained from

applying an economic perspective to the study of terrorism. A second purpose is to present an

updated analysis of trends and cycles, policy-induced externalities, collective action responses,

and hostage negotiation strategy. A third purpose is to identify some future research directions.

II. A Look at the Data

To provide a perspective on the nature of the transnational terrorist threat, we compile

Table 1 based on data from the US Department of State (1988-2004). This table indicates the

annual number of transnational terrorist events, the associated deaths, the number of wounded,

and the number of attacks against US people and/or property for 1968-2003. During these 36

years, there were 14,857 transnational terrorist incidents in which 14,807 people (including those

on 9/11) died. On average, there were 411 fatalities per year which is relatively few, especially

Page 260: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

4

compared with the 41,000 or so people killed annually on US highways. Each terrorist incident

kills on average about one person. The casualties on 9/11 represent a clear outlier with deaths on

this single day approximately equal to all transnational terrorist-related deaths recorded during

the entire 1988-2000 period.

An examination of Table 1 suggests that transnational terrorism follows a cyclical pattern

with much of the 1990s being relatively calm compared to the earlier two decades.

Transnational terrorism is particularly low during 2002-2003, with incidents on par in number to

that of 1969 at the start of the era of transnational terrorism. Something that cannot be seen from

Table 1 is that a high proportion of total casualties for a given year is typically associated with a

couple of “spectacular” events – e.g., the simultaneous bombings of the US Embassies in

Nairobi, Kenya, and Dar es Salaam, Tanzania, accounted for 291 deaths and almost 5,000

injuries in 1998 (US Department of State, 1999). The right-hand column of Table 1 indicates

that approximately 40% of all transnational terrorist attacks are against US interests. This is

especially noteworthy from an externality viewpoint, because relatively few incidents take place

on US soil – i.e., during 1998-2003, only six incidents (including the four skyjackings on 9/11)

occurred in the United States (US Department of State, 2004).

By having relatively secure borders, the United States must rely on foreign governments

to protect US citizens and property while abroad. Terrorists that target US interests – e.g.,

Revolutionary Organization 17 November in Greece (known as 17 November) – may operate

with impunity if the risks to foreigners are of little concern to the local government. This leads

to underdeterrence of terrorism from a multi-country viewpoint (Lee, 1998). Until the summer

of 2002 when a 17 November terrorist injured himself in an attempted bombing, the group had

engaged in over 140 attacks and 22 assassinations since 1973 with no arrests (Wilkinson, 2001,

p. 54). If, instead, much of the threat is to a host country’s interests, then overdeterrence may

Page 261: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

5

result as the country does not account for the transference externality of causing the terrorists to

switch their attacks to another less-protected country. In the overdeterrence scenario, each

country engages in a Prisoners’ Dilemma “arms race” to deflect the common terrorist threat to an

alternative venue (Arce and Sandler, 2004; Sandler and Lapan, 1988; Sandler and Siqueira,

2003). Unless such actions decrease the overall level of attacks, each country expends resources

without securing their citizens’ safety, which is particularly relevant when these citizens are

targeted in other countries. This is a real concern for the United States, which has deflected

almost all attacks on its interests to foreign soil.

Data

Except for some annual totals, government-collected data sets have not been made

available to researchers. Mickolus (1982) developed a data set, International Terrorism:

Attributes of Terrorist Events (ITERATE) for 1968-77. This event-based data set was extended

to cover 1978-2003 by Mickolus et al. (2004). ITERATE uses a host of sources for its

information, including the Associated Press, United Press International, Reuters tickers, the

Foreign Broadcast Information Service (FBIS) Daily Reports, and major US newspapers (e.g.,

the Washington Post, New York Times).

ITERATE poses a number of shortcomings that researchers must take into account when

testing theories. By relying on newspaper accounts, ITERATE is better at chronicling the

actions of terrorists (e.g., number of terrorists in a hit squad or terrorists’ actions during

negotiations) than in recording those of the authorities (e.g., how many commandos were used to

free a hostage). In select instances, government strategy is revealed by newspapers and is coded

by ITERATE. Because ITERATE is an events data set, researchers must rely on event counts

rather than on continuous measures of intensity unless casualty counts are used (Enders and

Page 262: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

6

Sandler, 2000, 2002). ITERATE picks up newsworthy transnational terrorist incidents, so that

there is some bias, which must be recognized. The bias has worsened since mid-1996 when the

FBIS Daily Reports was no longer available to ITERATE coders.

Despite these difficulties, ITERATE is suited to a wide range of empirical tasks. For

example, it can display trends and cycles for events for forecasting purposes (e.g., Cauley and

Im, 1988; Enders, Parise, and Sandler, 1992). The data have even been used to investigate

terrorist and government bargaining behavior in hostage-taking events – i.e., kidnapping,

skyjackings, and takeover of facilities (barricade and hostage-taking events) – by Atkinson,

Sandler, and Tschirhart (1987). This latter study applied a time-to-failure model, where the

length of an incident is related to choice variables of the adversaries – e.g., sequential release of

hostages, allowing deadlines to pass uneventfully, and the number of hostages secured.

Based on ITERATE data, we display two quarterly time series – all transnational

incidents (All) and bombings – in Figure 1 for 1968-2003. From Figure 1, we can see that

transnational terrorism displays peaks and troughs. Bombings are the favorite mode of operation

of terrorists, accounting for about half of all transnational terrorist incidents on average in any

given year. Additionally, the bombing time series tracks the all-incident series rather well. The

latter half of the 1990s to the present represents a downturn in transnational terrorism due, in

large part, to fewer states sponsoring terrorism in the post-Cold War era (Enders and Sandler,

1999). In Figure 2, the quarterly time series for assassinations and hostage-taking events are

displayed for 1968-2003. Cycles are again apparent. The two time series display far fewer

incidents per quarter than bombings. If terrorists are rational actors, as we suppose, then they

should respond to risk and engage less frequently in those events that are more risky and

logistically complex, such as assassinations and hostage taking (Sandler, Tschirhart, and Cauley,

1983). Assassinations and hostage missions fell just prior to 9/11 and have not returned to their

Page 263: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

7

old levels. There are probably three explanations for these drops. First, today’s terrorists are

more interested in greater carnage than an assassinated individual. Second, extra precautions at

airports have reduced skyjackings – one kind of hostage-taking mission. Third, the war on terror

has compromised al-Qaida’s leadership and its ability to execute logistically complex and costly

attacks.

In Figure 3, we display the quarterly percentage of incidents with casualties (i.e., deaths

or injuries) for the 1968-2003 period. This time series is noteworthy because it indicates that

since the early 1990s, transnational terrorist incidents, although way down in number, are more

likely to end in injuries or death for victims. Terrorist experts have documented a change in the

makeup and motivation of the general perpetrators of terrorism since the takeover of the US

Embassy in Tehran in November 1979 (Hoffman, 1998). From the late 1960s until the latter

1980s, transnational terrorism has been primarily motivated by nationalism, separatism, Marxist

ideology, and nihilism (Wilkinson, 1986). In the 1990s, the motivation of terrorism changed

with “the emergence of either obscure, idiosyncratic millennium movements” or religious-based

fundamentalist groups (Hoffman, 1997, p. 2). Since the beginning of 1980, the number of

religious-based groups has increased as a proportion of the active terrorist groups: 2 of 64

groups in 1980, 11 of 48 groups in 1992, 16 of 49 groups in 1994, and 25 of 58 groups in 1995

(Hoffman, 1997, p. 3).

With the earlier prevalence of leftist-based organizations that wanted to win the hearts

and minds of the people, such terrorist groups avoided casualties except of individuals

characterizing the establishment or the “enemy.” Today, fundamentalist terrorist groups

purposely seek out mass casualties, viewing anyone not with them as a legitimate target as 9/11

showed. Enders and Sandler (2000) show that a significant rise in casualties from transnational

incidents can be traced back to the takeover of the US Embassy in Tehran. In recent years, an

Page 264: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

8

incident is almost 17 percentage points more likely to result in death or injury compared with the

earlier eras of leftist terrorism.

To highlight the changing patterns of transnational terrorism since 9/11, we display the

proportion of bombing incidents and the proportion of hostage-taking events for 1968-2003 in

Figure 4. Since 9/11, transnational terrorisms have decreased the proportion of hostage events

and greatly increased the proportion of bombings. This pattern is consistent with today’s

fundamentalist terrorists going for greater carnage and avoiding costly and risky hostage events.

Trends and cycles

Judging by the public’s and media’s reaction to 9/11, one might conclude that

international terrorism is on the rise, but the opposite is true as Figure 1 showed. This

misperception may be due to the increasing likelihood of an incident resulting in casualties,

making incidents on average more newsworthy. The standard procedure for ascertaining the

form of a deterministic trend is by fitting a polynomial in time (t), where additional trend terms

(i.e., t, t2, t3) are added until the associated coefficient is no longer statistically significant. For

1968-2003, we investigate trends for six time series extracted from ITERATE: hostage taking,

bombings (of all types), threats and hoaxes (i.e., threatened future incidents or a false claim for a

concurrent incident – a bomb aboard a plane, when there is no bomb), assassinations, incidents

with casualties, and all transnational terrorist incidents. Table 2 indicates the polynomial trend

estimates for these six series (where time = t), all of which are characterized by a nonlinear trend.

The t-ratios associated with the coefficient estimates are indicated in parentheses beneath the

constant and the time trend terms. Five of the six series are represented by a quadratic trend with

a negative coefficient for the squared time term. This characterization reflects the fact that series

tended to rise in the late 1960s and to decline in the late 1990s. Only the threats and hoaxes

Page 265: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

9

series is represented by a more complicated cubic trend; nevertheless, this series also displays a

similar inverted U-shaped pattern.

In Table 2, the next-to-the-last column on the right reports the F-statistics and their

“prob” values in brackets, representing the statistical significance of the overall regression.

These significance levels are all zero to three digits, which are strongly supportive of the fitted

nonlinear trend equations. Such fitted trends are not useful for very long-term forecasting,

because there is little reason to believe that the number of incidents will continue to decline.

Instead, the fit of the nonlinear trend cautions against simple statements about a decidedly

upward or downward trend to any form of international terrorism. Such proclamations are

common in the media. The trend analysis suggests that there is persistence in each of the

incident series – high and low levels of terrorism come in waves or cycles. Shocks to any

incident series are not permanent, so that there is a reversion toward a long-run mean.

Cycles in terrorism data have been attributable to a number of factors. Alexander and

Pluchinsky (1992) explain fluctuations in terrorism using demonstration and copycat effects.

Heightened public sensitivity following a successful terrorist attack induces other terrorists to

strike when media reaction is likely to be great. The anthrax attacks following the events of 9/11

appear to correspond to this pattern. Economies of scale in planning terrorist incidents by

terrorist groups or networks may also lead to the bunching of attacks. Cycles may also stem

from the attack-counterattack process between the terrorists and authorities (Faria, 2003). Public

opinion following a spate of attacks can prompt governments’ periodic crackdowns that

temporarily create a lull in transnational terrorism. These downturns are subsequently followed

by countermeasures and recruitment by the terrorists as they prepare for a new offensive. Chalk

(1995) indicates that cycles based on public-opinion pressure swings are in the three to five year

range, insofar as time is required for the public to unite and successfully make their demands on

Page 266: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

10

officials to do something – a prediction borne out by time series investigations (Enders and

Sandler, 1999).

In our past work, we find that each type of terrorist series has its own characteristic cycle

that hinges on the logistical complexity of the attack mode. Enders and Sandler (1999) and

Enders, Parise, and Sandler (1992) argue that logistically complex events such as skyjackings,

large suicide car bombings, and assassinations will have longer cycles than less sophisticated

events as the attack-counterattack interaction among adversaries takes longer. Such complex

missions utilize relatively large amounts of resources as compared to small explosive bombings,

threats, and hoaxes. Given their resource constraints, terrorists can more easily gear up for a

campaign dominated by small bombs than one relying on more resource-intensive events.

The theory of Fourier series allows a wide class of functions to be expressed in terms of

sine and cosine components. To uncover the underlying cycles in a series, a researcher must

regress the detrended values of a series on all frequencies in the interval [1, T/2], where T is the

number of observations. The frequency of a series indicates how fast the underlying cycle is

completed – a low (high) frequency implies a long (short) cycle. A graphical depiction the

proportionate variation explained by each frequency (called the periodogram) has large peaks

representing the crucial underlying frequencies. Some series with obvious cycles, like sunspots

or average daily temperatures, will display a periodogram with a single focal frequency. Given

the stochastic behavior of terrorists and the measures applied to curb terrorism, there is unlikely

to be one deterministic frequency that dominates the periodicity for any of the six series. Thus,

we use a different approach than trying to identify one particular frequency. Series with long

periods will have most of their variance explained by the low frequencies, whereas series with

short periods will have most of their variance explained by high frequencies.

In accordance with spectral analysis, we detrended each series using the fitted polynomial

Page 267: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

11

trends in Table 2. The last two columns of Table 2 report the total variance of each series and

the proportion of this variance accounted for by the lowest 15 percent of the frequencies. In

particular, we report the proportion of the variance explained by the frequencies in the interval

[1, 0.15 × T/2]. We anticipate that the logistically complex incidents types will have relatively

large amounts of this proportion attributable to the low frequencies. The all-events series has a

large variance of 1256.651 with just 22.2 percent corresponding to the relatively low frequencies.

In marked contrast and in accordance with our priors, the more complex events of assassinations

and those involving casualties have smaller variances with more of this variance (39.3 and 39.1

percent, respectively) attributed to low frequencies. As predicted, threats and hoaxes of

bombings display the greatest evidence of short cycles with approximately 25 percent of their

variance explained by the longest cycles. Hostage taking is in the intermediate range with 31.1

percent of the variance explained by the low frequencies. Some hostage-taking events (e.g.,

skyjackings) are complex, while others (e.g., kidnapping) are not so complex; hence this

intermediate finding for all hostage-taking missions is sensible.

III. Game Theory and Hostage Taking

Despite the events of 9/11, hostage taking may still involve negotiations, because most

such missions involve kidnappings, where the terrorists are not suicidal. Skyjackings in Turkey

and Cuba during March 2003 demonstrate that not all such events include terrorists bent on mass

destruction. Nevertheless, suicide skyjackings and the reactions of desperate passengers to fight

back must be analyzed in the future along with a government’s decision to destroy a hijacked

plane.

To date, there have been seven economic analyses of hostage-taking events – i.e.,

Atkinson, Sandler, and Tschirhart (1987), Lapan and Sandler (1988), Selten (1988), Islam and

Page 268: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

12

Shahin (1989), Sandler and Scott (1987), Scott (1991), and Shahin and Islam (1992). The first

three studies stress game-theoretic aspects, while the latter four studies do not. We focus our

remarks around the Lapan and Sandler (1988) study, which is the most general of these three

game-theoretic studies. The question posed by their investigation is whether or not a stated

policy by which a government precommits never to negotiate with hostage takers will have the

intended consequence of keeping terrorists from ever taking hostages. The conventional wisdom

states that if terrorists know ahead of time that they have nothing to gain that they will never

abduct hostages. This belief has become one of the four pillars of US policy with respect to

addressing transnational terrorism – i.e., “make no concessions to terrorists and strike no deals”

(US Department of State, 2001, p. iii).

The underlying game tree is displayed in Figure 5, where the government goes first and

chooses a level of deterrence, D, which then determines the likelihood, θ, of a logistical failure

(i.e., failure to secure hostages). Because deterrence expenditure (equivalent to D) must be paid

by the government in all states of the world, it is analogous to an insurance premium and is,

hence, part of the cost to the government’s payoff, listed above that of the terrorists, at the four

endpoints to this simple game in Figure 5. More risk-averse governments choose higher

deterrence levels and experience less hostage taking at home. Once deterrence is decided, the

terrorists must then choose whether or not to attack. The probability of an attack, Ω, depends on

whether the terrorists’ expected payoffs from a hostage-taking attack are positive. If

* [(1 ) ] [ (1 ) ],c c pm p m< = − θ θ × + − ! then the terrorists are better off attacking even though they

receive –cθ for a logistical failure and (1 )[ (1 ) ]pm p m− θ + − ! for a logistical success. We have c

< c* when the expected payoff from a logistical success, which accounts for negotiation success

or failure, exceeds the expected payoff from a logistical failure. In Figure 5, Ω corresponds to

Page 269: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

13

*

0( ) ,

cf c dc∫ where f(c) is the probability density for c which reflects the unknown resolve of the

terrorists.

If hostages are apprehended (i.e., logistical success occurs), then the government must

decide whether or not to capitulate to terrorists’ demands, where p is the likelihood of

government capitulation. The probability of a hostage-taking incident increases with the

likelihood of a logistical success, the probability of a government capitulation (if hostages are

secured), and the benefit of a successful operation, m. In contrast, the likelihood of an attack

decreases with smaller terrorist payoffs associated with logistical and negotiating failures – i.e.,

smaller |c| and .m!

The conventional wisdom for the never-to-capitulate policy hinges on at least four

implicit assumptions: (i) the government’s deterrence is sufficient to stop all attacks; (ii) the

government’s pledge is fully credible to all would-be hostage takers; (iii) the terrorists’ gains

from hostage taking only derives from the fulfillment of their demands; and (iv) there is no

uncertainty concerning the payoffs. Each of these assumptions may not hold in practice.

Deterrence will not stop all attacks if the terrorists perceive that there is a positive expected

payoff from taking hostages – that ( ) ( )1 θ 1 θ 0 .pm p m c− × + − − > ! Even if the government’s

pledge is believed by the terrorists (i.e., p = 0), conditions on m! exists [i.e., ( )1 θ θm c− > −! ], so

that the terrorists can derive a positive gain from securing hostages when getting no concessions.

This may arise when media exposure from holding the hostages is sufficient reward in itself. If,

however, the government’s pledge is not completely credible (i.e., p > 0) owing to past

concessions, then the terrorists’ expected payoff is greater by ( ) ( )1 θ pm pm− − ! than in the case

of a credible governmental pledge, and so an attack becomes more imminent. When a terrorist

group is sufficiently fanatical that it views failure as having a positive payoff (i.e., 0m c> − >! ),

Page 270: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

14

then the expected payoff is always positive even when θ = 1 and deterrence is insufficient to

make failure a certainty.

At the endpoints of the game, the payoffs may themselves be uncertain. In this regard,

we focus on the payoffs to government from the four possible outcomes to the game. With no

attack, the government incurs only the cost of deterrence. If an attack ensues but fails (i.e., no

hostages are taken), then the government incurs the cost of a (> 0) in addition to deterrence

expense; if, however, an attack succeeds, then the government experiences an added cost of h for

capitulating and n for not capitulating. The game is more interesting (and realistic) by allowing

either h or n, or both to be uncertain. When, instead, h and n are known beforehand, the

government’s response would be to not capitulate provided that h > n. In the latter case,

conventional wisdom applies. Next, suppose that n is a random variable, which may assume a

large value for some hostages (e.g., a soldier or member of parliament). The government is now

guided by comparing h with the expected value of n, and then choosing the smallest, which may

involve conceding to terrorist demands (e.g., the Israeli release of 1,150 Arab prisoners in a

negotiated swap for three Israeli soldiers in May 1985) when the expected value of n exceeds h.

For the scenario when both h and n are random, the choice then hinges on choosing the

negotiation response that minimizes the expected cost. A precommitment strategy to never

concede to hostage takers’ demands may be time inconsistent when a government later discovers

that the cost of holding firm is too high owing to cost randomness. Although the government has

every intention to fulfill its pledge, its inability to deter all incidents and the terrorists’ ability to

capture the “right” hostage means that a government may, at times, renege on its pledge.

The game representation can be made more realistic by allowing multiple periods and

reputation costs. A government concession in one period to hostage takers makes terrorists raise

their belief about future concessions. As p increases for future periods, more hostages will be

Page 271: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

15

taken, so that there is an added cost to conceding in any period. This cost is denoted by R for

loss of reputation, and results in capitulation costs to the government, becoming h + R + D(θ) in

Figure 5. Even when reputation cost is included, conceding may not be eliminated unless h + R

exceeds n for all its realizations. Such a scenario may be achieved through rules – e.g., a

constitutional amendment that imposes sufficiently severe punishment to eliminate any

discretion of government negotiators.

The game can be made still more realistic by including additional sources of uncertainty

in terms of the terrorists’ payoffs. Hostage-taking incidents involve asymmetric information and

uncertainty on the part of both terrorists and governments (Lapan and Sandler, 1993; Overgaard,

1994). The beauty of game theory is that it permits the evaluation of policies while accounting

for uncertainty and strategic interactions of opposing interests. In so doing, easy fixes may not

be so straightforward.

IV. Game Theory and Governmental Responses

We have already discussed the transference externality when terrorists target two or more

countries and each independently chooses a level of deterrence that fails to account for associated

external costs/benefits. External costs are present when deterrence at home displaces the attack

abroad, while external benefits are relevant when deterrence at home either protects foreigners or

reduces the level of attacks globally. Depending on the opposing external effects, and there may

be others not listed, there may result too much or too little deterrence (Sandler and Arce, 2003;

Sandler and Lapan, 1988; Sandler and Siqueira, 2003). The overdeterrence/underdeterrence

problem is heightened when a terrorist network (e.g., al-Qaida) operates in upwards of 60

countries and stages their attacks worldwide (US Department of State, 2001). Underdeterrence

is particularly acute in countries sympathetic to a group’s grievances when the group focuses

Page 272: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

16

their attack on foreigners. As the number of potential targets increase, transference efforts may

be especially large. By forming a global network, terrorists limit the effectiveness of countries’

efforts to thwart terrorism as externalities are maximized through countries’ uncoordinated

decisions. Terrorists will naturally seek out the weakest link – i.e., the country with the least

security – for the venue for their next attack. To address these weaknesses, prime targets, such

as the United States, have instituted programs to assist such weakest-link countries in bolstering

their counterterrorist capabilities. In fact, this assistance is another of the four pillars of US

antiterrorism policy (US Department of State, 2001). Ironically, US efforts to induce other

countries to secure their airports and public places make the United States a more attractive

target, as 9/11 sadly demonstrated.

If the terrorist networking advantage is to be countered, then targeted nations must learn

to coordinate their own efforts at counterterrorism. This poses a special problem because nations

resist sacrificing their autonomy over security matters to a supranational collective. With this in

mind, terrorist experts have often called for piecemeal policy where intelligence is shared but not

deterrence decisions (e.g., Kupperman, 1987, p. 577). Such piecemeal responses may be

inadvisable when the strategic incentives are taken into account. Suppose that a terrorist network

targets three countries, each of which are engaged in overdeterrence to transfer the attack abroad.

Further suppose that intelligence allows the targeted countries to better judge the marginal

effectiveness of diverting attacks by revealing the terrorists’ preference for alternative targets.

As these nations acquire this information, they become better adept at diverting attacks, thereby

augmenting the negative transference externality. The net impact of this information sharing

may be to heighten the “transference race” without providing more security, so that the added

deterrence cost simply makes the three countries worse off. This results in a second-best

outcome in which the change in one policy parameter (i.e., increased information sharing) which

Page 273: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

17

would, under full cooperation, improve efficiency, may worsen inefficiency when a second

policy (i.e., coordination of deterrence) is not chosen optimally. A similar second-best scenario

may characterize other partial responses – e.g., greater actions to apprehend terrorists without

coordinating efforts to increase punishments. The failure to coordinate retaliatory responses

until 7 October 2001 is another piecemeal response that may have led to inefficiencies. Thus, the

application of game theory again raises policy concerns previously ignored in the literature.

V. Fighting Terrorists and Their Sponsors

Although governments are often confronted by the same terrorists who will target the

countries’ assets and people at home and abroad, countries nevertheless find it difficult to form

coalitions to attack the terrorists on their sponsors directly. Actions to coordinate retaliation

against terrorist camps are typically characterized as a Prisoners’ Dilemma (e.g., Lee, 1988;

Sandler, 1997; Sandler and Arce, 2003) where the dominant strategy, giving the greatest reward

regardless of the other countries’ action, is to do nothing. This representation follows because a

country’s own cost of attacking exceed its perceived benefits. Terrorists locate in out-of-the-way

places that give them a strategic and cost advantage – e.g., al-Qaida located in the caves and

mountains of Afghanistan. This locational advantage raises a retaliator’s costs, thus limiting a

nation’s desire to assume this role. Perceived retaliation cost may also be high relative to

derived benefits, because the retaliator often attracts subsequent terrorist attacks as a protest to its

action (Brophy-Baermann and Conybeare, 1994; Enders and Sandler, 1993). Any retaliatory

action, however, yields purely public benefits – nonexcludable and nonrival – to all potential

target countries. For example, suppose that three countries confront a common terrorist threat.

Further suppose that unilateral action by any nation costs it 6 but confers benefits of 4 on each of

the targeted nations. Thus, the retaliator nets −2, while the other nations receive a free-rider

Page 274: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

18

benefit of 4. From a social viewpoint, each retaliator gives more total benefits to society than its

individual costs; however, from the nation’s perspective, costs exceed benefits and it will do

nothing.

Action may, however, occur if some nation is the prime target so that its actions provide

more benefits to it than to other countries. When these nation-specific benefits begin to

outweigh the associated costs, a prime-target nation acts and “privileges” other less-preferred

targets with a free ride (Arce and Sandler, 2004; Sandler, forthcoming). After 9/11, the two

countries – the United States and the United Kingdom – that lost the most were the main two

participants in the attack of the Taliban and al-Qaida in Afghanistan. These targeted countries

had to be seen by their people to be doing something to protect their lives and property against

another devastating attack. Without action, the ruling government would lose legitimacy. This

need to maintain legitimacy in the aftermath of 9/11 raised the benefits of retaliatory action

sufficiently to warrant acting alone if required. This was particularly true for the United States.

A number of lessons in building a coalition to weaken a terrorist threat can be gleaned

from the aftermath of 9/11. Asymmetric targets foster action. If some countries are the choice

targets, then they may be sufficiently motivated to act. In addition, the terrorists encourage this

coalition building by concentrating their attacks on relatively few nations and escalating the

magnitude of spectacular attacks. If they were to spread their attacks more evenly over nations,

no nation may derive sufficient benefits to privilege the rest of the group with a free ride from a

retaliatory action. Terrorists will concentrate their attacks to satisfy a constituency. Terrorists’

desire to capture the attention of the media means that they must kill lots of people with some

attacks. As death tolls mount, nations become motivated to act as benefits start to outweigh

costs.

Page 275: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

19

VI. Rational-Choice Representations of Terrorists

Beginning with the Landes (1978) study of skyjackings, economists characterize

terrorists as rational actors who maximize expected utility or net payoffs subject to constraints.

Arguments in these constraints may consist of terrorists’ resource endowments or actions taken

by the authorities to thwart terrorism. In the Landes (1978) model, potential hijackers engage in

a hijacking provided that the associated expected utility exceeds other nonskyjacking means of

furthering their goals. Based on this utility comparison, Landes (1978) specifies an offense (i.e.,

number of skyjackings) function, whose independent variables include the hijackers’ subjective

estimate of the likelihood of apprehension, their estimate of the conditional probability of

imprisonment (if apprehended), and other actions by the authorities (e.g., the presence of US sky

marshals on flights). Using data on US hijackings for 1961-1976, Landes demonstrates that

greater prison sentences and enhanced likelihood of apprehension are significant deterrents. He

also indicates that the installation of metal detectors on 5 January 1973 led to between 41 and 50

fewer hijackings in the United States during 1973-1976.

In a subsequent analysis, Enders and Sandler (1993) examine a wide range of policy

interventions, including metal detectors, fortification of embassies, retaliatory raids, and the

Reagan “get-tough-on-terrorists” laws. The theoretical model for the terrorists that underlies

their study is analogous to the consumer-choice model. Terrorists maximize utility or expected

utility derived from the consumption of basic commodities, produced from terrorist and

nonterrorist activities. For example, al-Qaida terrorists may gain utility from a reduced political

resolve on the part of the United States to remain in the Persian Gulf as Americans lose their

lives in terrorist attacks (e.g., the destruction of the Al Khubar Towers housing US airmen and

others on 25 June 1996 near Dhahran, Saudi Arabia). This weakening of US resolve is the basic

commodity that can be produced with a number of alternative attack modes. Substitution

Page 276: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

20

possibilities among terrorist tactics arise when alternative modes of operations produce the same

basic commodities (e.g., political instability, media attention) in varying amounts. Substitution

is enhanced when attack modes possess closely related outcomes and are logistically similar.

This is clearly the case for hijackings and other kinds of hostage events. Complementarity

results when combinations of attack modes are required to produce one or more basic

commodities. When threats follow real attacks, both actions assume a heightened effectiveness

and are thus complementary.

To produce these basic commodities, a terrorist group must choose between nonterrorist

and terrorist activities, while being constrained by resources. In the latter choice, terrorists must

further choose between different modes of terrorist attacks based on the perceived “prices”

associated with alternative operations. Choices are many and include the intended lethality of

the act, its country of location, and whom or what to target. The expenditure on any activity

consists of its per-unit price times the activity’s level. Each mode of operation has a per-unit

price that includes the value of time, resources, and anticipated risk to accomplish the act. The

securing and maintenance of a kidnapping victim in a hidden location is logistically more

complex and requires more resources than leaving a small bomb in a trash bin in a railroad

station, so that the former has a greater per-unit price. In choosing a venue, the price differs

based on security measures taken by the authorities; a country with more porous borders will be

the staging ground for attacks against targets from other more secure countries. The prices

confronting the terrorists for each tactic are determined, in large part, by the government’s

allocation of resources to thwart various acts of terrorism. If, for example, embassies are

fortified, then attacks against embassy personnel and property within the mission’s ground

become more costly for the terrorists – i.e., there is a rise in the relative price of such attacks.

Similarly, metal detectors in airports increase the relative price of skyjackings as compared with

Page 277: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

21

other kinds of terrorist acts, including kidnappings.

Government policies aimed at a single type of terrorist event (e.g., the installation of

bomb-sniffing equipment in airports) adversely changes its relative price and results in a

substitution into now less expense modes of attack. Thus, Landes’ (1978) measure of the

success of metal detectors, in terms of fewer skyjackings, does not go far enough, because the

application of this technology may have induced a large number of other kinds of events.

Similarly, to judge the success of embassy fortification, a researcher must also examine

assassinations and other attacks against embassy personnel, once outside of the compound.

To account for these substitutions, Enders and Sandler (1993) apply vector autoregression

(VAR) analysis to allow for the potential interactions among various terrorist time series (e.g.,

skyjackings and other hostage events) in response to government policies. They find that metal

detectors decreased skyjackings and threats, but increased other kinds of hostage incidents, not

protected by detectors. The trade-off between events were about one for one (also see Enders,

Sandler, and Cauley, 1990; Im, Cauley, and Sandler, 1987). Both substitutions and

complementarities are uncovered. Fortification of US embassies and missions reduced attacks

against such installations, but were tied to a disturbing increase in assassinations of officials and

military personnel outside of protected compounds. In addition, Enders and Sandler (1993)

establish that the US retaliatory raid against Libya on April 1986 (for its suspected involvement

in La Belle Discothèque in West Berlin on 4 April 1986) was associated with an immediate

increase in terrorist attacks against US and UK interests. This increase was shortly followed by a

temporary lull as terrorists built up depleted resources. Apparently, the raid caused terrorists to

intertemporally substitute attacks planned for the future into the present to protest the retaliation.

Within a relatively few quarters, terrorist attacks resumed the same mean number of events.

There are a number of ways to institute antiterrorist policies that address these likely

Page 278: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

22

substitutions and complementarities. First, the government must make the terrorists substitute

into less harmful events. Second, the government must go after the terrorists’ resource

endowment (i.e., its finances, its leadership, and its membership) if an overall decrease in

terrorism is to follow. Efforts to infiltrate groups or to freeze terrorists’ finances have this

consequence. Third, the government must simultaneously target a wide range of terrorist attack

modes, so that the overall rise in the prices of terrorist attacks becomes analogous to a decrease

in resources. Success in raising the price of all modes of terrorist attacks would induce terrorists

to shift into legal protests and other nonterrorist actions to air grievances. Based on the above,

we can conclude that a reliance on technological barriers merely causes a substitution into other

attack modes in the short run. In the long term, terrorists will develop ingenuous

countermeasures (i.e., plastic guns, bottles of flammable liquid) to circumvent the technology.

This terrorist response is an innovation effect, which gives rise to a dynamic strategic interaction.

Consequently, authorities must be ever vigilant to improve the technology by anticipating

terrorists’ ways of circumventing such barriers. This vigilance must lead to periodic upgrades in

the technology prior to the terrorists exposing the technology’s weakness through a successful

attack. Unfortunately, authorities have been reactive by only responding after a technological

barrier’s weakness has been exploited, so that the public remains vulnerable until a new

technological fix is found and installed.

Other kinds of substitutions

Substitution effects abound in the study of terrorism and involve not only actions of the

terrorists, as described above, but also actions of the targets. For targets, the economic literature

addresses two kinds of substitutions. First, there are studies that examine the tourists’ choice of

vacation spot based on the perceived threat of terrorism and other costs. An alteration in travel

Page 279: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

23

risks, arising from increased terrorist incidents in a country, raises the price of a holiday there in

comparison to other vacation venues, not confronted with terrorism. In a study of Spain, Enders

and Sandler (1991) employ VAR analysis to demonstrate that a typical transnational terrorist

incident is estimated as scaring away just over 140,000 tourists when all monthly impacts are

combined. Companion studies by Enders, Sandler, and Parise (1992) and Drakos and Kutan

(2003) establish and quantify terrorism-induced substitutions in tourism for Greece, Austria,

Italy, Turkey, Israel, and other terrorism-ridden countries. Countries, like Greece, that have not

addressed transnational terrorist attacks directed at foreigners lose significant foreign-exchange

earnings as a consequence. The cost of terrorism comes in many forms.

Second, target-based substitutions involve foreign direct investment (FDI). Investors

decide where to invest based on their perceived economic risks, political risks, and monetary

returns. An increase in transnational terrorism directed at FDI (e.g., attacks by Euskadi ta

Askatasuna (ETA) in the Basque region of Spain) is sure to divert such investment. Enders and

Sandler (1996) show that an “average” year’s worth of terrorism reduced net FDI in Spain by

13.5% annually, and it reduced net FDI in Greece by 11.9% annually. These reductions

translated into declines in real net FDI of $488.9 million and $383.5 million, respectively, or the

equivalent of 7.6% and 34.8% of annual gross fixed capital formation in Spain and Greece.

Transnational terrorism displayed significant economic cost, not counting the billions spent on

barriers and deterrence. In a more recent study of the Basque region, Abadie and Gardeazal

(2003) establish that terrorism reduced per capita GDP by ten percentage points in relation to the

terrorism-free synthetic control region.

Studies of risks

After 9/11, there is greater interest in applying economic methods to study antiterrorism

Page 280: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

24

policy choices. One useful line of study examines interdependent security (IDS) risks where the

effectiveness of the protective actions by one agent is highly dependent on those of other agents

(Heal and Kunreuther, 2004; Kunreuther and Heal, 2003). If, e.g., luggage in the cargo hold of a

commercial plane is not rechecked during transfer, then airlines’ incentives to invest in screening

their own luggage are diminished because the safety of the flight is dependent on exogenous

factors. These authors show that a variety of game forms may apply. They also make policy

recommendations to create tipping and cascading equilibriums, whereby firms become more

motivated to augment their own security as transferred luggage of key carriers (i.e., those with

the greatest number of feeder flights) become safely screened. To achieve these equilibriums,

government must target airline subsidies to key carriers. There are many IDS concerns

associated with protective measures against terrorist attacks in a globalized world.

Economists are also interested in the insurance implications of terrorism, since extreme

events such as 9/11 are very costly – about $90 billion in losses (Kunreuther, Michel-Kerjan, and

Porter, 2003) – and virtually impossible to predict. Following 9/11, most insurers dropped their

terrorism coverage or made it prohibitively expensive. Terrorism coverage raises public policy

issues – e.g., should the government provide coverage and, if so, how should public and private

coverage interface? Clearly, economics can be fruitfully applied to such problems.

VII. Toward a Benefit-Cost Analysis of Terrorist-Thwarting Policies

As a future research project, economists should assess the benefits and cost of specific

policies to thwart terrorism. Such an exercise has not been adequately done and poses some real

challenges. Costs are fairly straightforward since figures are available in, say, the United States

as to what is paid to fortify embassies and missions, or to guard US airports. Consider the cost

Page 281: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

25

associated with airport security. The value of lost time as travelers are screened must be added

to the cost of guards and screening equipment.

On the benefit side, calculations are less transparent. One way to estimate a portion of

this benefit would be to compute the reduced loss of life attributable to airport security measures

– i.e., fewer people killed in skyjackings. If the net number of such lives saved, after adjusting

for substitutions into other life-threatening terrorist actions, can be measured, then the average

“value of a statistical life” can be applied to translate these lives into a monetary figure. To this

figure, a researcher must also compute and add the reduced losses in property values (i.e., from

destroyed planes) attributable to the fewer hijackings. In addition, a portion of the value of net

air travel revenues must be considered as a benefit arising from a heightened sense of security

stemming from security upgrades. The events of 9/11 clearly underscore that there is a cost to a

breach in airport security as the public loses its confidence in air travel. Any of these

components are fraught with measurement difficulties, because there may be intervening factors

at work – e.g., air travel was already in a slump prior to 9/11.

Every policy to thwart terrorism would entail its own stream of benefits and costs.

Invariably, the benefit calculations are problematic. The US-led retaliation against al-Qaida and

the Taliban in Afghanistan has well-defined costs in terms of deployed soldiers, ordnance,

diplomacy, and side payments to “allies.” But the true savings or benefits from fewer future acts

of terrorism, in terms of lives and property saved, is so much more difficult to calculate as they

require counterfactual information. Time-series techniques, engineered by Enders and Sandler

(1991, 1996) to measure losses to tourism or to FDI from terrorism, can be utilized following the

retaliation to roughly estimate the decline in terrorist incidents and their economic value.

VIII. Concluding Remarks

Page 282: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

26

Although economic methods have enlightened the public on a number of issues

concerning transnational terrorism, there are many other issues to analyze. For instance, there is

a need for applying more dynamic game methods – i.e., differential game theory – if the waxing

and waning of terrorist organizations (e.g., Red Brigades and Red Army Faction) are to be

understood. Clearly, past successes and failures determine the size of these groups over time.

The terrorists try to increase their organization’s size through enhanced resources, successful

operations, and recruitment, while the government tries to limit the group’s size through raids,

intelligence, group infiltration, and actions to thwart successes. This dynamic strategic

interaction needs to be modeled and empirically tested. In addition, researchers must better

assess the role of information and intelligence on behalf of the terrorists and the authorities.

Given how little governments really know about the strength of the terrorists that they confront –

e.g., the US government had almost no clue about the size of al-Qaida (US Department of State,

2001, p. 69) prior to 9/11 – asymmetric information characterizes efforts to thwart terrorism.

Similarly, the terrorists are ill-informed about the resolve of the government and the amount of

resources that it is willing to assign to curbing terrorism. Additionally, there is a need to model

terrorist campaigns – i.e., the choice of the sequence and composition of attacks used by

terrorists. As researchers better understand these choices, more effective policy responses can be

devised that adjust for the strategic interaction. Another unresearched issue is the optimal choice

between proactive and defensive antiterrorism policies. Arce and Sandler (2004) show that

governments have a proclivity to favor defensive policies when confronting transnational

terrorism, but these authors do not indicate the optimal mix.

Page 283: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

27

References

Abadie, Alberto and Javier Gardeazabal. 2003. “The Economic Costs of Conflict: A Case

Study of the Basque Country,” American Economic Review, 93, 113−132.

Alexander, Yonah and Dennis Pluchinsky. 1992. Europe’s Red Terrorists: The Fighting

Communist Organizations. London: Frank Cass.

Arce M. Daniel G. and Todd Sandler. 2004. “Counterterrorism: a Game-Theoretic Analysis,”

Los Angeles, CA: School of International Relations, University of Southern California

(unpublished manuscript).

Atkinson, Scott E., Todd Sandler, and John T. Tschirhart. 1987. “Terrorism in a Bargaining

Framework,” Journal of Law and Economics, 30, 1−21.

Azam, Jean-Paul. Forthcoming. “Suicide-Bombing on Inter-Generational Investment,” Public

Choice.

Brophy-Baermann, Brian and John A.C. Conybeare. 1994. “Retaliating against Terrorism:

Rational Expectations and the Optimality of Rules Versus Discretion,” American Journal

of Political Science, 38, 196–210.

Cauley, John and Eric I. Im. 1988. “Intervention Policy Analysis of Skyjackings and Other

Terrorist Incidents,” American Economic Association Papers and Proceedings, 78, 27–

31.

Chalk, Peter, 1995. “The Liberal Democratic Response to Terrorism,” Terrorism and Political

Violence, 7, 10–44.

Drakos, Kostas and Ali M. Kutan. 2003 “Regional Effects of Terrorism on Tourism: Evidence

from Three Mediterranean Countries,” Journal of Conflict Resolution, 47, 621−641.

Enders, Walter and Todd Sandler. 1991. “Causality Between Transnational Terrorism and

Tourism: The Case of Spain,” Terrorism, 14, 49−58.

Page 284: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

28

_____. 1993. “The Effectiveness of Anti-Terrorism Policies: Vector-Autoregression

Intervention Analysis,” American Political Science Review, 87, 829−844.

_____. 1996. “Terrorism and Foreign Direct Investment in Spain and Greece,” Kyklos, 49,

331−352.

_____. 1999. “Transnational Terrorism in the Post-Cold War Era,” International Studies

Quarterly, 43, 145−167.

_____. 2000. “Is Transnational Terrorism Becoming More Threatening,” Journal of Conflict

Resolution, 44, 307−332.

_____. 2002. “Patterns of Transnational Terrorism 1970-99: Alternative Time Series

Estimates,” International Studies Quarterly, 46, 145−165.

Enders, Walter, Gerald F. Parise, and Todd Sandler. 1992. “A Time-Series Analysis of

Transnational Terrorism: Trends and Cycles,” Defence Economics, 3, 305−320.

Enders, Walter, Todd Sandler, and Jon Cauley. 1990. “UN Conventions, Technology and

Retaliation in the Fight against Terrorism: An Econometric Evaluation,” Terrorism and

Political Violence, 2, 83−105.

Enders, Walter, Todd Sandler, and Gerald F. Parise. 1992. “An Econometric Analysis of the

Impact of Terrorism on Tourism,” Kyklos, 45, 531−554.

Faria, João. 2003. “Terror Cycles,” Studies in Nonlinear Dynamics and Econometrics, 7,

Article 3, http://www.bepress.com/snde.

Heal, Geoffrey and Howard Kunreuther. 2004. “IDS Models and Airline Security,” New York,

NY: Graduate School of Business, Columbia University (unpublished manuscript).

Hoffman, Bruce. 1997. “The Confluence of International and Domestic Trends in Terrorism,”

Terrorism and Political Violence, 9, 1−15.

_____. 1998. Inside Terrorism. New York: Columbia Univ. Press.

Page 285: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

29

Im, Eric I., Jon Cauley, and Todd Sandler. 1987. “Cycles and Substitutions in Terrorist

Activities: A Spectral Approach,” Kyklos, 40, 238−255.

Islam, Muhammad Q. and Wassim N. Shahin. 1989. “Economic Metholdology Applied to

Political Hostage-Taking in Light of the Iran-Contra Affair,” Southern Economic

Journal, 55, 1019−1024.

Kunreuther, Howard and Geoffrey Heal. 2003. “Interdependent Security,” Journal of Risk and

Uncertainty, 26, 231−249.

Kunreuther, Howard, Erwann Michel-Kerjan, and Beverly Porter. 2003. “Assessing, Managing

and Financing Extreme Events: Dealing with Terrorism,” Working Paper No. 10179,

National Bureau of Economic Research, Cambridge, MA.

Kupperman, Richard N. 1987. “Vulnerable America,” in Paul Wilkinson and A.M. Stewart

(eds.), Contemporary Research on Terrorism, Aberdeen, UK: University of Aberdeen

Press, pp. 570-580.

Landes, William M. 1978. “An Economic Study of US Aircraft Hijackings, 1961-1976,”

Journal of Law and Economics, 21, 1−31.

Lapan, Harvey E. and Todd Sandler. 1988. “To Bargain or Not to Bargain: That is the

Question,” American Economic Association Papers and Proceedings, 78, 16−20.

_____. 1993. “Terrorism and Signalling,” European Journal of Political Economy, 9, 383−397.

Lee, Dwight R. 1988. “Free Riding and Paid Riding in the Fight against Terrorism,” American

Economic Papers and Proceedings, 78, 22−26.

Mickolus, Edward F. 1982. International Terrorism: Attributes of Terrorist Events, 1968-1977

(ITERATE 2). Ann Arbor, MI: Inter-University Consortium for Political and Social

Research.

Mickolus, Edward F., Todd Sandler, Jean M. Murdock, and Peter Flemming. 2004.

Page 286: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

30

International Terrorism: Attributes of Terrorist Events, 1968-2003 (ITERATE 5). Dunn

Loring, VA: Vinyard Software.

Overgaard, Per B. 1994. “Terrorist Attacks as a Signal of Resources,” Journal of Conflict

Resolution, 38, 452−78.

Sandler, Todd. 1997. Global Challenges. Cambridge: Cambridge Univ. Press.

_____. Forthcoming. “Collective versus Unilateral Responses to Terrorism,” Public Choice.

Sandler, Todd and Daniel G. Arce M. 2003. “Terrorism & Game Theory,” Simulation &

Gaming, 34, 319−337.

Sandler, Todd and Harvey E. Lapan. 1988. “The Calculus of Dissent: An Analysis of

Terrorists’ Choice of Targets,” Synthèse, 76, 245-261.

Sandler, Todd and John L. Scott. 1987. “Terrorist Success in Hostage-Taking Incidents,”

Journal of Conflict Resolution, 31, 35−53.

Sandler, Todd and Kevin Siqueira. 2003. “Global Terrorism: Deterrence versus Preemption,”

Los Angeles: School of International Relations, University of Southern California

(unpublished manuscript).

Sandler, Todd, John T. Tschirhart, and Jon Cauley. 1983. “A Theoretical Analysis of

Transnational Terrorism,” American Political Science Review, 77, 36−54.

Scott, John L. 1991. “Reputation Building in Hostage Incidents,” Defence Economics, 2,

209−218.

Selten, Reinhard. 1988. “A Simple Game Model of Kidnappings,” in Reinhard Selten (ed.),

Models of Strategic Rationality, Boston: Kluwer Academic, pp. 77−93.

Shahin, Wassim N. and Muhammad Q. Islam. 1992. “Combating Political Hostage-Taking: An

Alternative Approach,” Defence Economics, 3, 321−7.

United States Department of State, Various years. Patterns of Global Terrorism. Washington,

Page 287: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

31

DC: US Department of State.

Wilkinson, Paul. 1986. Terrorism and the Liberal State, rev. ed. London: Macmillan.

_____. 2001. Terrorism versus Democracy: The Liberal State Response. London: Frank Cass.

Page 288: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

TABLE 1: Transnational Terrorism: Events 1968-2003

Year Number of Events Deaths Wounded Attacks on US Interests 2003 208 625 3,646 84 2002 202 725 2,013 77 2001 355 3,296 2,283 219 2000 426 405 791 200

1999 395 233 706 169 1998 274 741 5,952 111

1997 304 221 693 123 1996 296 314 2,652 73

1995 440 163 6,291 90

1994 322 314 663 66 1993 431 109 1,393 88

1992 363 93 636 142 1991 565 102 233 308 1990 437 200 675 197

1989 375 193 397 193

1988 605 407 1,131 185 1987 665 612 2,272 149

1986 612 604 1,717 204 1985 635 825 1,217 170

1984 565 312 967 133 1983 497 637 1,267 199

1982 487 128 755 208 1981 489 168 804 159

1980 499 507 1,062 169 1979 434 697 542 157

1978 530 435 629 215

1977 419 230 404 158 1976 457 409 806 164 1975 382 266 516 139

1974 394 311 879 151

1973 345 121 199 152 1972 558 151 390 177

1971 264 36 225 190 1970 309 127 209 202

1969 193 56 190 110 1968 125 34 207 57 Source: US Department of State, Patterns of Global Terrorism (1988-2003) and tables provided to Todd Sandler in 1988 by the US Department of State, Office of the Ambassador at Large for Counterterrorism.

Page 289: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

0

50

100

150

200

250

300

350

1968 1970 1972 1974 1976 1978 1980 1982 1984 1986 1988 1990 1992 1994 1996 1998 2000 2002

Inci

den

ts p

er Q

uar

ter

All

Bombings

FIGURE 1: All Incidents and Bombings, 1968-2003

Page 290: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

0

5

10

15

20

25

30

35

1968 1970 1972 1974 1976 1978 1980 1982 1984 1986 1988 1990 1992 1994 1996 1998 2000 2002

Inci

den

ts p

er Q

uar

ter

Assassinations

Hostage Incidents

FIGURE 2: Assassinations and Hostage Incidents, 1968-2003

Page 291: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

0

10

20

30

40

50

60

70

80

90

100

1968 1970 1972 1974 1976 1978 1980 1982 1984 1986 1988 1990 1992 1994 1996 1998 2000 2002

Per

cen

t

FIGURE 3: Proportion of Incidents with Casualities, 1968-2003

Page 292: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

0

10

20

30

40

50

60

70

80

90

100

1968 1970 1972 1974 1976 1978 1980 1982 1984 1986 1988 1990 1992 1994 1996 1998 2000 2002

Per

cen

t

Hostage IncidentsBombings

FIGURE 4: Proportions of Bombings and Hostage Incidents, 1968-2003

Page 293: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

TABLE 2: Trend and Other Statistical Properties of Transnational Terrorist Incidents, 1968-2003

Incident Type Constanta Time (Time)2 (Time)3 F–statb Variance Percentc

Hostage taking 2.916 0.244 –0.002 13.83 31.837 0.311 (2.009) (5.120) (–4.839) [0.000] Bombings 37.710 0.954 –0.008 30.296 624.310 0.241 (5.916) (4.637) (–6.040) [0.000] Threats & Hoaxes 6.024 –0.061 0.006 –0.000 15.011 79.431 0.263 (1.940) (–0.326) (1.811) (–2.854) [0.000] Assassinations –1.069 0.379 –0.003 65.367 18.126 0.393 (–0.976 (10.716) (–11.371) [0.000] Casualties 5.112 0.810 –0.006 58.444 86.454 0.391 (2.138) (10.494) (–10.811) [0.000] All Events 43.075 2.293 –0.018 44.240 1256.651 0.222 (4.725) (7.790) (–8.855) [0.000] a t-ratios are in parentheses. b Prob values are in brackets under the F-statistics. c Proportion of variance of the detrended, fitted-polynomial series that is accounted for by the lowest

15 percent of the frequencies (i.e., the longest cycles).

Page 294: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

!

"#$%

!

&%%$

'#$%

&%($

#

)

*

Page 295: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

10.1177/0022002704272863ARTICLEJOURNAL OF CONFLICT RESOLUTIONArce M., Sandler / COUNTERTERRORISM

Counterterrorism

A GAME-THEORETIC ANALYSIS

DANIEL G. ARCE M.Department of Economics

Rhodes College

TODD SANDLERSchool of International Relations

University of Southern California

This article establishes the prevalence of deterrence over preemption when targeted governments canchoose between either policies or employ both. There is a similar proclivity to favor defensive counter-terrorist measures over proactive policies. Unfortunately, this predisposition results in an equilibrium withsocially inferior payoffs when compared with proactive responses. Proactive policies tend to provide purelypublic benefits to all potential targets and are usually undersupplied, whereas defensive policies tend to yielda strong share of provider-specific benefits and are often oversupplied. When terrorists direct a dispropor-tionate number of attacks at one government, its reliance on defensive measures can disappear. Ironically,terrorists can assist governments in addressing coordination dilemmas associated with some antiterroristpolicies by targeting some countries more often than others.

Keywords: counterterrorism; deterrence; preemption; terrorism; noncooperative game; Nashequilibrium

Terrorism is the premeditated use or threat of use of violence by individuals orsubnational groups to obtain political, religious, or ideological objectives throughintimidation of a large audience usually beyond that of the immediate victims.1 Bysimulating randomness, terrorists create an atmosphere of fear where everyone feelsvulnerable, thereby extending their sphere of influence as far as possible. Suicide mis-sions can heighten this air of anxiety and place greater pressures on governments tocapitulate to terrorist demands owing to the greater casualties, on average, associatedwith such events—thirteen deaths per suicide attack compared with less than one

183

AUTHORS’NOTE: Daniel G. Arce M. is the Robert D. McCallum Distinguished Professor of Econom-ics and Business at Rhodes College. Todd Sandler is the Robert R. and Katheryn A. Dockson Professor ofInternational Relations and Economics at the University of Southern California. The authors have profitedfrom the comments of two anonymous reviewers.

JOURNAL OF CONFLICT RESOLUTION, Vol. 49 No. 2, April 2005 183-200DOI: 10.1177/0022002704272863© 2005 Sage Publications

1. This definition combines essential features of definitions in the literature; see Hoffman (1998,chap. 1) and Schmid and Jongman (1988).

Page 296: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

death per nonsuicide attack (Pape 2003). In this regards, the events of September 11,2001 (henceforth 9/11), made the public and governments painfully aware of the risksposed by the new breed of suicide and fundamentalist terrorists bent on maximal casu-alties. Following 9/11, governments have spent tens of billions of dollars on a varietyof antiterrorist policies. Since 2002, the budget supporting the newly created U.S.Department of Homeland Security grew by more than 60 percent to $36.2 billion forfiscal year 2004 (Office of Management and Budget 2003).

Counterterrorist policies may involve taking direct actions against terrorists or theirsponsors. Such proactive policies may include destroying terrorist training camps,retaliating against a state sponsor, infiltrating terrorist groups, gathering intelligence,or freezing terrorist assets. Preemption is the quintessential proactive policy in whichterrorists and their assets are attacked to curb subsequent terrorist campaigns. Moredefensive or passive counterterrorist measures include erecting technological barriers(e.g., metal detectors or bomb-sniffing equipment at airports), fortifying potential tar-gets, and securing borders. These defensive policies are intended to deter an attack byeither making success more difficult or increasing the likely negative consequences tothe perpetrator.2 Efforts to deter terrorist events often displace the attack to other ven-ues, modes of attack (e.g., from a skyjacking to a kidnapping), countries, or regions,where targets are relatively softer (Drakos and Kutan 2003; Enders and Sandler 1993;Sandler and Enders 2004; Sandler 2003).

By protecting all potential targets, preemption provides public benefits; in contrast,by deflecting the attack to relatively less-guarded targets, deterrence and/or defensivemeasures impose public costs. The irony arises because nations have a pronouncedproclivity to resort to deterrence rather than preemption despite the greater social gainsusually associated with the latter. The primary purpose of this article is to apply ele-mentary game theory to explain this tendency. Unlike a recent paper (Sandler andSiqueira 2003) that examines deterrence and preemption in isolation, the current exer-cise allows governments to choose between these policies or to employ them together.Although we allow alternative game forms to characterize both policies, deterrence isshown to have an unfortunate dominance over preemption, consistent with what isobserved in the real world. A second major purpose is to investigate the game structureof other defensive and proactive counterterrorist policies. A variety of game forms arerelevant, not only among different antiterrorist measures but also for the same measureunder alternative scenarios. The analysis also identifies the circumstances whenpreemption may result owing to payoff asymmetries between targets or policies.

Game theory is an appropriate tool for investigating counterterrorism because itcaptures the strategic interactions between terrorists and targeted governments whosechoices are interdependent.3 In so doing, game theory permits a rich range of strategic

184 JOURNAL OF CONFLICT RESOLUTION

2. Our use of deterrence follows that in the terrorist literature (Sandler and Enders 2004), in whichdeterrence limits or restrains a particular action (e.g., metal detectors made hijackings more difficult andgreatly reduced attempted hijackings). We do not use deterrence in the cold war sense of inhibiting an actionnecessarily through a threatened punishment.

3. Past articles have applied game theory to evaluate hostage negotiations (Atkinson, Sandler, andTschirhart 1987; Lapan and Sandler 1988; Sandler, Tschirhart, and Cauley 1983; Selten 1988), terrorists’choice of targets (Sandler and Arce M. 2003; Sandler and Lapan 1988), and terrorists’allocation of resourcesunder asymmetric information (Lapan and Sandler 1993; Overgaard 1994).

Page 297: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

environments and policy choices in keeping with modern-day terrorist threats. More-over, game theory assumes that each player is rational and must second-guess itsadversaries; thus, a government must place itself in its opponents’ position beforedeciding the appropriate strategic response. To decide the best strategy, a governmentmust anticipate not only the actions of terrorists but also those of other governmentsthat might work at cross-purposes or take advantage of another government’s action.In today’s world of networked terrorists where the threat is global, accounting forthese reactions of other governments is essential to the formulation of effectivecounterterrorist policies.

PREEMPTION OR DETERRENCE: SPECIFIC EXAMPLE

Any strategic analysis of the choice between preemption or deterrence mustaccount for preemption’s purely public benefits to all potential targets: direct actionagainst terrorists or their sponsors makes everyone safer.4 In contrast, a strategic repre-sentation of deterrence must account for the costs imposed on the nation that deters anattack as well as the public costs incurred by others from the increased likelihood ofhaving an attack deflected to their soil. The deterrer must not only expend resources tomake its territory a less attractive venue but also suffers costs from having its people orproperty targeted abroad. Deterrence spending is analogous to an insurance policy thatis paid regardless of the outcome, but in bad states (when an attack ensues), deterrencecurbs the expected damage at home, which is the deterrer’s private benefit.

Arce M., Sandler / COUNTERTERRORISM 185

EU Preempt Status quo Deter

Preempt 2,2 2,4 6,6

Status quo 4, 2 0,0 4,2 US

Deter 6, 6 2, 4 Nash

2, 2

− −

−−

−−−−

Figure 1: Deterrence versus Preemption: Symmetric Benefits and CostsNOTE: EU = European Union.

4. Everyone is safer insofar as a weakened terrorist threat means that all potential targets have less tofear. There is, however, a qualification: heavy-handed preemption may create anger and new recruits,thereby jointly producing a public bad (Rosendorff and Sandler 2004). The analysis here holds, provided thatthe pure public benefit from preemption-induced threat reduction outweighs any associated public costsfrom new recruits to the terrorist cause. Inclusion of recruitment costs would reinforce our findings thatdeterrence is favored to preemption.

Page 298: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

To illustrate the dilemma posed by counterterrorist policies, we use a specificexample in which two targets—the United States and the European Union (EU)—must choose preemption or deterrence. Both players can also do nothing, denoted bythe status quo. The passive player is the terrorist group that is bent on attacking theweaker of the two targets or flipping a coin if neither is weaker. For illustration, eachpreemptive action provides a public benefit of 4 for the United States and EU at a pri-vate cost of 6 to the preemptor. In Figure 1, the preemption game is captured by thenorthwest 2 × 2 bold-bordered matrix, in which each government can preempt ormaintain the status quo. If, say, the United States preempts, then it gains a net benefit of–2 (= 4 – 6) while conferring a free-rider gain of 4 on the EU. These payoffs arereversed if the roles are switched. When both governments preempt, each receives anet gain of 2 as its preemption expense of 6 is deducted from gains of 8 (= 4 × 2)derived from both targets’ efforts. Neither country acting gives zero net benefits toboth players. This 2 × 2 preemption game is a prisoner’s dilemma (PD) with inaction asthe dominant strategy since 4 > 2 and 0 > −2. The resulting Nash equilibrium is mutualstatus quo—(Status Quo, Status Quo)—from which neither target would unilaterallymove. This equilibrium is Pareto dominated by mutual action (preemption).

Next, we turn to the 2 × 2 deterrence game displayed by the southeast 2 × 2 bold-bordered matrix in Figure 1, in which the players have two strategies: do nothing ordeter an attack at home. In this stylized symmetric example, we assume that deterrenceis associated with a public cost of 4 experienced by the deterrer and the other country.The deterrer’s costs arise from the action and its potential losses from a deflectedattack (say, from its citizens residing abroad), while the nondeterrer suffers the deflec-tion costs of being the target of choice. A deterrer is motivated by private gains of 6prior to costs being deducted. If, say, the EU deters alone, then it nets 2 (= 6 – 4), whilethe United States loses 4 by becoming the target of choice. Payoffs are switched whenthe United States deters alone. Net benefits are zero if neither acts, while each receivesa net payoff of –2 [= 6 – (4 × 2)] from mutual deterrence as costs of 8 are deducted froma private gain of 6. Once again, a PD game results. Now, the dominant strategy is action(Deter) rather than inaction, and the Nash equilibrium is (Deter, Deter).

The real issue is which counterterrorism policy dominates if each target can chooseeither policy or the status quo. This can be addressed by consulting the 3 × 3 matrix ofFigure 1 with its two embedded PD games. If one player deters and the other preempts,then the deterrer gains 6 (= 6 + 4 – 4), while the preemptor receives –6 (= 4 – 6 – 4). Thedeterrer gets a private benefit of 6 from its deterrence and a public benefit of 4 from theother player’s preemption but must cover its deterrence cost of 4. In contrast, the solepreemptor suffers a cost of 4 from the other player’s deterrence and a cost of 6 from itsown efforts but only receives a private benefit of 4 from preempting. The other payoffsin the matrix remain as before.

The dominant strategy is for both players to deter since the payoffs are higher thanthe corresponding payoffs associated with the other two strategies. As both targetsexercise their dominant strategy, the Nash equilibrium of (Deter, Deter) follows. Thisoutcome is like a double PD game in which the smallest summed payoff results—every other strategic combination is socially preferred from an aggregate payoff view-point. Of the two Nash equilibria of the embedded and overlapping 2 × 2 PD games,

186 JOURNAL OF CONFLICT RESOLUTION

Page 299: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

the Pareto-inferior equilibrium reigns. In the 3 × 3 game, the sum of the payoffsdecreases when moving down the columns, but the strategy in the bottom row domi-nates; similarly, the sums of the payoffs decrease when moving rightward along a row,but the strategy in the right-most column dominates. This outcome is rather fascinatingand disturbing; it implies that deterrence wins out over preemption when payoffs mir-ror one another in that the public versus private roles of benefits and costs areswitched.5 There is an implied resilience to deterrence in this stylized example. Is thisexample reflective of more generalized situations where benefits and costs do notmerely switch roles in terms of values for the two policies, or alternative game formsapply, or players are asymmetric? We now analyze more general representations toaddress this question.

GENERALIZED DETERRENCE-PREEMPTION ANALYSIS

In this section, the generalized game no longer assumes that the public costs ofdeterrence equal the public benefits of preemption or that the private benefits of deter-rence equal the private costs of preemption. In terms of notation, B denotes the publicbenefits of preemption, c represents the private costs of preemption; C denotes thepublic costs of deterrence, and b represents the private benefits of deterrence. The(re)actions of terrorists in this model are suppressed because they are consistent withthe public aspects of deterrence and preemption produced in conjunction with terroristactivity, as explicitly derived by Sandler and Siqueira (2003) and Sandler and Arce(2003).6 The generalized game is in Figure 2, where the overlapping 2 × 2 preemptionand deterrence games are again highlighted by boldfaced borders. In the northwest 2 ×2 preemption game, the pure publicness of preemption is a key feature. If there is a solepreemptor, then that player affords a free ride worth B to the other nation and receives a

Arce M., Sandler / COUNTERTERRORISM 187

EU Preempt Status quo Deter

Preempt

2 ,2B c B c

,B−c B ,B c C B b C+

Status quo ,B B c 0,0 ,C b C US

Deter

,B b C B c C+

,b C C

Nash

2 , 2b C b C −−−−

−−−

−−−

−−−

Figure 2: Generalized Deterrence-Preemption Game, 2B > c > B and 2C > b > CNOTE: EU = European Union.

5. With an alternative solution concept, such as nonmyopic equilibria in the “theory of moves”(Brams 1994), the Pareto-efficient solution might be achieved. This investigation is left to our future work.

6. Heal and Kunreuther (2005 [this issue]) make a similar assumption in a study that focused only ondefensive policies.

Page 300: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

net benefit of B – c. We initially assume that the costs of preemption exceed the associ-ated benefits so that c > B. If both countries preempt, then each receives 2B – c as costsare deducted from the benefits derived from the combined actions of the two govern-ments (i.e., B from each preemption for a total of 2B). To ensure that a PD game results,we must assume that B > 2B – c, which again implies that c > B. Also, we assume thatthe payoff from mutual preemption is greater than that from mutual inaction so that 2B– c > 0.7 Taken together, the inequality 2B > c > B is sufficient to ensure that a PD gamecharacterizes the northwest 2 × 2 preemption game. The dominant strategy for thisembedded game is to do nothing, which results in the Nash inactivity equilibrium witha payoff of (0, 0). The southeast 2 × 2 bold-bordered matrix indicates the deterrencegame, in which payoffs are computed as before. To ensure a PD game, we assume that2C > b > C. The dominant strategy of this embedded game is to deter, and the Nashequilibrium is mutual deterrence.

For the 3 × 3 game, there are also the two strategic combinations in which oneplayer deters and the other preempts. The deterrer then receives B + b – C from theassociated public gain from preempting, B, and the private gain from deterring, b,minus the public deterrence costs, C. The preemptor gains the public preemption ben-efit but must cover the private costs of preempting and the public costs of its counter-part’s deterrence for a payoff of B – c – C. The two sets of inequalities ensure that thedominant strategy is to deter for both governments so that the Nash equilibrium ofmutual deterrence results, which is Pareto inferior to doing nothing or mutual preemp-tion. Thus, this first generalization of the game, denoted as the baseline game, does noteliminate the persistence of deterrence.8

Because targeted countries may face the same situation in each period, we examinewhen mutual preemption can be supported in an infinitely repeated game with a dis-count factor of δ. Suppose that a grim-trigger strategy is employed in which a playerbegins by preempting but will henceforth switch to deterrence if the other player everfails to preempt, so that a “deterrence trigger” is employed. Preemption is then sus-tained if 9

188 JOURNAL OF CONFLICT RESOLUTION

7. This last inequality also rules out any oscillatory supergame equilibrium in which alternatingbetween the off-diagonal cells does better than mutual preemption. This means that 2B – c > .5B + .5(B – c),which implies that 2B > c.

8. The same bias against proactive policy and reliance on defensive measures is not anticipated fordomestic antiterrorist policy because the central government can internalize the public benefit fromproactive responses. A weakened domestic terrorist group benefits just the host country, whose taxes cansupport a proactive campaign. Similarly, a central government can balance the external deflection costs fromdefensive actions. For transnational terrorism, there is no supranational government that can internalizeexternal benefits and costs from proactive and defensive policies, respectively.

9. To derive this inequality, we must assume that the present value of the perpetual gain from mutualpreemption, (2B – c)/(1 – δ), exceeds the gain from deterring in the first period and then suffering the punish-ment payoff of mutual deterrence thereafter. This implies that

2

12 2 2B c

B b C b C b C−

−≥ + − + − + − +

δδ δ( ) ( ) ... ,

or

2

12

2

1

B cB b C b C

b C−−

≥ + − − − + −−δ δ

( )( )

,

from which equation (1) follows with some algebra.

Page 301: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

δ ≥ [(b – C) – (B – c)]/(B + C). (1)

Based on equation (1), the smaller is the incentive for unilateral deterrence, b – C, andthe smaller is the net cost of unilateral preemption, B – c, the more likely it is to sustainmutual preemption through a threat-based trigger. This inequality also holds if

δ ≥ [(b + c) – (B + C)]/(B + C). (2)

which indicates that mutual preemption has a better chance when the sum of publiccosts and benefits is large compared with the sum of private costs and benefits. Equa-tion (2) highlights that private motivation must be small compared with external influ-ences for a threat-based trigger to induce cooperation. Of course, the sustainability ofmutual preemption also hinges on the discount factor being large so that the future isvalued sufficiently.

Two problems must be resolved to secure mutual preemption through a threat-based trigger. First, mutual deterrence remains an equilibrium; thus, parties mustagree to coordinate and move from deterrence to preemption. Second, sustainingmutual preemption may conflict with the short-run viewpoint taken by governmentsowing to election periods that limit tenure. The results for the infinitely repeated ver-sion of Figure 2 are equivalent to those for a finite, but indefinitely, repeated versionwhere δ is the probability that the current period is not the last.10 If δ represents theprobability of reelection, then this may be quite low owing to term limits or other con-siderations, which then work against sustaining preemption through threat-based trig-gers. Thus, we must look elsewhere for supporting preemption. Ironically, the lifetimetenure of terrorist leaders supports the widespread cooperation that characterizes ter-rorist groups since the 1960s.11

MUTUAL INACTION IS DISASTROUS

Next, we change one payoff combination in Figure 2—that of mutual status quo,where the two embedded 2 × 2 games overlap. In particular, we change this payoff to(–D, –D) (not shown in Figure 2) so that mutual inaction is disastrous in the sensethat this payoff is less than the sucker payoffs of the embedded preemption and deter-rence games. Thus, the payoff, Π, from the mutual status quo must satisfy

–D = Π(Status Quo, Status Quo) < minB – c, –C. (3)

This inequality ensures that the 2 × 2 preemption game is now a chicken game withpure-strategy Nash equilibria of unilateral preemption. The dominant strategy for theassociated 3 × 3 game is still deterrence with a single Nash equilibrium of (Deter,Deter) that makes at least one player worse off than the equilibria of the embedded 2 ×2 preemption chicken game.12 The Nash equilibrium of the embedded deterrence

Arce M., Sandler / COUNTERTERRORISM 189

10. The expected length of such a game is 1/(1 – δ).11. On terrorist networks, see Alexander and Pluchinsky (1992), Arquilla and Ronfeldt (2001),

Hoffman (1998), and Sandler (2003).12. This equilibrium could make both players worse off than the equilibria of the chicken game if

B – c > b – 2C, both of which are negative by assumption.

Page 302: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

game wins out over those of the embedded preemption game. Thus, the persistence ofdeterrence is again demonstrated.

DETERRENCE AND THRESHOLD PREEMPTION GAME

To further study the resilience of the mutual deterrence equilibrium, we now tie thecountries’ interests for preemption closer together by assuming a threshold preemp-tion game in which benefits of B per preemption effort are only realized once there aretwo preemptors. This suggests that a sufficient effort must be expended or else nothingis achieved. Thus, a token operation such as the U.S. retaliatory raid on Libya in April1986 may have no lasting impact—an outcome later demonstrated by empirical analy-sis (Enders and Sandler 1993). In Figure 3, two payoffs change in the northwest 2 × 2matrix as compared with Figure 2—a sole preemptor only incurs costs of c, and thereare no free-rider benefits. This embedded preemption matrix is an assurance or staghunt game in which players will match actions at the Nash equilibria: either both pre-empt or both maintain the status quo. Strategy choices must be coordinated. The 2 × 2embedded deterrence game remains unchanged.

For the 3 × 3 game, we must also alter the payoffs associated with (Deter, Preempt)and (Preempt, Deter) in Figure 3. If the United States deters and the EU preempts, thenthe United States gains b – C, and the EU endures the public costs of U.S. deterrenceand the private costs of its own preemption. The EU receives no benefits from its pre-emption because the threshold has not been attained. In the upper right-hand cell of thematrix, the roles and payoffs are reversed. Deter still dominates over the status quo butmay not dominate over preempt. The strategic combination (Deter, Deter) remains aNash equilibrium. If 2B – c ≥ b – C, then (Preempt, Preempt) is a second Nash equilib-rium. This inequality requires that mutual preemption provides payoffs at least as largeas those from deterring alone. It also implies that the sum of public benefits and costsof preemption and deterrence, 2B + C, exceeds the corresponding sum of privatebenefits and costs, b + c. If we use the benefits and costs underlying Figure 1, we get

190 JOURNAL OF CONFLICT RESOLUTION

EU Preempt Status quo Deter

Preempt

2 , 2B c B c

,0c ,c C b C

Status quo 0, c 0,0 ,C b C US

Deter ,b C c C ,b C C 2 , 2b C b C

Figure 3: Deterrence and Threshold Preemption Game, 2B > c > B and 2C > b > CNOTE: EU = European Union.

Page 303: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

2B – c = 2 = b – C, so that deter weakly dominates preempt, and the likely equilibriumis (Deter, Deter), which is Pareto inferior to (Preempt, Preempt). Unless payoffs reallyfavor preemption, mutual deterrence is anticipated.

ASYMMETRIC PREEMPTION

Countries that have engaged in preemption have one major commonality: they haveattracted the lion’s share of terrorist attacks. Thus, Israel is known for attacking terror-ist groups and their infrastructure in the hopes of weakening them. Since 9/11, theUnited States has also greatly increased its preemptive actions against terrorists. U.S.action is understandable given that approximately 40% of transnational terroristattacks are directed at U.S. people and property (Sandler 2003, Table 1). For domesticterrorism, countries engage in preemption because limiting such attacks solely bene-fits them. For transnational terrorism on home soil, governments have been moreaggressive at pursuing groups that pose a significant threat to domestic interests (e.g.,Red Brigades in Italy, Direct Action in France, and Red Army Faction in West Ger-many) and have done little to crush groups with little risk to domestic concerns (e.g.,November 17 in Greece).

To model asymmetric gains from preemption, we alter the baseline game so that theUnited States receives greater benefits from its own preemption than it confers on theEU. In particular, U.S. preemption yields a benefit of 2B to itself and a spillover benefitof B to the EU at a cost of c to the United States. EU preemption still provides a publicbenefit of B at a preemption cost of c. Deterrence remains as before: each deterrerreceives private benefits of b and confers a public cost of C to both countries. We againassume the same two sets of inequalities indicated in the caption to Figure 4.

In Figure 4, the 2 × 2 deterrence PD game has the same payoffs as in the baselinegame of Figure 2. If the United States preempts alone, it now receives 2B – c while stillconferring a free-rider benefit of B on the EU. Compared with the baseline game, theasymmetry adds B to each of the U.S. payoffs in the top row—all other payoffs remainunchanged. The EU still has a dominant strategy to deter, so that the only possible

Arce M., Sandler / COUNTERTERRORISM 191

EU Preempt Status quo Deter

Preempt

3 ,2B c B c

2 ,B c B 2 ,B c C B b C+

Status quo ,B B c 0,0 ,C b C US

Deter ,B b C B c C+ ,b C C 2 , 2b C b C

Figure 4: Asymmetric Deterrence-Preemption Game, 2B > c > B and 2C > b > CNOTE: EU = European Union.

Page 304: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Nash equilibria must be (Preempt, Deter) or (Deter, Deter) in the right-hand column.The former is the equilibrium if 2B – c > b – C, so that the United States gains morefrom preempting alone than from deterring alone. In fact, satisfaction of this inequal-ity makes preempt the dominant strategy for the United States. After 9/11, thisinequality likely held for a preferred-target country such as the United States sincedeterring alone merely transfers the attack abroad where its people and property arestill attacked, thus greatly limiting U.S. gains from relying on deterrence alone. Targetasymmetry can explain the current state of affairs with the United States using preemp-tion and deterrence, while less-preferred targets engage in just deterrence. As terror-ists display less bias for a single target, there is less apt to be a preemptive response. Itis asymmetric targeting by terrorists that induces countries to resort to preemption.The relevant asymmetry involves whose assets are targeted and not where they are tar-geted—an attack against Israelis in Kenya will be viewed by the Israeli government asan attack against Israel.

DOING BOTH

Next, we allow for a fourth strategic choice of doing both preemption and deter-rence. The payoffs for preempting and deterring are those of the baseline game. Therelevant 4 × 4 game matrix is displayed in Figure 5, in which the northwest bold-bordered 3 × 3 matrix is that of the baseline game. There are four new payoff combina-tions. If, for example, a government does both policies unilaterally, then it receives B –c + b – C and provides the other government with a net payoff of B – C. When one gov-ernment does both and the other just preempts, the first receives 2B – c + b – C, and thepreemptor gets 2B – c – C. The other two payoff combinations are computed similarly.

Deterrence dominates if it provides a player a higher payoff than doing both whenthe other player does both, that is, B + b – 2C ≥ 2B – c + b – 2C. This inequality reducesto c ≥ B, which is clearly true for our example because c > B by assumption. The persis-tence of deterrence is again displayed. Thus we are led back to the realization of thelast section that asymmetric preemption benefits are often essential to stem this ten-dency. In short, preemption benefits must outweigh associated costs if targeted gov-ernment such as the United States is to engage in both deterrence and preemptionagainst a terrorist threat. Only those countries experiencing a disproportionate numberof attacks may fall into this category. All others will rely on deterrence and hope thatsome prime target will privilege them to some purely public preemption benefits.

OTHER PROACTIVE ANDDEFENSIVE COUNTERTERRORIST POLICIES

Thus far, we have shown that for the choice between preemption and deterrence,there is a marked tendency to rely on Pareto-inferior deterrence. Preemption abides bya variety of game forms—PD, chicken, assurance (threshold), asymmetric domi-

192 JOURNAL OF CONFLICT RESOLUTION

Page 305: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

193

EU Preempt Status quo Deter Both

Preempt

2 , 2B c B c

,B c B

,B c C B b C+

2 , 2B c C B c b C+

Status quo

,B B c

0,0

,C b C

,B C B c b C+

Deter ,B b C B c C+

,b C C

2 , 2b C b C

2 , 2B b C B c b C+ +

US

Both

2 , 2B c b C B c C+

,B c b C B C+

2 , 2B c b C B b C+ +

2 2 , 2 2B c b C B c b C+ +

Figure 5: Four-Strategy Deterrence-Preemption Game, 2B > c > B and 2C > b > CNOTE: EU = European Union.

Page 306: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

nance, and others indicated below—while deterrence typically adheres to a PD game.The issue here is whether these tendencies also characterize other proactive and defen-sive counterterrorism policies.

PROACTIVE POLICIES

In Figure 6, we display the game-theoretic aspects of four additional proactive poli-cies. Each two-player, normal-form game is in ordinal (rank-ordered) form, where thelargest number (i.e., 4) in the cells is the best payoff, and the smallest (i.e., 1) is theworst payoff. Consider two governments contemplating freezing terrorist assets,shown in panel a. Each government has two choices: to freeze assets or not to freezeassets. If a weakest-link situation (Hirshleifer 1983) applies, then nothing is accom-plished unless both players take action—sole action merely induces the terrorists toput assets in the other country. The best payoff for each government arises when bothfreeze assets, thus eliminating a safe haven for the terrorist assets. The worst payoff isreceived by the government that freezes assets unilaterally since it suffers an economicloss without any safety gain. The government that does nothing then gets the second-greatest ordinal payoff of 3 from the banking profits derived from doing business withthe terrorists. This latter government does not get a free ride because no safety isachieved—the lowest level of action determines the safety of everyone in a weakest-link scenario. The second-lowest payoffs are associated with mutual inaction. Thereare then two Nash equilibria—mutual freeze and mutual inaction—indicated by thecells with boldfaced payoffs. With a weakest-link situation, leadership by one countrycan coordinate efforts. If, therefore, the United States freezes assets, the EU is betteroff matching U.S. resolve because the EU prefers a payoff of 4 over 3.

When the noncooperating country is not worried about terrorist attacks and cangain greatly by sequestrating terrorist funds, then its ordinal payoffs in the off-diago-nal cells change from 3 to 4—the temptation payoff—and the mutual action payoffschange from 4 to 3. A PD game results with a no-action equilibrium. Like preemption,freezing assets can be associated with numerous game structures such as PD, chicken,assurance, and asymmetric dominance. Asymmetric dominance applies when onecountry confronts a greater terrorist threat and achieves some protection from unilat-eral action. Given the strategic similarity between preemption and freezing assets, acountry that must choose between freezing assets and deterrence will favor deterrenceunless there is a significant asymmetry or a weakest-link consideration motivatescooperation.

Next, consider the proactive policy of retaliating against a state sponsor of terror-ism. This policy has virtually the same strategic structure as preemption and is often aPD game. It is a chicken game if mutual inaction results in a spate of terrorist attacks inwhich the status quo is the worst outcome. In panel b of Figure 6, we characterize theUnited States as the prime target of a state sponsor, so that it has a dominant strategy toretaliate (4 > 3 and 2 > 1), while the EU has a dominant strategy not to retaliate. Whenboth targets exercise their dominant strategy, the Nash equilibrium (whose payoffs areboldfaced) results, with the United States retaliating unilaterally. Retaliation may alsoabide by a threshold assurance game. Once again, a policy choice between retaliation

194 JOURNAL OF CONFLICT RESOLUTION

Page 307: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

195

a. Freezing assets: weakest link

EU Gather Does not

Gather

2,2

4,3

US

Does not

3,4

1,1

c. Intelligence: hero

EU Retaliate Does not

Retaliate

4,3

2,4

US

Does not

3,1

1,2

b. Retaliation: asymmetric dominance

EU Infiltrate Does not

Infiltrate

2,2

3,4

US

Does not

4,3

1,1

d. Infiltration: leader

EU Freeze Does not

Freeze

4,4

1,3

US

Does not

3,1

2,2

Figure 6: Some Alternative Proactive Policies and Their Ordinal Game FormsNOTE: EU = European Union.

Page 308: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

and deterrence is apt to favor deterrence. After 9/11, the U.S.-led attack against theTaliban, who harbored al-Qaida, follows this pattern, with most European countriesresponding by tightening security to deter attacks.

We now turn to two proactive policies that can be associated with a quite differentstrategic structure than the proactive policies considered thus far. In the case of gather-ing intelligence, the ordinal-payoff matrix for a two-government scenario may corre-spond to panel c of Figure 6. Each government must decide whether to gather intelli-gence on a terrorist threat or group. The intelligence game gives the greatest advantageto the government that gathers the information and the second-greatest payoff to thefree rider. The gatherer achieves some additional benefit from being in control of theinformation that is not obtained by the free rider. In a world of globalized terror, theinformed government will want to share much of its intelligence to protect its coun-try’s citizens and assets abroad. If both governments gather the same intelligence,there is wasted effort, and each may jeopardize the other’s covert operation. Thusmutual action may result in the second-lowest payoff. Finally, mutual inaction leavesboth governments vulnerable, and this gives the lowest payoff. In panel c, the resultingequilibria are the two off-diagonal cells in which just one country gathers the intelli-gence. This game structure is known as “hero” (Coleman 1999) because the playerwho unilaterally moves away from the maximin solution of mutual gathering is a heroby taking a lower return while conferring a higher return on the other player. Hero is acoordination game in which players must coordinate their choices or else be saddledwith undesirable outcomes. This coordination requires a loss in autonomy that nationshave often been unwilling to display on security matters except in the direst ofcircumstances. Furthermore, there is no room for two heroes as two heroes result in thesmallest payoffs.

If payoffs from intelligence are asymmetric because terrorists’ targeting decisionsfocus on some governments, then an asymmetric-dominance scenario may arise. Inthis case, the coordination dilemma is solved by the likely target providing intelligencefor itself and others. Ironically, the terrorists can greatly assist governments in address-ing the coordination dilemma by having favorite targets that attract a disproportionateshare of attacks. As for other proactive policies, asymmetries may be essential if gov-ernments are to engage in intelligence gathering and deterrence and not rely on deter-rence. Another asymmetry may arise from capacity when one country is betterequipped than the other for the mission. The latter may then be willing to let its coun-terpart gather the intelligence. For choices involving intelligence and deterrence, therelatively high payoffs for both players mean that intelligence may win out when adecision between them must be made. In situations where doing both is an option, oneor more players may do both, which again brings up a coordination problem.

In panel d of Figure 6, strategic aspects of infiltrating a terrorist group are indicatedin a 2 × 2 game representation. Taking the action outweighs the costs but not relative tothe net gain of free riding, which is associated with the greatest ordinal payoff. Thesecond-smallest payoff arises when both governments infiltrate a terrorist groupbecause mutual action may jeopardize the other government’s operation. Agents maybe killed if governments do not know of their counterpart’s action. Moreover,resources are wasted since nothing is gained from duplicating the mission. The small-

196 JOURNAL OF CONFLICT RESOLUTION

Page 309: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

est payoffs arise from mutual inaction. The game is known as “leader,” in which theplayer who moves away from the maximin solution of mutual action receives thegreatest gain (Coleman 1999). The two Nash equilibria are again the off-diagonal cellswith the boldfaced payoffs, in which one government infiltrates and the other freerides. As in the case of hero, coordination is required or else low-paying diagonal cellswill be reached. The coordination can be provided de facto if one target has insufficientcapacity or expertise to provide infiltration. Coordination is also not an issue when onecountry perceives a much greater threat from the group, so that an asymmetric domi-nance applies as in panel b. If infiltration abides by a leader game, then extending theanalysis to allow infiltration to be chosen along with deterrence may lead to equilibriawith both being chosen, as in the case of intelligence.

A final proactive policy concerns the development of new counterterrorism tech-nologies (e.g., bomb-sniffing devices, plastic explosive tags, and new databases).Such actions are “best-shot” public goods for which the greatest effort determines theprovision level (Hirshleifer 1983). Suppose that each of two governments can discoverthe new technology. Further suppose that the technology gives 6 in benefits to every-one once discovered but provides no additional benefits for a redundant discovery. Thecost of discovery is, say, 4. If one computes the cardinal payoffs, they are (2, 6) and (6,2) in the off-diagonal cells and (2, 2) and (0, 0) along the main diagonal. The greatestpayoff is gained by the free-riding government when the other government achievesthe technological breakthrough. In ordinal form, the game is that of panel c in Figure 6,provided that the 4s are changed to 2s. The Nash equilibria are the off-diagonal cells inwhich only one government acts; coordination is required to avoid duplication, notunlike intelligence or group infiltration.

A number of findings are associated with proactive policies. First, most proactivepolicies are purely public goods. If governments’ proactive policies are cumulative(i.e., actions add to the total level achieved rather than weakest link, threshold, or bestshot), then a PD game applies, and inaction is the dominant strategy. Second, a varietyof game forms can characterize the same proactive policy owing to alternative waysthat effort levels of the governments are aggregated. Third, coordination games figureprominently, meaning that some communication and joint efforts are necessary toavoid wasteful duplication. Fourth, asymmetric targeting by terrorists can motivateaction by a government to privilege the rest of the governments with benefits from itsresponse.

DEFENSIVE POLICIES

Defensive policies include deterrence in which a PD game applies and the domi-nant strategy is to deter. Deterrence can result in a “deterrence race” whereby action byone potential target induces another target to take similar steps to reduce the terrorists’likelihood of success or their payoffs. A race occurs because failure to act makes a gov-ernment a soft target that will draw an attack. Another defensive policy is to harden atarget (e.g., fortifying embassies and diplomatic missions). Such security upgradesagain deflect an attack to other less fortified targets, thereby inducing potential targetsto compete in terms of fortification. Once again, a PD game applies. Both deterrence

Arce M., Sandler / COUNTERTERRORISM 197

Page 310: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

and security enhancement are instances of “strategic complements” whereby actionby one government encourages similar actions by another government.

A somewhat different defensive scenario characterizes efforts to shore up a weak-est-link or vulnerable country. Countries have an interest in bolstering such countries’defensive measures because foreign residents are in harm’s way as terrorists use “soft”venues to hit other countries’ assets. Thus, one of the four pillars of U.S. counter-terrorism policy is to offer assistance to countries whose capacity is inadequate tocounter terrorism (U.S. Department of State 2003). Shoring up vulnerable targetsabroad is a pure public good in which inaction is a dominant strategy unless a country’sassets are the targets of choice. Thus, shoring up the weakest link gives rise to a PDgame, chicken game (if doing nothing is disastrous), or asymmetric dominance. Incontrast to the other two defensive actions, efforts to achieve an acceptable securitystandard abroad yield purely public benefits. As such, this defensive policy has muchin common with proactive policies of preemption, freezing assets, and retaliatingagainst state sponsors.

CONCLUDING REMARKS

By way of summary, Table 1 lists six proactive and three defensive counter-terrorism policies along with their corresponding game forms. Counterterrorism poli-cies fall in four classes: PD scenarios with public benefits in which too little action fol-lows, PD scenarios with public costs in which too much action follows, coordinationgames (e.g., assurance, best shot, leader, and hero) in which bad outcomes must beavoided, and asymmetric dominance in which a prime target provides protection forall. When compared to defensive measures, proactive counterterrorist policies display

198 JOURNAL OF CONFLICT RESOLUTION

TABLE 1

Policy Choices and Underlying Games

Policy Type Alternative Game Forms

Proactive policiesPreemption Prisoner’s dilemma, chicken, assurance (threshold), coordination

(best shot), asymmetric dominanceFreezing assets Prisoner’s dilemma, chicken, asymmetric dominance, assurance

(weakest link)Retaliation Prisoner’s dilemma, chicken, assurance (threshold), coordination

(best shot), asymmetric dominanceGroup infiltration Leader, asymmetric dominanceIntelligence Hero, asymmetric dominanceNew technological barriers Coordination (best shot)

Defensive policiesDeterrence Prisoner’s dilemma (deterrence race)Hardening targets Prisoner’s dilemma (fortification race)Shoring up weakest link Prisoner’s dilemma, chicken, asymmetric dominance

Page 311: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

the greater variety of underlying game forms, which implies a richer set of policyresponses. Efforts to facilitate more appropriate responses must be tailored to the asso-ciated strategic structure (e.g., with asymmetric dominance, no policy interventionmay be needed if the acting country responds sufficiently for all, while for a chickengame, responses must be coordinated to avoid a disastrous outcome).

Earlier, we examined the choices between preemption and deterrence and demon-strated the resilience of deterrence even though the associated Nash equilibrium wasthe worse of the two embedded PD games. When a proactive policy such as retaliationis combined with a defensive policy such as hardening targets, the associated 3 × 3game has target hardening being the dominant strategy, analogous to the preemption-deterrence choice. For the pattern of benefits and costs examined here, defensive poli-cies of deterrence and hardening targets generally dominate many proactive policies,except for intelligence and infiltration. For the latter two policies, equilibria involve acoordination of efforts to avoid wasteful duplication or nations working at cross pur-poses. This coordination requires better communications between intelligence organi-zations or some type of signaling mechanism to indicate whose turn it is to act.

Many proactive policies yield purely public benefits in which free riding is a prob-lem. In contrast, most defensive policies give private benefits and public costs, withcountries competing to match one another’s actions to not draw the attack. Govern-ments are predisposed to engage in too little proactive effort and too much defensiveeffort—thus the general prevalence of the latter. Proactive policies are encouragedprimarily by asymmetric targeting, in which a few nations draw a larger share ofthe attacks. This asymmetry raises these countries’ net benefits from proactivemeasures that can potentially reduce the terrorist threat for everyone. Thus, asymmet-ric targeting works against terrorists’ interests. When asymmetries are sufficientlygreat, a nation will engage in both proactive and defensive actions. A more optimalresponse may ensue if the international community fosters the prime target’s proactiveresponses through subsidies or other support. Too much reliance on a prime target maylead to either fatigue or the pursuit of an agenda not in keeping with other countries’interest; thus, free riding has its own costs.

REFERENCES

Alexander, Yonah, and Dennis Pluchinsky. 1992. Europe’s red terrorists: The fighting communist organiza-tions. London: Frank Cass.

Arquilla, John, and David Ronfeldt. 2001. The advent of netwar (revisited). In Networks and netwars, editedby John Arquilla and David Ronfeldt, 1-25. Santa Monica, CA: RAND.

Atkinson, Scott E., Todd Sandler, and John Tschirhart. 1987. Terrorism in a bargaining framework. Journalof Law and Economics 30 (1): 1-21.

Brams, Steven J. 1994. Theory of moves. Cambridge, UK: Cambridge University Press.Coleman, Andrew M. 1999. Game theory and its applications in the social and biological sciences. New

York: Routledge.Drakos, Konstantinos, and Ali M. Kutan. 2003. Regional effects of terrorism on tourism in three Mediterra-

nean countries. Journal of Conflict Resolution 47 (5): 621-41.Enders, Walter, and Todd Sandler. 1993. Effectiveness of anti-terrorism policies: Vector-autoregression-

intervention analysis. American Political Science Review 87 (4): 829-44.

Arce M., Sandler / COUNTERTERRORISM 199

Page 312: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Heal, Geoffrey, and Howard Kunreuther. 2005. IDS models of airline security. Journal of Conflict Resolu-tion 49 (2): 201-17.

Hirshleifer, Jack. 1983. From weakest link to best shot: The voluntary provision of public goods. PublicChoice 41 (3): 371-86.

Hoffman, Bruce. 1998. Inside terrorism. New York: Columbia University Press.Lapan, Harvey E., and Todd Sandler. 1988. To bargain or not to bargain: That is the question. American Eco-

nomic Review 78 (2): 16-20.. 1993. Terrorism and signaling. European Journal of Political Economy 9 (3): 383-97.Office of Management and Budget. 2003. Department of Homeland Security. Accessed August 25, 2003, at

http://www.whitehouse.gov/omb/budget/fy2004/homeland.htmlOvergaard, Per B. 1994. Terrorist attacks as a signal of resources. Journal of Conflict Resolution 38 (3):

452-78.Pape, Robert A. 2003. The strategic logic of suicide terrorism. American Political Science Review 97 (3):

343-61.Rosendorff, B. Peter, and Todd Sandler. 2004. Too much of a good thing? The proactive response dilemma.

Journal of Conflict Resolution 48 (5): 657-71.Sandler, Todd. 2003. Collective action and transnational terrorism. World Economy 26 (6): 779-802.Sandler, Todd, and Daniel G. Arce M. 2003. Terrorism and game theory. Simulation & Gaming 34 (3): 319-

37.Sandler, Todd, and Walter Enders. 2004. An economic perspective on transnational terrorism. European

Journal of Political Economy 20 (2): 301-16.Sandler, Todd, and Harvey E. Lapan. 1988. The calculus of dissent: An analysis of terrorists’ choice of tar-

gets. Synthése 76 (2): 245-61.Sandler, Todd, and Kevin Siqueira. 2003. Global terrorism: Deterrence versus preemption. Unpublished

manuscript, School of International Relations, University of Southern California.Sandler, Todd, John Tschirhart, and Jon Cauley. 1983. A theoretical analysis of transnational terrorism.

American Political Science Review 77 (1): 36-54.Schmid, Alex P., and Albert J. Jongman. 1988. Political terrorism: A new guide to actors, authors, concepts,

data bases, theories and literature. Amsterdam: North-Holland.Selten, Reinhard. 1988. A simple game model of kidnapping. In Models of strategic rationality, edited by

Reinhard Selten, 77-93. Boston: Kluwer Academic.U.S. Department of State. 2003. Patterns of global terrorism. Washington, DC: U.S. Department of State.

200 JOURNAL OF CONFLICT RESOLUTION

Page 313: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Public Choice (2005) 124: 75–93DOI: 10.1007/s11127-005-4747-y C© Springer 2005

Collective versus unilateral responses to terrorism

TODD SANDLERSchool of International Relations, University of Southern California, Von Kleinsmid Center 330, LosAngeles, CA 90089-0043, USA (E-mail: [email protected])

Accepted March 2005

Abstract. Global terrorism presents collective action issues for targeted nations. Proactivemeasures (e.g., preemptive strikes) against terrorists create external benefits for all at-risknations. In contrast, defensive actions deflect attacks to softer targets, thereby giving rise toexternal benefits to protected foreign residents and external costs to venues abroad. Coordinatedantiterrorism measures are particularly difficult to achieve when many nations must participateand nonparticipants can undo the efforts of others. Thus, freezing terrorists’ assets or abidingby a no-negotiation pledge pose difficult collective action problems. These same concerns donot plague decisive action against domestic terrorism.

1. Introduction

Terrorism is the premeditated use or threat of use of violence by individualsor subnational groups to obtain a political or social objective through intimi-dation of a large audience beyond that of the immediate victims. Terrorists tryto circumvent the normal political process through violence perpetrated ona public who may then pressure the government to concede to the terrorists’demands. On 11 September 2001 (henceforth, 9/11), the four hijacked planesgraphically illustrated the havoc and destruction that terrorists can wreak onsociety. If a targeted government views its future (discounted) costs from asustained terrorist campaign as greater than that of conceding to terrorists’demands (including reputation costs), then a government may grant conces-sions (Lapan & Sandler, 1993). In the absence of caving in, governments mustinstitute antiterrorist measures.

The modern era of transnational terrorism began in 1968 with terroriststraveling between countries and maintaining a presence in multiple countriesto achieve their greatest impact. A watershed transnational terrorist event wasthe 22 July 1968 hijacking of an El A1 Boeing 707 en route from Rome toTel Aviv with 10 crew members and 38 passengers, including three hijack-ers identified with the Popular Front for the Liberation of Palestine (PFLP)(Mickolus, 1980, pp. 93–94). This event is noteworthy for a number of reasons.First, there was clear evidence of state-sponsorship after the plane landed inAlgiers, because Algeria took advantage of the situation and held some of thehostages until 1 September 1968 when a deal was finally struck.1 Second, theincident forced the Israelis to negotiate directly with the Palestinian terrorists

Page 314: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

76

(Hoffman, 1998, p. 68). Third, massive media coverage demonstrated to otherterrorists that such events could capture worldwide attention. Fourth, one ofthe terrorists helped land the plane in Algiers; hence, 9/11 was not the firstinstance where a terrorist flew a hijacked airplane (Mickolus, 1980, p. 94).Fifth, a ransom of $7.5 million was paid by the French to the hijackers and16 Arab prisoners from the 1967 Arab-Israeli war were released by Israel.The hijackers were flown to a safe location with their ransom; two of thehijackers subsequently were involved in hijackings in 1972 (Mickolus, 1980).This incident clearly depicts the transnational externality (i.e., uncompen-sated interdependency involving multiple countries) that modern terrorismcan imply where, e.g., a grievance in the Middle East affects a flight leavinga European airport. To protect against such events, airports must institute ad-equate security measures against the spillover of terrorism from abroad. Thenews coverage resulted in an externality in the form of additional hijackings.Moreover, paid ransoms encouraged further incidents worldwide owing to thepromise of high rewards.

More recently, the skyjackings of 9/11 created transnational externalitiesbecause the deaths and property losses at the World Trade Center (WTC) in-volved upwards of 80 countries. Subsequent efforts to bolster security in theUnited States and Europe appear to be shifting attacks to developing coun-tries – e.g., Indonesia, Morocco, Saudi Arabia, Kenya, Turkey and Malaysia(Sandler, 2005). The devastation of 9/11 raised the bar in terms of the kind ofcarnage that a future terrorist act must produce to capture similar news cover-age. That, in turn, induces the terrorists to innovate in order to find new meansto cause even greater destruction. This innovation process is an intertemporalexternality that today’s terrorists impose on tomorrow’s victims.

Modern-day transnational terrorism raises some essential dilemmas. Ter-rorists appear able to address their collective action concerns through co-operation among themselves, while governments are less adept at collec-tive responses and primarily resort to unilateral (suboptimal) responses. Fortransnational terrorism, there is a propensity for nations to focus on defensiverather than proactive countermeasures. Defensive actions may merely deflectattacks to less-protected venues, leading nations to work at cross-purposes(Arce & Sandler, 2005; Sandler & Lapan, 1988; Sandler & Siqueira, 2003).Moreover, there is a clear tendency for at-risk nations to rely on a prime-targetnation to carry the burden for direct action against the terrorists. In contrast,governments appear properly motivated to strike the right balance betweendefensive and proactive responses against domestic terrorism.

The primary purpose of this paper is to explain the collective action failuresthat plague targeted countries in their efforts to respond to global terrorism. Toaccomplish this task, I employ some simple game theory to examine alternativeantiterrorism responses to a common transnational terrorism threat. Threegame forms are prevalent: prisoners’ dilemma, asymmetric dominance and

Page 315: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

77

stag hunt. The last is particularly germane for analyzing cases where a degreeof coordination is required to accomplish some gain. For example, countriesthat do not freeze terrorists’ assets can greatly undo the actions of those that do.I address the asymmetries between governments and terrorists that underliemany collective action concerns, driven by opposing externalities relevant totoday’s networked terrorists who harbor common grievances. Terrorists’ ownactions may foster efforts for nations to address collective action concerns.As the severity of attacks escalates, nations become more willing to followthe lead of prime-target nations to take actions such as freezing terrorists’assets. I also underscore some of the public choice dilemmas where politicalfreedoms provide a favorable environment that some terrorists may exploit.

2. Preliminaries

At the outset, domestic terrorism must be distinguished from transnational ter-rorism. The former is solely a host country affair where its citizens resort toterrorist attacks on other citizens or their property with the intention of further-ing a domestic political or social agenda through violence and intimidation.The bombing of the Alfred P. Murrah Federal Building in Oklahoma Cityon 19 April 1995 was a domestic terrorist event, because Timothy McVeighand his accomplices were American citizens, as were the victims of the blast.Moreover, this bombing did not have ramifications for other countries.

By virtue of its victims, targets, institutions, supporters, terrorists’ de-mands, or perpetrators, transnational terrorism involves more than a singlecountry. The train bombings in Madrid on 11 March 2004 were transnationalterrorist incidents because many of the terrorists were foreign nationals whocame to Madrid to stage their attack. Moreover, the bombing victims in-cluded some non-Spanish citizens. In addition, the bombing had far-reachingimplications for other European countries that then had to take precautionsagainst similar attacks. The four hijackings on 9/11 also were transnationalterrorist acts with global consequences as to their victims, security concerns,and financial impact. Although domestic terrorism is far more prevalent thantransnational terrorism (National Memorial Institute for the Prevention of Ter-rorism, 2004), the latter generates cross-border externalities that are difficultto address, and leads to collective action failures when unilateral responses bygovernments work against global welfare. For example, US efforts to secureits borders have transferred most terrorist incidents against US interests toforeign venues. Although 40% of all transnational terrorist attacks are againstUS people or property, few have occurred on US soil in recent years (Sandler,2003). Transnational terrorism, as practiced by Al-Qaida and its loose networkof affiliates, poses a greater threat than domestic terrorism to world securityas fundamentalist groups seek maximum carnage and financial repercussions(Hoffman, 1998).

Page 316: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

78

Counterterrorism consists of government actions to inhibit terrorist attacksor curtail their consequences. There are two main categories of antiterrorismpolicies – proactive and defensive. Proactive or offensive measures targetthe terrorists, their resources, or their supporters directly. By weakening theability of terrorists to operate, proactive policies reduce the frequency andprevalence of attacks against all at-risk targets. Such actions include attack-ing terrorist camps, assassinating terrorist leaders, freezing terrorist assets,retaliating against a state-sponsor, gathering intelligence, and infiltrating aterrorist group.

Defensive or passive policies try to protect a potential target against anattack or to ameliorate the damage in case of an attack. Defensive measuresmay involve the installation of technological barriers (e.g., bomb-sniffing de-vices, metal detectors, or biometric identification), the hardening of targets(e.g., barriers in front of federal buildings), the deployment of security person-nel (e.g., sky marshals on commercial flights), and the institution of terroristalerts. While some proactive policies may provoke a terrorist backlash, de-fensive measures usually do not have this potential downside (Rosendorff &Sandler, 2004). By reducing the terrorists’ probability of success and increas-ing their operations’ costs, defensive actions attempt to dissuade terrorists byreducing their expected net benefits from attacks. If, however, the authoritiesmake one type of attack harder without affecting the costliness of other typesof attacks, then such partial measures can merely induce terrorists to substituteone mode of attack for another relatively cheaper one – e.g., the installationof metal detectors at airports reduced skyjackings but increased other types ofhostage-taking missions (Enders & Sandler, 1993, 1995, 2004; Enders et al.,1990). Similarly, defensive actions that make one country more secure maymerely transfer attacks to less-secure venues abroad.

3. Asymmetries Between Nations and Terrorists

To appreciate the collective action problems posed by transnational terrorism,one must recognize the asymmetries that distinguish the behavior of targetednations and their terrorist adversaries. These asymmetries provide tacticaladvantages to terrorists who target assets from powerful nations.

Nations must guard everywhere, while terrorists can identify and attackthe softest targets. Efforts by nations to harden targets induce terrorists toredirect their attacks to less-protected venues. As rich countries mobilizedtheir defensive measures following 9/11, the developing world stayed thevenue of choice from which to attack Western interests. In 2003, there were 190transnational terrorist attacks, with none in North America and 24 incidentsin Europe.2 There were, however, 70 attacks in Asia, 53 in Latin America,and 37 in the Middle East. Although there were no transnational attacks inthe United States in 2003, there were 82 anti-US attacks on foreign soil: 46,

Page 317: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

79

Latin America; one, Eurasia; two, Africa; six, Asia; 11, Middle East; and 16,Western Europe. During 2002, there were 198 transnational terrorist incidents,with none in North America and only nine in Western Europe. Asia was thepreferred venue with 101 attacks.

Nations are target-rich; terrorists are target-poor. Terrorists may hide in thegeneral population in urban centers, thereby maximizing collateral damageduring government raids to capture them. Nations have to be fortunate on adaily basis, while terrorists only have to be fortunate occasionally.3 As such,terrorists can sit back and pick the most opportune time to strike, as they did on9/11. Unlike liberal democracies that are constrained in their reaction to ter-rorist threats, terrorists can be unrestrained in their brutality, as demonstratedby attacks perpetrated by fundamentalist terrorists in recent years. Nationsare not well-informed about terrorists’ strength, whereas terrorists can easilydiscover how many governmental resources are being allocated to antiterroristactivities. In the United States, this information is a matter of public record.This asymmetric information is amply illustrated by US estimates of al-Qaidastrength as “several hundred to several thousand members”, reported by the USDepartment of State (2001, p. 68) just five months before 9/11. The 7 October2001 invasion of Afghanistan indicated that Al-Qaida had far more membersthan the State Department’s upper-bound estimate. Such misleading figuresnot only hamper the military in terms of planning antiterrorist operations,but they also make it more difficult to convince other countries to contributetroops to preemptive raids on training camps and terrorist infrastructure.

Another asymmetry concerns the organizational structure adopted by gov-ernments and terrorists. Governments are hierarchical, whereas terrorist orga-nizations are nonhierarchical with loosely tied networks of cells and affiliatedterrorist groups (Arquilla & Ronfeldt, 2001). Terrorist cells and groups canoperate independently of one another. Moreover, captured terrorist leaders canprovide only limited intelligence owing to the looseness of the network andthe virtual autonomy of many of its components. Recent espionage scandalsindicate that government informants can do much damage to the integrity ofan intelligence organization.

Beyond some point, government size can limit its effectiveness in wag-ing an antiterrorist campaign. Also, a larger government has more targetsto protect and can create greater grievances from taxes used to finance thebureaucracy. In contrast, a larger terrorist group can engage in a more ef-fective campaign that may signal to the government that an accommodationis less costly. Hirshleifer (1991) introduced the notion of the “paradox ofpower” in conflict situations, where smaller forces may have a strategic advan-tage over larger, militarily superior forces. In particular, small insurgencies,including terrorists, can cause more damage per operative insofar as sometechnologies of conflict favor the small force that can hide and strike largetargets.

Page 318: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

80

A final asymmetry is the most essential for understanding why nationshave greater difficulty in addressing their collective action problem than theterrorists. National strength provides a false sense of security, thereby inhibit-ing governments from appreciating the need for coordinated action. Nationsalso do not agree on which groups are terrorists – e.g., until fairly recently,the European Union (EU) did not view Hamas as a terrorist organization de-spite its suicide bombing campaign. In democracies, leaders’ interests in thefuture are limited by the length of the election cycle and their likelihood ofreelection. Agreements made with leaders of other countries to combat ter-rorism may be rather short-lived if a government changes. For example, thenew Spanish Prime Minister Zapatero pulled the country’s troops out of Iraqfollowing his surprise win in the national elections stemming from the al-leged link between the 11 March 2004 train bombing and Spanish support forthe US-led war on terror. This short-term viewpoint limits intergovernmentalcooperative arrangements that could follow from a repeated-game analysis,based on a tit-for-tat strategy. Because many counterterrorism actions amonggovernments abide by a prisoners’ dilemma game structure (see Section 4), amyopic viewpoint works against solving the problem through repeated inter-actions, unless agreements can have a permanency that transcends a changein governments. The high value that governments place on their autonomyover security matters also inhibits their addressing collective action issuessuccessfully.

A much different situation characterizes the terrorists who have coop-erated in networks since the onset of modern-day terrorism. From the late1960s, terrorist groups have shared personnel, intelligence, logistics, trainingcamps and resources (Alexander & Pluchinsky, 1992; Hoffman, 1998). Morerecently, Al-Qaida forged a loosely linked network when Osama bin Laden be-gan franchising other Islamic groups (Raufer, 2003; Hoffman, 2003). Despitedifferent political agendas, terrorist groups share similar opponents – e.g., theUnited States and Israel – that provide some unity of purpose. For example,the left-wing terrorists groups in Europe during the 1970s and 1980s wereunited in their political orientation and their goal to overthrow a capitalisticsystem (Alexander & Pluchinsky, 1992). Terrorist groups cooperate becauseof their relative weakness compared with the well-armed governments thatthey confront. Given their limited resources and grave risks, terrorists havelittle choice but to cooperate to stretch resources. Terrorist leaders tend to betenured for life so that they view intergroup interactions as continual. Thislong-term orientation means that terrorist groups can successfully addressprisoners’ dilemma interactions through punishment-based tit-for-tat strate-gies. The temptation to renege on an agreement with another terrorist groupfor a short-term gain is tempered by the long-run losses from the lack of futurecooperative gains. Terrorists appear to place less weight than governments ontheir autonomy, provided that shared actions further their goals. Unlike their

Page 319: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

81

government adversaries, terrorists are motivated to address their collectiveaction concerns.

4. Proactive Versus Defensive Policies

As a generic proactive policy, I examine efforts to preempt a terrorist groupby, say, attacking the terrorists’ bases and training camps. I then compare andcontrast preemption with a generic defensive policy – i.e., actions to deter anattack by fortifying vulnerable targets.

4.1. Preemption

In panel a of Figure 1, a symmetric preemption game is displayed for twotargeted countries (i.e., nations 1 and 2), each of which must decide whether ornot to launch a preemptive strike against a common terrorist or state-sponsorthreat. The attack is meant to weaken the terrorists and limit their futureactions. Given the common threat posed by the terrorists, each preemptingcountry provides a pure public benefit of B for itself and the other at-risknation. More benefits are achieved when both countries attack the terrorists,as combined action does more harm to the terrorists.

In each cell of the 2 × 2 game matrix, the left-hand payoff is that of nation1 and the right-hand payoff is that of nation 2. The cost of preemption is cfor each preemptor, where c > B. I assume that isolated action results inless benefits than costs so that a collective action problem occurs.4 If nation

Figure 1. Alternative preemption scenarios.

Page 320: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

82

1 preempts alone and nation 2 maintains the status quo, then nation 1 netsB − c < 0, while nation 2 receives the free-rider benefit of B. These payoffsare interchanged when the nations’ roles are reversed in the bottom left-handcell. When both nations join forces, each nets 2B −c from the two preemptionactions, where 2B is assumed to be greater than c. All-around inaction givespayoffs of 0 to both nations. Given these assumptions, each nation’s dominantstrategy is to do nothing, because B > 2B −c and 0 > B −c. The underlyinggame is a prisoners’ dilemma with a Nash equilibrium of mutual inaction. Ifthe symmetric case is extended to n nations with each preemptor providing Bin benefits for all at-risk nations at a provision cost of c > B to the preemptor,then the outcome is for no nation to act. A repeated-game version is notpromising owing to the short-run view that nations take of such interactionswith other governments.

A more optimistic case arises in the asymmetric version in panel b ofFigure 1, where benefits and costs are tailored by subscripts to the two nations.Nation 1 is a prime target of the terrorists with more to gain from any actionthat weakens the terrorists. Suppose that nation 1 receives a benefit of B1

from its own preemptive action or that of nation 2. Moreover, B1 exceedsits preemption costs of c1. Since B1 > c1, nation 1’s dominant strategy nowis to preempt, which is analogous to the United States after 9/11. Nation 2is in an analogous situation to that in panel a; thus, 2B2 > c2 > B2 andnation 2’s dominant strategy is still to do nothing. As each nation exercisesits dominant strategy, the Nash equilibrium results in nation 1 preemptingunilaterally. The underlying game is one of “asymmetric dominance”. Withthe United States sustaining 40% of transnational terrorist attacks worldwide,its willingness to preempt alone or to lead a coalition is easy to understand. Byfocusing so many attacks on US interests, the terrorists motivate US proactiveresponses. If terrorists had not concentrated their campaign on a couple ofnations, there would be even fewer proactive measures against terrorism. TheNash equilibrium in panel b is not necessarily the social optimum (based on thecompensation principle) insofar as the sum of benefits from mutual preemptionmay exceed that of the Nash equilibrium. Matrix b can be extended to n nationswith m prime targets and n −m nonprime targets. As such, the subset of primetargets is motivated to take aggressive actions against the terrorists.

Next suppose that some at-risk nation adopts proactive measures (evensymbolic ones) to support a prime-target nation’s actions, as Spain and Japandid in the US war on terror. Their supportive efforts put their people in greaterjeopardy. In this scenario, nation 2’s assumed inequality changes to c2 > 2B2

in panel b of Figure 1. Nation 2’s dominant strategy is to do nothing – asillustrated by Spain’s withdrawal from Iraq following the 11 March 2004train bombing where this inequality became apparent. Terrorists have a clearmotive to attack countries that bolster the proactive measures of prime-targetcountries.

Page 321: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

83

Figure 2. Deterrence: Symmetric prisoners’ dilemma

4.2. Defensive measures

Next, I consider deterrence as a means to limit terrorists’ success by hardeninga target at an expense of C to the deterrer. In Figure 2, such action provides abenefit of b greater than C for the deterrer. Unlike preemption with its publicbenefits, defensive measures have a public cost of Ci because the attack maybe deflected to country i as country j takes precautionary actions. If nation1 deters alone, then it gains b − C , while nation 2 suffers a cost of −C2 asit becomes a more desirable target. When nation 2 deters alone, the payoffsare reversed with nation 1 sustaining a deflection cost of −C1. No actiongives 0 payoffs, while mutual deterrence provides payoffs of b − C − Ci fornation i, i = 1, 2. Since b > C , the dominant strategy in the game matrixis for both countries to deter. As each nation plays its dominant strategy, theNash equilibrium of this prisoners’ dilemma is for everyone to deter, whichgives both nations a negative payoff based on the parameters assumed. Thepayoffs for mutual deterrence include −Ci because I implicitly assume onlytwo countries and that the terrorists are bent on attacking some target nomatter how well protected. Thus, matching deterrence upgrades leads to netcosts, so that C + Ci > b, as assumed. The deterrence game is analogous tothe problem of the commons, with all players trying to achieve a gain whileignoring the external-cost consequences of their actions.

If this game is extended to n nations with analogous parameters, then thesuboptimality of the Nash equilibrium worsens as more nations take defen-sive measures to shift the attack elsewhere. In today’s world of globalizedterrorism, the game’s outcome is that the terrorists will stage their attacksin those nations with the least defensive measures – the so-called soft tar-gets. In these venues, the terrorists will hit the interests of those nationsagainst which they have the greatest grievances. Thus, the paucity of attacksin North America and Europe in 2002–2003 is consistent with this predic-tion, as is the large percentage of attacks against US people and propertyabroad.

Shoring up the softest target implies its own collective action problem.Bolstering the defense of soft targets provides purely public benefits to all

Page 322: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

84

nations whose people or property are in jeopardy. In a globalized world, thismay involve improving many nations’ defensive capabilities. The underly-ing symmetric game for shoring up the softest target is surely a prisoners’dilemma with no action at the equilibrium. With nonsymmetric players, theprime-target nations have the most to gain from increasing the capabilities ofsoft targets. Thus, one of the four pillars of US counterterrorism policy is toimprove the antiterrorism abilities of those countries that seek assistance (USDepartment of State, 2004). No country – not even the United States – hasthe requisite resources to enhance all countries’ counterterrorism activities.Since 9/11, the United States has been spending large amounts on its ownproactive and defensive responses, which limits its capacity to help others.There is also a moral-hazard problem associated with strengthening anothercountry’s capabilities, since the latter may purposely use this money for do-mestic concerns and not protect the providing country’s interests. Thus, USaid to country X might either be used to protect non-US targets in X or elsereplace X’s usual security expenditures.

4.3. Choice between preemption and deterrence

Even though preemption implies public benefits and private costs, while deter-rence implies public costs and private benefits, the prisoners’ dilemma appliesto both situations in their symmetric presentation. What would happen if anation has three strategic options: deter, status quo, and preempt? Arce andSandler (2005) examined this question and found that the deter strategy dom-inates in two-nation symmetric scenarios. Ironically, the mutual-deter Nashequilibrium provides the smallest summed payoff in the associated 3×3 gamematrix. These authors vary the game form for the embedded preemption game(e.g., chicken is allowed) but uncover a robustness of their results. Even whena fourth policy choice – deterring and preempting – is included, the deterchoice dominates.

For domestic terrorism, nations are able to balance proactive and defensivemeasures. Israel clearly applies both in its domestic struggle against Hamasand Hezbollah. In their fight against leftist terrorists in the 1970s and 1980s,countries in Europe used proactive and defensive campaigns. The former re-sulted in the capture of Direct Action in France, the Red Brigades in Italy,and the Combatant Communist Cells in Belgium in the 1980s (Alexander& Pluchinsky, 1992). Why do tactics to combat domestic terrorism gener-ally differ from those used by non-prime-target nations to fight transnationalterrorism? First, the host nation is the only target of domestic terrorism. De-fensive actions are not applied to transfer the attack abroad as in the caseof transnational terrorism. Any transference of domestic attacks takes placeamong targets within the nation. A centralized government can internalize anytransference externality when deciding defensive allocations for the country.

Page 323: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

85

There is no centralized supranational government to serve the same purpose fortransnational terrorism. Second, the benefits of a proactive campaign againstdomestic terrorism are private to the venue nation. As such, the nation cannotfree ride on any other nation’s efforts, since other nations are not in jeop-ardy. For domestic terrorism, the central government removes much of thestrategic maneuvering that characterizes policy decisions for transnationalterrorism.5 Third, defensive measures require protecting all potential targets,while proactive responses only necessitate intelligence-based raids againstthe terrorists or their resources. There is a cost-effectiveness in instituting afocused proactive campaign; defensive action may lead to virtually limitlessspending.

5. Coordination Dilemma: Freezing of Terrorists’ Assets

Obviously, other game forms can apply to countermeasures in the war on ter-ror. A common game form for some policy choices is a “stag-hunt” assurancegame, where both parties are best off if they take identical measures. When aplayer takes the measure alone, this player receives the smallest payoff and theplayer who does nothing earns the second-greatest payoff. This kind of sce-nario is descriptive of a host of counterterrorism policies where two or morenations must act in unison for the best payoffs to result. Examples includefreezing terrorist assets, denying safe haven to terrorists, applying sanctionsto state-sponsors, or holding to a no-negotiation policy. Even one nation thatbreaks ranks can ruin the policy’s effectiveness for all others. To illustratesuch scenarios, I use freezing terrorist assets as a generic example and beginwith a two-nation symmetric case.

Matrix a in the top of Figure 3 displays this scenario where the highestpayoff of F results from mutual action, followed by a payoff of A from doingnothing either alone or together. The smallest payoff, B, comes from freezingassets alone since the terrorists can merely transfer their assets elsewhere,leaving the acting country with some banking losses but few safety gains. SinceF > A > B, there is no dominant strategy. There are, however, two pure-strategy Nash equilibriums: both countries freeze assets or neither freezesassets.

A third Nash equilibrium involves mixed strategies in which each purestrategy is played in a probabilistic fashion. To identify this mixed-strategyequilibrium, I determine the probability q of nation 2 freezing terrorist as-sets that make nation 1 indifferent between freezing terrorist assets and doingnothing. Similarly, I derive the probability p of action on the part of nation1 that makes nation 2 indifferent between the two strategies. Once p and qare identified, equilibrium probabilities for maintaining the status quo simplyequal 1 − q and 1 − p for nations 2 and 1, respectively. The relevant proba-bilities are indicated for matrix a besides the respective column and row. The

Page 324: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

86

Figure 3. Alternative freezing assets scenarios.

calculations for q (or p not shown) go as follows:

q F + (1 − q)B = q A + (1 − q)A, (1)

from which we have

q = (A − B)/(F − B). (2)

when q exceeds this value, cooperation in the form of both countries freezingterrorist assets is the best strategic choice. An identical expression holds forp owing to symmetry. The ratio in (2) represents the adherence probabilitythat each nation requires of the other to want to coordinate its freeze policy.6

A smaller equilibrium probability favors successful coordination, because anation requires less certainty of its counterpart’s intention to freeze assets inorder to reciprocate.

From Equation (2), either a larger gain (F) from a mutual freeze or a smallerstatus-quo payoff (A) promotes the coordination equilibrium by reducing therequired adherence probability. An event like 9/11 not only raises F but low-ers A as nations realize the benefits from limiting terrorists’ resources and thecatastrophic consequences that inaction may have for all. As terrorists escalatethe carnage to capture the media’s attention, nations are increasingly drawnto coordinate counterterrorism activities when unified action is required. Fol-lowing 9/11’s unprecedented casualties, many more nations participated in

Page 325: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

87

freezing assets,7 but participation is by no means universal. Differentiatingthe right-hand side of (2) with respect to B shows that a decrease in the payoffassociated with unilaterally freezing assets inhibits cooperation by raising por q.8

This game scenario can be readily generalized to n homogeneous nations,where at least n nations must freeze assets if each participant is to receive apayoff of F. For less than n freeze participants, each adherent receives B forcooperating and the nonadherents get A. If nations are uncertain about theintentions of other nations, then freezing assets is a desired policy providedthat a nation believes that the n − 1 required additional participants will fol-low through with a collective probability greater than q. This then impliesthat each nation must be expected to cooperate by at least the n − 1st root ofq, which for even modest groups may require near certainty. This is not anencouraging finding. If, however, the required number of adherents for coor-dination gains can be limited, then this decreases the assurance probabilities.For an agreement to freeze assets, this is best accomplished by first unifyingsome of the major financial-center nations – i.e., the United States, the UnitedKingdom, Switzerland, Japan and Germany. A concern with this strategy isthat some near-catastrophic terrorist acts are not very costly – e.g., the 1993WTC bomb cost just $400 and caused $500 million in damages (Hoffman,1998) – so that near-universal freezes may be required.

In matrix b in Figure 3, an alternative scenario is displayed where notfreezing assets, when the other nation freezes, gives the second highest payoffto the noncooperator, so that F > E > A > B. This scenario implies that thenation that does not join the freeze can profit by providing a safe haven forterrorists’ funds. The nation may be motivated to do so if it does not view itsown people or property as likely targets of the terrorists. The two pure-strategyNash equilibriums are for a mutual freeze or no action along the diagonal of thematrix. For the mixed-strategy Nash equilibrium, the adherence probabilitiesare now:

p = q = (A − B)/[F − B + (A − E)], (3)

which are greater than those in (2), because (A− E) < 0. Hence, coordinatinga freeze becomes more difficult owing to profitable opportunities availableto less scrupulous nations that can greatly limit gains from action to freezeassets, eliminate safe havens, or abide by no-negotiation pledges (see, e.g.,Lee, 1988).

Policies that penalize noncompliance can reverse the ranking of A and E,so that A > E . As a consequence, adherence becomes easier to achieve. Thereare two practical problems: (i) to identify nations that accept terrorists’ fundsand (ii) to convince nations to punish nonadherents. Since nations hide their

Page 326: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

88

bad behavior, singling out nations for punishment is not so easy. Imposingsanctions is itself a prisoners’ dilemma game that presents its own collectiveaction concern.

In Figure 4, a final freeze scenario allows for asymmetry where nation 2has more potential nonadherence profits but fewer gains from acting alonethan its counterpart. That is, I assume that F > Ei > A > Bi , i = 1,2, where E2 > E1 and B1 > B2. The pure-strategy Nash equilibriumsare still the matching-behavior outcomes along the diagonal of the matrixin Figure 4. For the mixed-strategy equilibrium, the adherence probabilitiesare:

p = A − B2

F − B2 + (A − E2)>

A − B1

F − B1 + (A − E1)= q. (4)

To act, nation 2 needs greater assurance than nation 1 that the other nationwill freeze assets. Such asymmetry is likely to work against consummating afreeze.

When coordination is required for a counterterrorism measure, many fac-tors work against getting sufficient action. A crucial consideration is the min-imum number of nations required for coordinating antiterrorism activities.As this minimum increases, nations must have greater assurance that otherswill cooperate for them to follow suit. Any policy action that limits this min-imum bolsters cooperation. As the threat of terrorism escalates, coordinationof counterterrorism is encouraged because cooperative outcomes have greaterpayoffs and unilateral action has smaller payoffs. The application of technol-ogy to track money flows can identify duplicitous nations that hamper othernations’ actions by providing safe havens to terrorists’ assets. Retributionagainst these “spoiler” nations can foster more fruitful coordination by send-ing a clear signal that profiting from terrorism has consequences. Efforts bythe International Monetary Fund and World Bank to assist countries in track-ing asset transfers can lower the costs of unilateral action, thereby boostingefforts to freeze terrorists’ assets.

Figure 4. Asymmetric freezing assets scenario.

Page 327: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

89

6. Public Choice Dilemma

The recent terrorism literature has shown that there appears to be a positiveassociation between terrorism and democracy (Eubank & Weinberg, 1994,2001; Li & Schuab, 2004; Schmid, 1992). This association is traced to factorsin a liberal democracy that can provide a favorable environment for transna-tional terrorist activities. For example, freedom of the press allows terroriststo publicize their cause through news coverage of terrorist attacks. Media cov-erage of ghastly events also serves terrorists’ needs to create an atmosphereof fear where everyone feels at risk. File footage is reshown periodically onanniversaries of events and when related incidents occur, so that these eventsremain in the public consciousness. Restraints on governments’ powers limitthe ability of authorities to hold terrorist suspects or to gather intelligence.Obviously, 9/11 has eroded some of these restraints as civil society becamemore willing to trade away some civil liberties for greater security. Freedomof association also provides an environment conducive to terrorism. Moderndemocratic states are not only target-rich, but also present opportunities forfunding and military training. Information is also readily available on buildingbombs and guerrilla tactics in an open society. In contrast, an autocracy is aless supportive environment for terrorism. If a terrorist group in an autocracywants to publicize its cause, then it may stage incidents in democracies wherenews coverage is more complete and the environment is more supportive.Crossing borders is generally easier in a liberal democracy than in an autoc-racy which, in turn, encourages the export of terrorism and the prevalence oftransnational externalities.

This association between democracy and transnational terrorism presentsa real public choice dilemma. Usually, democratic ideals work in a coun-try’s favor – e.g., democratic countries do not tend to go to war with oneanother. There are a number of research issues that require further empir-ical analysis to understand the public choice implications of transnationalterrorism. First, the staging of terrorist events in liberal democracies requiresstudy. To date, there has been no careful and convincing study on whethertransnational terrorism is originating in or spilling over to democratic coun-tries. The level of this alleged externality needs to be investigated in orderto determine the appropriate policy response. For example, enhanced bordersecurity can address some spillover terrorism. Second, the influence of thetype of democracy on the level of terrorism requires analysis. Which kind ofdemocratic system – proportional representation or majoritarian system – ismore conducive to terrorism? Since proportional representation gives moreviews, even extreme ones, a presence in government, terrorism may be lessprevalent under proportional representation than under a majoritarian system.The impact of the type of democratic system on the level of terrorism has notbeen investigated.9 Third, the role of rent seeking as a motive for terrorism

Page 328: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

90

requires further analysis. A paper by Kirk (1983) argued that government sizeencourages more terrorism because of greater potential rents to capture. Hisanalysis probably does not apply in today’s world where fundamentalist-basedterrorism is the driving force, since these terrorists’ goals do not appear tobe distribution driven. Many fundamentalist groups – e.g., Al-Qaida – viewall nonbelievers as enemies and want an Islamic state (White, 2003). In thosecountries where there are rival terrorist groups, a rent-seeking explanation ofterrorism may be appropriate. Each terrorist group is in a contest with othergroups for the provision of a public good in the form of a political changethat favors the group’s constituency. Rent-seeking costs are the expense of theterrorist campaign that promotes the terrorists’ demands. Such costs representa lower bound on the expense that the campaign imposes on society, becausedamage to the latter must also be included.

7. Concluding Remarks

The paper applies elementary noncooperative game theory to explore the col-lective action dilemmas that confront nations as they address a global terroristthreat. Although incentives are conducive for terrorists to form networks andcooperate, incentives are less supportive for targeted nations to coordinatetheir counterterrorism policies. Both proactive and defensive measures oftenimply an underlying prisoners’ dilemma game in which insufficient actioncharacterizes offensive efforts and too much action characterizes defensiveresponses. For proactive measures, a prime-target country is anticipated toact. By concentrating their attacks on a couple of target countries, terroristsmotivate these countries to strike back and privilege all at-risk countries withtheir actions to weaken the terrorists. If countries realize that defensive mea-sures may merely divert attacks abroad where their people and property are stilltargeted, then there will be a smaller tendency to overspend on defensive mea-sures. For domestic terrorism, there is a better balance struck between proac-tive and defensive responses because a central government can internalize theexternalities among targets that plague responses at the transnational level.

Collective action concerns may be particularly troublesome for counterter-rorist actions requiring sufficient transnational coordination, where nonpartic-ipating countries can severely undermine the efforts of the cooperators. Suchcoordination concerns apply to efforts to freeze terrorists’ assets, eliminate ter-rorists’ safe havens, deny terrorists’ weapons, and maintain a no-negotiationpolicy. As the number of participants required for cooperative gains to berealized increases, the associated assurance probabilities also increase. Thus,in the case of freezing terrorists’ assets, a few nations that safeguard theseassets can provide terrorists with the means to engage in some large-scale at-tacks. This is especially true because deadly events may be relatively cheap tofinance. Sanctions for nonparticipants can improve coordination possibilities

Page 329: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

91

but raise a collective action problem of their own, since sanctions providepurely public benefits. By targeting countries and their interests at home andabroad, today’s terrorists worsen the coordination problem for at-risk coun-tries. As terrorists escalate the damage from their acts, they, however, increasethe likelihood of coordination success on the part of targeted countries. Fol-lowing 9/11, many more countries started to freeze terrorists’ assets.

Acknowledgments

The author is the Robert R. and Katheryn A. Dockson Professor of Interna-tional Relations and Economics. The author’s research was financed in partfrom the Dockson endowment. While assuming full responsibility for anyshortcomings, the author has benefited from comments by Hirofumi Shimizuand Kevin Siqueira on an earlier draft.

Notes

1. The Algerians immediately freed the 23 non-Israeli passengers. On 27 July 1968, theyreleased the Israeli women and children hostages (Mickolus, 1980, p. 94). The remaininghostages were held at an Algiers military base under the “protection” of the Algeriangovernment.

2. The figures in this paragraph come from US Department of State (2004, pp. 176–181).3. This asymmetry paraphrases what Irish Republican Army (IRA) terrorists said in a letter

after they learned that their 12 October 1984 bombing of the Grand Hotel in Brighton hadnarrowly missed killing Prime Minister Margaret Thatcher. Their letter said, “Today, wewere unlucky. But remember we have only to be lucky once. You will have to be luckyalways.” See Mickolus et al. (1989, vol. 2, p. 115).

4. If B > c, then the dominant strategy is for both nations to preempt – a scenario that wevirtually never see for multiple countries.

5. Before 9/11, airlines tried to save money in their employment of security personnel. Thedeployment of federally trained screeners removes this strategic option.

6. Another interpretation for mixing is that p and q denote the uncertain beliefs that the nationshave for the likelihood that the other country will act.

7. Since 9/11, $200 million of alleged terrorist assets have been frozen (White House, 2003).8. dq/d B = dp/d B = (A − F)/(F − B)2 < 0, so that a smaller B is associated with greater

adherence probabilities.9. Recently Reynal-Querol (2002) showed that the incidence of civil wars is lower with

proportional representation than with majoritarian systems. Her analysis can be applied tothe incidence of transnational terrorism.

References

Alexander, Y., & Pluchinsky, D. (1992). Europe’s Red Terrorists: The Fighting CommunistOrganizations. Frank Cass: London.

Arquilla, J., & Ronfeldt, D. (2001). The advent of Netwar (Revisited). In J. Arquilla & D.Ronfeldt (Eds.), Networks and Netwars, 1–25. RAND: Santa Monica, CA.

Page 330: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

92

Arce, D. G., & Sandler, T. (2005). Counterterrorism: A game-theoretic analysis. Journal ofConflict Resolution, 49(2), 183–200.

Enders, W., & Sandler, T. (1993). The effectiveness of anti-terrorism policies: A vector-autoregression-intervention analysis. American Political Science Review, 87(4), 829–844.

Enders, W., & Sandler, T. (1995). Terrorism: Theory and applications. In K. Hartley &T. Sandler (Eds.), Handbook of Defense Economics, Vol. 1, 213–249. North-Holland:Amsterdam.

Enders, W., & Sandler, T. (2004). What do we know about the substitution effect in transnationalterrorism? In A. Silke (Ed.), Researching Terrorism: Trends, Achievements, Failures, 119–137. Frank Cass: Ilford.

Enders, W., Sandler, T., & Cauley, J. (1990). UN conventions, technology, and retaliation inthe fight against terrorism: An economic evaluation. Terrorism and Political Violence, 2(1),83–105.

Eubank, W. L., & Weinberg, L. (1994). Does democracy encourage terrorism? Terrorism andPolitical Violence, 6(4), 417–435.

Eubank, W. K., & Weinberg, L. (2001). Terrorism and democracy: Perpetrators and victims.Terrorism and Political Violence, 13(1), 155–164.

Hirshleifer, J. (1991). The paradox of power. Economics and Politics, 3(3), 177–200.Hoffman, B. (1998). Inside Terrorism. Columbia University Press: New York.Hoffman, B. (2003). Al Qaeda, trends in terrorism, and future potentialities: An assessment.

Studies in Conflict & Terrorism, 26(6), 429–442.Kirk, R. M. (1983). Political terrorism and the size of government: A positive institutional

analysis of violent political activity. Public Choice, 40(1), 41–52.Lapan, H. E., & Sandler, T. (1993). Terrorism and signaling. European Journal of Political

Economy, 9(3), 383–397.Lee, D. R. (1988). Free riding and paid riding in the fight against terrorism. American Economic

Association Papers and Proceedings, 78(2), 22–26.Li, Q., & Schuab, D. (2004). Economic globalization and transnational terrorism: A pooled

time-series analysis. Journal of Conflict Resolution, 48(2), 230–258.Mickolus, E. F. (1980). Transnational Terrorism: A Chronology of Events 1968–1979.

Greenwood Press: Westport, CT.Mickolus, E. F., Sandler, T., & Murdock, J. M. (1989). International Terrorism in the 1980s:

A Chronology of Events, 2 vols. Iowa State University: Ames.National Memorial Institute for the Prevention of Terrorism. (2004). Preventing Terrorism or

Mitigating its Effect. Available at http://www.mipt.org.Raufer, X. (2003). Al Qaeda: A Different Diagnosis. Studies in Conflict & Terrorism, 26(6),

391–398.Reynal-Querol, M. (2002). Political systems, stability and civil wars. Defence and Peace

Economics, 13(6), 463–483.Rosendorff, P., & Sandler, T. (2004). Too much of a good thing? The proactive response

dilemma. Journal of Conflict Resolution, 48(5), 657–671.Sandler, T. (2003). Collective action and transnational terrorism. World Economy, 26(6), 779–

802.Sandler, T. (2005). Recognizing the limits to cooperation behind national borders: Financing

the control of transnational terrorism. In I. Kaul & P. Conceicao (Eds.), Public Finance ina Globalizing World: Innovations in Theory and Practice. Oxford University Press: NewYork, forthcoming.

Sandler, T., & Lapan, H. E. (1988). The calculus of dissent: An analysis of terrorists’ choiceof targets. Synthese, 76(2), 245–261.

Page 331: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

93

Sandler, T., & Siqueria, K. (2003). Global terrorism: Deterrence versus preemption. Unpub-lished manuscript, School of International Relations, University of Southern California,Los Angeles, CA, USA.

Schmid, A. P. (1992). Terrorism and democracy. Terrorism and Political Violence, 4(4), 14–25.United States Department of State. (2001). Patterns of Global Terrorism, 2001. US Department

of State: Washington, DC.United States Department of State. (2004). Patterns of Global Terrorism, 2003. US Department

of State: Washington, DC.White, J. R. (2003). Terrorism: 2002 Update. Wadsworth/Thomason Learning: Belmont, CA.White House. (2003). Progress Report on the Global War on Terrorism. Available at http://www.

state.gov/s/ct/rls/rpt/24087.htm.

Page 332: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

DISTRIBUTION OF TRANSNATIONAL TERRORISM AMONG COUNTRIES BY INCOME CLASS AND GEOGRAPHY AFTER 9/11

by

Walter Enders University of Alabama

and

Todd Sandler

University of Southern California

Author’s Note: This research was partially supported by the United States Department of Homeland Security through the Center for Risk and Economic Analysis of Terrorism Events (CREATE), grant number EMW-2004-GR-0112. However, any opinions, findings, and conclusions or recommendations are solely those of the authors and do not necessarily reflect the views of the Department of Homeland Security. The authors have profited from the comments of two anonymous reviewers. Walter Enders is the Bidgood Chair of Economics and Finance at the University of Alabama. Todd Sandler is the Robert R. and Katheryn A. Dockson Professor of International Relations and Economics at the University of Southern California. The data used in this paper are posted at http://www.isanet.org/data_archive.htm.

Page 333: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

DISTRIBUTION OF TRANSNATIONAL TERRORISM AMONG COUNTRIES BY INCOME CLASS AND GEOGRAPHY AFTER 9/11

Abstract

This article applies an autoregressive intervention model for the 1968-2003 period to identify

either income-based or geographical transference of transnational terrorist events in reaction to

the rise of fundamentalist terrorism, the end to the Cold War, and 9/11. Our time-series study

investigates the changing pattern of transnational terrorism for all incidents and only those

involving U.S. people and property. Contrary to expectation, there is no evidence of an income-

based post-9/11 transfer of attacks to low-income countries except for attacks with U.S.

casualties, but there is a significant transference to the Middle East and Asia where U.S. interests

are, at times, attacked. We also find that the rise of fundamentalist terrorism has most impacted

those regions the Middle East and Asia with the largest Islamic population. The end to the

Cold War brought a terrorism peace dividend that varies by income and geography among

countries. Based on the empirical findings, we draw policy recommendations regarding

defensive counterterrorism measures.

Page 334: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

DISTRIBUTION OF TRANSNATIONAL TERRORISM AMONG COUNTRIES BY INCOME CLASS AND GEOGRAPHY AFTER 9/11

The terrorist hijackings of September 11, 2001, (henceforth, 9/11) and their fiery aftermath

changed the way that the global community views its major security threats. There is now a

realization that a terrorist incident can result in large-scale casualties, huge property losses, and

long-lasting ramifications. Prior to 9/11, no terrorist event had caused more than $2.9 billion in

damages (Wolgast, 2002)1 or killed over 500 people (Quillen, 2002). The incidents on 9/11

murdered almost 3,000 and caused over $80 billion in losses (Kunreuther and Michel-Kerjan,

2004). In terrorists future attempts to outdo past atrocities, there is real anxiety among

authorities on the magnitude of the next large-scale attack. The March 11, 2004, commuter train

bombings in Madrid (henceforth, 3/11) underscore the vulnerabilities of all countries to terrorist

attacks. As antiterrorism efforts are bolstered, governments are beginning to recognize that there

is no foolproof defense that can eliminate the terrorist threat. Post-9/11 actions to augment

security in wealthy nations may have unintended negative consequences by inducing terrorists to

stage their attacks in countries less able to afford widespread defensive measures. Thus, the new

emphasis on homeland security in the United States and throughout the European Union (EU)

may merely displace terrorist attacks to softer venues where people and property from prime-

target countries are attacked abroad (Enders and Sandler, 1993, 1995; Sandler and Enders, 2004).

This transference of attacks may be income-based or geographically founded. When

transference is income based, attacks are anticipated to be displaced from high-income countries

(HICs) to low-income countries (LICs) as some HICs deploy enhanced security measures that

make attacks more difficult and costly for terrorists to accomplish. At a minimum, these

defenses imply that terrorists may be forced to choose targets of lower value in rich countries.

For example, current actions to secure the monuments, the U.S. Capitol building, the White

Page 335: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

2

House, and other terrorist-prized targets mean that an attack in Washington DC would be

deflected to a lower-valued venue. If the transference is geographically based, then the

displacement may be from a rich region (e.g., Europe) to a poorer region (e.g., the Middle East

or Eurasia). A geographical shift may also be motivated by the ability of terrorists to blend in

and establish a support system, especially for religious fundamentalist terrorists. If terrorists

attack foreign interests nearer to home, then they do not have to cross borders that, in some

regions, are more safely guarded after 9/11. In the 1980s, there was a significant spillover of

Middle East terrorism throughout Europe e.g., there were 43 terrorist incidents of Middle

Eastern origin in Europe in 1987 (U.S. Department of State, 1988:16, 18). Given the increased

scrutiny attributed to Middle Easterners in Europe following 9/11, more incidents are anticipated

to be staged in the Middle East now.

After 9/11, casual empiricism gives an impression that terrorist events are being

displaced from rich to poor countries, perhaps in light of defensive measures in the former.

There have been many recent high-profile transnational terrorist attacks in low-income and

middle-income countries (MICs) e.g., in Morocco, Turkey, Indonesia, India, Malaysia, Kenya,

the Philippines, Pakistan, and Afghanistan. Casual empiricism may not, however, withstand

careful statistical scrutiny. The primary purpose of this paper is to empirically evaluate with

time-series methods (i.e., autoregressive intervention analysis) whether terrorists have shifted

their venue based on target countries income or regional location in reaction to the rise of

fundamentalist terrorism, the end to the Cold War, or 9/11. To accomplish this task, we partition

countries into income categories based on two alternative schemes. We also apply a standard

regional classification to pigeonhole countries geographically. Additionally, we analyze four

different time series of transnational terrorist events: all incidents, incidents with casualties,

incidents with a U.S. target, and casualty incidents with a U.S. target. A secondary purpose is to

Page 336: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

3

draw policy conclusions from the empirical findings.

Our aim is not to establish that income or political systems (constraints) are explanatory

variables for transnational terrorism. Such variables are already related to transnational terrorism

in recent studies by Li and Schaub (2004), Li (2005), and others. Investigating the impact of

these economic and political variables on terrorism is appropriate for panel estimates where the

time period is sufficiently long to allow for their effect. We are, instead, concerned with the

changing venue patterns of terrorist attacks in response to shocks. Events following 9/11, such

as the invasion of Afghanistan and the ongoing war on terror, surely have motivated

grievances and attacks against the coalition of the willing. Moreover, upgrades in homeland

security may have changed terrorist venues.2

Among other things, we find that the rise of fundamentalist terrorism, starting in late

1979, concentrated the distribution of transnational terrorism over time in LICs and those regions

with a large Islamic population. At the time of 9/11, LICs had been experiencing the lions share

of transnational terrorism with relatively few incidents in HICs. After 9/11, there has been a

gradual escalation of attacks with some increase in incidents involving a U.S. target in countries

of all three income classes. These attacks have, however, not occurred on U.S. soil, so that U.S.

homeland security has secured America, but not necessarily Americans. We uncover no clear

evidence of a general transference of attacks from HICs to LICs following 9/11. This is due, in

part, to the low level of terrorism in HICs and the high level in LICs at the time of 9/11; thus,

even a small increase in HIC attacks will appear proportionately large. There is more convincing

evidence of a regional shift in the post-9/11 era with incidents being displaced from Europe and

Africa to the Middle East and Asia, especially when U.S. targets are involved.

Background and Theoretical Considerations

Page 337: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

4

Terrorism is the premeditated use or threat of use of violence by individuals or subnational

groups to obtain a political or social objective through intimidation of a large audience beyond

that of the immediate victims. This standard definition rules out state terror, but does not

eliminate state-sponsored terrorism in which a country aids a terrorist group through logistical

support, training, a safe haven, financing, or other assistance (Mickolus, 1989). Terrorists

typically unleash their attacks against a general audience that does not directly make the

decisions that they want to affect. By making attacks appear to be random, terrorists intimidate a

wider audience and create a general anxiety in the targeted country. In response, the country

may expend huge amounts of resources to protect a wide range of vulnerabilities. As a society

becomes more aware of the terrorist threat, homeland security efforts may increase dramatically.

Terrorism falls into two categories: domestic and transnational. Domestic terrorism

involves only the host country so that the perpetrators, victims, financing, and logistical support

are all homegrown. More important, domestic incidents generate implications for just the host

country or its interests. In contrast, terrorist attacks that include perpetrators, victims, targets, or

interests from two or more countries constitute transnational terrorism. The 3/11 bombings are

transnational because they involved Moroccan terrorists on Spanish soil and killed or maimed

victims from a number of countries. The kidnappings of foreign workers in Iraq in 2004 are

transnational terrorist events intended to pressure foreign governments to pull out their troops,

workers, and diplomats. These acts are also meant to keep other governments from assisting the

U.S.-backed fledgling Iraqi government. Clearly, terrorist incidents whose ramifications

transcend the venue country are transnational.

We are particularly interested in investigating transnational terrorism before and after

9/11, insofar as this type of terrorism poses the greatest concern for the global community. At an

earlier time, we would have said that it presented the greatest security challenge to developed

Page 338: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

5

countries, but with security upgrades in the United States and some other rich countries,

transnational terrorism is a potential exigency for all countries owing to attack transference. The

dispersed al-Qaida network of affiliated groups heightens the interest in transnational terrorism.

Actions by countries to implement defensive countermeasures are anticipated to influence the

distribution of transnational terrorist attacks across countries. Hence, our focus is solely on this

form of terrorism.

For our theoretical underpinnings, we rely on a choice-theoretic model of terrorist

behavior.3 A terrorist group or network chooses its target country or venue to maximize

expected benefits, U, subject to a resource constraint. In particular, the terrorist groups expected

benefits are derived from attacks against n alternative venues, denoted by Ti, 1,..., ,i n= so that

( )1 2, ,..., .nU U T T T= The terrorist group picks its target venues to

maximize ( )1 2, ,..., ,nU T T T subject to 1

,n

i ii

C T I=

=∑ (1)

where Ci is the per-attack expected costs of targeting country i, Ti is the number of attacks in i,

and I is the resource constraint of the terrorist group. Each Ci is determined by the complexity of

the attack and the countermeasures taken by the authorities. The solution to this problem is to

satisfy

1 1 2 2 ... n nU C U C U C= = = , (2)

subject to the resource constraint, where iU is the terrorists expected marginal benefits

( )iU T∂ ∂ of attacking country i. This solution indicates that anything that lowers (raises) a

single venues expected costs makes that venue more (less) attractive for terrorists to attack

relative to other venues. If the terrorists perceive the marginal benefits from attacking target i

(i.e., Ui) to increase because of new grievances against country i, then, other things constant, this

Page 339: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

6

development augments incidents directed at i.

Based on equation (2), when two potential target venues offer the same expected benefits

for the terrorists (i.e., Ui = Uj), then they will pick the venue with the smaller expected costs (i.e.,

the smaller Ci or Cj). Actions by the authorities to harden target i may merely displace the attack

to another country whose Cj is now seen as smaller. The war on terror primarily influences the

terrorists resource constraint by reducing I and making all attacks less likely, or by changing the

relative costliness of attacking particular venues. Heavy-handed countermeasures may raise the

terrorists anticipated expected benefits, thereby making the proactive country a prized target.

When the attack venues imply the same expected costs (adjusted for risks), the terrorists will

choose the location with the greater expected benefits. Because terrorists must trade off

expected benefits and expected costs when deciding attack locations, action by a country to

secure homeland targets may fail to displace the attack abroad if the terrorists sufficiently value

the benefits to offset the greater expected costs. This is an essential insight in understanding the

pattern of attacks under investigation, because it implies that even massive increases in homeland

security need not deter nor deflect an attack at home when the terrorists sufficiently prize a target

i.e., view Ui as sufficiently high. Clearly, al-Qaida would dearly love to execute another attack

on U.S. soil even if it does not rival 9/11. Given these trade-offs of costs and benefits, the

distribution of terrorist attacks based on wealth or enhanced security is ultimately an empirical

question, dependent upon the terrorists perceived benefits and costs. Thus, redoubled efforts by

some rich countries to appear impregnable may merely increase the expected benefits of the

terrorists so that attacks may still occur in fortified countries. In contrast, support networks in

the terrorists home regions may reduce expected costs (Ci) enough or increase I sufficiently so

that some attacks hit foreign targets closer to the home of the terrorists following security

upgrades in the United States and elsewhere.

Page 340: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

7

There are two significant developments prior to 9/11 that have influenced the pattern of

transnational terrorism and that must be taken into account in our post-9/11 investigation. The

first is the rise in fundamentalist-based terrorism. Hoffman (1998) places this rise at the fourth

quarter of 1979 (i.e., 1979:4) owing to the November 4, 1979, takeover of the U.S. embassy in

Tehran and the December 25, 1979, Soviet invasion of Afghanistan. Since 1980, the number of

religious-based terrorist groups has increased as a proportion of active terrorist groups: 2 of 64

in 1980; 11 of 48 in 1992; 16 of 49 in 1994; and 25 of 58 in 1995 (Hoffman, 1997:3). The

proportion of incidents with deaths or injuries increased by 17 percentage points after the onset

of fundamentalist terrorism (Enders and Sandler, 2000). Unlike the left-wing terrorists who were

the dominant influence until the 1990s, fundamentalist terrorists have resorted to suicide

missions, which are on average over thirteen times more deadly than other terrorist attacks (Pape,

2003).4 The rise of fundamentalist terrorism is anticipated to increase incidents with casualties

after 1979:4. This increase is anticipated to be unevenly distributed among countries, with the

greatest impact on LICs, where fundamentalist terrorists have greater support networks. When

geographical considerations are also taken into account, we expect that fundamentalist terrorism

will impact those regions i.e., the Middle East, Eurasia, and Asia with large Moslem

populations, since the marginal costs of terrorism there will be relatively less and resources more

plentiful.

The second pre-9/11 development is the end of the Cold War during the last quarter of

1991 with the demise of the Soviet Union and communist regimes in Eastern Europe. Their

demise removed some of the avid state-sponsors of terrorism (Wilkinson, 1992), because these

countries no longer had a reason to destabilize Western countries. This reduction in support

limits terrorist resources and, therefore, the number of attacks. In the late 1980s and early 1990s,

a number of European countries (e.g., France, Belgium, Germany, Spain, and the United

Page 341: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

8

Kingdom) captured and brought to justice left-wing terrorists (Alexander and Pluchinsky, 1992;

Clutterbuck, 1992). In the early 1990s, there was also a collective initiative by the EU to take a

united front against terrorism (Chalk, 1994; Wilkinson, 1992). These events coming around the

end of 1991 have been shown to decrease the amount of transnational terrorism (Enders and

Sandler, 1999, 2000). Thus, any analysis of post-9/11 terrorism must account for this structural

shift at the start of the post-Cold War era.

Data

The data on transnational terrorist incidents are drawn from International Terrorism: Attributes

of Terrorist Events (ITERATE), which records the incident date, its location, number of deaths,

number of injured, and other variables (Mickolus et al., 2004). For location, ITERATE records

the starting country location of the terrorist attack only 47 out of 12,569 transnational incidents

had no start location listed and these 47 events are excluded from our statistical analysis.

Variable 28 of ITERATE indicates the type of U.S. target (i.e., commercial property, military

installation, diplomatic, U.S. government, or nonofficial), while variables 34 and 39 denote the

number of Americans wounded or killed, respectively. Thus, we can distinguish not only attacks

against U.S. interests but also attacks with U.S. casualties. ITERATE data are derived from the

worlds newsprint and electronic media with a heavy reliance until 1996 on the Foreign

Broadcast Information Service (FBIS) Daily Reports, which survey a couple hundred of the

worlds major newspapers and related sources. By splicing together previous ITERATE data

sets, ITERATE 5s common file contains over 40 key variables common to all transnational

incidents from 1968:1 to 2003:4. ITERATE excludes actions involving insurgencies, declared

wars, or an occupying force. Thus, roadside bombs against coalition forces in Iraq after the end

of the Iraq War in 2003 are not recorded as transnational terrorism, but the kidnappings of

Page 342: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

9

foreign workers in Iraq are included. ITERATE coding conventions are nearly identical to those

of the U.S. Department of State.

In total, we extract four quarterly time series from ITERATE. We use a quarterly, rather

than a more disaggregated time interval, to minimize periods with zero or near-zero

observations, which would violate the underlying normality assumption upon which our

inferential techniques rest. The ALL incident time series includes the quarterly totals for all

types of terrorist incidents for the 1968:1-2003:4 sample period. A second time series is the

casualty series, which contains all incidents with either a death and/or injury. We include two

series involving all targeted countries because the rise of fundamentalist terrorism and the other

shocks analyzed may result in non-U.S. targets being attacked. For example, coalition-of-the-

willing countries are prone to al-Qaida attacks after 9/11. Moreover, fundamentalist terrorists

have grievances with a host of countries, including the United Kingdom, Spain, France, and

Israel. Approximately 60% of all transnational terrorist attacks is directed at non-U.S. targets.

Incidents with a U.S. target (i.e., a U.S. citizen or property) are a subset of the series with all

incidents, while casualty incidents with a U.S. target are a subset of either the casualty series or

the U.S. target series. These series are included to examine whether post-9/11 homeland security

upgrades in the United States may have shifted attacks against U.S. interests to other countries.

The two U.S. series can be thin in terms of zero or near-zero quarterly totals for some income

classes or geographical regions. This problem is then a concern that we address with appropriate

econometric procedures.

To examine the distribution of terrorism across countries income classes, we first use the

World Banks classification of countries into low, middle, and high per capita income nations.

Although income groupings are described in detail in each issue of the World Banks (various

years) World Development Report,5 we mention some of the key features of the classification

Page 343: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

10

scheme. All World Bank member countries and others with populations in excess of 30,000 are

divided into three primary income groups LICs, MICs, and HICs. For 2000, LICs had a per

capita Gross National Income (GNI) of $755 or less, MICs had a per capita GNI greater than

$755 and less than or equal to $9,265, and HICs had a per capita GNI in excess of $9,265. These

dollar figures are adjusted annually to account for changes in a number of economic

circumstances including inflation, overall living standards, and exchange rates. Country codes

from ITERATE for location start of incidents allow us to associate terrorist events location to

the countrys income classification. Similarly, we can match terrorist events to other country

taxonomies described below.

In constructing our time series, we take account of the fact that individual nations may

switch among the three income groups. As a result of economic growth, the number of nations

included in the HIC group has generally increased, thereby working against a possible

transnational terrorism substitution from HICs to LICs. For instance, Algeria and Mexico moved

from the LIC group to the MIC group, whereas, Israel, Portugal, and Spain switched from the

MIC group to the HIC group owing to high per capita income growth. In the late 1980s, Poland

moved in the opposite direction from the class of MICs to LICs when it was a transition

economy, but returned to the MIC group in the mid-1990s.

When matching countries to terrorist attacks and income classes, we also had to adjust for

changes in the political map of Eastern Europe, Africa, and elsewhere over the entire sample

period. Prior to its division, ITERATE records terrorist incidents occurring in Czechoslovakia;

after its split, ITERATE separately keeps track of terrorist events in the Czech Republic and the

Slovak Republic. With respect to the Soviet Union, incidents before the breakup are attributed to

the U.S.S.R., while after the breakup they are assigned to the relevant new nations (e.g.,

Ukraine). The U.S.S.R. presents a potential concern because early issues of the World

Page 344: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

11

Development Report recorded the per capita GNI of the U.S.S.R. as greater than that of Hong

Kong, Greece, or Spain. The accuracy of Soviet GNI data is doubtful, because it was artificially

inflated as a political tool in the Cold War. This does not present a real problem for our study,

because much of the focus is on the post-Cold War period. Moreover, throughout the sample

period, there were very few transnational terrorist incidents in the U.S.S.R. for example, just

four from 1980 to 1987.

For geographical groupings, we apply the regional classifications given in the U.S.

Department of State (2003) Patterns of Global Terrorism. These six regions are the Western

Hemisphere (North, Central, and South America), Africa (excluding North Africa), Asia (South

and East Asia, Australia, and New Zealand), Eurasia (Central Asia, Russia, and the Ukraine),

Europe (West and East Europe), and the Middle East (including North Africa). This partition of

countries puts most of the Islamic population into the Middle East, Eurasia, and Asia. The

geographical division does not correlate with the income taxonomy, so that geography is likely

to display different substitution possibilities before and after 9/11. The lack of correlation will

become apparent in the graphs displayed in the subsequent sections.

Distribution of Terrorist Incidents by Income Classes

Figure 1 displays four panels for the location of terrorist incidents by income groups for the

sample period, 1968:1-2003:4. In each panel, the quarterly number of incidents is measured on

the vertical axis, whose scale may differ between panels. Panel 1 depicts the quarterly total of all

incidents, while panels 2 to 4 show quarterly incident counts occurring in LICs, MICs, and HICs,

respectively. All four time paths indicate a decline around the start of 1992, during the start of

the post-Cold War era (Enders and Sandler, 2000). The panels also show an increase in incidents

following 9/11, with LICs and MICs displaying a more marked increase. In Figure 2, we display

Page 345: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

12

the quarterly time series for terrorist incidents with one or more casualties for the entire sample

and the three income groups. For LICs, casualty incidents rose since the start of fundamentalist

terrorism in 1979:4 until 1992 when it started to decline. Following 9/11, there has been an

upward trend in casualty incidents, especially in LICs. The four panels of Figure 2 display that

LICs experienced by far the largest number of casualty incidents among the three income

classes.

[Figures 1 and 2 near here]

In Figure 3, the four quarterly time series are depicted by income group for terrorist

incidents against a U.S. target. Panel 2 shows that LICs generally suffered the largest number of

such attacks. There is also a somewhat more pronounced increase in these incidents in LICs

after 9/11 compared with the other income groups. When the time series for casualty incidents

against a U.S. target are plotted (not shown), there is also a marked upward trend of such attacks

in LICs.

[Figure 3 near here]

A useful way to simplify the long-run movements in these time series is to examine the

proportion of incidents staged in the LIC group. Figure 4 presents the proportion of each

incident type occurring in this income class. Because the proportions can be quite erratic, we

smoothe each series using a one-period lead and lag. If, for example, tx denotes the total

number of incidents of a particular type that occurs in period t, and ty represents the number of

incidents of that type that takes place in the LIC group in period t, the proportion of that incident

type in the LIC group ( )tp in period t is constructed as:

( ) ( )1 1 1 1 .t t t t t t tp y y y x x x+ − + −= + + + + (3)

In Figure 4, panels 1 to 3 indicate a clear upward trend in the proportion of all incidents,

Page 346: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

13

casualty incidents, and incidents with a U.S. target taking place in the LIC group.6 Although

there are now more casualty incidents with a U.S. target in LICs compared with earlier periods,

there is no clear upward trend for this series since 1979 (see panel 4). An interesting feature of

all four proportion series is that all experienced a sharp decline around 1999 and a sharp rise

following 9/11. The magnitude of the rebound is, however, smaller than the 1999 decline; thus,

the proportion of terrorist incidents in LICs is greater in the late 1990s than after 9/11.

[Figure 4 near here]

Table 1 reports four descriptive statistics for the four quarterly time series for several

essential time periods. For example, the mean number of ALL incidents is 66.4 per quarter for

the time period between the end of the Cold War and 9/11 (1992:2-2001:2). Over the same time

period, the quarterly means for the LIC, MIC, and HIC groups are 42.9, 5.7, and 17.8 incidents,

respectively. We also list four descriptive statistics for each of the four time series in the nine

quarters prior to 9/11 and the nine quarters following 9/11. Table 1 also reports the proportion of

terrorist incidents occurring in LICs. Prior to 9/11, 74.3% of these incidents took place in LICs,

while following 9/11, only 57.0% occurred in LICs.

[Table 1 near here]

In contrast to the visual impressions of Figures 1 through 4, there appear to be only

modest differences in the pre-9/11 and post-9/11 series. The mean of the series including all

incidents rises from 42.3 to 46.6 incidents per quarter following 9/11; thus, the overall level of

terrorism rises by 10%. There is an interesting and unexpected change in the composition of

incidents by income categories. After 9/11, the mean number of incidents in LICs falls by 6.8

per quarter, while this mean in HICs rises by 7.3 per quarter. A more pronounced increase

characterizes incidents with casualties where the worlds mean rises from 12.9 incidents per

quarter before 9/11 to 20.6 incidents per quarter after 9/11. Although the overall level of

Page 347: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

14

terrorism increases, the proportion of incidents with casualties in LICs falls from 72.2% to

67.9%. There is a 44% increase worldwide in the mean number of incidents with a U.S. target

(24.1/16.7 = 1.44) following 9/11, and more than a threefold increase in the mean number of

casualty incidents with a U.S. target (9.4 versus 2.6 incidents per quarter) following 9/11.

Because these incidents are not occurring in the United States, Americans may be safer at home

but not abroad in the aftermath of 9/11 and its security increases. About half of this increase

4.8 incidents per quarter occurred in LICs.

Statistical Analysis

Visual impressions and simple descriptive statistics do not replace formal inferential statistics.

Consider the increase in the number of casualty incidents in LICs that took place after 9/11.

Because this series is characterized by a number of increases and decreases, we must ascertain

whether this particular increase is statistically significant or just a random occurrence. To

determine whether the various incident series behaved differently following 9/11, we first

estimate each time series as an autoregressive (AR) process. Consider the AR(p) model:

1 2 3 41

,p

t i t i P L ti

y c a y FUND POST D Dα α α α ε−=

= + + + + + +∑ (4)

where p is the number of lags, ty is the number of incidents of a particular type in period t, c is a

constant, ia s and isα are undetermined coefficients, and ε is an error term. Equation (4) is a

standard autoregressive model augmented by four dummy variables. DP and DL are dummy

(intervention) variables representing potential impacts of 9/11. DP is a pulse dummy that equals

1 if t = 2001:3 and 0 otherwise. A pulse intervention variable is appropriate if the 9/11 attack

induced a temporary change in the ty series. The magnitude of 3α indicates the initial effect

Page 348: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

15

of 9/11 on the time series, and the rate of decay of this impact, if any, is determined by the

characteristic roots of equation (4). To allow 9/11 to have had a permanent effect on yt, we

include a level dummy variable such that DL is 0 for t < 2001:3 and is 1 for 2001:3t ≥ . The

immediate impact of 9/11 on ty is given by 4α , and the long-run effect is given by

( )4 1 iaα −∑ . We also include dummy intervention variables to control for the rise of religious

fundamentalism (FUND) and the post-Cold War era (POST). As identified by Enders and

Sandler (2000), FUND is a dummy variable taking a value of 1 beginning in the last quarter of

1979, and POST is a dummy variable taking a value of 1 beginning in the last quarter of 1991.

For each series, the lag length is selected by the Schwartz Bayesian Criterion (SBC). We

perform the tests without including time as a regressor, because there is no evidence of a

deterministic trend in any of the incident series.

Because we use count data and some of the time series are thin, we also obtain the

maximum likelihood estimates for thin series using a Poisson distribution. This distribution is

often used to model discrete variables that possess a reasonable number of observations near the

lower zero bound. For a given set of regressors xt, the Poisson model assumes that yt is

distributed with a probability density function:

( ) ( )! .tt t t tf y x e yµ µ−= (5)

A Poisson distribution rules out negative realizations of yt. As is easily demonstrated, the

conditional mean t tE y x is .tµ We model this mean as:

( ) 1 2 3 41

exp ln ,p

t i t i t i P Li

c a y bI FUND POST D Dµ α α α α− −=

= + + + + + +

∑ (6)

where t iI − is an indicator function that equals 0 if 0t iy − > and 1 if 0.t iy − = The indicators

parameter is estimated using a grid search over the interval 0.1 0.9.b≤ ≤

Page 349: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

16

Equations (4) and (6) are similar in that FUND, POST, DP, and DL can all affect the mean

of yt. Unlike equation (4), we permit the mean to be influenced by ln(yt-i) instead of the level of

yt-i. The rationale for this specification is to prevent the ty sequence from becoming

explosive. The logarithmic specification, however, mandates replacing zero values of yt-i with

some positive number b. Another way to understand the issue is to rewrite equation (6) in the

multiplicative form,

( ) [ ]1 2 3 41

exp .ip

a

t t i P Li

y c FUND POST D Dµ α α α α∗−

=

= • + + + +∏ (6′)

In equation (6′), 0t iy∗− = is an absorbing state. For ,i p≤ the expected value of ty is zero when

any value of t iy∗− is zero. Insofar as the ty cannot be negative, the probability of a positive value

of ty is then zero. To rule out such an undesirable implication of the model, a small positive

value (i.e., b) is added to zero values of t iy∗− by equation (6).

Although we do not provide a complete discussion of the alternative models, some

comparison of the ordinary least squares (OLS) and Poisson estimation methodologies is in

order. Given that equation (4) contains the appropriate specification of the mean, the coefficient

estimate using OLS can be consistent, but any confidence interval constructed using a t-

distribution may be severely distorted if the time series has zero or near-zero values. To assist

making appropriate inference, we report t-statistics based on robust standard errors. As shown in

equation (6) or (6′), the Poisson model is nonlinear so that the coefficients do not have a

straightforward interpretation. Moreover, the specification in equation (6) and the need to add b

to zero values of t iy∗− seem ad hoc. In a related point, the mean and variance of a Poisson-

distributed variable are identical. When the variance of ty is substantially greater than the mean,

some researchers replace the Poisson distribution with a negative binomial. As shown in Table

Page 350: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

17

1, most of the series exhibit no evidence of excess volatility in terms of their variance.

Given the limitations of the Poisson model, we typically report the OLS estimates with

robust standard errors. When, however, a time series is especially thin, we report the Poisson

estimate. If there are important differences between the OLS and the Poisson estimates, we

report the results of both.

Results

For each sample of countries, the results of the estimations for the four different incident types

are displayed in Table 2 below the corresponding series name. Our four samples include all

countries (WORLD) and the countries in the three designated income classes of the World Bank

(various years). The entries for WORLD are the sums of the associated incidents occurring in

the countries within the three income classes. Column 2 indicates the estimation method;

column 3 reports the number of lags; column 4 displays the pre-intervention intercept, c; and

columns 5 through 8 list 1α through 4α estimates. Column 9 reports the estimated long-run

(LR) value of the effect of DL as ( )4 1 21 ... ,pa a aα − − − − and column 10 indicates the prob-

value of the F-test for the joint hypothesis that 3 4 0α α= = , i.e., for the null hypothesis that 9/11

did not have any significant impact on global terrorism patterns. Finally, column 11 displays the

prob-value of the Ljung-Box Q-statistic using 4 lags of the residuals. The coefficients t-

statistics, calculated using robust standard errors, are depicted in parentheses beneath each

estimated coefficient.

[Table 2 near here]

To explain Table 2s entries, we first consider the estimates for the worldwide sample for

the ALL incident series. Because this series is quite thick (see panel 1 in Figure 1 where no

Page 351: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

18

quarterly total approaches zero), we report only the OLS results using a lag of one. The rise of

fundamentalism increases the series intercept by 25.68 incidents per quarter, while the end of

the Cold War (POST) decreases the intercept by 37.35 incidents per quarter. Both of the t-

statistics (2.98 and −3.49) exceed 1.96 in absolute value so that these two dummies are

statistically significant at the 5% level. The estimated coefficients on DP and DL are −30.13 and

−13.26, respectively, with t-statistics for 3α and 4α of −3.34 and −1.18. Moreover, the F-

statistic for the joint restriction that 3 4 0α α= = has a prob-value of 0.00; thus, we can conclude

that the decline in the number of incidents following 9/11 had a statistically significant

temporary, but not permanent component. Diagnostic checks indicate that the model is

adequate; for example, the reported prob-value for the Ljung-Box Q-statistic using 4 lags of the

residuals is 0.20.

For the time series with all incidents, the OLS estimates for the three income classes

indicate that FUND caused a significant increase in transnational terrorism of 27.56 incidents per

quarter for LICs, a significant decrease of 4.75 incidents per quarter for MICs, and no significant

change for HICs. Clearly, the influence of fundamentalist terrorism is income sensitive,

probably given the distribution of fundamentalist populations. All three income classes

experienced a significant decline in transnational terrorism in the post-Cold War period: 14.24

fewer incidents per quarter for LICs, 8.03 fewer incidents per quarter for MICs, and 13.80 fewer

incidents per quarter for HICs. There is no evidence of a substitution in overall transnational

terrorism from HICs to LICs following 9/11. In fact, the coefficients for both DP and DL are

negative and significant only for only LICs. Any long-run impact of the post-9/11 worldwide

decline in terrorist attacks was concentrated in LICs. The MIC sample experienced a temporary

fall in transnational terrorism, while the HIC sample did not register any significant effect as a

Page 352: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

19

result of 9/11.7 The latter result indicates that any increased marginal costs from bolstered

homeland security in the HIC sample balanced any greater perceived marginal benefits that

terrorists derived from attacking these countries directly.

For the casualty series, there is little measurable influence of rise of fundamentalism or

the end of the Cold War on the income-based distribution of incidents. The sole exception is the

statistically significant decrease of 1.16 incidents per quarter in MICs as a result of the rise in

fundamentalist terrorism. A key finding is that there is no long-run impact of 9/11 on any of the

four samples. The two statistically significant coefficients of DP are −6.78 and 4.38 for LICs and

HICs, respectively. This result suggests an immediate and temporary switch in the composition

of casualty incidents from LICs to HICs, perhaps as groups sympathetic to al-Qaida tried to raise

anxiety in high-income countries in the wake of 9/11, as their perceived marginal benefits

increased in HIC venues.

Next, we turn to incidents with a U.S. target. For the OLS results, fundamentalist

terrorism had little influence except for a marginally significant increase in LICs, while the end

of the Cold War resulted in significant decreases for all four samples with the largest decrease

occurring in HICs. There was a significant temporary decline in terrorism following 9/11 of

17.44 incidents per quarter associated with the WORLD sample, where most of this decrease

(i.e., 12.54 fewer incidents per quarter) was concentrated in LICs. For the OLS estimates, DL is

only significant for the HIC sample. The Poisson estimates for the thin MICs and HICs series

reflect a small, but significant, positive coefficients for DL.

The casualty series with a U.S. target is particularly thin for the three income classes;

thus, the Poisson estimates are reported. For LICs, we also display the OLS estimates since the

OLS and Poisson results differ for DP and DL. The primary finding concerns the long-run impact

of 9/11. The OLS estimate of 4α for WORLD is 4.58 additional incidents per quarter with a t-

Page 353: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

20

statistic of 2.26. The value of 4α for LICs is 3.45 additional incidents per quarter and the t-

statistic is 2.21. Most of the OLS-identified increase in attacks involving U.S. casualties was in

LICs, consistent with the greater concentration of U.S. targeted incidents in LICs owing to lower

anticipated marginal costs. The Poisson estimates of 4α are, however, positive and significant

for all income groups.

Alternative Search for Income-Based Substitution

To show the robustness of our income-based results, we apply an alternative partition of

countries into income classes that does not rely on the World Bank tripartite classification based

on cutoff per-capita GNI levels. We assign the 31 countries with the highest per capita GNI

according to the World Bank (2000) to the HIC group and all others to the LIC group. These 31

HICs include most member states of the Organization of Economic Cooperation and

Development (OECD) plus some other countries.8 Table 3 displays summary statistics for the

LICs, HICs, and LICs/WORLD based on the new partition for the four time series. Most

transnational terrorism had been staged in LICs during the 1990s. Prior to 9/11, HICs

experienced just 5.6 incidents per quarter on average, while LICs suffered 37.3 incidents per

quarter on average. During the nine quarters following 9/11, the quarterly mean rose in HICs

and fell slightly in LICs. Incidents with casualties are associated with an increase in their

quarterly means in both LICs and HICs after 9/11. A similar pattern holds for the two time

series involving a U.S. target, with a large apparent substitution to LICs for casualty incidents

with a U.S. target after 9/11. These impressions are now tested with the AR intervention model

represented in equations (4) and (6) above.

[Table 3 near here]

Page 354: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

21

Table 4 indicates the empirical results. When countries are partitioned in this new

fashion, the rise of fundamentalism had virtually all of its impact in LICs for all incidents and

those involving casualties. The rise of fundamentalist terrorism is associated with a large and

statistically significant increase in transnational terrorism attacks in LICs of 24.38 incidents per

quarter. Casualty incidents rose by 3.24 per quarter in LICs. A similar finding holds for casualty

incidents with a U.S. target: The coefficient for fundamentalism is positive and significant for

the Poisson test, and positive and marginally insignificant for OLS. Thus, our new partition

shows that the impact of fundamentalism was entirely based in LICs. A different pattern

emerges with respect to the decline in transnational terrorism in the post-Cold War period. For

the ALL incident series, the decline was virtually evenly split between LICs and HICs. The only

significant POST decline for incidents with casualties occurred in HICs. Following the Cold

War, there was a significant decline in incidents with a U.S. target for both income classes, with

the biggest drop characterizing HICs. This was also the case for casualty incidents with a U.S.

target. Thus, the worlds richest countries experienced the largest decline in deadly transnational

terrorism following the end of the Cold War but prior to 9/11, as state-sponsorship declined and

terrorist resources fell.

[Table 4 near here]

A mixed picture emerges with respect to the influence of 9/11. Immediately following

9/11, the total number of incidents fell by 27.79 per quarter in LICs, but displayed no significant

change in HICs. Moreover, neither income class experienced a permanent impact in total

terrorism after 9/11 − i.e., the coefficient on DL is not significant. For incidents with casualties,

there was an immediate decrease of 8.45 incidents per quarter in LICs and an increase of 4.30

incidents per quarter in HICs , almost equal to the four hijackings on 9/11. There was again no

permanent 9/11 influence. Both series involving U.S. targets fell in LICs temporarily after 9/11.

Page 355: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

22

However, incidents with a U.S. target increased permanently by 3.92 incidents per quarter in

HICs following 9/11. The Poisson result reinforces this finding. For casualty incidents with a

U.S. target, most of the worldwide increase of 4.59 incidents per quarter was in LICs where such

incidents rose by 3.56 incidents per quarter. Although there was also an increase in such

incidents in HICs, this increase was more modest, judging from the OLS results. Thus, there was

a greater concentration of deadly post-9/11 incidents involving a U.S. target in LICs, consistent

with the earlier findings and the view that homeland security upgrades in rich countries protected

Americans there. There is, however, an increased risk for American interests in LICs following

9/11 from transference of attacks.

The Distribution of Terrorism across Regions

The six panels of Figure 5 depict the time series with all incidents for the six designated regions.

Panels 1 and 2 show a sustained decrease in transnational terrorism beginning in the early 1990s

for the Western Hemisphere and Europe, respectively. In panel 3, the Middle East displays an

increase in transnational terrorism for the start of the 1990s, followed by a fall around 1993 and

then an increase around 9/11. A similar increase occurs for Asia following 9/11 in panel 4. In

panels 5 and 6, there is a jump in transnational terrorism in Africa and Eurasia at the start of the

1990s, followed by decreases and increases over the ensuing years. Some of the regional

incident patterns in Figure 5 (see, especially, Africa, Eurasia, and the Middle East) do not match

those in Figure 1 when countries are partitioned by income classes. Hence, the geographical

identification provides new insights on attack patterns.

[Figure 5 near here]

Figure 6 depicts the casualty series for the six geographical regions. The most striking

feature is the sharp upward trend in these terrorist incidents in the Middle East starting in 2000,

Page 356: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

23

with a pronounced increase following 9/11. Much smaller increases characterize the other

regions. In Asia (panel 4), the increase in terrorist incidents after 9/11 is followed by a decrease.

Some of the series, especially that of Eurasia, may be too thin to conduct meaningful statistical

analysis.

[Figure 6 near here]

Table 5 reports that the descriptive statistics for three periods for the four incident series

and the six geographical regions.9 We focus our remarks on the time series that includes all

incidents. For the 1992:2-2001:2 period, Europes mean of 19.27 incidents per quarter exceeds

that of the other regions. The quarterly mean of terrorist incidents in the Western Hemisphere

(11.84), Africa (10.05), the Middle East (12.92), and Asia (9.76) are all quite similar; there are,

however, some contrasting regional changes for the two time intervals surrounding 9/11. In the

nine pre-9/11 quarters, the Western Hemisphere and Africa experienced an average of 12.33 and

9.44 incidents per quarter, respectively; in the nine post-9/11 quarters, the Western Hemisphere

and Africa experienced an average of 5.33 and 2.44 incidents per quarter, respectively. These

are rather drastic declines. In sharp contrast, the Middle East and Asia had incident means that

rose very sharply from 4.78 and 7.78 to 15 and 13 incidents per quarter, respectively, for the

same comparison intervals. The mean number of European incidents showed a modest rise from

6.33 to 10.78 incidents per quarter.

[Table 5 near here]

In the casualty series, the Middle East displayed the largest change on either side of 9/11

a rise of almost 8.5 incidents per quarter. In contrast, Africas casualty series fell by 2.78

incidents per quarter. For incidents with a U.S. target, the Western Hemisphere experienced a

reduction of 5.89 incidents per quarter when the periods on either side of 9/11 are compared.

Europe, the Middle East, and Asia, however, attracted more U.S.-targeted events following 9/11.

Page 357: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

24

This same pattern held for the Middle East and Asia for casualty incidents with a U.S. target.

To formalize these impressions, we again conduct an AR intervention analysis for each

incident type in each region.10 The empirical results are summarized in Table 6. For all

incidents, the rise of fundamentalism was associated with a significant increase in terrorism in

Africa, Asia, and the Middle East, but not in the other three regions. The increase is greatest in

the Middle East. The post-Cold War period is associated with less transnational terrorism in the

Western Hemisphere, Europe, the Middle East, and Asia, which is due, in part, to the reduced

sponsorship by the Soviet-bloc countries and the demise of many left-wing European groups

(Enders and Sandler, 1999). In contrast, Eurasia had more terrorism during the post-Cold War

period, a result characteristic of fledgling democracies (Eubank and Weinberg, 1994). Africa,

the Middle East, and Asia experienced a significant immediate decline in terrorism following

9/11, as shown by the estimate of the DP coefficient. The Western Hemisphere, Eurasia, and

Africa had a significant long-term decrease in terrorism after 9/11. Asia showed a significant but

small increase. When these results are evaluated in conjunction with Table 5, there is strong

evidence that all regions experienced on balance a post-9/11 decline in terrorism due, in part, to

the war on terror and attacks against al-Qaida and associates.

[Table 6 near here]

The empirical results for the casualty series are similar to those for the ALL incident

series. The increase in fundamentalism was associated with a significant increase in casualty

incidents in Africa, the Middle East, and Asia. For the latter two regions, there are strong

fundamentalist populations and influences. The post-Cold War era experienced a significant fall

in casualty incidents in the Western Hemisphere and a significant rise in Eurasia. The various

results for Europe are ambiguous since the OLS and Poisson estimates have some marked

differences: e.g., the coefficient for the post-Cold War era (POST) is negative and insignificant

Page 358: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

25

for OLS, but negative and significant for Poisson. The Western Hemisphere displays a positive

and significant temporary increase in casualty incidents during the post-9/11 period. The Middle

East and Asia experienced a temporary drop in these events after 9/11. The OLS estimates show

that no region displayed a permanent and significant change (at the 5% level) in casualty

incidents following 9/11. The decline for Europe is only significant for the Poisson estimation.

Overall, there is less evidence of a permanent 9/11-induced fall of casualty events compared with

ALL events. This finding is consistent with transnational terrorist incidents remaining deadly in

the post-Cold War era.

Interestingly, the rise of fundamentalism is not associated with a significant effect on the

number of incidents against U.S. interests in any region but Eurasia, where there is a negative

and significant impact. The positive influence of fundamentalist terrorism in Asia is almost

significant at the 5% level. The end of the Cold War or POST resulted in region-specific

differences: There is a negative and significant impact in the Western Hemisphere, Europe, the

Middle East, and Asia. Again, these findings can be partly explained by reduced state-

sponsorship of terrorism and the demise of many left-wing groups in Europe. In contrast, the

end of the Cold War is tied to a rise in incidents involving U.S. targets in Eurasia and Africa,

where there was greater political instability in the 1990s. The pulse dummy for 9/11 indicates a

negative and significant fall in U.S.-targeted events in Europe, the Middle East, and Asia.

During the post-9/11 period, there are marginally significant permanent declines in incidents

involving U.S. targets in the Western Hemisphere and Africa. There is, however, a significant

positive increase in the coefficient for DL in the Middle East. This result is strongly suggestive

of a transfer of U.S.-targeted events from North America and other venues to targets in the

Middle East, in keeping with the terrorists responding to augmentations in U.S. homeland

security.

Page 359: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

26

Finally, we turn to the regional effects tied to casualty incidents with a U.S. target. In

Table 6, the rise in fundamentalism is not associated with any significant changes in these

incidents. In contrast, POST leads to significant drops in these events in the Western

Hemisphere and Europe. The so-called peace dividend derived from the end of the Cold War

involved not only reduced military spending but also a decrease in terrorism directed at U.S.

interests owing to less state-sponsorship. There is, however, a significant increase in such events

in Africa following the end of the Cold War. The 9/11 pulse coefficient reflects a temporary but

significant rise in casualty incidents with a U.S. target in the Western Hemisphere and a

significant decrease in the Middle East and Asia after 9/11. More important, the level impact of

9/11 is quite different: Both the Middle East and Asia experienced a significant increase in these

events, while Africa experienced a marginally significant decrease. For the Middle East and

Asia, we again see a geographical switch of venue following 9/11 possibly coinciding with

increases in security in the wealthy countries and the associated increases in the costs of carrying

out an attack Ci.

Concluding Remarks

We apply time-series methods to identify shifting patterns of transnational terrorism across

countries income classes and geographical distribution in response to three defining events.

Intuition and eyeballing of data may give different impressions than careful statistical analysis

that controls for important interventions such as the rise of fundamentalism, the end of the Cold

War, and 9/11. Although intuition suggests a substitution of terrorist events from rich to poor

countries in response to 9/11-motivated increases in homeland security in some rich countries

(especially the United States and the EU) and the terrorists hunt for soft targets, we find no

convincing evidence of this shift except for incidents with U.S. casualties. Our failure may be

Page 360: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

27

due to offsetting factors (i.e., increased marginal costs and higher marginal benefit of terrorist

incidents) or the rather low beginning GNI per capita level for designating HICs and MICs. To

address the latter concern, we reclassify HICs as those with the 31 highest per capita GNIs and

look for a transference of terrorist events after 9/11 from HICs to LICs. Again, we find no

evidence of an income-based transfer in the anticipated direction except for incidents with U.S.

casualties, so that our results are robust to an alternative income taxonomy.

When countries are classified into six regional groups, there is evidence of shifting

venues based on geography. For terrorist incidents with a U.S. target, a clear transference away

from the Western Hemisphere and Africa to the Middle East and Asia is uncovered. In addition,

the augmenting influence of the rise of fundamentalism on transnational terrorists was greatest in

the Middle East and Asia, where there are large Islamic populations. The end to the Cold War

and the breakup of the Soviet Union reduced transnational terrorism in most regions except

Eurasia, where it has increased with augmented political instability. The effects of

fundamentalism and the end of the Cold War on terrorism differed markedly between income-

based and geographically based partitions of countries.

While Americans are safer at home owing to enhanced homeland security, the

vulnerability of U.S. citizens and property abroad has increased following 9/11. This

vulnerability probably also applies to other prime-target countries, particularly those identified as

assisting the U.S. agenda in the Middle East. The U.S. policy to assist LICs that request help11

does not go far enough given the changing post-9/11 pattern of the transnational terrorism aimed

at U.S. targets. Soft targets can exist anywhere and our analysis identifies increased post-9/11

attacks not only in HICs but also in the Middle East and Asia. Thus, U.S. assistance must

account for changing patterns of attacks against U.S. and other interests. Our study shows that

this pattern may go against intuition owing to opposing considerations and be more

Page 361: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

28

geographically based. For example, post-9/11 attacks in Saudi Arabia have involved a wealthy

Middle East country. Todays fundamentalist terrorism is shifting to the Middle East and Asia,

where large support populations exist and terrorists do not have to transcend fortified borders to

attack U.S. and Western interests. Thus, regions that once experienced greater spillover

terrorism from the Middle East and Africa (e.g., Europe in the 1980s) may want to reallocate

some homeland security spending to these regions to protect their interests.

Our time-series analysis identifies where the United States and the international

community need to direct their security efforts in light of recent events. In a globalized world

with transnational terrorism, countries must realize that terrorists will react to homeland security

upgrades by identifying weaker links abroad. The ability to shore up the weakest links

worldwide requires collective action beyond efforts observed to date. Such actions are prone to

free riding as countries wait for the prime-target countries to act. Past events the rise of

fundamentalist terrorism and the end to the Cold War demonstrate that transnational terrorism

patterns can change rather drastically. Both events have had a greater influence on patterns than

9/11. Moreover, this change in terrorism patterns may be geographically, rather than income

driven. There is clearly a need to keep track of such changes if defenses are to be appropriately

deployed.

Page 362: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

29

References

Alexander, Yonah, and Dennis Pluchinsky (1992) Europe’s Red Terrorists: The Fighting

Communist Organizations. London: Frank Cass.

Atkinson, Scott E., Todd Sandler, and John Tschirhart (1987) Terrorism in a Bargaining

Framework. Journal of Law and Economics 30:1−21.

Cameron, A. Colin, and Pravin Trivedi (1998) Regression Analysis of Count Data. Cambridge:

Cambridge University Press.

Chalk, Peter (1994) EU Counter-Terrorism, the Maastricht Third Pillar and Liberal Democracy

Acceptability. Terrorism and Political Violence 6:103−145.

Clutterbuck, Richard (1992) Keeping Track of Terrorists after 1992. Terrorism and Political

Violence 4:301−306.

Enders, Walter, and Todd Sandler (1993) The Effectiveness of Anti-Terrorism Policies: A

Vector-Autoregression-Intervention Analysis. American Political Science Review

87:829−844.

Enders, Walter, and Todd Sandler (1995) Terrorism: Theory and Applications. In Handbook

of Defense Economics, Vol. I, edited by K. Hartley and T. Sandler, pp. 213−249.

Amsterdam: North-Holland.

Enders, Walter, and Todd Sandler (1999) Transnational Terrorism in the Post-Cold War Era.

International Studies Quarterly 43:145−167.

Enders, Walter, and Todd Sandler (2000) Is Transnational Terrorism Becoming More

Threatening? A Time-Series Investigation. Journal of Conflict Resolution 44:307−332.

Enders, Walter, and Todd Sandler (2006) The Political Economy of Terrorism. Cambridge:

Cambridge University Press, forthcoming.

Eubank, William L., and Leonard B. Weinberg (1994) Does Democracy Encourage Terrorism?

Page 363: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

30

Terrorism and Political Violence 64:417−435.

Hoffman, Bruce (1997) The Confluence of International and Domestic Trends in Terrorism.

Terrorism and Political Violence. 9:1−15.

Hoffman, Bruce (1998) Inside Terrorism. New York: Columbia University Press.

Kunreuther, Howard, and Erwann Michel-Kerjan (2004) Dealing with Extremist Events: New

Challenges for Terrorist Risk Coverage. Unpublished manuscript, Wharton, University

of Pennsylvania, Philadelphia, PA.

Landes, William M. (1978) An Economic Study of U.S. Aircraft Hijackings, 1961-1976.

Journal of Law and Economics 21:1−31.

Li, Quan (2005) Does Democracy Promote or Reduce Transnational Terrorist Incidents? Journal

of Conflict Resolution 49:278−297.

Li, Quan, and Drew Schaub (2004) Economic Globalization and Transnational Terrorism.

Journal of Conflict Resolution 48:230−258.

Mickolus, Edward F. (1989) What Constitutes State Support to Terrorists? Terrorism and

Political Violence 1:287−293.

Mickolus, Edward F., Todd Sandler, Jean M. Murdock, and Peter Flemming (2004) International

Terrorism: Attributes of Terrorist Events, 1968-2003 (ITERATE 5). Dunn Loring, VA:

Vinyard Software.

Pape, Robert A. (2003) The Strategic Logic of Suicide Terrorism. American Political Science

Review 97:343−361.

Quillen, Chris (2002) A Historical Analysis of Mass Casualty Bombers. Studies in Conflict &

Terrorism 25:279−292.

Sandler, Todd, and Walter Enders (2004) An Economic Perspective on Transnational Terrorism.

European Journal of Political Economy 20:301−316.

Page 364: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

31

Sandler, Todd, John Tschirhart, and Jon Cauley (1983) A Theoretical Analysis of Transnational

Terrorism. American Political Science Review 77:36−54.

U.S. Department of State (1988, 2003) Patterns of Global Terrorism. Washington, DC: U.S.

Department of State.

Wilkinson, Paul (1992) The European Response to Terrorism: Retrospect and Prospect. Defence

Economics 3:289−304.

Wolgast, Michael (2002) Global Terrorism and the Insurance Industry: New Challenges and

Policy Responses. Paper presented at the DIW (Deutsches Institut für

Wirtschaftsforschung) Workshop, The Economic Consequences of Global Terrorism,

June 14−15, Berlin.

World Bank (1978, 1980, 1990, 1995, 2000) World Development Report. New York:

Oxford University Press.

Page 365: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

32

Notes

1. The April 10, 1992, bombing of the London financial district by the Irish Republican

Army caused $2.9 billion of losses, making it the most costly terrorist incident prior to 9/11.

2. In the United States, homeland security involves securing targets at home (Enders and

Sandler, 2006: Chapter 10). Upgrades to U.S. embassies and military installations abroad started

in 1976 and 1985, well before 9/11 (Enders and Sandler, 1993). For the United States, except for

a few years, there is no homeland security expenditure data; thus, we cannot explicitly add this

variable. We can, however, infer that rich countries are more able to afford homeland security.

Moreover, some wealthy nations (e.g., Israel, Spain, the United Kingdom, and the United States)

are motivated to augment security because their interests are prime targets of terrorists.

3. Pioneering studies include Landes (1978), Sandler, Tschirhart, and Cauley (1983),

and Atkinson, Sandler, and Tschirhart (1987).

4. The average terrorist incident kills one person, while a suicide mission murders

thirteen.

5. We used the 1978, 1980, 1990, 1995, and 2000 volumes of the World Development

Report to track changes in the countries income classifications.

6. We use smoothed proportions in Figure 4 only; the actual proportions are utilized in

our statistical analysis.

7. We also ran a three-variable vector-autoregressive (VAR) model with separate

estimating equations for LICs, MICs, and HICs. For each equation, current variables of

incidents in each income class are regressed against past values of incidents in each of the three

income classes and the four intervention dummies. The results for the ALL series is virtually

identical to the single-equation estimates. These results are available from either author upon

request.

Page 366: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

33

8. The 31 countries are: Luxembourg, Norway, the United States, Switzerland,

Denmark, Iceland, Austria, the Netherlands, Canada, Belgium, Hong Kong, Japan, Ireland,

Germany, France, Australia, the United Arab Emirates, the United Kingdom, Finland, Italy,

Sweden, Singapore, Spain, Israel, Macao, New Zealand, Kuwait, Malta, Cyprus, Portugal, and

Greece.

9. Figures 5 and 6 display the pattern of the time series for the entire period and show

whether a series is thin in terms of zero values. Table 5 gives a more focused characterization of

the series for the post-Cold War and 9/11 periods.

10. A spatial econometric specification requires a nonlinear estimator that conflicts with

our linear time-series approach. Spatial estimation is reserved for another paper.

11. This assistance is one of the four pillars of U.S. antiterrorism policy (U.S. Department

of State, 2003).

Page 367: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 1: Location of Incidents by Income GroupPanel 1: All Incidents

inci

den

ts p

er q

uar

ter

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010

50

100

150

200

250

300

350

Panel 3: MIC Incidents

inci

den

ts p

er q

uar

ter

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010

10

20

30

40

50

60

70

Panel 2: LIC Incidents

inci

den

ts p

er q

uar

ter

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010

25

50

75

100

125

150

175

200

225

Panel 4: HIC Incidents

inci

den

ts p

er q

uar

ter

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010

25

50

75

100

125

150

175

200

225

Page 368: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 2: Location of Casualty Incidents by Income GroupPanel 1: All Casualty Incidents

inci

den

ts p

er q

uar

ter

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010

10

20

30

40

50

60

Panel 3: MIC Casualty Incidents

inci

den

ts p

er q

uar

ter

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010

10

20

30

40

50

Panel 2: LIC Casualty Incidents

inci

den

ts p

er q

uar

ter

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010

10

20

30

40

50

Panel 4: HIC Casualty Incidents

inci

den

ts p

er q

uar

ter

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010

10

20

30

40

50

Page 369: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 3: Incidents with a U.S. Target by Income GroupPanel 1: All Incidents with a U.S. Target

inci

den

ts p

er q

uar

ter

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010

20

40

60

80

100

120

140

160

Panel 3: MIC Incidents with a U.S. Target

inci

den

ts p

er q

uar

ter

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010

10

20

30

40

50

60

70

80

90

Panel 2: LIC Incidents with a U.S. Target

inci

den

ts p

er q

uar

ter

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010

10

20

30

40

50

60

70

80

90

Panel 4: HIC Incidents with a U.S. Target

inci

den

ts p

er q

uar

ter

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010

10

20

30

40

50

60

70

80

90

Page 370: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 4: Proportion of Incident Types in the LIC GroupPanel 1: Proportion of Incidents in the LIC Group

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1.0

Panel 3: Proportion of Incidents with a U.S. Target

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1.0

Panel 2: Proportion of Casualty Incidents

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010.0

0.2

0.4

0.6

0.8

1.0

Panel 4: Proportion of Casualty Incidents with a U.S. Target

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010.00

0.25

0.50

0.75

1.00

Page 371: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 5: Incidents by RegionPanel 1: Western Hemisphere

inci

den

ts p

er q

uar

ter

1968 1972 1976 1980 1984 1988 1992 1996 20000

10

20

30

40

50

60

70

80

90

Panel 4: Asia

inci

den

ts p

er q

uar

ter

1968 1972 1976 1980 1984 1988 1992 1996 20000

25

50

75

100

125

150

Panel 2: Europe

inci

den

ts p

er q

uar

ter

1968 1972 1976 1980 1984 1988 1992 1996 20000

25

50

75

100

125

150

175

Panle 5: Africa

inci

den

ts p

er q

uar

ter

1968 1972 1976 1980 1984 1988 1992 1996 20000

5

10

15

20

25

30

35

40

45

Panel 3: Middle East

inci

den

ts p

er q

uar

ter

1968 1972 1976 1980 1984 1988 1992 1996 20000

8

16

24

32

40

48

56

64

Panel 6: Eurasia

inci

den

ts p

er q

uar

ter

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010

1

2

3

4

5

6

7

8

9

Page 372: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 6: Casualty Incidents by RegionPanel 1: Western Hemisphere

inci

den

ts p

er q

uar

ter

1968 1972 1976 1980 1984 1988 1992 1996 20000

5

10

15

20

25

30

Panel 4: Asia

inci

den

ts p

er q

uar

ter

1968 1972 1976 1980 1984 1988 1992 1996 20000.0

2.5

5.0

7.5

10.0

12.5

15.0

17.5

20.0

Panel 2: Europe

inci

den

ts p

er q

uar

ter

1968 1972 1976 1980 1984 1988 1992 1996 20000

5

10

15

20

25

30

Panle 5: Africa

inci

den

ts p

er q

uar

ter

1968 1972 1976 1980 1984 1988 1992 1996 20000

5

10

15

20

25

30

Panel 3: Middle East

inci

den

ts p

er q

uar

ter

1968 1972 1976 1980 1984 1988 1992 1996 20000

5

10

15

20

25

30

Panel 6: Eurasia

inci

den

ts p

er q

uar

ter

1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 20010

1

2

3

4

5

6

7

8

Page 373: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

TABLE 1. Summary Statistics of the Various Incident Types by Income Group

Series Start End Mean Variance Min Max Mean Variance Min Max

ALL Incident Types Incidents with Casualties WORLD 1992:2 2001:2 66.4 44.0 10 242 22.7 14.3 4 57

1999:2 2001:2 42.3 22.2 10 82 12.9 7.3 4 262001:4 2003:4 46.6 29.4 17 105 20.6 12.8 7 43

LICs 1992:2 2001:2 42.9 24.7 6 125 16.5 11.3 2 501999:2 2001:2 33.1 20.4 6 72 9.9 6.8 2 232001:4 2003:4 26.3 16.8 8 58 14.0 9.5 4 34

MICs 1992:2 2001:2 5.7 3.9 0 16 2.3 2.2 0 91999:2 2001:2 3.7 1.1 2 5 1.8 1.5 0 52001:4 2003:4 7.3 8.7 0 23 2.8 3.0 0 8

HICs 1992:2 2001:2 17.8 28.7 2 171 4.0 4.6 0 211999:2 2001:2 5.6 2.3 2 9 1.2 1.1 0 32001:4 2003:4 12.9 8.1 5 26 3.8 2.0 0 7

LICs/WORLD 1992:2 2001:2 67.5% 0.145 0.262 0.878 71.8% 0.122 0.385 0.9131999:2 2001:2 74.3% 0.095 0.600 0.878 72.2% 0.134 0.500 0.8852001:4 2003:4 57.0% 0.117 0.394 0.758 67.9% 0.112 0.500 0.857

Incidents with a U.S. Target Casualty Incidents with a U.S. Target

WORLD 1992:2 2001:2 16.2 10.4 3 38 3.9 3.3 0 171999:2 2001:2 16.7 12.9 3 38 2.6 1.2 0 42001:4 2003:4 24.1 17.1 8 59 9.4 6.5 1 20

LICs 1992:2 2001:2 12.3 9.6 2 35 2.9 3.0 0 161999:2 2001:2 13.9 12.8 3 33 1.9 1.3 0 42001:4 2003:4 13.6 9.4 4 33 6.7 4.7 1 14

MICs 1992:2 2001:2 1.6 1.9 0 10 0.4 0.7 0 31999:2 2001:2 1.0 0.9 0 2 0.4 0.5 0 12001:4 2003:4 4.3 5.4 0 16 1.0 1.9 0 6

HICs 1992:2 2001:2 2.3 2.2 0 8 0.6 0.8 0 31999:2 2001:2 1.8 2.5 0 7 0.2 0.4 0 12001:4 2003:4 6.2 4.9 0 16 1.8 1.2 0 4

LICs/WORLD 1992:2 2001:2 73.6% 0.183 0.250 1.000 71.6% 0.243 0.000 1.0001999:2 2001:2 78.7% 0.210 0.333 1.000 69.8% 0.209 0.500 1.0002001:4 2003:4 57.1% 0.133 0.366 0.778 71.1% 0.119 0.333 1.000

Notes: LICs denotes low-income countries; MICs indicates middle-income countries; and HICs depicts high-income countries. Min is the smallest quarterly total, and Max is the largest quarterly total.

Page 374: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

TABLE 2. OLS and Poisson Estimates of Intervention Variables Region Method Lags c FUND POST DP DL LR F Q(4)

ALL Incident Types WORLD OLS 1 61.29 25.68 -37.35 -30.13 -13.26 -17.71 0.00 0.20 (5.66) (2.98) (-3.49) (-3.34) (-1.18) LICs OLS 1 21.61 27.56 -14.24 -21.26 -12.48 -15.24 0.00 0.31 (5.68) (4.68) (-2.58) (-4.10) (-1.85) MICs OLS 1 18.15 -4.75 -8.03 -5.91 1.35 1.49 0.00 0.29 (6.93) (-2.08) (-4.61) (-2.22) (0.50) HICs OLS 2 19.32 2.99 -13.80 -2.22 -1.36 -2.56 0.45 0.89 (4.88) (0.84) (-2.33) (-0.83) (-0.29)

Incidents with Casualties WORLD OLS 2 6.63 2.59 -2.73 -3.41 2.79 9.37 0.53 0.52 (3.72) (1.17) (-1.16) (-1.09) (0.78) LICs OLS 2 2.44 2.97 -0.80 -6.78 2.47 8.28 0.00 0.71 (2.79) (1.66) (-0.48) (-3.02) (0.96) MICs OLS 1 3.46 -1.16 -0.77 -1.38 0.54 0.79 0.02 0.92 (6.27) (-2.28) (-1.66) (-1.58) (0.57) HICs OLS 3 2.67 0.11 -1.58 4.38 -0.06 -0.19 0.00 0.52 (3.25) (0.10) (-1.27) (5.44) (-0.06)

Incidents with a U.S. Target WORLD OLS 1 29.86 0.10 -15.96 -17.44 7.01 8.18 0.00 0.76 (6.19) (0.02) (-4.15) (-3.34) (1.30) LICs OLS 1 10.30 4.09 -5.04 -12.54 1.50 1.98 0.00 0.30 (4.69) (1.95) (-2.24) (-4.19) (0.46) MICs OLS 2 6.59 -3.00 -2.62 -3.16 1.69 2.78 0.00 0.26 (4.38) (-1.95) (-2.38) (-1.70) (0.90) Poisson 1 1.92 -0.45 -0.96 -32.77 0.86 0.00 (23.70) (-5.88) (-6.62) (0.00) (4.21) HICs OLS 1 10.68 -0.45 -7.83 -1.28 3.89 3.85 0.00 0.37 (6.56) (-0.28) (-5.92) (-0.79) (2.42) Poisson 1 2.35 -0.04 -1.44 -0.21 0.96 0.00 (32.09) (-0.67) (-11.46) (-0.45) (5.53)

Casualty Incidents with a U.S. Target WORLD OLS 2 4.62 0.83 -2.48 -3.09 4.58 6.08 0.00 0.89 (5.51) (1.10) (-2.90) (-1.54) (2.26) LICs OLS 1 2.49 1.72 -1.58 -6.31 3.45 3.89 0.00 0.25 (6.64) (3.53) (-2.63) (-4.17) (2.21) Poisson 1 0.96 0.45 -0.38 -34.35 0.75 0.00 (10.32) (3.92) (-3.24) (0.00) (4.68) MICs Poisson 1 0.53 -0.67 -0.70 -34.01 0.86 0.12 (4.67) (-3.42) (-2.36) (0.00) (2.07) HICs Poisson 1 0.40 0.10 -0.99 1.16 1.04 0.00

(3.31) (0.58) (-3.99) (2.18) (3.07) Notes: Column 2 refers to the estimation method; column 3 indicates the number of lags; column 4 is the pre-intervention intercept; and columns 5-8 indicate coefficient estimates. FUND denotes the rise in fundamentalist terrorism; POST indicates the end of the Cold War; DP is a pulse dummy for 9/11; DL is a level dummy for 9/11; LR is the long-run effect of 9/11; F is the F-statistic, and Q(4) is Ljung-Box Q-statistic using 4 lags.

Page 375: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

TABLE 3. Summary Statistics of the Various Incident Types by Income Group for Alternative Classification

Series Start End Mean Variance Min Max Mean Variance Min Max

ALL Incident Types Incidents with Casualties LICs 1992:2 2001:2 49.0 25.7 8 130 18.8 11.5 3 53 1999:2 2001:2 37.3 21.6 8 79 11.8 7.0 4 25 2001:4 2003:4 34.1 23.4 10 80 16.8 11.9 5 40HICs 1992:2 2001:2 17.7 27.5 2 163 3.9 4.7 0 21 1999:2 2001:2 5.6 2.3 2 9 1.2 1.1 0 3 2001:4 2003:4 12.8 7.9 5 25 3.8 2.0 0 7LICs/WORLD 1992:2 2001:2 77.7% 0.142 0.329 0.929 85.2% 0.115 0.563 1.000 1999:2 2001:2 85.2% 0.053 0.763 0.929 90.6% 0.090 0.769 1.000 2001:4 2003:4 70.8% 0.114 0.526 0.846 79.1% 0.124 0.625 1.000 Incidents with a U.S. Target Casualty Incidents with a U.S. Target

LICs 1992:2 2001:2 14.2 10.1 3 37 3.4 3.2 0 16 1999:2 2001:2 15.0 12.5 3 33 2.4 1.2 0 4 2001:4 2003:4 18.2 13.8 4 49 7.7 5.7 1 14HICs 1992:2 2001:2 2.1 2.0 0 7 0.5 0.8 0 3 1999:2 2001:2 1.8 2.5 0 7 0.2 0.4 0 1 2001:4 2003:4 6.2 4.9 0 16 1.8 1.2 0 6LICs/WORLD 1992:2 2001:2 84.6% 0.150 0.417 1.000 84.9% 0.231 0.000 1.000 1999:2 2001:2 87.8% 0.193 0.417 1.000 90.6% 0.186 0.500 1.000 2001:4 2003:4 73.4% 0.152 0.500 1.000 79.6% 0.121 0.667 1.000Notes: HICs depicts the 31 countries with highest per-capita GNI in 2000, while LICs denotes all other countries. See Table 1 for the WORLD statistics.

Page 376: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

TABLE 4. OLS and Poisson Estimates of Intervention Variables for Alternative Income Classification Region Method Lags c FUND POST DP DL LR F Q(4)

ALL Incident Types LICs OLS 1 34.54 24.38 -16.90 -27.79 -11.92 -13.89 0.00 0.59 (6.24) (3.84) (-2.77) (-3.89) (-1.41) HICs OLS 2 22.13 2.87 -16.99 -1.99 -1.16 -2.27 0.54 0.97 (4.91) (0.77) (-2.71) (-0.76) (-0.26)

Incidents with Casualties

LICs OLS 2 3.51 3.24 -0.74 -8.45 2.76 8.26 0.00 0.84 (3.15) (1.69) (-0.43) (-3.10) (0.86) HICs OLS 2 4.42 0.03 -2.88 4.30 -0.25 -0.64 0.00 0.31 (4.63) (0.03) (-2.19) (5.68) (-0.26)

Incidents with a U.S. Target

LICs OLS 1 16.15 0.87 -6.33 -16.59 3.66 4.88 0.00 0.32 (4.73) (0.29) (-2.31) (-3.84) (0.80) HICs OLS 1 12.97 -1.01 -9.84 -1.06 3.92 4.03 0.00 0.28 (6.54) (-0.55) (-6.37) (-0.67) (2.46) Poisson 1 2.44 -0.07 -1.59 -0.13 0.97 0.00 (26.19) (-1.28) (-11.56) (-0.27) (5.42)

Casualty Incidents with a US Target

LICs OLS 2 2.75 0.96 -1.31 -6.62 3.56 5.11 0.00 0.82 (4.79) (1.60) (-1.90) (-4.03) (2.09) Poisson 1 1.24 0.28 -0.35 -33.52 0.75 0.00 (14.60) (2.85) (-3.22) (0.00) (4.99) HICs Poisson 1 0.75 -0.10 -1.20 1.23 1.09 0.00

(7.26) (-0.67) (-4.58) (2.29) (3.11) Notes: See Table 2 for the OLS results for the WORLD sample. Column 2 refers to the estimation method; column 3 indicates the number of lags; column 4 is pre-intervention intercept; and columns 5-8 indicate coefficient estimates. FUND denotes the rise of fundamentalist terrorism; POST indicates the end of the Cold War; DP is a pulse dummy for 9/11; DL is a level dummy for 9/11; LR is the long-run effect of 9/11; F is the F-statistic, and Q(4) is Ljung-Box Q-statistic using 4 lags.

Page 377: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

TABLE 5. Summary Statistics of the Various Incident Types by Region

Note: West. Hem. denotes Western Hemisphere, and Mid. East indicates Middle East. Min is the smallest quarterly total, and Max is the largest quarterly total.

Series Start End Mean Variance Min Max Mean Variance Min Max ALL Incident Types Incidents with Casualties West. Hem. 1992:2 2001:2 11.84 8.41 1 32 1.97 1.71 0 6 1999:2 2001:2 12.33 12.19 1 29 0.67 0.71 0 2 2001:4 2003:4 5.33 4.80 0 17 1.00 1.00 0 3 Europe 1992:2 2001:2 19.27 27.57 1 163 4.81 4.69 0 22 1999:2 2001:2 6.33 2.60 2 10 2.22 1.39 0 4 2001:4 2003:4 10.78 9.19 4 30 1.44 1.59 0 4 Eurasia 1992:2 2001:2 3.00 2.17 0 9 1.51 1.82 0 8 1999:2 2001:2 2.33 2.00 0 6 0.56 1.01 0 3 2001:4 2003:4 1.00 0.71 0 2 0.44 0.73 0 2 Africa 1992:2 2001:2 10.05 9.46 1 42 4.78 5.31 0 26 1999:2 2001:2 9.44 6.42 1 18 4.22 3.73 0 13 2001:4 2003:4 2.44 2.46 0 7 1.44 2.30 0 7 Mid. East 1992:2 2001:2 12.92 9.84 1 44 5.84 5.86 0 23 1999:2 2001:2 4.78 3.99 1 13 1.89 1.83 0 6 2001:4 2003:4 15.00 9.95 4 32 10.33 8.00 2 26 Asia 1992:2 2001:2 9.76 8.48 0 44 3.86 3.81 0 20 1999:2 2001:2 7.78 6.22 1 21 3.44 2.65 0 8

2001:4 2003:4 13.00 10.91 4 40 6.44 3.28 2 12 Incidents with a U.S. Target Casualty Incidents with a U.S. Target West. Hem. 1992:2 2001:2 6.30 6.90 0 25 0.76 1.04 0 5 1999:2 2001:2 9.22 10.91 1 25 0.44 0.53 0 1 2001:4 2003:4 3.33 3.46 0 12 0.78 0.83 0 2 Europe 1992:2 2001:2 1.59 1.26 0 4 0.35 0.48 0 1 1999:2 2001:2 1.78 1.48 0 4 0.44 0.53 0 1 2001:4 2003:4 4.67 5.00 0 13 0.22 0.44 0 1 Eurasia 1992:2 2001:2 0.49 0.65 0 2 0.16 0.44 0 2 1999:2 2001:2 0.67 0.71 0 2 0.22 0.67 0 2 2001:4 2003:4 0.44 0.73 0 2 0.22 0.67 0 2 Africa 1992:2 2001:2 2.68 3.58 0 17 1.30 2.82 0 16 1999:2 2001:2 1.78 1.64 0 4 0.44 0.53 0 1 2001:4 2003:4 1.00 1.00 0 3 0.11 0.33 0 1 Mid. East 1992:2 2001:2 2.86 2.35 0 8 0.62 0.83 0 3 1999:2 2001:2 1.33 1.58 0 5 0.33 0.50 0 1 2001:4 2003:4 7.56 4.82 2 11 4.78 4.09 0 11 Asia 1992:2 2001:2 2.41 2.58 0 11 0.76 1.06 0 3 1999:2 2001:2 2.00 1.73 0 5 0.78 1.97 0 2 2001:4 2003:4 7.56 8.40 1 29 3.11 2.32 1 7

Page 378: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

TABLE 6. OLS and Poisson Estimates of Intervention Variables by Geographic Region Region Method Lags c FUND POST DP DL LR F Q(4)

ALL Incident Types West. Hem. OLS 1 22.57 0.22 -13.25 0.51 -5.51 -7.16 0.01 0.81 (7.40) (0.08) (-4.86) (0.33) (-2.58) Europe OLS 2 18.44 5.62 -14.54 -5.40 -3.15 -5.75 0.02 0.87 (5.45) (1.47) (-2.56) (-1.75) (-0.65) Eurasia Poisson 1 -0.71 0.41 1.17 -33.63 -0.74 0.12 (-2.56) (1.25) (4.35) (0.00) (-2.06) Africa OLS 2 1.97 2.33 1.89 -2.09 -4.53 -7.25 0.00 0.68 (3.44) (2.65) (1.25) (-2.89) (-2.46) Mid. East OLS 1 6.91 9.10 -7.35 -11.00 2.71 3.95 0.00 0.48 (4.40) (3.85) (-2.91) (-3.65) (0.89) Asia Poisson 1 1.62 0.28 -0.22 -1.63 0.24 0.01 (23.42) (4.03) (-3.39) (-2.28) (2.22)

Incidents with Casualties

West. Hem. OLS 2 2.50 0.63 -2.25 3.64 -0.52 -1.14 0.00 0.85 (4.55) (0.75) (-2.74) (8.77) (-1.06) Europe OLS 3 2.70 0.26 -1.66 0.22 -0.53 -1.80 0.78 0.98 (3.53) (0.25) (-1.39) (0.42) (-0.70) Poisson 1 1.32 0.17 -0.42 1.18 -0.64 0.06 (13.62) (2.32) (-4.65) (1.55) (-2.20) Eurasia Poisson 1 -3.35 1.29 2.50 -33.03 -0.91 0.23 (-3.28) (1.15) (4.54) (0.00) (-1.71) Africa OLS 2 0.92 0.99 1.10 -1.13 -1.97 -3.08 0.00 0.58 (3.18) (2.17) (1.29) (-1.59) (-1.83) Mid. East OLS 1 2.07 1.88 -1.03 -6.64 3.75 7.28 0.00 0.21 (3.66) (2.38) (-1.02) (-3.17) (1.69) Asia OLS 1 1.16 1.53 0.12 -3.37 2.01 2.77 0.00 0.31 (3.71) (2.73) (0.19) (-3.03) (1.57)

Incidents with a U.S. Target West. Hem. OLS 1 14.08 -2.18 -6.23 0.87 -2.79 -3.20 0.13 0.22 (6.49) (-1.11) (-3.29) (0.79) (-1.87) Europe OLS 1 8.80 -0.13 -7.32 -4.35 2.73 3.14 0.00 0.93 (6.55) (-0.07) (-4.15) (-2.85) (1.76) Eurasia Poisson 1 -1.00 -2.57 3.01 -31.42 -0.02 1.00 (-2.76) (-2.47) (2.90) (0.00) (-0.03) Africa OLS 5 1.01 -0.21 1.41 -0.37 -1.28 -1.53 0.01 0.99 (3.45) (-0.82) (2.22) (-0.77) (-1.82) Mid. East OLS 1 3.04 0.38 -1.33 -5.25 3.91 5.29 0.00 0.78 (5.46) (0.57) (-2.21) (-3.52) (2.63) Asia OLS 1 2.92 2.26 -2.97 -7.26 4.66 5.17 0.00 0.69

(4.14) (1.94) (-2.97) (-2.68) (1.69)

Casualty Incidents with a U.S. Target West. Hem. OLS 2 1.21 0.30 -1.14 3.70 -0.07 -0.14 0.00 0.41 (4.09) (0.71) (-2.72) (11.00) (-0.18) Europe OLS 1 1.34 0.42 -1.41 -0.23 -0.12 -0.12 0.00 0.70 (5.89) (1.40) (-4.87) (-1.64) (-0.78)

Page 379: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Eurasia Poisson 1 -56.74 0.00 29.30 -32.61 0.32 0.93 (-138.98) (0.00) (0.00) (0.00) (0.39) Africa Poisson 1 -0.90 -0.07 1.35 -30.76 -1.10 0.19 (-2.99) (-0.17) (4.17) (0.00) (-1.83) Mid. East OLS 2 0.52 -0.07 -0.17 -2.40 2.56 5.79 0.06 0.56 (1.86) (-0.23) (-0.72) (-2.28) (2.36) Asia OLS 1 0.83 0.40 -0.46 -3.12 2.36 2.35 0.00 0.91

(4.76) (1.65) (-1.94) (-4.25) (3.06) Notes: Column 2 refers to the estimation method; column 3 indicates the number of lags; column 4 is the pre-intervention intercept; and columns 5-8 indicate coefficient estimates. FUND denotes the rise in fundamentalist terrorism; POST indicates the end of the Cold War; DP is a pulse dummy for 9/11; DL is a level dummy for 9/11; LR is the long-run effect of 9/11; F is the F-statistic, and Q(4) is Ljung-Box Q-statistic using 4 lags.

Page 380: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Global terrorism: deterrence versus preemption

by

Todd Sandler School of Social Sciences

University of Texas at Dallas [email protected]

and

Kevin Siqueira

School of Social Sciences University of Texas at Dallas

[email protected] 1-315-268-6609

Final Revision: January 2006

Abstract This paper analyzes two anti-terrorism policies when a targeted nations people and property are

in jeopardy at home and abroad. A countrys deterrence decision involves both external benefits

and costs as the terrorist threat is deflected, while its preemption decision typically gives external

benefits when the threat is reduced for all potential targets. With damages limited to home

interests, a country will overdeter, while, for globalized terror, a country will underdeter.

Preemption is usually undersupplied. Leader-follower behavior is apt to lessen inefficiency for

deterrence, but worsens inefficiency for preemption as compared with simultaneous-choice

equilibrium allocations. Targeted nations can never achieve the proper counterterrorism policy

through leadership. JEL Codes: H40, D62

Keywords: transnational externalities, simultaneous choices, leader-follower, terrorism, deterrence, preemption.

Page 381: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Global terrorism: deterrence versus preemption

1. Introduction

Since the Israeli-Arab conflicts of the late 1960s and beyond, transnational terrorism (i.e.,

terrorist attacks involving victims, perpetrators, or audiences from two or more countries) have

posed worldwide security concerns (Hoffman 1998) that are highlighted by the London subway

bombing on 7 July 2005, the Madrid commuter train bombing on 11 March 2004, the Bali

nightclub bombing on 12 October 2002, and the four hijackings on 11 September 2001

(henceforth, 9/11). Decentralized counterterrorism measures by autonomous national

governments to deter attacks by hardening targets at home or to preempt future terrorist actions

by annihilating the terrorists, their supporters, and resources result in transnational externalities

with diverse outcomes. Although one may jump to the conclusion that underprovision of effort

is likely to characterize such measures owing to an underlying provision of an international

public good (e.g., Lee 1988; Lee and Sandler 1989; Rosendorff and Sandler 2004), the situation

is more complex so that intuition may be misleading. The nature of externalities stemming from

counterterrorism depends on the governments payoff functions and how they account for

repercussions at home and abroad. That is, homeland security may protect not only citizens but

also foreign visitors, while such measures may jeopardize other countries assets by deflecting a

potential attack abroad. Recent empirical investigations demonstrate that defensive actions taken

by some targeted countries have transferred the attacks abroad (Enders and Sandler 1993, 2004,

2006a, b).

The purpose of this paper is to gain an understanding of countermeasure externalities

because, despite some examples of cooperation to freeze assets or to share information,

homeland security budgets and preemptive responses are still decided independently by nations

that cherish their autonomy (Sandler and Enders 2004). Consequently we may either end up in

Page 382: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

2

an unsafe world where too little of an international public good is provided, or else in an

excessively defended one where too much is invested to shift attacks abroad. When decisions

are simultaneous, deterrence may be too much or too little compared with the social optimum,

depending on the relative magnitude of opposing deterrence-induced externalities. Preemption,

in contrast, will typically be undersupplied as compared with the social optimum. The extent of

overdeterrence or underdeterrence generally diminishes when a leader-follower equilibrium is

compared with that of simultaneous moves. Although all targeted nations benefit from a leaders

deterrence decisions, a nation is relatively better off moving second. We are interested in such

leader-follower responses because spectacular attacks at home may necessitate that a targeted

country (e.g., the United States following 9/11 or England following the subway bombings)

assume the initiative. Under these circumstances, we investigate how such positions influence

the internalization of counterterrorism externalities. Leadership typically exacerbates the

inefficient level of preemption as decisive action by one targeted country can result in a reduced

level of overall preemption when compared with the equilibrium allocation of simultaneous

actions. Deterrence often represents strategic complements where actions by targeted countries

move in unison, while preemption represents strategic substitutes where actions by targeted

countries move in opposite directions.

2. Toy game representations

Terrorism is the premeditated use, or threat of use, of extra-normal violence by individuals or

subnational organizations to obtain a political objective through intimidation or fear directed at

an audience beyond the immediate victim. Generally, a terrorist act is transnational when its

ramifications transcend the host country where the act is staged. Policies directed at thwarting

such incidents are prone to generate uncompensated interdependencies among at-risk countries,

Page 383: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

3

because actions to address the exigency may either ameliorate the risks to all or deflect the attack

elsewhere. Astute terrorists will not only exploit the failure of governments to cooperate by

attacking the weakest link (e.g., the least-secure airport), but will also exacerbate this

noncooperative inefficiency by playing alternative targets off against one another. Globalization

heightens the risk of transnational terrorism owing to the greater mobility of terrorists, better

communication networks among terrorists, enhanced means to publicize terrorist causes, and the

greater dispersion of countries assets and people.

If one were to display the deterrence and preemption games as 2 × 2 normal-form

matrices, both games are apt to be a Prisoners Dilemma (PD) for the targeted nations (Arce and

Sandler 2005). This follows because the deterrence game is analogous to an arms race when

external costs dominate, with each country best off when it deters and the other does not. For

preemption, a PD is also likely owing to the public good nature of such action, where each nation

is best off when it can free ride on the other nations action. To illustrate, consider figure 1. In

panel a, a 2 × 2 generic deterrence game is depicted where nation 1 is the row player and nation

2 is the column player. This representation is reflective of other defensive countermeasures.

Deterrence by just nation i gives it a benefit of b at a cost of C, in which b > C so that a country

is motivated for self-defense. Moreover, passive country j endures a cost of Cj as it draws more

attacks, since it becomes a relatively softer target in light of is defensive measures. No action

by either nation gives no net gain, while mutual action provides each nation a negative payoff of

b − (C + Ci), for i = 1, 2, as private and external costs overwhelm private gains. Obviously, the

dominant strategy of this PD is to deter and a Nash equilibrium of mutual deterrence with

negative payoffs results.

[Figure 1 near here]

Alternatively, panel b of figure 1 displays the generic preemption game, where each of

Page 384: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

4

two targeted nations can preempt or maintain the status quo. If, say, nation 1 preempts while

nation 2 does not, then nation 1 gains a net benefit of B − c as it deducts its private preemption

costs of c from the public benefit of B that it receives along with nation 2. Thus, nation 2 obtains

a free-rider benefit of B in the upper right-hand cell. A reversal of roles reverses payoffs. If both

countries preempt, then each gains 2B from the cumulative action at an individual cost of c, so

that net gains are 2B − c for both. Payoffs are zero from all-around inaction. The public good

dilemma is aptly captured by assuming that 2B > c > B so that acting alone is not desirable but

mutual activity is desirable. Again, a PD applies. Each countrys dominant strategy is now to do

nothing and the Nash equilibrium is mutual inaction.

The potential identity of the underlying 2 × 2 matrices may lead one to conclude that

these countermeasures require the same policy corrections. As our continuous-choice analysis

demonstrates, this conclusion could not be further from the truth policy implications differ

greatly for these terrorism-thwarting decisions. As the game is generalized, differences arise that

not only apply to a simultaneous-move representation, but also to a leader-follower

representation.

3. The deterrence decision

To highlight the similarities and differences between the deterrence and preemption decisions for

two countries confronting a transnational terrorist threat, we construct a single game model that

can be adapted by some parameters to represent either counterterrorism instrument. In so doing,

we limit notation. We first focus on deterrence efforts to harden potential targets.

The model involves two governments (countries) that are targeted by the same terrorist

group or network. Targeted governments are denoted by i = 1, 2. In any given period, the

terrorists can stage their attack in just a single country, known as the host country. For example,

Page 385: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

5

al-Qaida may engage in simultaneous attacks but typically in the same country during the same

period. This assumption agrees with how most groups operate owing to limited resources. Each

country is vulnerable at home and abroad, insofar as an attack anywhere may involve residents or

foreigners. Government i first chooses its policy instrument or effort to raise the probability of a

terrorist failure at home, denoted by θi . Thus, 1 θi− represents the probability of a terrorist

success in country i. Government i decides its expenditure level on deterrence ( )θ ,iG where

( )θ 0iG′ > and ( )θ 0iG′′ > . We treat the terrorist threat as exogenous and focus on the strategic

interactions between the targeted governments. The probability that government i is attacked is

given by ( )π θ ,θ ,i i j which for deterrence satisfy 0i i∂π ∂θ < and 2 2π θ 0,i i∂ ∂ > so that

defensive measures limit the likelihood of a home attack with diminishing returns to effort.

However, greater deterrence by country j augments the probability of an attack on country i, but

at a decreasing rate: π θ 0i j∂ ∂ > and 2 2π θ 0.i j∂ ∂ < Finally, country js deterrence will reduce

(increase) the marginal impact of country is action to limit the probability of being attacked

when js efforts are greater (less) than that of is efforts so that 2π θ θ 0i i j∂ ∂ ∂ ! as θ θ .i j"

When each countrys efforts are equal, the value of the cross partials is zero. The assumptions

on π hold for i, j = 1, 2 and .i j≠ In todays world of fundamentalist terrorists, there is always

a likelihood of attack even when both countries are heavily defended. The model, however,

captures the real-world observation that terrorists favor softer targets (Enders and Sandler 1993).

Unless otherwise indicated, we assume symmetry such that ( ) ( )π θ ,θ π θ ,θ .i i j j j i=

The game has four alternative outcomes: the attack succeeds or fails in country i = 1, 2.

In addition to the deterrence costs that each country pays in any of these eventualities, each

country incurs costs from the attack at home or abroad as its people or property may be in harms

Page 386: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

6

way. For simplicity, we have made payoffs symmetric, so that the costs of a failed (successful)

attack in a host country are A ( ) ,H where H A> as failure limits damage to the venue country.

We use lower-case analogous symbols, a and h, for the costs to country i from a terrorist attack

failure (success) abroad, where h > a.

3.1. Government costs functions

Country is expected damage from a home attack is ( )θ ,il while is expected damage from an

attack on its interests abroad is ( )θ .jv This is captured in (1)-(2):

( ) ( )θ θ 1 θi i il A H= + − (1)

and

( ) ( )θ θ 1 θ .j j jv a h= + − (2)

Given the assumptions on the cost parameters, l(θi) decreases as θi increases and v(θj) decreases

as θj increases, because expected damages fall as terrorist failure is more imminent. Given (1)-

(2), the expected costs of terrorism for government i is:

( ) ( ) ( ) ( )θ π θ π θ ,i i i i j jC G l v= + +θ (3)

where θ ( )θ ,θi j= and an interchange of the is and js would give country js costs. Country is

expected costs derive from three considerations: deterrence expenditure, attacks at home, and

attacks on is interests abroad.

The simultaneous-move equilibrium follows when country i chooses θi to minimize its

expected costs, subject to the constancy of θj, while country j chooses θj, subject to the constancy

of θi. For either country, the first-order condition requires that

Page 387: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

7

( ) ( ) ( ) ( ) 0, , 1, 2, and .ji ii i i i j

i i i

CG l l v i j i j

∂π∂ ∂π′ ′= θ + π θ + θ + θ = = ≠∂θ ∂θ ∂θ

(4)

On the right-hand side of (4), the first and fourth terms represent the costs of increasing θi

(coming from greater deterrence expense and the expected damage of deflecting an attack abroad

to is own interests), while the second and third terms represent the benefits of increasing θi

(arising from the reduced expected costs and the smaller likelihood associated with home

attacks).1 Second-order conditions require that 2 2 0,i iC∂ ∂θ > which we assume holds.2 Given

the presence of externalities, independent behavior by the governments are unlikely to give a

cost minimum for society at large, where CT = Ci + Cj is minimized, in which

( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) .Ti j i i i j j jC G G l v l v = θ + θ + π θ + θ + π θ + θ θ θ (5)

Minimization of CT yields a Pareto optimum whose equilibrium choice variables are denoted by

( )* *, i j= θ θ*θ in contrast to the simultaneous-action noncooperative solution indicated by

( )N N, i j= θ θNθ , which satisfies (4). The Pareto first-order conditions for minimizing CT are:

( ) ( ) ( ) ( ) ( ) ( ) ( ) 0,T

jii i i i i i j j

i i i

CG l v l v l v

∂π∂π∂ ′ ′ ′= θ + π θ + θ + θ + θ + θ + θ = ∂θ ∂θ ∂θ (6)

and a similar expression for ,TjC∂ ∂θ where the is and js are switched as compared with (6).3

The nature of the opposing externalities is clear when the noncooperative first-order

conditions are compared with those for the cooperative solution. Evaluation of the first-order

conditions for the cooperative problem at the simultaneous-move Nash equilibrium yields:

( ) ( ) ( )N N N jii i i j

i i

v v l∂π∂π′π θ + θ + θ

∂θ ∂θ 0, for i, j = 1, 2, and i ≠ j. (7)

The first term on the left-hand side of (7) is a marginal external benefit, conferred by government

is deterrence on protecting js citizens when they are in country i. Similarly, the second left-

≥<

Page 388: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

8

hand expression in (7) is a marginal external benefit conferred by is deterrence on country js

interests by reducing terrorist attacks in i. In contrast, the third left-hand term in (7) is a marginal

external cost that arises as is deterrence increases the likelihood of an attack in j, where js

interests are in harms way. Given the presence of opposing externalities, the net marginal

externality in (7) cannot be signed without further structure. Marginal external benefits result in

too little deterrence, whereas marginal external costs result in too much deterrence when the

simultaneous-move equilibrium levels of deterrence are compared with social-optimizing levels.

For the simultaneous deterrence decision, the slope of the governments best-response

(BR) path, which indicates the best choice of θi for alternative values of θj, proves instructive.

This slope is derived by implicitly differentiating i iC∂ ∂θ in (4) with respect to θj to give:

( ) ( ) ( ) ( )22

2

2

j ji ii j i j

j i i j i ji

ij

i

l v l vBR

C

∂π ∂ π∂π ∂ π′ ′− θ − θ − θ − θ∂θ ∂θ ∂θ ∂θ ∂θ ∂θ∂ =

∂∂θ∂θ

, (8)

for i, j = 1, 2, and i ≠ j. The denominator of (8) is positive since the second-order conditions are

satisfied by assumption, so that the sign of this slope hinges on the numerator. At the symmetric

equilibrium, the numerator is positive and therefore the sign of the slope of these best-response

paths are both positive.4 As such, the countries efforts at deterrence represent strategic

complements (see Bulow, Geanakoplos, and Klemperer 1985).

4. Fully symmetric simultaneous-move case: alternative terrorist scenarios

To get some definitive results that possess some real-world analogues, we make some specific

assumptions. The outcomes for our specialized scenario provide insights for less stark examples

that may include aspects of both scenarios to varying degrees.

Page 389: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

9

4.1. No collateral damage

In the first two scenarios, we assume that attacks are host-country specific with no collateral

damage on foreign interests, so that a = h = 0 and, therefore, ( ) ( ) 0i iv v′θ = θ = for i = 1, 2,

owing to symmetry. The evaluation of CT at the symmetric Nash equilibrium allocation implies:

( ) ( ) ( )N 0,Ti i j iC l∂ ∂θ = θ ∂π ∂θ >Nθ i, j = 1, 2, and i ≠ j. (9)

Eq. (9) indicates that a country overdeters as compared with the Pareto-optimal level, because

the external costs imposed on the other country by deflecting the attack there are not taken into

account. Consequently, a deterrence race applies as each nation tries to transfer the terrorist

threat abroad where it has no interests.

Thus, the reaction of the United States to 9/11 or England to the London subway

bombings may be excessive. The seemingly uncontrollable homeland security spending in the

United States, when state and local spending is included, has this hallmark. Terrorists hurt their

targeted countries budgets in ways that transcend the carnage and destruction. Overdeterrence

bolsters these economic consequences of terrorism. Even when there is some collateral damage,

host-country losses motivate overdeterrence.

The best-response curves are displayed in figure 2 (ignoring point S) where θj is on the

vertical axis and θi is on the horizontal axis. These best-response paths connect the optimums of

the isocost curves (suppressed except for the dashed curve) for each country. These isocost

curves are generally hill-shaped for government i (see the dashed curve) and an inverted C-

shaped for government j. Country is welfare improves on lower isocost curves, while country

js welfare improves on left-shifted isocost curves (closer to the vertical axis). This follows

because each country then experiences a smaller deterrence level abroad for any level of its own

Page 390: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

10

deterrence, thereby making it relatively safer at home. In figure 2, the intersection of the two

reaction paths at N denotes the simultaneous-move equilibrium, where country is isocost curve

has a zero slope and js isocost curve has a vertical slope. The symmetric Pareto optimum is

some point, P, along the 45° line that is closer to the origin than point N. This is a case of

strategic complements where the deterrence choice of potential targets moves together.

[Figure 2 near here]

4.2. Globalized terror scenario

Our second polar case is globalized terror where a countrys risk is equivalent at home and

abroad, so that A = a and H = h. This implies that a countrys expected attack costs are such that

( ) ( )i jl vθ = θ at the symmetric equilibrium where .i jθ = θ = θ Now, an evaluation of CT at the

simultaneous-move equilibrium gives:5

( ) ( )N N 0,Ti iC v′∂ ∂θ = π θ <θ i = 1, 2. (10)

Thus, the external benefits that a countrys deterrence efforts provide to foreigners are not taken

into account and this leads to underdeterrence i.e., θ* > θN, where subscripts are suppressed.

Although this scenario is extreme to focus our thinking, it provides insight for other

cases. In nonsymmetric cases for which a countrys citizens are at greater risks abroad owing to

excellent protection at home (e.g., the United States after 9/11), foreign-generated external

benefits and, hence, foreign underdeterrence are anticipated to dominate. As such, the downside

to successful efforts at home to deflect attacks is that a countrys citizens are then more

vulnerable abroad, where the country has little influence owing to sovereignty issues. Recent

statistical analyses have uncovered a shift in transnational terrorist incidents from Western

venues to the Middle East and Asia, where post-9/11 upgrades have not been instituted (Enders

and Sandler 2006a). This shift is particularly strong for attacks against US interests. If the

Page 391: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

11

terrorists purposely limit the collateral damage to the host country from their attacks against, say,

Americans, then the terrorists can maximize the host country’s underdeterrence. This appears to

have been the Greek scenario with respect to its ineffective efforts to curb 17-November terrorist

activities for 22 years until a terrorist accidentally blew himself up during the summer of 2002

(Lee 1988; Wilkinson 2001). The US assistance to foreign governments one of the four

pillars of US antiterrorist policy (US Department of State 2002) is a sensible action to

address this foreign underdeterrence, but, of course, the United States can fortify only a limited

number of potential target nations. If, however, the asymmetry involves dominant costs at home

(A > a, H > h), then overdeterrence may characterize a less extreme degree of globalized

terrorism. Thus, the richness of the deterrence game is brought out.

For the fully symmetric globalized scenario, the slope of the best-response curve is

positive for both countries. Once again, we have strategic complements for the deterrence game,

but the isocost curves are now U-shaped and C-shaped for country i and j, respectively.

Moreover, the Pareto optimum (not displayed for this case) is on the 45û line above the

simultaneous-move equilibrium N in figure 2. The discussion above establishes:

Proposition 1. In the case of no collateral damage, each noncooperative target government

overdeters relative to the Pareto-optimal level; in the case of globalized terror, each

noncooperative target government undeters relative to the Pareto-optimal level.

5. Preemption game

In the preemption game, the targeted government (i = 1, 2) must independently decide whether to

launch an attack against a terrorist group or its sponsor. Although the preemption game bears

great similarities to the deterrence game, the former displays some subtle but important

Page 392: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

12

differences. First, preemption confers public benefits on targeted countries, while deterrence

confers public costs and benefits on targeted countries. Second, a corner solution may

characterize preemption as only one government (i.e., the prime target) takes action. In contrast,

all targeted governments will take deterrent measures so that a corner solution is not

economically relevant. Third, with preemption, a fanatical terrorist group may be kept from

attacking if the governments actions sufficiently deplete a groups capabilities. Other

differences will be noted in the ensuing analysis.

We utilize the same notation as before, but ( )iG θ now denotes preemption costs. All of

the other parameters e.g., ( ) ( ),i il vθ θ , A, H, a, and h have analogous interpretations as those

in the deterrence game. The essential difference in parameters involves the probability that

country i will be attacked, as given by ( ).iπ θ An increase in is preemption reduces this

probability not only for country i but also for j − i.e., 0i i∂π ∂θ < and 0j i∂π ∂θ < − with

diminishing returns to effort. This second inequality is a key difference between preemption and

deterrence. A second associated difference is the unambiguous sign of the cross partial i.e.,

2 0i i j∂ π ∂θ ∂θ > − which indicates that js preemption reduces the marginal impact of is

preemptive efforts owing to diminishing returns. Collective preemption may be sufficient to

eliminate all attacks, where 0 1 21π = − π −π is the governments perceived likelihood of no

attack.6

The first-order conditions characterizing the Nash equilibrium of the preemption game

played between two targeted countries are identical in form to that in (4), and are not displayed

here. Now, ( )iG′ θ denotes the marginal preemption costs and the remaining three terms

represent marginal benefits either conferred at home or abroad. Unlike deterrence with opposing

Page 393: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

13

externalities, preemption reduces vulnerabilities in all potential target countries by curbing

terrorists capabilities. Because all externalities are positive, best-response paths and outcomes

are easier to sign.

In figure 3, government is isocost curves are U-shaped (see IiIi), while government js

isocost curves (see IjIj) are translated through 90û. For i, higher isocost curves indicate a greater

well-being, since each level of is preemption is associated with a higher preemption by the other

country. Similarly, isocost curves to the right represent greater well-being for country j. Based

on the assumptions, the thickened best-response curves (BRi and BRj) are negatively sloped,

indicative of the public good nature of preemption. BRi joins the zero slopes of the isocost

contours for i, while BRj joins the vertical slopes of the isocost contours for j. These negatively

sloped best-response paths are also consistent with the preemption decisions of the governments

being strategic substitutes. The simultaneous-move equilibrium occurs at N.

[Figure 3 near here]

5.1. Noncooperative versus cooperative behavior: alternative scenarios

By evaluating the first-order conditions for minimizing CT at the symmetric, Nash equilibrium

allocation of the simultaneous-move preemption game, we find that ( )TiC∂ ∂θNθ is negative in

any scenario. This comparison leads to the following result:

Proposition 2. For all cases, the simultaneous-move equilibrium allocation results in a smaller

level of preemption by both targeted governments, compared with the Pareto optimum.

Proof: See Appendix

Both polar scenarios now lead to the same outcome. The extent of underpreemption will be

Page 394: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

14

greater in the globalized terror instance because there are a couple sources of external benefits in

contrast to the single source for no collateral damage. Less extreme cases would also result in

too little preemption. The situation is displayed in figure 3, where the cross-hatched region,

defined by the governments isocost curves through N, denotes Pareto-improvement allocations

for preemption. The symmetric Pareto optimum, P, is located somewhere in this region on the

45û line.

These results generalize to n target countries. In an asymmetric world where some

countrys interests are the preferred targets of the terrorists, the country is motivated to preempt

despite the free ride given to others. For example, US interests are the target of 40% of the

transnational terrorist attacks; its war on terror embodies its preemptive effort (Sandler and

Enders 2004).

6. Stackelberg leader-follower in the deterrence game

Although a leader-follower representation is often of interest because there is an issue of

coordination, signaling, or commitment, we choose to use this framework to ascertain if there is

a possibility for the externalities to be internalized by one nation moving first. There has been

little evidence either before or after 9/11 that nations coordinate their deterrence or preemption

decisions (Sandler 2003). In a world where some countries interests are the preferred target of

terrorists, these countries will heavily invest in intelligence and antiterrorist measures. With

their greater risks, such targeted countries may have little political choice but to assume a

leadership role by deciding their deterrence prior to other targeted countries. Since 9/11, the

United States has been more aggressive than other countries in bolstering antiterrorist measures,

as reflected in the tens of billions of dollars of extra security spending. Currently, the United

States is considering installing defensive measures against surface-to-air missiles on commercial

Page 395: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

15

planes. Thus, we first investigate the allocative implications if a past attack forces a government

to assume a leadership position in terms of defensive measures.

Country i is assumed to be the leader and country j the follower. As the leader, i

minimizes its costs, taking into account the impact that its deterrence decision will have on js

choice of deterrence. That is, country i will choose θi to minimize its deterrence costs, while

treating θj as dependent on its θi according to js best-response path, so that θj = BRj(θi). The

leaders cost function is:

( ) ( ) ( ) ( ) ( ) ( ), , , .i i j i i i i j i i j i j i j iC BR G BR l BR v BR θ θ = θ + π θ θ θ + π θ θ θ (11)

Differentiating (11) with respect to θi, we derive the leaders first-order condition,

( ) ( ) ( ) ( ) ( ) ( ) ( )S

0,j j ji i ii i i i j i j j j

i i i j j i

BRCl l v l v vG

∂π ∂π ∂∂ ∂π ∂π′ ′= θ + π θ + θ + θ + θ + θ + θ π =∂θ ∂θ ∂θ ∂θ ∂θ ∂θ

(12)

where the superscript S on Ci denotes Stackelberg or leader-follower equilibrium allocation. In

(12), the first bracketed expression consists of the same terms as in the simultaneous-move first-

order conditions, while the second bracketed expression, which is multiplied by the slope of

country js reaction path, distinguishes the leaders behavior from that in a noncooperative (N)

simultaneous-move game. That is, when (12) is evaluated at ( )N N, ,i j= θ θNθ the first bracketed

term equals zero, leaving the second composite expression as the determinant of the relationship

of the leader-follower equilibrium allocation to that in the Nash simultaneous-move game. The

terms in the second bracketed expression are the marginal external benefits and costs that j

imposes on i from not cooperating [see (7)]. Even if the slope of the best-response path is

positive, the net influence of this expression cannot be evaluated unless additional structure is

placed on the problem.

Page 396: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

16

6.1. Alternative scenarios: simultaneous-move versus Stackelberg equilibrium allocation

If there is no collateral damage beyond the host countrys interests, so that the v expressions are

zero, then the evaluation of the leaders Stackelberg first-order condition at the symmetric

simultaneous-move equilibrium gives:

( ) ( )S

N 0.i ji

ii j i

C BRl

∂ ∂∂π= θ > ∂θ ∂θ ∂θ

Nθ (13)

This sign follows because 0i j∂π ∂θ > (from deflecting the attack abroad) and the positive slope

of js reaction path. This inequality indicates that the leader internalizes some of the marginal

external costs from deflecting the attack. This partial internalization arises as the leader accounts

for the strategic complementarity, in which overdeterrence on its part leads the follower to

overdeter in response. To reduce the reciprocal external costs, the leader curtails its deterrence,

an action that induces a similar response by the follower. As a consequence, N Sθ θ! where

( )S S, i j= θ θSθ . Leader-follower behavior limits overdeterrence when the Stackelberg outcome is

compared with the simultaneous-move equilibrium. This can be seen in figure 2, presented

earlier, where leader is dashed isocost curve is tangent to js best-response curve at the leader-

follower equilibrium S.7 The isocost curves associated with S imply that both countries are better

off than at N owing to the curtailment of the deterrence race. Because the followers isocost

curve necessarily shifts left by more than the leaders isocost curve shifts down, there is a

second-mover advantage that a prime-target country relinquishes out of political necessity to act

first. The 9/11 attacks have imposed a strategic disadvantage on the United States by making it

assume a deterrence leadership role; nevertheless, the United States makes some gain by seizing

the initiative.

In the globalized scenario, a similar internalization occurs. An evaluation of the leaders

Page 397: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

17

Stackelberg first-order conditions at the symmetric simultaneous-move equilibrium allocation

implies that the leader internalizes some of the marginal external benefits that stem from the

strategic complementarity. In particular, the leader increases its level of deterrence, because

such efforts induce a greater deterrence by the follower, which safeguards the leaders interests

on the latters soil. As compared with the underdeterrence associated with simultaneous moves,

both the leaders and followers deterrence levels are greater, so that S Nθ θ! . In figure 2, the

leader-follower solution is up along BRj to the right of N at S′ where one of the leaders U-shaped

isocost curves (not shown) is tangent to js best-response path. Once again, both governments

gain from leadership by one of the targeted countries, but the follower has a second-mover

advantage. In summary, we have:

Proposition 3. For either no collateral damage or globalized terrorism, the equilibrium allocation

in the leader-follower game results in deterrence levels that are closer to the social optimum,

compared with those of the simultaneous-move outcome. The follower, however, gains relative

to the leader.

6.2. Leader-follower and preemption

Given the unidirectional externalities in the preemption situation, the evaluation of the impact of

leader-follower behavior is simple to ascertain. An evaluation of the leader-follower first-order

condition at the simultaneous-move equilibrium of the preemption game gives:

Proposition 4. The leader decreases its preemption efforts relative to the simultaneous-move

equilibrium. Moreover, total preemption for the leader-follower allocation is less than that for a

Page 398: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

18

unique (interior) simultaneous-move equilibrium.

Proof: See Appendix

At an interior solution, the leader reduces its preemption because it foresees that this reduction

will induce the follower to provide more. This action improves the leaders well-being at the

expense of the follower. Unlike deterrence, taking the initiative is not Pareto improving.

In figure 3 (displayed earlier), the leader-follower equilibrium at S will be northwest

along the followers best-response path. The aggregate leader-follower level of preemption must

decrease as compared with the unique simultaneous-move equilibrium N, given that the slope of

BRj is greater than 1. All terrorist scenarios no collateral damage, globalized terror, or some

combination give this outcome. If there is a corner solution where BRi is everywhere above

BRj, then the leader-follower solution is at the θi intercept of the BRi reaction path where i does

all of the preemption and j free rides. In this case, leadership has no influence on the outcome.

With an attack like 9/11, the host countrys best-response curve may shift sufficiently to the

northeast that a corner solution results where one or two most impacted countries do virtually all

of the preempting e.g., post-9/11 actions of the United States and the United Kingdom in

Afghanistan.

7. Policy implications and concluding remarks

Although deterrence and preemption games are almost identical in structure, they possess some

essential differences that influence the conduct of sensible and effective counterterrorism policy.

For the deterrence game, the mix of home and abroad risks imply both external benefits and

costs, which, in turn, can yield a wide variety of outcomes. Thus, noncooperating nations may

overdeter if host-country risks outweigh threats to a countrys citizens while abroad. If,

Page 399: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

19

however, terrorism is globalized, placing citizens equally in harms way everywhere, then

underdeterrence is the outcome. Because only external benefits are typically generated for

preemption, too little action is the norm so that policy must bolster this measure.

In the absence of a corner solution, less global preemption will result from leadership so

that the Bush doctrine of 2002 will limit the overall level of preemption, opposite to the

doctrines intention. This result follows because preemption is purely public to potential targets

of transnational terrorism, thus allowing the leader to reduce its efforts by more than the follower

increases its efforts. After 9/11, there were some countries most notably, the United Kingdom

that followed the US invasion of Afghanistan, so that a corner solution did not apply. For these

follower countries, US leadership is anticipated to have increased their participation level,

consistent with the administrations wishes. Prime-target countries confront a real policy

dilemma because preemption leadership shows its citizens that it is decisive, but at the risk of

reducing overall efforts. As such, political realities lead to the wrong policy choice. When,

however, deterrence decisions are considered, leadership is apt to limit the inefficiency

whether there is underdeterrence or overdeterrence. Thus, leadership is apt to be helpful for

deterrence but not for preemption. This policy insight does not fully concur with the Bush

administrations current actions.

As fundamentalist terrorist drive for ever-greater atrocities, they motivate leadership in a

small set of prime-target nations e.g., the United States, the United Kingdom, Israel, and Spain.

What our analysis highlights is that leadership, without true cooperation, is a two-edged sword

for the practice of counterterrorism: leadership curbs inappropriate deterrence levels but

exacerbates inappropriate preemption levels. Given the diverse strategic character of deterrence

and preemption decisions, nations can never get the mix correct through leadership, induced by

large-scale terrorist attacks. The only solution is the creation of a cooperative network of nations

Page 400: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

20

with integrated counterterrorist measures. We are nowhere near this goal (Enders and Sandler

2006b).

Our models abstract by assuming just two targeted nations. This abstraction is

appropriate because an individual nation views its actions vis-à-vis the collective target of the

rest of the world. In the case of the United States, the rest of the world (in terms of targeted

countries) is a collective player roughly of similar size. For a small country, the rest of the world

overshadows it, so that a corner solution where it does no preemption of transnational terrorism

is likely. In our future work, we are examining the mix between deterrence and preemption.

This mix greatly complicates the analysis, which is best understood by first having these policies

examined in isolation, as done here.

Page 401: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

21

Appendix

Proof of Proposition 2.

We evaluate the first-order conditions for minimizing CT at the symmetric Nash equilibrium of

the simultaneous-move preemption game. This gives

( ) ( ) ( ) ( )N N N 0T

jii i i i

i i i

Cv v l

∂ ∂π∂π′= π θ + θ + θ <∂θ ∂θ ∂θ

Nθ for i, j = 1, 2, and .i j≠ (A1)

For the no collateral damage case where 0v v′= = and for the globalized terror case where

( ) ( ) ,v l⋅ = ⋅ there is too little preemption at the Nash equilibrium allocation compared with the

Pareto optimum, so that all terms to the left of inequality are negative.

Proof of Proposition 4.

To compare the interior of Stackelberg equilibrium allocation to that of the simultaneous-move

preemption game, we evaluate the first-order conditions charactering leader-follower behavior at

Nθ :

( ) ( ) ( ) ( )S

N N N 0.i j ji

i j j ji j j i

C BRl v v

∂ ∂π ∂∂π ′= θ + π θ + θ > ∂θ ∂θ ∂θ ∂θ

Nθ (A2)

In (A2), all terms in the brackets are negative and the slope of the followers best-response path

is also negative; hence, the product of these expressions is positive for all scenarios. The sign in

(A2) indicates that the leader will preempt to a smaller extent than at the simultaneous-move

equilibrium. The follower will then increase its preemption, but since the slope of BRj is less

than one in absolute value to ensure uniqueness and existence of equilibrium (Cornes, Hartley,

and Sandler 1999), the overall value of preemption falls relative to the simultaneous-choice

equilibrium.

Page 402: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

22

References

Arce, Daniel G., and Todd Sandler (2005) Counterterrorism: a game-theoretic analysis,

Journal of Conflict Resolution 49, 183−200

Bulow, Jeremy I., John D. Geanakoplos, and Paul D. Klemperer (1985) Multimarket oligopoly:

strategic substitutes and complements, Journal of Political Economy 93, 488−511

Cornes, Richard, Roger Hartley, and Todd Sandler (1999) Equilibrium existence and uniqueness

in public goods models: an elementary proof via contraction, Journal of Public

Economic Theory 1, 499−509

Eaton, B. Curtis (2004) The elementary economics of social dilemmas, Canadian Journal of

Economics 37, 805−29

Enders, Walter, and Todd Sandler (1993) Effectiveness of anti-terrorism policies: vector-

autoregression-intervention analysis, American Political Science Review 87, 829−44

−−−−−− (2004) What do we know about the substitution effect in transnational terrorism?, in

Researching Terrorism: Trends, Achievements, and Failures, ed. A. Silke (Ilford, UK:

Frank Cass)

−−−−−− (2006a) Distribution of transnational terrorism among countries by income classes and

geography after 9/11,International Studies Quarterly 50, forthcoming

−−−−−− (2006b) The Political Economy of Terrorism (Cambridge: Cambridge University Press)

Hirshleifer, Jack (1989) Conflict and rent-seeking success functions: ratio vs. difference models

of relative success, Public Choice 63, 101−12

−−−−−− (2000) The macrotechnology of conflict, Journal of Conflict Resolution 44, 773−92.

Hoffman, Bruce (1998) Inside Terrorism (New York: Columbia University Press)

Lee, Dwight R. (1988) Free riding and paid riding in the fight against terrorism, American

Economic Review Papers and Proceedings 78, 22−6

Page 403: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

23

Lee, Dwight R., and Todd Sandler (1989) On the optimal retaliation against terrorists: the paid-

rider option, Public Choice 62, 141−52

Rosendorff, B. Peter, and Todd Sandler (2004) Too much of a good thing? The proactive

response dilemma, Journal of Conflict Resolution 48, 657−71

Sandler, Todd (2003) Collective action and transnational terrorism, World Economy 26,

779−802

Sandler, Todd, and Walter Enders (2004) An economic perspective on transnational terrorism,

European Journal of Political Economy 20, 301−16

United States Department of State (2002) Patterns of Global Terrorism (Washington, DC: US

Department of State)

Wilkinson, Paul (2001) Terrorism versus Democracy: The Liberal State Response (London:

Frank Cass)

Page 404: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

24

Footnotes

Sandler is an Endowed Professor of Economics and International Political Economy, and

Siqueira is an Associate Professor. This research was partially supported by the United States

Department of Homeland Security (DHS) through the Center for Risk and Economic Analysis of

Terrorism Events (CREATE) at the University of Southern California, grant number EMW-

2004-GR-0112. Any opinions, findings, and conclusions or recommendations are solely those of

the authors and do not necessarily reflect the DHS. The authors gratefully acknowledge helpful

comments provided by Miguel Costa-Gomes and Gianni De Fraja following presentation of an

earlier version of this paper at the University of York, UK. Helpful comments were also

provided by a referee.

1. Although a corner solution is technically interesting, it is not economically

meaningful. Terrorism-prone countries do not choose zero deterrence levels; every country with

airports have installed metal detectors.

2. The second-order condition requires that

( ) ( ) ( ) ( )22 2

2 2 22 0.ji i i

i i i ji i i i

CG l l v

∂ π∂ ∂π ∂ π′′ ′= θ + θ + θ + θ >∂θ ∂θ ∂θ ∂θ

This condition will hold if the probability function consistent with our assumption on iπ is of the

following specific form:

π ,ji

i j

θ=θ + θ

, 1, 2,i j = and .i j≠

A countrys perceived likelihood of a terrorist attack hinges on the other targets relative

deterrent measures. This attack probability function is similar but different than contest success

functions in the conflict literature, where success hinges on the ratio of own effort to total effort

(Hirshleifer 1989, 2000).

Page 405: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

25

3. We assume that the second-order condition for the cooperative minimization problem

is satisfied. A sufficient condition for this to hold is that the principal minors of the Hessian

matrix are strictly positive:

2

20

T

i

C

θ∂ >∂

and

22 2 2

2 20

T T T

i j i j

C C C

θ θ θ θ ∂ ∂ ∂− > ∂ ∂ ∂ ∂

.

For the specific probability function assumed in footnote 2, this condition holds.

4. In (8), the first two terms in the numerator are positive, while the last two terms will

be of differing signs. The sum of these last two terms will, however, be zero when i jθ = θ

because cross partials are then zero.

5. This follows since .i i j i∂π ∂θ = −∂π ∂θ

6. The following specific forms for the attack probabilities would give such results:

0

0 0

,ji

i j i j

θπ =

θ + θ + θ + θ for , 1, 2,i j = i j≠

and

00 0

.i j

i j i j

θ + θπ =

θ + θ + θ + θ

In these equations, 0iθ and 0jθ are proxies for some kind of obstacle that protects country i and j,

respectively. An increase in 0iθ reduces the likelihood of i being attacked, but increases the

likelihood that country j is targeted. The need for a different underlying specific probability

function is another difference between the two models.

7. Our problems are similar to some of the social dilemmas analyzed in the excellent

article by Eaton (2004). Some important differences exist because deterrence has opposing

externalities.

Page 406: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

(C + Ci > b > C), i = 1, 2 a. 2 × 2 Generic deterrence game

(2B > c > B) b. 2 × 2 Generic preemption game

Figure 1. Preemption and deterrence games in normal form

nation 2 Status quo Deter

Status quo

0, 0

−C1, b − C

nation 1

Deter

b − C, − C2

b − C − C1, b − C − C2

nation 2 Preempt Status quo

Preempt

2B − c, 2B − c

B − c, B

nation 1

Status quo

B, B − c

0, 0

Page 407: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

45o

θj

θi

P

N

BRi

BRj

0

Figure 2. Best-response paths for symmetric deterrence game

SS '

Page 408: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

45o

0

BRi

BRj

PS

N

Figure 3. Symmetric preemption best-response paths

N

ii

N

j

jIj

Ij

IiIi

θ θ

θ

θ

Page 409: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Terrorist backlash, terrorism mitigation, and policy delegation

Kevin Siqueira*

and

Todd Sandler School of Economic, Political and Policy Sciences

University of Texas at Dallas 2601 N Floyd Road

Richardson, TX 75083 USA 1-972-883-6725

fax: 1-972-883-6297

January 2007

Abstract This paper presents a three-stage proactive game involving terrorists, elected policymakers, and

voters. In each of two targeted countries, a representative voter chooses an elected policymaker,

charged with deciding proactive countermeasures to ameliorate a transnational terrorist threat.

Two primary considerations drive the voters’ strategic choice: free riding on the other countries’

countermeasures and limiting a reprisal terrorist attack. The resulting low proactive

countermeasures benefit the terrorists, whose attacks successfully exploit voters’ strategic

actions. This finding stems from a delegation problem where leadership by voters has a

detrimental consequence on the well-being of targeted countries. Domestic politics add another

layer of concern when addressing a common terrorist threat.

JEL classification: H41, D72, H56, D74 Keywords: Terrorism; Delegation problem; Counterterrorism; Public Goods; Three-stage game email address: [email protected] (K. Siqueira), [email protected] (T. Sandler) Corresponding Author: Sandler *Siqueira is an Associate Professor of Economics. Sandler is the Vibhooti Shukla Professor of Economics and Political Economy. We have profited from the comments of two anonymous references. This research was partially supported by the U.S. Department of Homeland Security through the Center for Risk and Economic Analysis of Terrorism Events (CREATE) at the University of Southern California, grant number N00014-05-0630. However, any opinions, findings, and conclusions or recommendations are solely those of the authors and do not necessarily reflect the views of the Department of Homeland Security.

Page 410: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Terror backlash, terrorism mitigation, and policy delegation 1. Introduction

The unprecedented and destructive terrorist attacks on September 11, 2001 (hereafter 9/11) not

only had economic ramifications but also political consequences, felt across the globe. Estimates

of economic losses run from $80 to $90 billion, not including increased expenditures on

homeland security and other indirect costs that followed in the wake of these attacks (Kunreuther

and Michel-Kerjan, 2004; Kunreuther et al., 2003). To maintain political support from the

American public, the Bush administration had to demonstrate its ability to take decisive actions

to protect US people and property from future attacks. These measures took two tracks:

defensive responses in the form of greatly expanded homeland security and offensive responses

in the form of the Afghan invasion on October 7, 2001. The latter was intended to destroy al-

Qaida’s assets and send a clear message that such terrorist attacks will elicit a massive and

prolonged retaliatory blow against the terrorists, their associates (i.e., Abu Sayyaf in the

Philippines), and their supporters (i.e., the Taliban who had provided a safe haven).

As a targeted government takes stringent proactive measures against terrorists and their

sponsors, the government must also worry about a potential backlash that these efforts might

trigger at home by another terrorist group that objects to Draconian countermeasures. For

example, Spain’s support of the US-led “war on terror,” including its participation in

Afghanistan and Iraq, resulted in the March 11, 2004 (hereafter 3/11) Madrid commuter train

bombings, which killed 191 and injured 1,200. Spanish voter’s viewed the ruling Partido

Popular party’s strong stance against al-Qaida as having brought this backlash attack to the

homeland – a belief bolstered by the statements by the perpetrators. The government’s

culpability was exacerbated by its false accusation of Euskadi ta Askatasuna (ETA). Similarly,

Britain’s close alliance with US post-9/11 proactive efforts likely resulted in the London subway

Page 411: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

2

and bus bombings on July 7, 2005 and a subsequent failed attack four weeks later. As with

Spain, proactive measures against al-Qaida caused another sympathetic group to retaliate on the

retaliator’s home turf. A series of terrorist attacks in Saudi Arabia during 2004-2005 appears

motivated by its cooperation in US-led antiterrorism efforts against al-Qaida. After 9/11, Abu

Sayyaf’s attacks in the Philippines followed a similar backlash motivation.

Thus, a strong proactive response presents a dilemma for politicians and the electorate in

a liberal democracy. If a targeted government pursues rigorous antiterrorist policies that curtail

the general threat at home and abroad, these efforts may trigger a backlash that leads to a direct

attack at home.1 This is illustrated by Osama bin Laden threatened attacks on American soil in

retaliation for US actions in early 2006 to kill al-Qaida leaders (e.g., Ayman al Zawahiri).

However, a failure to address the general threat of terrorism also leaves the country vulnerable to

attacks at home and abroad. Hence, any response – retaliation or inaction – has negative

consequences that must be balanced. This dilemma is further complicated in the case of a

common transnational terrorist threat confronting two or more countries, insofar as each

country’s action has strategic implications on the other countries’ response.

The purpose of this article is to investigate proactive counterterrorism measures when

voters delegate such policy choices to elected officials in two countries facing a common

terrorist threat.2 The underlying game involves terrorists, elected officials, and voters. Unlike

the literature, our representation accounts for the strategic aspects of domestic politics, associated

with offensive countermeasures against a transnational terrorist threat. Previous analyses

focused on just two-player games with the targeted countries’ policymakers as the strategic

players.3 The inclusion of voters allows us not only to investigate the delegation problem, where

voters rely on elected officials to represent their preferences, but also to account for the

grievance aspect of proactive policies.4 We establish that voters are inclined to restrict offensive

Page 412: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

3

operations. In particular, voters may strategically elect a government that places a low priority

on meeting the general terrorism threat so as to minimize backlash attacks while obtaining a free

ride on the efforts of another targeted nation. This strategizing on the part of voters results in a

Pareto-inferior level of proactive countermeasures than in the absence of delegation. Thus,

terrorist attacks can make targeted countries work against one another by inducing constituencies

to elect candidates who are soft on terrorism. If, however, the terrorists were only to target a

single country, then this adverse delegation problem is absent, because there is no other target to

provide a terrorist counteroffensive or to draw an attack. Our analysis shows that confronting a

common transnational terrorist threat is especially difficult in democracies.

The remainder of the paper contains four sections. Section 2 provides background and a

justification for the game’s structure. In Section 3, stage 2 and 3 of the three-stage game are

analyzed. Section 4 solves the all-important first stage where farsighted voters assume a

leadership role over the officials whom they elect. Section 5 indicates concluding remarks and

policy implications.

2. The underlying game: background and justification

To capture domestic politics and policy choice, we focus on the problem of delegation where

voters choose elected officials or policymakers in two terrorism-threatened democratic countries.

These policymakers must then decide proactive measures to mitigate future attacks from a

common terrorist threat from group A. Today, group A could be al-Qaida, while, in the 1980s, it

would have been the Abu Nidal Organization (ANO) or Islamic Jihad. Proactive responses –

e.g., infiltrating a terrorist group, attacking terrorist training camps, or assassinating or capturing

terrorists – represent a privately provided pure public good problem, because such actions come

at a private cost to the provider nation and generate nonexcludable and nonrival benefits to all at-

Page 413: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

4

risk countries. We also recognize that enhanced offensive actions also increase the likelihood of

being attacked by another group, denoted by group B, that objects to the counteroffensive. For

example, Israeli retaliatory actions against the Palestine Liberation Organization (PLO) and

Black September at home and abroad led to more militant groups – e.g., the Popular Front for the

Liberation of Palestine (PFLP) and ANO – that frequently staged attacks to protest Israeli

actions. Hamas is a particularly apropos example of group B, since it retaliates against Israeli

responses and does so within Israel. Recent Israeli crackdowns on Fatah and Hezbollah incited

Hamas attacks.

Since 9/11, countries in the US-led coalition (e.g., Great Britain, Spain, Australia, the

Philippines, and Turkey) endured attacks at home from terrorists aligned or sympathetic to al-

Qaida. The loosely tied al-Qaida network nicely fits the scenario of our model where pressures

on al-Qaida can erupt in another group launching an attack on the country’s home soil. The

country that draws the attack is often the one that is perceived to have acted more heavy-

handedly than other countries,5 which fits the London bombings in the summer of 2005. Our

game representation captures several aspects of the proactive dilemma associated with

transnational terrorism: namely, the free-riding incentive, the backlash risk, and the delegation

problem. The latter arises because voters have an incentive to strategically elect a government

that puts less weight on the general terrorism threat in the hopes of shifting abroad more of the

offensive response, thereby putting more backlash risk on the other country. As such, an

electorate can influence the game subsequently played by the countries’ policymakers as they

enact counterterrorism measures. If, for example, voters are more concerned about the

retaliatory attacks than about the general threat, then they will choose a dovish policymaker.

This strategic vote can result in less action by both countries and a greater general terrorism

threat.6 Consequently, voters may be worse off than had they not acted strategically.

Page 414: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

5

2.1. The players and the timing of the game

The game involves three different sets of players: voters, policymakers, and terrorists. Although

terrorists do not act strategically in our model and respond only to the actions taken by the two

countries, each terrorist group represents a particular type of threat to each country. Terrorist

group A poses a general threat to two countries whose people and properties can be targeted at

home and abroad. In addition, terrorist group B hits a proactive country at home with a

retaliatory attack, meant to display its displeasure and grievance at the county whose

countermeasures are viewed as more stringent. In each targeted country, a second set of players

consists of elected policymakers who decide countermeasures against group A in order to

minimize the expected damages from possible terrorist attacks in addition to minimizing the cost

of implementing the associated policy. The third set of players is the countries’ voters who share

the same objectives as elected policymakers. In each country, we assume that voters and

policymakers only differ in the weight that they place on the threat of experiencing a backlash

attack at home, stemming from their actions to curb the general terrorism threat. To simplify and

abstract from the complex political process associated with two democratic countries, we focus

on a representative voter from a majority group that dominates the process and is decisive in

determining the election of political candidates and, thus, policy alternatives.

The timing of the game is as follows: In stage 1, the voters in each targeted country

simultaneously elect a policymaker who then decides a proactive response to group A in stage 2.

This response is decided in a noncooperative fashion even though both governments are

confronted by a common threat. Given the reluctance of most governments to coordinate their

security policies, this is an appropriate assumption. We assume that voters and governments

know the terrorists’ preferences but are unsure about their propensity to engage in terrorist acts.

Page 415: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

6

In stage 3, terrorist group A decides the nature of its campaign against the two countries. As a

potential reaction to government countermeasures, terrorist group B surfaces and attacks the

heavier-handed country. We employ the subgame perfection solution concept and thus solve the

game backwards starting with the terrorist campaigns in stage 3, moving to the choices of the

policymakers in stage 2, and ending with the voters’ election of the policymakers in stage 1.

3. Stage 2 and 3 of the game: counterterrorism and terrorism

As motivated by our discussion in Section 2, we first examine the general threat posed by group

A in stage 3 as it decides whether to conduct its terror campaign against countries 1 and 2, based

on the countermeasures ( ), 1,2i iθ = taken by the two countries. To capture the public good

nature of government actions at curbing the terrorist threat, we let ( )1 2g θ θ+ represent the

probability of a terrorist campaign failure and ( )1 21 g θ θ− + denote the probability of a terrorist

campaign success. The probability of failure function is strictly increasing and concave in the

cumulative countermeasures of the targeted governments, so that 0g′ > and 0.g′′ < The

campaign can result in failure (a “miss”) with payoff m or a success (a “hit”) with payoff h. Any

expected gains from A’s campaign must be at least as large as the benefit, b, of delaying the

campaign and pursuing the best alternative nonterrorist activity. Thus, the terrorist group will

engage in its campaign against both countries provided that the following inequality holds:

( ) ( )1 ,g m g h bγΘ + − Θ + ≥⎡ ⎤⎣ ⎦ (1)

where 1 2 ,θ θΘ = + ,h m> and γ represents A’s predisposition to waging its terror campaign.

For simplicity, γ is assumed to be uniformly distributed on the interval [ ], .α α− Because group

A’s predisposition is unknown to voters and their elected officials, A’s campaign likelihood, p, is

Page 416: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

7

viewed as a random event. Given our assumptions, the voters’ and officials’ perceived

probability of a terror campaign is given by,7

( ) ( ) [ ] 1 2

1 1, 1 1 ( ) ,

2p b g m g hθ θ

α⎛ ⎞= − − Θ − − Θ⎜ ⎟⎝ ⎠

(2)

which is itself dependent on the two governments’ countermeasures. Performing comparative

statics on (2), we obtain,

( )1 2

0,2

p p gm h

θ θ α′∂ ∂= = − <

∂ ∂ (3)

so that the probability that group A engages in a terror campaign decreases as either country

exerts more antiterrorist efforts. These marginal probabilities are themselves increasing in the

actions of either country:

( )2 2 2 2

2 21 2 1 2 2 1

0.2

p p p p gm h

θ θ θ θ θ θ α′′∂ ∂ ∂ ∂= = = = − >

∂ ∂ ∂ ∂ ∂ ∂ (4)

Next, we turn to group B which, as discussed earlier, attacks as a protest to the

countermeasures levied by one of the countries on group A. The voters and policymakers

evaluate the threat that their country could be attacked by B to be a function of the relative

differences between the effort levels expended by the two countries in countering the general

terrorist threat. Each government or its designated policymaker assumes that country 1 will be

attacked if 1 2 ,θ η θ+ ≥ where 0η > represents B’s bias against government 1. This bias could be

the result of B’s accumulated past grievances built up over the years. This random variable is

assumed to be uniformly distributed on the interval [ ], .ψ ψ− Given the timing of the game, η is

unknown to the voters and policymakers in stage 1 and 2 when they make their decisions. We,

thus, let the perceived probability, 1,π that B attacks country 1 to be given by:

( ) ( )1 1 2 2 1, .π θ θ ρ η θ θ= ≥ − Since the distribution of η is uniform, we have:8

Page 417: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

8

( ) ( )1 1 2 2 1

1 1, 1 ,

2π θ θ θ θ

ψ⎡ ⎤= − −⎢ ⎥⎣ ⎦

(5)

so that 2 11π π= − is the probability that B retaliates against country 2. From (5), we have:

1 2 1 2

1 2 2 1

10.

2

π π π πθ θ θ θ ψ

∂ ∂ ∂ ∂= = − = − = >∂ ∂ ∂ ∂

(6)

Thus, country i’s risk from a backlash attack increases with its own countermeasures and

decreases with those of the other country. All second-order partials are zero since the first-order

partials are independent of the iθ s.

Terrorist group B may arise out of an ethnic, religious, or political community, common

to both countries – e.g., the suicide bombers in London on July 7, 2005 were Islamic

fundamentalists with beliefs aligned with al-Qaida. Russian offensives against terrorists and

insurgents in Chechnya resulted in Chechen terrorists staging missions in Russia, including the

bombings of two Moscow apartment buildings (September 9 and 13, 1999) and the barricade and

hostage seizure of a Moscow theater (October 23, 2002). In addition, the terrorists behind the

3/11 Madrid train bombings shared religious and ethnic affinities with al-Qaida. Increases in

security against terrorism are apt to be directed in part against those interests identified with a

particular terrorist threat at home and abroad. This may then result in grievances among

sympathetic elements at home that erupt into a new group demonstrating its displeasure,

especially when the country’s measures appear particularly harsh relative to the other targeted

country.

3.1. Elected policymakers’ counterterrorism response: stage 2

We now fold the game back to stage 2 where an elected policymaker in each of the two targeted

countries decides the proactive response, while taking its counterpart’s response as given. To

Page 418: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

9

represent the policymakers’ objective function, we must first indicate country i’s damage and

likelihood in four scenarios, given the presence of a general terrorist threat from group A and

localized threat from group B. iiD represents the damage to country i when group A directs

attacks at i’s interests at home and abroad, while group B stages protest attacks at home. The

likelihood of this scenario is ,ipπ where p and iπ have been previously defined. If, however,

group A attacks i’s interests at home and abroad, but B retaliates against j (i.e., the other country),

then ijD denotes the damage to i and occurs with probability ( )1 .ip π− Given that the first

scenario involves additional attacks than the second scenario, it is reasonable to assume

.ii ijD D> The third and fourth scenario involve no general threat from group A to country i. In

the third scenario, country i endures attacks from group B at home, resulting in damage iid with

probability (1 ) .ip π− Clearly, ii iiD d> since iiD also involves losses from attacks by group A at

home and abroad. Finally, the fourth case involves country i experiencing no attacks from either

terrorist group so that damage, ,ijd is zero with a probability of ( )( ) 91 1 .ip π− − Similarly, we

can define four scenarios for country j where , ,jj ji jj jjD D D d> > and 0.jid =

In each targeted country, the elected policymaker chooses its proactive response

( ), 1, 2 ,i iθ = taking its counterpart’s policy as given while anticipating the consequences of its

choice on the probabilities that it is attacked by group A or B or both. The policymaker’s

objective is to minimize the sum of its expected damages from the four scenarios and the costs of

its countermeasures, ( ).iC θ The cost function is assumed to be strictly increasing and convex in

.iθ As a special feature of the expected damages from attacks, a weight of igα is applied by the

elected policymaker to iiD , which reflects damages from attacks by groups A and B on i’s soil.

Page 419: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

10

The weight is also applied to .iid This weight captures a policymaker’s aversion to policy-

induced terrorist attacks on home soil. As such, the proactive choice in country i is also

influenced by ,igα which varies along the unit interval, [ ]0,1 . An elected policymaker in stage 2

chooses ,iθ taking jθ as given, to

minimize ( ) ( ) ( )1 1 ,ig ig igi ii i ij i ii iZ p D p D p d Cπ α π π α θ= + − + − + (7)

where the arguments of p and iπ are suppressed. The associated first-order condition, after

rearrangement, is:

( ) (1 ) ( ) (1 ) 0.ig ig igii ii ii i ij ii ij ii

i i

pD d D p D D p d C

ππ α π α αθ θ

∂∂ ′⎡ ⎤ ⎡ ⎤− + − + − + − + =⎣ ⎦ ⎣ ⎦∂ ∂ (8)

The second-order condition associated with (7) is assumed to hold.10

Given that the sign of the first expression in brackets in (8) is positive, the first composite

expression in (8) is negative (recall that 0ip θ∂ ∂ < ) and captures i’s added benefits from

reducing the likelihood that group A will initiate its terror campaign owing to greater proactive

measures. The sign of the second expression in (8) is ambiguous and hinges, in large parts, on

igα or the potential distaste placed by the policymaker on a backlash attack launched by group B

to protest actions taken against group A. If this weight is close to zero so that backlash losses are

greatly discounted, then the second expression in (8) may be negative and represents an

additional marginal benefit from proactive measures. In this scenario, the policymaker places

more weight on shifting the retaliatory attack abroad than on the damage sustained at home. Of

course, C′ denotes the marginal provision cost of the proactive measure. A second relevant

scenario involves igα with values near one. When this occurs, the sign of the second bracketed

expression will be unequivocally positive if ,igii ijD Dα > since the iid term is positive.11 This

scenario means that the second expression in (8) represents an additional (proactive) marginal

Page 420: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

11

cost coming from the backlash consequence. Scenario 1 with two marginal benefit terms and

single marginal cost expression implies greater offensive action than scenario 2 with its single

marginal benefit term and two marginal cost expressions. Sufficient weight placed on backlash

curtails a proactive response beyond the standard free-rider response associated with a

transnational terrorism threat (Sandler and Siqueira, 2006). In either scenario, marginal benefits

are equated to marginal costs for an interior solution to (8).

3.2. Nash equilibrium at stage 2

We now turn to the mathematical and geometrical representation of the Nash equilibrium for the

elected policymaker of the two targeted countries that confront the same general terrorism threat

and potential backlash consequences. The simultaneous solution of (8) for each policymaker

denotes the equilibrium counterterrorism policies of elected officials in stage 2. This solution

and comparative statics are described shortly, but first we display the solution graphically.

Equation (8) implicitly defines the best-response functions ( )iBR for policymaker i

( )1,2; i i j= ≠ where ( ), .igi i jBRθ θ α= This function relates i’s optimal choice of iθ to

alternative choices of jθ by country j, along with the weight attached to backlash damage. Other

parameters of the best-response function are suppressed for simplicity. Using the implicit

function theorem, we derive the slope of i’s best-response function to be:

( ) ( )2

2

2

1

0.

igi ii ii i ij

i jiig

j

i

pD d D

BR

Z

π α πθ θ

θθ

∂ ⎡ ⎤− − + −⎣ ⎦∂ ∂∂ = <∂∂∂

(9)

The sign of (9) is unequivocal because the cross-partial derivative and the bracketed

expression are both positive, so that the numerator must be negative. Moreover, the second-

Page 421: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

12

order condition ensures that the denominator is positive. By (9), the reaction path of

policymaker i is thus negatively sloped: as he or she expends less counterterrorism effort, his or

her counterpart in j expends more effort. This negative slope can be traced to free riding and an

intent to draw fewer retaliatory attacks. By analogous reasoning, j’s reaction path is also

negatively sloped. Hence, proactive countermeasures are viewed as strategic substitutes.

[Figure 1 near here]

In Figure 1, the reaction paths (ignore the dashed reaction path) are displayed with 1θ on

the horizontal axis and 2θ on the vertical axis. The Nash equilibrium is at N, where the reaction

paths intersect. 1BR is steeper than a downward-sloping line with slope −1, while 2BR is flatter

than a downward-sloping line with slope −1 in order to ensure stability and uniqueness (Cornes

et al., 1999; Cornes and Sandler, 1996). In Figure 1, a line with slope −1 through N will intersect

the horizontal axis at the aggregate Nash equilibrium level of proactive measures for the two

policymakers combined; i.e., *1 2 .N Nθ θΘ = +

Next we display the influence of the policymaker’s weight ,igα attached to retaliatory

attacks, on his choice of .iθ Differentiating (8) with respect to this weight gives:

( )

2

2

,i i i

ii ii i ip ii

i iiigig

i

D d pd

BR

Z

π θ θπ πε ε

θ θα

θ

−⎛ ⎞ ∂⎡ ⎤− +⎜ ⎟⎣ ⎦ ∂∂ ⎝ ⎠=∂∂ −∂

(10)

where ( )( )/ /i i i i i iπ θε π θ θ π≡ ∂ ∂ and ( ) ( )/ /

ip i ip pθε θ θ≡ − ∂ ∂ are elasticity expressions. In

particular, i iπ θε captures i’s probability elasticity of suffering a backlash attack in response to its

countermeasures, while ipθε indicates the probability elasticity of preventing group A’s attacks at

home or abroad. Henceforth, the first elasticity is called the backlash elasticity, and the second

Page 422: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

13

elasticity is termed the prevention elasticity. If i i ipπ θ θε ε≥ , then the expression in (10) is negative

owing to the numerator being positive and the denominator being negative. Thus, a greater

backlash elasticity relative to the prevention elasticity means that the best-response curve shifts

down and to the left in response to a large backlash weight (see dashed curve 1BR′ in Figure 1).

As a result, there is less total expended proactive measures at the new Nash equilibrium, N ′ ,

even though policymaker 2 increases such efforts in response to policymaker 1’s reduced efforts

– i.e., *′Θ < Θ in Figure 1. If, however, i i ipπ θ θε ε< , then the sign of (10) can be negative, zero,

or positive depending on whether the left-hand multiplicative expression in the numerator is less

than, equal to, or greater than (in absolute value) the right-hand expression. When the latter

holds, which we henceforth assume,12 the policymaker’s best-response curve shifts up in Figure

1 (not shown) and more total counterterrorism effort results. This case follows when the damage

from solely retaliatory attacks at home, ,iid is small and the backlash elasticity is also small, so

that i’s policymaker is not intimidated by group B.

3.3 Stage 2: further implications

To determine the equilibrium responses to changes in 1gα and 2gα at stage 2, we implicitly solve

the elected policymaker’s first-order conditions and obtain *( , )ig jgi iθ θ α α= , i, j = 1, 2 and .i j≠

Next, we incorporate these expressions into the two first-order conditions in (8) and totally

differentiate the resulting equation with respect to the two alphas to display the comparative

static reactions to changes in the weights given by the policymakers. We rearrange the

differentiated expressions and apply Cramer’s Rule to obtain the following proposition:

Proposition 1:

Page 423: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

14

(i) If i i ipπ θ θε ε≥ , then * 0ig

id dθ α < and * 0igjd dθ α > .

(ii) If i i ipπ θ θε ε< and if

i iπ θε or iid is small enough, then * 0igid dθ α > and

* 0igjd dθ α < .

Proof: See Appendix 1.

Case (i) indicates that if the backlash elasticity is at least as great as the prevention elasticity,

then policymaker i’s countermeasures will fall as he puts more weight on the retaliatory threat.

As such, the shift displayed with curve 1BR′ in Figure 1 applies. Policymaker i places a heavier

burden on country j (i.e., * 0igjd dθ α > ), and both countries are more vulnerable to the general

threat as overall proactive measures drops. Proactive efforts are undersupplied owing to free-

riding and backlash concerns. When, however, case (ii) applies, policymakers’ proactive

responses move in opposite directions as igα changes. If, for example, less weight is placed on

backlash damages, then policymaker i exerts less countermeasures at combating the general

terrorism threat while policymaker j expends more effort.

4. Strategic voting in stage 1

We now fold the game back to stage 1 where each country’s voters can act strategically and elect

a policymaker, who can conceivably improve the voters’ well-being, perhaps at the expense of

the voters in the other targeted country. Two basic concerns are at play: the desire to free ride

on the proactive response of others and the wish not to draw a retaliatory attack by avenging

group B.13 Strategic voting can result in a worse outcome than without such voting.

Given some specified electoral process, voters in each country are viewed as electing a

policymaker (or government), while taking the election results in the other country as given.

Although the set of voters can differ over the single-dimensional parameter, ivα , representing

Page 424: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

15

voter iv’s weight on damages from a retaliatory attack by terrorists, we assume that one group of

voters is decisive in each country. Moreover, the group’s preferences can be characterized by a

representative voter in each country.14 Since voters move first and are assumed to be forward

looking, voters must address a strategic delegation problem insofar as the elected policymaker,

not the voter, picks the proactive response according to his or her own preferences. If the

electorate looks ahead and takes this factor into account, they may choose a policymaker whose

igα will likely differ from the voter’s own weight. We now investigate the implication of this

difference.

Given our assumptions, the policymaker elected in each country is the one most preferred

by the representative voter from the majority group. Let this voter’s preference be characterized

by the backlash weight .imα In stage 1, the representative voter in country i chooses igα of the

elected policymaker to

*minimize (1 ) (1 ) ( )im im imi ii i ij i ii iZ p D p D p d Cπ α π π α θ= + − + − + , (11)

where ,p ,iπ and *iθ are all functions of igα and .jgα Analogous to the policymaker objective,

the objective in (11) is a sum of the damages in the various scenarios and the cost of proactive

measures. The sole difference is the weight that the representative voter (and its majority group)

attaches to the possibility of enduring a backlash attack. When determining which policymaker

to elect, each representative voter takes into account the impact of his choice on the policy that

will be played in the subsequent stage of the game. In so doing, each representative voter acts as

a Stackelberg leader vis-à-vis the elected policymaker (the follower) of both countries, who

displays Nash-Cournot behavior toward one another. Minimizing (11) with respect to ,igα and

using policymaker i’s first-order condition from (8) and the equilibrium best responses to

changes in ,igα we obtain the following expression (see Appendix 2 for details):

Page 425: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

16

( ) ( )

i i i

ii ii i im igip ii jj

i i

D d pdπ θ θ

π πε ε α αθ θ

−⎧ ⎫∂⎡ ⎤− + Φ − =⎨ ⎬⎣ ⎦ ∂⎩ ⎭

( ) ( ) ( ) ( )1 1 ,im im imii ii ii i ij ii ij ii ji

j j

pD d D p D D p d

ππ α π α αθ θ

⎧ ⎫∂∂⎪ ⎪⎡ ⎤⎡ ⎤− + − + − + − Φ⎨ ⎬⎣ ⎦ ⎣ ⎦∂ ∂⎪ ⎪⎩ ⎭ (12)

where 0jjΦ > and 0jiΦ > are defined in Appendix 1. The remaining terms in (12) have been

defined previously, where 0jp θ∂ ∂ < and 0.i jπ θ∂ ∂ <

A sufficient condition for the right-hand expression within i of (12) to be negative is

that ,imii ijD Dα ≥ so that the representative voter’s weighted damages from attacks by groups A

and B on i’s interests exceed the damages from just attacks by group A on i’s interests. Although

stronger than needed, this assumption is likely to hold provided that the representative voter

views retaliatory attacks at home with sufficient disdain not to reverse the ii ijD D≥ inequality.

We are left with the following proposition:

Proposition 2: Assuming ,im

ii ijD Dα ≥ there are two scenarios depending on the relative

elasticities to the alternative threats:

(i) If ,i i ipπ θ θε ε≥ then .ig imα α>

(ii) If i i ipπ θ θε ε< and if

i iπ θε or iid are sufficiently small, then .im igα α>

Proof: See Appendix 3.

If the elasticity to experiencing a backlash attack is greater or equal to the elasticity to the

general threat of terrorism, then the representative voter will elect a government that puts more

weight on the threat of a backlash than he or she does. This results in each government exerting

less effort to combat the terrorist threat than had voters’ not acted strategically. Country i’s

Page 426: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

17

voters are motivated by free riding on the proactive response of j and a desire not to draw a

retaliatory response from group B. This agrees with Spain’s election following 3/11 and the

withdrawal of forces by some other countries with troops in Iraq and Afghanistan once the threat

of a backlash attack grew. If both countries’ representative voters satisfy case (i), then a

Prisoners’ Dilemma delegation game follows with both countries reducing proactive efforts

beyond the suboptimal level implied by stage 2.15 In Figure 2, this shows up with the

policymakers’ best-reaction paths shifting down from the continuous paths to the dashed paths.

As such, the Nash equilibrium goes from N to ,N where individual and aggregate proactive

levels fall. Unfortunately, the representative voters’ strategic actions result in reduced welfare

levels to both – i.e., the iso-utility curves associated with N (not displayed) imply lower welfare

levels than those through N as the general threat of terrorism increases at home and abroad.

[Figure 2 near here]

In case (ii), it still remains possible that less effort toward combating the general threat of

terrorism will follow when the representative voter tries strategically to gain a greater free ride

from the other country’s proactive response by choosing a policymaker who downplays the

backlash concern. That is, the representative voter chooses a policymaker whose backlash

weight is less than .imα In case (ii), the representative voter knows that the elasticity of

prevention exceeds the backlash elasticity, where i iπ θε or iid is small. Because of the lack of

responsiveness to backlash or the small damages associated with iid , a policymaker has a greater

inclination to address the general terrorism threat without fear of reprisal. As such, a

policymaker that puts more weight on backlash damages will expend more proactive effort in

this case. By choosing a policymaker who cares little about the backlash, the representative

voter installs a policymaker less inclined to act in the hopes of getting a larger free ride from the

Page 427: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

18

other targeted country. This kind of strategic thinking on the part of both countries’ voters will

again result in the downward shifts of the reaction paths in Figure 2. The attempt to profit on the

other country’s efforts yields an undersupply of proactive measures that jeopardizes both

countries and reduces welfare in a Prisoners’ Dilemma type of scenario. For both cases, voters’

strategic action results in the Nash equilibrium shifting in the southwestern direction where the

aggregate proactive response falls.

5. Concluding remarks and policy implications

This paper presents a three-stage game with three sets of participants: terrorists, elected

policymakers, and voters. The model accounts for the strategic interaction between voters and

their delegated policymakers, charged with deciding proactive countermeasures to limit a

transnational terrorist threat confronting two countries. As such, this paper is the first to

investigate domestic politics in a strategic framework as it applies to counterterrorism. The

analysis shows that strategic foresight by the voter leads to an undersupply of proactive

measures. This reduced effort is motivated by two desires: free riding on the other country’s

countermeasures and limiting any reprisal terrorist attacks. The voter elects a policymaker who

will subsequently exploit his or her counterpart by curbing proactive measures. Similar actions

abroad will result in an equilibrium where welfare is reduced – i.e., the strategic move is self-

defeating.

This result indicates that the need for international cooperation when addressing a

common terrorist threat (e.g., al-Qaida, Jemaah Islamiyah, and Abu Nidal Organization) could be

even more important than shown in past studies, which do not consider domestic politics

(Sandler and Siqueira, 2006). This extra difficulty stems from a delegation problem, associated

with the voters’ reliance on an elected policymaker. This then provides yet another factor why

Page 428: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

19

liberal democracies confront a real dilemma when addressing terrorism (Wilkinson, 1986).

Nations must devise some mechanism for orchestrating an international proactive response to a

common terrorism threat. To date, the best example of this is the Afghanistan response. But

even there, most of the effort fell on the US and UK shoulders with token help by Canada,

Australia, and Denmark (The Economist, 2006). Reprisal attacks on British, Australian, South

Korean, and Spanish interests were intended by terrorists to limit or eliminate these countries’

participation – a strategy that worked in the case of Spain and South Korea. Terrorists remain

better than governments in acting as a united force.

As a future direction, the influence of strategic voting on cooperative solutions can be

investigated. The delegation problem may still work against cooperation if voters elect

policymakers with greater backlash concerns or free-riding interests. The analysis here can also

be applied to defensive measures deployed by commonly targeted nations. Even without

cooperation, strategic voting may ameliorate the oversupply of defensive actions in an attempt to

transfer the attack to a softer target abroad. Since such measures are strategic complements,

strategic voting, and the leadership that it implies, may elect officials who are less concerned

with transferring the attack, particularly when the country has interests at home and abroad.

Page 429: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

20

Appendix 1: Derivation of Proposition 1 Following the procedures outlined in the text, we obtain:

*

,i jjiig

d

d

θα

−Ω Φ=

Δ , 1,2i j = , ,i j≠ (A1)

*

,j i ji

ig

d

d

θα

Ω Φ=

Δ , 1,2i j = , i j≠ , (A2)

where

11 12

21 22

,Φ Φ

Δ ≡Φ Φ

( )

,i i i

ii ii i ii p ii

i i

D d pdπ θ θ

π πε εθ θ

− ∂⎡ ⎤Ω ≡ − +⎣ ⎦ ∂ 1,2,i =

( ) ( ) ( )2

21 2 ,jjg jg

jj j jj jj j ji jj jj jij j j

p pD d D D d D C

ππ α π α

θ θ θ∂∂ ∂⎡ ⎤ ⎡ ⎤ ′′Φ ≡ − + − + − − +⎣ ⎦ ⎣ ⎦∂ ∂ ∂

, 1, 2,i j = ,i j≠

( ) ( )2

1 ,jgji j jj jj j ji

j i

pD d Dπ α π

θ θ∂ ⎡ ⎤Φ ≡ − + −⎣ ⎦∂ ∂

, 1,2i j = , i j≠ .

Given 0jjΦ > , 0jiΦ > , and the fact that stability requires 11 22 12 21Δ ≡ Φ Φ − Φ Φ > 0, the signs of

(A1) and (A2) depend on the sign of iΩ .

Thus if ,i i ipπ θ θε ε≥ then 0iΩ > so that * 0ig

id dθ α < and * 0igjd dθ α > . For the

remaining case, iΩ can be rewritten as

( ) ( ) ,i i i i i

ii p ii ii ii

i

p D d dπ θ θ π θπε ε εθ

⎡ ⎤Ω ≡ − − +⎣ ⎦

owing to the definition of .i iπ θε If , therefore

i i ipπ θ θε ε< and i iπ θε or iid is sufficiently small, then

0iΩ < and we obtain: * 0igid dθ α > and * 0ig

jd dθ α < .

Page 430: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

21

Appendix 2: Derivation of equation (12)

Minimizing (11) with respect to ,igα we obtain:

* ** *j jim im im imi i i i

i ii i ii ii iiig ig ig igi j i j

p pD D p D p D

θ θθ π θ ππ α π α α αθ α θ α θ α θ α

∂ ∂∂ ∂ ∂ ∂∂ ∂+ + +∂ ∂ ∂ ∂ ∂ ∂ ∂ ∂

( ) ( )* ** *

1 1j ji i i ii ij i ij ij ijig ig ig ig

i j i j

p pD D p D p D

θ θθ π θ ππ πθ α θ α θ α θ α

∂ ∂∂ ∂ ∂ ∂∂ ∂+ − + − − −∂ ∂ ∂ ∂ ∂ ∂ ∂ ∂

( ) ( )* ** *

1 1j jim im im imi i i ii ii i ii ii iiig ig ig ig

i j i j

p pd d p d p d

θ θθ π θ ππ α π α α αθ α θ α θ α θ α

∂ ∂∂ ∂ ∂ ∂∂ ∂− − + − + −∂ ∂ ∂ ∂ ∂ ∂ ∂ ∂

*

0iig

Cθα

∂′+ =∂

. (A3)

Rearranging, we obtain:

( )1im im imi ii ii i ij i ii ii ij

i i i i i

p p pD D d p D p D

π ππ α π π α αθ θ θ θ θ

⎧ ∂ ∂∂ ∂ ∂+ − − + −⎨∂ ∂ ∂ ∂ ∂⎩

( )*

1 imi iii ig

i

p d Cπ θαθ α

⎫∂ ∂′+ − + =⎬∂ ∂⎭

( )1im im imi ii ii i ij i ii ii ij

j j j j j

p p pD D d p D p D

π ππ α π π α αθ θ θ θ θ

⎧ ∂ ∂∂ ∂ ∂⎪− + − − + −⎨∂ ∂ ∂ ∂ ∂⎪⎩

( )*

1 jimiii ig

j

p dθπ α

θ α⎫ ∂∂ ⎪+ − ⎬∂ ∂⎪⎭

. (A4)

Using the policymaker’s first-order condition in (8) to substitute out for C′ in (A4) and

rearranging slightly, we have:

( ) ( )1 1im im im imi i ii ii i ij i ii ii ij ii

i i i i i i

p p pD D d p D p D p d

π π ππ α π π α α αθ θ θ θ θ θ

⎧ ∂ ∂ ∂∂ ∂ ∂+ − − + − + −⎨∂ ∂ ∂ ∂ ∂ ∂⎩

( ) ( )*

1 1ig ig ig igi i i ii ii i ij i ii ii ij ii ig

i i i i i i

p p pD D d p D p D p d

π π π θπ α π π α α αθ θ θ θ θ θ α

⎫∂ ∂ ∂ ∂∂ ∂ ∂− − − + − + − − ⎬∂ ∂ ∂ ∂ ∂ ∂ ∂⎭

( ) ( )*jim im im im imi

i ii ij ii ij ii ij ii ii igj j

pD D d D p D D d d

θππ α α α α αθ θ α

⎧ ⎫ ∂∂∂⎪ ⎪⎡ ⎤ ⎡ ⎤= − − − + + − − +⎨ ⎬⎣ ⎦ ⎣ ⎦∂ ∂ ∂⎪ ⎪⎩ ⎭. (A5)

Focusing only on the left-hand side (A5), we cancel and arrange terms to yield:

Page 431: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

22

( ) ( ) ( )*

( ) (1 ) .im ig im ig im ig im igi i ii ii i ii ii ii ig

i i i i

p pD d p D p d

π π θπ α α π α α α α α αθ θ θ θ α

⎧ ⎫∂ ∂ ∂∂ ∂− − − + − + − −⎨ ⎬∂ ∂ ∂ ∂ ∂⎩ ⎭ Further rearranging slightly gives:

( ) ( ) ( )*

im igi i ii ii ii ii ii ii ig

i i i

pD d p D d d

π π θπ α αθ θ θ α

⎧ ⎫∂ ∂ ∂∂ − + − + −⎨ ⎬∂ ∂ ∂ ∂⎩ ⎭.

After some slight manipulations, the above expression becomes:

( ) ( )

*ii ii i im igi i i i i

ii igi i i i i

D d ppd

p

πθ π θ π θ α αθ θ π θ θ α

⎧ ⎫−⎡ ⎤∂ ∂ ∂∂⎪ ⎪+ + −⎨ ⎬⎢ ⎥∂ ∂ ∂ ∂⎪ ⎪⎣ ⎦⎩ ⎭.

Using the two definitions for elasticity and putting the above expression together with the right-

hand side of equation (A5), we have:

( ) ( )

*

i i i

ii ii i im igi ip ii ig

i i

D d pdπ θ θ

π π θε ε α αθ θ α

−⎧ ⎫∂ ∂⎡ ⎤− + − =⎨ ⎬⎣ ⎦ ∂ ∂⎩ ⎭

( ) ( ) ( ) ( )1 1 jim im imii ii ii i ij ii ij ii ig

j j

pD d D p D D p d

θππ α π α αθ θ α

⎧ ⎫ ∂∂∂⎪ ⎪⎡ ⎤⎡ ⎤− − + − + − + −⎨ ⎬⎣ ⎦ ⎣ ⎦∂ ∂ ∂⎪ ⎪⎩ ⎭. (A6)

Using (A1) and (A2), and canceling terms, the above expression becomes (12) in the text.

Appendix 3: Derivation of Proposition 2 By assumption, im

ii ijD Dα ≥ . From our results in Appendix 1, we know that 0jjΦ > and

0jiΦ > . Furthermore, given i i ipπ θ θε ε≥ for case (i), we can sign (12) in the following way:

( )( ) ( )im igα α+ + − = − + .

The parenthesis terms in the above expression represent the terms jjΦ and jiΦ in (12). From the

above equation, we can conclude that .im igα α< Alternatively, for case (ii) where i i ipπ θ θε ε<

and i iπ θε or iid is small, we can sign (12) as follows:

Page 432: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

23

( )( ) ( ) ,im igα α− + − = − +

from which we can conclude that .im igα α>

Page 433: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

24

Footnotes

1. To simplify the analysis and discussion, we only allow for such attacks at home. We can,

however, extend the analysis to permit backlash incidents at home and abroad. For example,

Israeli actions against the Palestine Liberation Organization led, in part, to a more militant

breakaway Abu Nidal Organization that attacked “Zionist” targets at home and abroad. The

Jemaah Islamiyah car bombing of the Australian embassy in Jakarta, Indonesia, however, fits the

assumption of the model, because a country’s embassy is considered to be home soil. Australia

was targeted in the bombing that killed 9 and injured over 150, owing to its support of US-led

operations against al-Qaida.

2. From 1968 until the early 1980s, this common threat either came from the Palestinian

groups or the leftists. Since 1979, this threat came increasingly from Islamic fundamentalist

terrorists. The model can be expanded to allow there to be more than two threatened countries.

This extension would greatly increase the notation without additional insight.

3. For example, see Arce and Sandler (2005), Sandler and Lapan (1988), and Sandler and

Siqueira (2006). For domestic terrorism, the two active players are the terrorists and the

policymaker (Anderton and Carter, 2005; Frey and Leuchinger, 2003).

4. Only Rosendorff and Sandler (2004) in a recruitment context examined grievances

stemming from proactive measures. These authors did not include voters.

5. The risk of a counterattack may be tied to vulnerability – soft-target status. Our analysis

implicitly assumes equal defensive measures, so that relative vulnerability is not a consideration.

Earlier papers have investigated soft-target vulnerability (Heal and Kunreuther, 2005).

6. Because voters choose policymakers that later implement policy, strategic voting is

analogous to strategic delegation. In a related paper, Persson and Tabellini (1992) considered

strategic delegation in the context of tax competition and European integration. In a

Page 434: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

25

noncooperative game, these authors showed that voters possessed incentives to delegate fiscal

`policy to policymakers who were different than them in terms of endowments. In the symmetric

political equilibrium, voters of both countries delegated policymaking to a government that was

more prone to taxation than both median voters. Also, see Besley and Coate (2003) and Dur and

Roelfsema (2005) on different delegation problems.

7. Equation (2) follows from writing the probability density function as ( ) ,p p γ= ≥ Γ

where ( ) ( )1b g m g h⎡ ⎤Γ = − Θ − − Θ⎣ ⎦ is based on (1). Thus ( )1 ,p P γ= − ≤ Γ where the

cumulative density function ( )P i equals: ( )1

.2 2

ds

α α α α

Γ

Γ= +− −∫

8. To derive (5), we note that ( )1 2 11 ,Pπ η θ θ= − ≤ − where ( )P i equals:

( )2 1

2 11.

2 2

dsθ θ

ψ

θ θψ ψ ψ

−= +− −∫

9. For simplicity, we assume that the backlash attack by group B must be in country i to

cause losses to i. We can easily allow B’s attacks to harm i’s interests at home and abroad. The

model will be the same provided that the Ds and ds are ordered as in the text. This will hold if

there is a “host country disadvantage” – i.e., losses to i are greater from B hitting i’s interests at

home than abroad.

10. The second-order condition is given by

( ) ( ) ( )2 2

2 21 2 0.

igig igi

i ii ii i ij ii ii iji i i i

Z p pD d D D d D C

ππ α π αθ θ θ θ

∂∂ ∂ ∂ ′′⎡ ⎤ ⎡ ⎤= − + − + − − + >⎣ ⎦ ⎣ ⎦∂ ∂ ∂ ∂

11. Even if ,igii ijD Dα < the expression can still be positive if the iid expression is

sufficiently large.

12. We employ this assumption on two grounds. First, it provides a more distinct case to

Page 435: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

26

earlier situations where reaction paths shift down. Second, this assumption allows us later to

utilize a direct connection between voter preferences over damages and government policy for

particular scenarios that simplifies discussion without unduly sacrificing generality by

maintaining two alternative scenarios.

13. A good example of this reaction is the terrorists’ response to the US retaliatory raid on

Libya on April 15, 1986 for its alleged involvement in the La Belle discotheque bombing in

Berlin earlier in April. Following the US raid, terrorism directed at US interests at home and

abroad increased greatly (Enders and Sandler, 1993, 2006).

14. Such a group may prove decisive, given its skills at organizing and mobilizing its

members. Historical and demographic factors may also play a role in maintaining this group’s

predominant electoral role. For more specific models concerning voting and elections, see

Persson and Tabellini (2000).

15. Free-riding incentives in stage 2 lead to suboptimal offensive countermeasures, since

neither policymaker accounts for reduced damages to the other country from his or her efforts

(Sandler and Siqueira, 2006).

Page 436: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

27

References Anderton, C.H., Carter, J.R., 2005. On rational choice theory and the study of terrorism. Defence

and Peace Economics 16, 275–282.

Arce, D.G., Sandler, T., 2005. Counterterrorism: a game-theoretic analysis. Journal of Conflict

Resolution 49, 183–200.

Besley, T., Coate, S., 2003. Centralized and decentralized provision of local public goods: a

political economy approach. Journal of Public Economics 87, 2611–2637.

Cornes, R., Hartley, R., Sandler, T., 1999. Equilibrium existence and uniqueness in public goods

models: an elementary proof via contraction. Journal of Public Economic Theory 1, 499

–509.

Cornes, R., Sandler, T., 1996. The Theory of Externalities, Public Goods, and Club Goods, 2nd

ed. Cambridge University Press, Cambridge.

Dur, R., Roelfsema, H., 2005. Why does centralisation fail to internalise policy externalities?

Public Choice 122, 395–416.

The Economist, 2006. Afghanistan: heading south. The Economist 378(8463), 12.

Enders, W., Sandler, T., 1993. The effectiveness of anti-terrorism policies: a vector-

autoregression-intervention analysis. American Political Science Review 87, 829–844.

Enders, W., Sandler, T., 2006. The Political Economy of Terrorism. Cambridge University

Press, Cambridge.

Faria, J. R., Arce, D.G., 2005. Terror support and recruitment. Defence and Peace Economics

16, 263–273.

Frey, B.S., Luechinger, S., 2003. How to fight terrorism: alternative to deterrence. Defence and

Peace Economics 14, 237–249.

Heal, G., Kunreuther, H., 2005. IDS model of airline security. Journal of Conflict Resolution

Page 437: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

28

49, 201–217.

Kunreuther, H., Michel-Kerjan, E., 2004. Policy watch: challenge for terrorism risk insurance in

the United States. Journal of Economic Perspectives 18, 201–214.

Kunreuther, H., Michel-Kerjan, E., Porter, B., 2003. Assessing, managing and financing extreme

events: dealing with terrorism. Working Paper 10179. National Bureau of Economic

Research, Cambridge, MA.

Persson, T., Tabellini, G., 1992. The politics of 1992: fiscal policy and european integration.

Review of Economic Studies 59, 689–701.

Persson, T., Tabellini, G., 2000. Political Economics. MIT Press, Cambridge, MA.

Rosendorff, B. P., Sandler, T., 2004. Too much of a good thing? The proactive response

dilemma. Journal of Conflict Resolution 48, 657–671.

Sandler, T., Lapan, H.E., 1988. The calculus of dissent: an analysis of terrorists’ choice of

Targets. Synthèsis 76, 245–261.

Sandler, T., Siqueira, K., 2006. Global terrorism: deterrence versus preemption. Canadian

Journal of Economics 39, 1370–1387.

Wilkinson, P., 1986. Terrorism and the Liberal State, revised ed. Macmillan. London.

Page 438: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Page 439: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Page 440: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

B.J.Pol.S. 37, 573–586 Copyright © 2007 Cambridge University Press

doi:10.1017/S0007123407000324 Printed in the United Kingdom

Terrorist Signalling and the Value of Intelligence

DANIEL G. ARCE A N D TODD SANDLER*

This article presents a model of terrorist attacks as signals where the government is uncertain as to whetherit is facing a group that is politically motivated or militant. Pooling equilibriums result with two types ofex post regret: P-regret, where the government concedes to political types that would not subsequently attack;and M-regret, where the government does not concede to militant types that subsequently attack at greaterlevels. Avoidance of such regret defines a measure of the value of intelligence. Counter-terrorism policy canthen be characterized in terms of whether a government should focus on increased intelligence versus increasedsecurity (hardening targets). The recommended use of asset freezing is also evaluated in terms of the resourcesrequired by terrorists to achieve the various equilibriums. Finally, this article supports the empirical findingof intertemporal substitution of resources by terrorists, concerned with the level of government response totheir attacks.

Terrorism is the premeditated use, or threat of use, of violence by individuals or subnationalgroups to obtain a political or social objective through intimidation of a target audience,beyond that of the immediate victims. Terrorists try to impose sufficient costs on a targetconstituency so that its government is pressured into conceding to the terrorists’ demands,when concessions are viewed as less costly than enduring future attacks. The immediateresponse to an attack is for the government to address the initial consequences, includingclean-up and additional security measures. Thereafter, the government assesses the likelysubsequent threat that the group poses in terms of its resources and proclivity for futureattacks. Politically orientated groups are ultimately interested in change and will eventuallychannel resources into political activities. In contrast, militant groups are more vengefuland will focus on attacks until concessions are granted.

Consider, for example, the Spanish government, which has had an armed struggle since1968 with the Basque-separatist group Euskadi ta Askatasuna (ETA). Spain also sufferedfrom the Madrid train station bombings on 11 March 2004 by Islamic terrorists seekinga withdrawal of Spanish troops from Iraq and Afghanistan. ETA can be characterized asa politically motivated group because the demands of its larger constituency may be metthrough the granting of more regional autonomy and self-determination (for example,responsibility for social services, taxation and policing). On occasion, ETA has agreed toa cease-fire. Moreover, ETA has been discriminate in its targeting, avoiding attacks withmass casualties. The Islamic terrorists in the Madrid bombing were more militant, intenton escalating attacks if their demands were not immediately met. They threatened toturn Spain into an ‘inferno’ should the withdrawal of Spanish troops from Iraq not takeplace.1 Three days after the Madrid bombings, Spanish voters reversed their apparentcourse to re-elect the government of the popular party Aznar and elected the socialist

* School of Economic, Political and Policy Sciences, University of Texas at Dallas. This article has benefitedfrom the comments by three anonymous referees and the Editor Hugh Ward; the authors are solely responsiblefor the article’s content.

1 MSNBC.com, ‘Group Threatens to Turn Spain into Inferno: Islamic Group Issues Warning after AllegedPlotters Kill Selves’, 5 April 2004, accessed 3 June 2005.

Page 441: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

574 A R C E A N D S A N D L E R

Zapatero government, which had campaigned under the promise to withdraw Spanishtroops in Iraq unless they came under United Nations’ control.

In assessing the signalling content of an attack, the government must determine anappropriate response that hinges on its beliefs about the militancy of the terrorists. Thisdecision is made under conditions of incomplete information, because the government isunlikely to be completely informed whether the terrorists’ preferences are militant orpolitical. This lack of information may stem from many causes. For example, multipleterrorist groups may be claiming responsibility for a series of attacks. Moreover, terroristgroups may have both political and militant elements that vie for dominance, so that thecontrolling wing may change and not be apparent at any point in time. This change in grouporientation may arise when government concessions appease the moderates, therebyleaving the more extreme elements to carry on the terrorist campaign.2 Followingconcessions of partial autonomy made to ETA in 1978, extremist elements in ETA wageda much more deadly campaign into the 1990s. Additionally, new and splinter groups maycome on the scene. Splintering was especially true of the Palestine Liberation Organization(PLO), which gave rise to more militant groups such as Black September, Popular Frontfor the Liberation of Palestine, Abu Nidal Organization and others. During a group’s initialattacks, the target government does not know the group’s resolve or militancy. In still otherinstances, no group may claim responsibility, leaving the government unenlightened as tothe perpetrator or its orientation.

The effect of incomplete information is twofold. First, there is a reputation incentive forpolitically motivated terrorists (P-types) to mimic militants (M-types) with a spectacularattack if it will quickly lead to concessions. Secondly, an incentive may exist for M-typesto mimic P-types so that the government will be less compelled to harden targets, whichwould diminish the likelihood (or increase the cost) of the logistical success of futureterrorist activity. This then feeds into a notion of intelligence consistent with that givenin Cilluffo et al. by involving an understanding of the motivations, thoughts and futureplans of one’s enemies.3 Multi-disciplinary intelligence, including insights into thecultures and mindsets of terrorist organizations, is crucial for counter-terrorism policy. Inparticular, there is the possibility of ex post regret where a government concedes topolitically motivated terrorists to whom it would not have conceded under completeinformation. This type of regret may arise because the magnitude of the attacks leads thegovernment to conclude falsely that it is facing militants who will escalate attacks if theirdemands are not met. Alternatively, a government may hold firm and face a second typeof ex post regret when it is subsequently attacked by militant terrorists whom thegovernment would have accommodated under complete information. Examples of the firsttype of ex post regret include concessions to groups such as the PLO, African NationalCongress (ANC), Irish Republican Army (IRA) and ETA, which each have a history ofusing diplomacy as well as sustaining a military wing, whose influence is not wellunderstood.4 Examples of the second type of regret include the Algerian revolt (1954–62)and Israel’s conflict with Hezbollah and Hamas, where the government did not seek a

2 Ethan Bueno de Mesquita, ‘Conciliation, Counterterrorism, and Patterns of Terrorist Violence’, InternationalOrganization, 59 (2005), 145–76; Todd Sandler and Daniel Arce, ‘Terrorism and Game Theory’, Simulation andGaming, 34 (2003), 319–37.

3 Frank L. Cilluffo, Ronald A. Marks and George C. Salmoiraghi, ‘The Use and Limits of US Intelligence’,Washington Quarterly, 25 (2002), 61–74.

4 Per Baltzer Overgaard, ‘The Scale of Terrorist Attacks as a Signal of Resources’, Journal of ConflictResolution, 38 (1994), 452–78.

Page 442: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Terrorist Signalling and the Value of Intelligence 575

political solution and attacks subsequently escalated. We will discuss these cases in furtherdetail in the body of the article. There is, thus, a value of intelligence that corresponds toeliminating or diminishing the likelihood of ex post regret.5 Similarly, Hoffman has arguedthat because religious-based terrorists are generally more violent than secular ones, thereexists a need for intelligence to identify terrorists’ type/preferences.6

A suicide mission is a tactic of some militant groups to signal their resolve.7 Suchmissions indicate that the group will gladly sacrifice even its human resources to raise thecarnage of the campaign. This graphic signal was first employed by Hezbollah in itssuccessful efforts to rid Lebanon of Israeli forces and then foreign peacekeepers in 1982and 1983, respectively. Noteworthy suicide attacks included the 23 October 1983 suicidetruck bombing of the US Marines barracks and the near-simultaneous suicide car bombingof the French paratroopers’ apartment building. The effectiveness of these attacks inremoving the peacekeepers led other militant groups – such as, Hamas, the PalestineIslamic Jihad (PIJ), the Al-Aqsa Martyrs Brigade and the Liberation Tigers Tamil Eelam(Tamil Tigers) – to adopt suicide missions. In some instances, these suicide campaignsresulted in concessions (for example, political concessions to Tamil Tigers) after an initialregret, once the extent of future attacks became understood by the targeted government.

In this article we examine a signalling model of terrorist attacks in which the governmenthas incomplete information about terrorists’ types. Past signalling models focused onattacks as signals of terrorist resource levels, where terrorists are (initially) able to stagean attack of sufficient magnitude to induce concessions, irrespective of whether they havehigh or low resources. Specifically, Lapan and Sandler examined the case where terroristsare militant and expend all remaining resources on attacks if concessions are not granted.8

By contrast, Overgaard analysed politically motivated groups that allocate all remainingresources to (non-violent) political purposes if no accommodations are made.9

Our analysis is centred on the creation of a unifying model that simultaneously allowsfor both militant and political terrorist types. This facilitates a comparison of the value ofintelligence for each case. No generality beyond the nexus of intelligence and uncertaintyabout terrorists’ types/preferences is claimed. In addition, our model permits a fundamentalextension whereby the government institutes defensive measures when attacks surpass athreshold, so that the value of intelligence depends not only on whether concessions occur,as is the case in the prior literature, but also on counter-terrorism policy. Specifically, thevalue of intelligence is broadened to include not only ex post regret following concessions,but also ex post regret following an escalation of terrorism in the absence of anaccommodation. We characterize when a government should focus on increased

5 The literature on the value of intelligence for terrorism has focused on the prevention of specific events, suchas 9/11 or terrorists’ use of weapons of mass destruction – see, e.g., Kevin Michael Derksen, ‘Commentary: TheLogistics of Actionable Intelligence leading to 9/11’, Studies in Conflict and Terrorism, 28 (2005), 253–68; FrancisH. Marlo, ‘WMD Terrorism and US Intelligence Collection’, Terrorism and Political Violence, 11 (1999), 53–71.In so doing, earlier articles indicated what type of intelligence (e.g., signal interception, human, or imagery) hasthe greatest effectiveness at each stage of a terrorist event. Unlike our exercise, the literature has not characterizedthe value of intelligence in terms of a signalling game of incomplete information, where the government isill-informed about the nature of the terrorist group.

6 Bruce Hoffman, Inside Terrorism (New York: Columbia University Press, 1998), pp. 185–205.7 Bruce Hoffman and Gordon H. McCormick, ‘Terrorism, Signaling, and Suicide Attacks’, Studies in Conflict

and Terrorism, 27 (2004), 243–81.8 Harvey E. Lapan and Todd Sandler, ‘Terrorism and Signalling’, European Journal of Political Economy,

9 (1993), 383–97.9 Overgaard, ‘The Scale of Terrorist Attacks as a Signal of Resources’.

Page 443: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

576 A R C E A N D S A N D L E R

intelligence versus increased security (hardening targets) to mitigate this possibility.Finally, the resulting equilibriums exhibit intertemporal substitution of terrorist resourceswhere a militant group may restrain attacks for strategic advantage, thereby exhibitingvarying patterns of terrorism, consistent with low-terrorism and high-terrorism periods ashave been empirically identified.10 The effects of proactive measures to freeze terroristassets are also examined in this context.

The remainder of the article contains three sections. The next section presents a unifyingsignalling model where governments are uninformed about terrorist types. In the ensuingsection, we indicate the value of intelligence. The final section contains concludingremarks.

TERRORIST SIGNALLING: A UNIFYING MODEL

In this section, we introduce a signalling model where the government has incompleteinformation about the type (preferences) of terrorists that it confronts. Information isasymmetric because terrorists can observe the outcomes of elections, implementation ofproactive policies and the hardening of potential targets. As is standard, we consider atwo-period model with dichotomous type set: M, P. Terrorists are M-types if they aremilitant; that is, they receive a benefit equal to the discounted sum of their attacks in thefirst and second period when the government holds firm. This is the case if terroristsperceive a positive value from attacking an obstinate government, or if they test agovernment’s never-to-concede pledge by unleashing their military wing. In addition,fundamentalist terrorists often view violence as sanctified, so that they are less constrainedin their carnage. Militant fundamentalists use violence to punish non-believers and seekmaximum casualties even when attacks will not result in concessions. Similarly, Dorandiscussed militant (Arabic/Islamic) terrorists in terms of their predilection for escalation.11

To summarize, militants are willing to escalate their attacks as a form of brinkmanship thatchallenges the interests of the opposing power to provoke the threat of intervention, if notactual intervention. For these militant terrorists, there exists a gap between the long-termgoals set by their (religious/ideological) convictions and their immediate goals,constrained by unlikely successful political action. The terrorists’ short-term goals aretherefore aimed at foiling the targeted government, through escalated attacks, rather thanthe attainment of their long-term goals. For this reason, some argued that terrorist groupssuch as al-Qaeda are not susceptible to traditional international political pressures.12

By contrast, P-types are politically motivated because an attack is a pure cost interms of both resources and political capital. They consequently direct all second-period resources to political activity, from which they receive a benefit. In comparison toM-types, P-types have reached the point where the opportunity cost of escalation isunacceptably high. Elsewhere, we have analysed joint consideration of M-types andP-types in a bargaining context13 and Siqueira has done so in terms of the incidence of

10 Such periods have been identified by Walter Enders and Todd Sandler, ‘Patterns of Transnational Terrorism,1970–1999: Alternative Time-Series Estimates’, International Studies Quarterly, 46 (2002), 145–65; WalterEnders and Todd Sandler, “Transnational Terrorism 1968–2000: Thresholds, Persistence, and Forecasts’,Southern Economic Journal, 71 (2005), 467–82.

11 Michael Doran, ‘The Pragmatic Fanaticism of al Qaeda: An Anatomy of Extremism in Middle EasternPolitics’, Political Science Quarterly, 117 (2002), 177–90.

12 Cilluffo, Marks and Salmoiraghi, ‘The Use and Limits of US Intelligence’, p. 65.13 Sandler and Arce, ‘Terrorism and Game Theory’.

Page 444: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Terrorist Signalling and the Value of Intelligence 577

competing-faction violence.14 Neither of the articles referred to above addressed thepotential for inferring terrorists’ type through past attack patterns.

Upon receiving a signal in terms of first-period attacks, the government either concedes(C) or does not concede (D). Governments often have a different response to spectacularattacks; consequently, we define an attack of at least (resource) level R* to be such thata non-conceding government significantly increases its level of deterrence/defensivepolicies to limit successful future attacks.15 An example is to harden targets throughincreased security, thereby decreasing the probability of a logistical success in asecond-period attack. In this way, the discount factor for a second-period attack subsequentto a first-period attack of at least level R* is given as . By comparison, the discount factorapplied to all other second-period attacks is given by , where . Following 11September 2001 (9/11), the United States created the Department of Homeland Security(DHS) to harden a wide range of targets (for example, airports, airplanes, public places,borders, ports and critical infrastructure), thereby greatly lowering . The US response isconsistent with 9/11 attacks signalling the likely presence of a militant group, wherebydefensive measures are prudent in the absence of concessions.

We assume that terrorists receive resource level R in each period, where R R*. In thefirst period, terrorists select their attack level from the dichotomous signal set a, A, wherea [0, R*) and A [R*, R]. An A-attack is considered large enough for the governmentto increase its defensive posture, thereby inducing discount factor if a second-periodattack occurs.

The game is illustrated in Figure 1, with a timeline that is given as follows:

1. Nature (N) selects the terrorist’s type from M, P.2. In the first period, terrorists select their signal from the set a, A, where A a as

defined above. The dotted lines connecting nodes in Figure 1 are the government’s(G) information sets, which are labelled according to the signal the governmentreceives: GA or Ga.

3. Upon receiving this signal, the government either concedes (C) to the terrorists or holdsfirm (D).

4. If the government does not concede, terrorists combine the remainder of theirfirst-period resources with their second-period resources. How these resources are putto use depends upon the terrorist’s type/preferences, as specified by their payoffs.Militants (M-types) will expend all available resources in a second-period attack, whileP-types will use them towards non-violent means.

Payoffs are expressed symbolically as P for P-types, M for M-types, and G for thegovernment. They are calculated as follows:

1. Each terrorist type receives resource level R in each period.2. The government faces the costs of the attack levelled against it in the first period: A

or a.

14 Kevin Siqueira, ‘Political and Militant Wings within Dissident Movements and Organizations’, Journal ofConflict Resolution, 49 (2005), 218–36.

15 Daniel G. Arce and Todd Sandler, ‘Counterterrorism: A Game-Theoretic Analysis’, Journal of ConflictResolution, 49 (2005), 183–200; Todd Sandler and Kevin Siqueira, ‘Global Terrorism: Deterrence versusPreemption’, Canadian Journal of Economics, 39 (2006), 1370–87. In Overgaard, ‘The Scale of Terrorist Attacksas a Signal of Resources’, the act of not conceding is described as a response, which we interpret as an increaseddefensive posture.

Page 445: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

578 A R C E A N D S A N D L E R

Fig. 1. Incomplete information about terrorists’ preferences

3. If the government concedes, it incurs second-period costs of S 0. Terrorists receivea payoff equal to their net remaining funds: R A or R a, plus vR, where v is the‘victory’ parameter that increases the value of second-period resources relative to thosediscounted by or . Essentially, v is a third discount factor.

4. If the government does not concede:

i. P-types receive R A R or R a R, the discounted present value of theirremaining resources put to political use.

ii. M-types receive a benefit equal to the discounted value of their remaining resources,which they expend in a second-period attack. Subsequent to an A-level attack, thispayoff is discounted by because the government responds to such an attackwith increased defensive policies. The discounted value of the two attacks istherefore A (R A) R 2R (1 )A. Similarly, after an a-attack,M-type terrorists gain 2R (1 )a. In either case, the government’s payoffs aredefined by the zero-sum nature of attacks, so that they lose an amount equal to theterrorists’ payoff.

The critical levels of belief in this model correspond to the conditional probabilitiessuch that the government concedes at information sets GA and/or Ga. This occurs whenits belief that it is facing an M-type meets or exceeds a threshold level. Belief i

corresponds to nodes i 1, 2, 3, 4, where 1 2 1, 3 4 1. G concedes at GA ifits expected payoff is such that:

EG[CGA] A S A2 [2R (1 )A]1 EG[DGA]; i.e., if

1 S/(2R A) LA. (1)

When the government G experiences an A-level attack, it will concede provided that itsbelief that it is facing an M-type exceeds the lower bound LA given in Condition 1. The

Page 446: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Terrorist Signalling and the Value of Intelligence 579

lower is LA, the more likely that a concession will occur. From Condition 1, we haveLA/S 0. As the costs of concession increase, the government is less likely to concede.

Lapan and Sandler recognized that the value of S may be determined through adeclaration or commitment by the government never to concede to terrorists’ demands.16

Such a commitment has the effect of reducing the government’s options, because, as Sincreases, it becomes less likely that the government will concede regardless of the priorprobability of M-types.17 The beliefs embodied in Condition 1 also imply that LA/R 0,so that the government is more apt to concede as terrorists’ resources increase. Thisfollows because a larger R means that the government incurs greater damage from amilitant group’s second-period attacks if the government holds firm. Condition 1 alsoimplies that LA/(/) 0. Recall that at GA the D strategy corresponds to an increasein the government’s defensive posture relative to that at Ga, leading to a greater discountingof second-period attacks where . As defensive measures are more effective, /increases; consequently, the government must be more certain that it is facing an M-typeto concede. We denote the reverse of the inequality in Condition 1 as 1, indicating thecondition on beliefs such that the government does not concede at GA.

Similarly, the government concedes at Ga if EG[CGa] a S a3 [2R (1 )a]4 EG[DGa], which indicates the following threshold:

4 S/(2R a) La. (2)

The signs on La/S and La/R are the same as those associated with LA for identicalreasons. Here, the comparative effect of versus , which applied for LA, does not comeinto play because it is only through an attack of level A R* that the government increasesits defensive posture (in relative terms), resulting in discount factor . Finally, Condition 2 denotes the condition under which Condition 2 is reversed, in which case thegovernment selects D at Ga.

S IGNALLING EQUILIBRIUMS AND THE VALUE OF INTELLIGENCE

Once again, incomplete information raises the concerns that politically motivated terroristsmay be seeking a quick resolution to their grievances by posing as militant types, and/ormilitant types have purposely avoided spectacular attacks to forestall a heightened focuson security by their targets. As an example of the latter phenomenon, Enders and Sandlerpresciently stated that authorities should focus on intelligence and prophylactic measuresin anticipation of upturns in terrorist incidents involving casualties following fairly lengthylulls of greater than two years.18 By 9/11, the US was well beyond a two-year lull. In thisway, the value of intelligence that we investigate corresponds to eliminating or reducingthe occurrence of ex post regret associated with misreading terrorists’ true intentions. Onesuch occurrence is ex post P-regret, meaning that the government concedes to P-types,which, under complete information, the government would hold firm against. Another

16 Lapan and Sandler, ‘Terrorism and Signalling’. The Irangate hearing following the Reagan administration’sarms-for-hostages negotiations was an effort by the US Congress to raise S to subsequent administrations.

17 This is akin to a sense of government resolve – see Robert Powell, ‘The Dynamics of Longer BrinkmanshipCrises’, in Peter C. Ordeshook, ed., Models of Strategic Choice in Politics (Ann Arbor: University of MichiganPress, 1989), pp. 151–75.

18 Walter Enders and Todd Sandler, ‘Is Transnational Terrorism Becoming More Threatening? A Time-SeriesInvestigation’, Journal of Conflict Resolution, 44 (2000), 307–32.

Page 447: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

580 A R C E A N D S A N D L E R

possibility is ex post M-regret, where, under complete information, the government wouldhave preferred either concession or increased security in the face of escalated militantattacks. Clearly, either type of ex post regret is only possible in a pooling equilibrium whereboth types send the same signal. Consequently, we begin with an examination of thepooling equilibriums, followed by a characterization of the separating equilibrium whereeach type sends a different signal.

An A-pooling equilibrium occurs under Conditions 1 and 2 so that the government’s(local) strategy at GA is C and at Ga it is D. Together, these strategies comprisethe behavioural strategy CD. Henceforth, we adhere to the convention of listingthe government’s strategy at GA first and its strategy at Ga second. Given Conditions 1and 2, P-types undertake an A-attack in period 1 if P[A, CD] R A vR R a R P[a, CD]. This simplifies to

R (A a)/(v ), (3)

thereby defining a resource constraint to be met for this equilibrium to hold.Furthermore, for M-types to engage in an A-attack, it must be the case thatM[A, CD] R A vR 2R (1 )a M[a, CD]; i.e.,

R [A (1 )a]/[(1 ) (v )]. (4)

Information set Ga is not reached in an A-pooling equilibrium. Nevertheless, actionsoff-the-equilibrium path must be justified in terms of the consistency and rationality ofthe set of beliefs and actions specified there. A set of beliefs that supports D at Ga is thatthe government believes that it is more likely to be facing a P-type at Ga. This is consistentwith the upper bound on 4 given in Condition 2, implying that the government’s beliefthat it is facing an M-type is low. Furthermore, P-types would send the out-of-equilibriumsignal a 0, implying that Condition 3 rather than Condition 4 is the binding constrainton R. Finally, the A-pooling equilibrium occurs with ex post P-regret because thegovernment is potentially conceding to P-types to whom it would not have conceded undercomplete information. For purposes of comparison, all equilibrium conditions aresummarized in Table 1.

An example of this pooling equilibrium is the internationalization of the Palestiniancause.19 The premier example of a Palestinian-based spectacular (A-level attack) is the1972 Munich Olympics hostage incident staged by the Black September PLO offshoot,resulting in the death of eleven Israeli Olympian competitors and five terrorists. Whatactually occurred in the aftermath of the ill-fated attempt to concede to the Black Septemberterrorists is entirely consistent with the payoffs that follow information set GA. TheEuropean reply to this security failure was immediately to establish special anti-terroristunits that successfully acquitted themselves in subsequent hostage incidents (for example,Grenzschutzgruppe Neun’s rescue of a hijacked Lufthansa aeroplane at Mogadishu,Somalia on 18 October 1977),20 thereby implying a discount factor of for futureattacks. During the same time period, the PLO was granted special observer status in theUnited Nations, and, by the end of the 1970s, the PLO had formal diplomatic relations withmore countries than did Israel, consistent with the vR component of payoffs.21

19 Hoffman, Inside Terrorism, pp. 67–86.20 Lufthansa flight 181, a Boeing 737, was hijacked en route from Mallorca to Frankfurt on 13 October 1977.

The plane was stormed in Mogadishu, following stop-overs in Rome, Larnaca, Dubai and Aden.21 Hoffman, Inside Terrorism, p. 75.

Page 448: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Terrorist Signalling and the Value of Intelligence 581

TABLE 1 Summary of Equilibriums

Conditions on Value ofEquilibrium beliefs Forms of regret intelligence

A-pooling 1 S/(2R A) Ex post P-regret:C at GA; D at Ga 4 S/(2R a) potential S

concessionsto P-types

a-pooling 1 S/(2R A) Ex post P-regret:C at GA; C at Ga 4 S/(2R a) potential S

concessionsto P-types

a-pooling 1 S/(2R A) Ex post M-regret:D at GA; D at Ga 4 S/(2R a) M-types escalate (2R a S)R [(1 )A (1 )a]/2( )

Separating EquilibriumD at GA; D at Ga 1 1 None actions makeR [(1 )A (1 )a]/2( ) 3 1 information

complete.

Next, consider an a-pooling equilibrium with concession. When Conditions 1 and2 hold, the government’s strategy is CC.22 It follows that P[a, CC] P[A, CC] andM[a, CC] M[A, CC] because A a. For example, instead of increasing counterterror-ism measures (inducing ), governments may accommodate terrorists.23 Indeed, severalEuropean nations (France and Greece in particular) have allegedly accommodated M-typesin order to tacitly obtain immunity from attacks.24 Furthermore, Overgaard argued that attimes concessions made to the ANC, IRA and PLO can be understood in terms of ex postP-regret, because these organizations’ commitment to their military wings is not wellunderstood.25

In the prior literature on signalling and terrorism, ex post regret occurred under anA-pooling equilibrium in Lapan and Sandler and an a-pooling equilibrium in Overgaard.26

Neither type of pooling equilibrium took place in the other model, owing to differencesin preferences posited for terrorists in each case. As either type of pooling equilibrium canresult in our model, we are able to measure and compare the value of intelligence in aunified framework. Specifically, the value of intelligence under P-regret is the difference

22 Beliefs consistent with Condition 1 do not violate forward induction as M-types have the greater incentiveto send an out-of-equilibrium signal of A.

23 See the discussion in Dwight R. Lee, ‘Free Riding and Paid Riding in the Fight against Terrorism’, AmericanEconomic Association Papers and Proceedings, 78 (1988), 22–6.

24 For example, a revolutionary organization, known as the 17 November, had an alleged arrangement withthe Greek government, whereby the terrorists directed attacks against non-Greek targets in return for sanctuary,see The Economist, issue no. 1831 (London: The Economist, 1984). From 1975 until the summer of 2002, the17 November operated with impunity, carrying out 146 attacks and twenty-two assassinations. A failed bombingattempt on 22 June 2002 at the Port of Piraeus in Athens led to the first-ever arrest for the group.

25 Overgaard, ‘The Scale of Terrorist Attacks as a Signal of Resources’.26 Lapan and Sandler, ‘Terrorism and Signalling’; Overgaard, ‘The Scale of Terrorist Attacks as a Signal of

Resources’. In the former study, ex post regret occurred when conceding to a low-resource type that initially attacksat a high (A) level.

Page 449: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

582 A R C E A N D S A N D L E R

between the government’s payoff for conceding to a P-type, as occurs in equilibrium, andits payoff for not conceding, as happens under complete information.

RESULT 1. The value of intelligence under P-regret is S, regardless of whether anA-pooling or a-pooling equilibrium occurs.

This result holds because the difference between not conceding or conceding to a P-typeis S in either pooling equilibrium. As S is partially determined by the government’s publicstance towards concessions, it follows that a hard-line government is going to place greatervalue on intelligence because concessions implicitly increase the cost of P-regret. This alsoholds for terrorists bent on the annihilation of their targets, as S is commensurately high.This justifies US investments in intelligence and the creation of the DHS after 9/11. It isalso consistent with Israeli investment in intelligence because of its perpetual dealings withmilitant terrorists who deny Israel’s right to existence.

Our model also identifies a new type of regret: ex post M-regret, where the governmentholds firm at either information set and is subsequently attacked in the second period byM-types. In this equilibrium, Conditions 1 and 2 hold, implying that the priorprobability of an M-type must be low.27 It is clear that P[a, DD] P[A, DD] becauseA a. In addition, M[a, DD] 2R (1 )a 2R (1 )A M[A, DD] requiresthat

R [(1 )A (1 )a]/2( ). (5)

This condition increasingly holds as the expected level of deterrence after an A-levelattack increases ( decreases), implying that if M-types expect a large response to afirst-period attack, then they will rationally make an intertemporal substitution favouringa second-period attack. This is a novel unintended consequence of terrorist deterrence(hardening targets). For example, elsewhere we have examined the public aspects ofcounter-terrorism policy and found that deterrence creates a public cost for those who donot harden targets, resulting in inefficiencies akin to the tragedy of the commons.28 Here,(anticipated) deterrence does not actually eliminate attacks, but instead leads to strategicintertemporal substitution of attacks, so that terrorists can catch the government lessprepared when launching their offensive.

The film, The Battle of Algiers, poignantly depicts this escalating pattern of tactics,which does not occur in prior signalling models. The Front de Liberation Nationale (FLN)began with a policy of weeding marginal revolutionary elements – drunks and prostitutes– out of the Casbah district, something the imperial French probably did not even interpretas terrorism; i.e., a 0. Indeed, Hoffman argued that prior to the French execution (byguillotine) of two FLN members, the terror campaign had been non-lethal by design –directed against inanimate symbols of French rule such as government offices andbuildings, military cantonments and police stations, but not deliberately against people.29

This was followed by escalating tactics such as shooting police, bombing civilian localesand conducting a general strike.30

27 As P-type have a payoff off the equilibrium path, R A vR, that is greater than its equilibrium payoff, thesebeliefs do not violate forward induction.

28 Arce and Sandler, ‘Counterterrorism’.29 Hoffman, Inside Terrorism, p. 62.30 The film is historically accurate since European civilians were only targeted after a bomb exploded in the

predominately Arab Casbah district (presumably by rogue French officials) in response to FLN activities againstFrench gendarmes.

Page 450: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Terrorist Signalling and the Value of Intelligence 583

A novel aspect of this pooling equilibrium is that Condition 2 places an upper-boundrestriction on terrorists’ resources for actions on the equilibrium path.31 Given limitedresources, M-types may rationally choose to attack at level a rather than A, and attack withgreater force (amassed resources) in the second period. The larger second-period attackis also preferred because it does not induce the government to initially harden targets theway an A-level attack would. This outcome is consistent with empirical evidence ofintertemporal substitution of attacks.

When Condition 5 holds, M-regret occurs under the auspices of an a-poolingequilibrium. In contrast to P-regret, M-regret is defined in terms of the opportunity costof one of two forgone alternatives. First, under complete information the governmentprefers to concede at node 4, rather than not concede. This is an intelligence concernregarding incomplete information about the type of terrorists the government is facing;here, the value of intelligence is the difference in the government’s payoffs for conceding(C) versus not conceding (D) at node 4; i.e., (2R a S). Under this form of M-regret,the value of intelligence is now a decreasing function of S. A tough public stance againstterrorists is tantamount to a commitment to weather subsequent attacks by M-types.Because R now enters into the value of intelligence, a policy of freezing assets (limitingR) reduces this value of M-regret. For example, a great deal of ETA assets were frozenfollowing 9/11, thereby decreasing both the Spanish government’s willingness to concedeto ETA and ETA attacks themselves. Any proactive counter-terrorism policy that curbsterrorist resources (such as, destroying terrorist training camps, capturing terrorists orinfiltrating groups) will also reduce the value of M-regret. Conversely, terrorists with lessrestricted access to a large amount of assets require a commensurately larger amount ofintelligence (for example, Abu Nidal Organization in the 1980s). Thus, the Tamil Tigersrun a commercial shipping network, 95 per cent of which is estimated to be the transportof legitimate commercial materials.32 An inability to freeze this source of income raisesthe value of intelligence about the Tamil Tigers in lieu of M-regret. Insufficientinternational proactive measures mean that R is high, so that M-regret leads to a highervalue of intelligence.33

Alternatively, a government might prefer to harden its targets at node 4, rather thanconcede.34 This is a security concern. Hardening targets at node 4 results in a payoff ofG 2R (1 )a, where discount factor replaces for hardened targets. Thedifference between the -based payoff and original -based payoff at node 4 is( )(2R a), which establishes the degree of security concern. Determining whichform of regret is the greater forgone alternative is crucial for formulating counterterrorismpolicy. To wit:

RESULT 2. M-regret is more of a security than an intelligence concern if S (2R a).

This result is novel because it gives a prescription for counter-terrorism policy to avoidM-regret. If the inequality in Result 2 holds, then policy should be focused on hardening

31 Condition 2 holds for the A-pooling equilibrium with P-regret, but Condition 2 constrains thegovernment’s belief at Ga, which is off the equilibrium path, and therefore met by 4 0, where no restrictionon R results.

32 Peter Chalk, ‘Liberation Tigers of Tamil: EELAM’s (LTTE) International Organization – A PreliminaryAnalysis’, Commentary No. 77, Canadian Intelligence Service, Ottawa, Canada, 2000.

33 Such insufficient measures are identified by Todd Sandler, ‘Collective versus Unilateral Responses toTerrorism’, Public Choice, 124 (2005), 75–93.

34 We thank an anonymous referee for this suggested extension.

Page 451: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

584 A R C E A N D S A N D L E R

targets – a security concern. For example, if the government’s resolve is high, therebyincreasing S, then security should be commensurately raised regardless of the size of pastterrorist attacks (i.e., even in the absence of a spectacular). If, by contrast, the inequalityis reversed, then security is less of a policy concern than intelligence. Moreover,intelligence should be focused on a judicious assessment of militant terrorists’ demandsto induce them to abandon violence. Indeed, as the left-hand side of the inequality in Result2 is the value of information under P-regret, S, this result shows that such a focus runsthe risk of P-regret. Result 2 recognizes the trade-off between P-regret and M-regret atinformation set Ga.

Finally, when Condition 5 is reversed, a separating equilibrium is possible whereM-types engage in an A-attack, P-types execute an a-attack, and the government does notconcede to either type. This corresponds to the Conditions 1, 2 and 5. In thisscenario, there is no regret because the government recognizes that M-types are makingthe A-attack so that signalling acts as a perfect substitute for intelligence. Indeed, followingBayes’s rule, we have 1 1 and 3 1.

Thus far, we have interpreted a policy of asset freezing as reducing R, for which theCondition 5 for a separating equilibrium is increasingly met. Militants will attack moreheavily in the first period, anticipating that their resources may be frozen thereafter.Moreover, P-types will set a 0 so as to avoid having their assets frozen and maximizepolitical benefits. If, in addition, M(A, DD) P(a, DD), then this separating equilibriumcaptures the publicity rationale for terrorism. Many organizations (for example, PLO,Hezbollah and Hamas) have turned militant because of difficulty in creating recognitionof their cause through traditional political channels. If the government is not going toconcede, terrorism has the effect of greatly increasing public awareness.

This separating equilibrium and the a-pooling equilibrium with M-regret are essentiallytwo sides of the same coin. In anticipating a response, militants will either attack moreheavily in the first period, as is the case in the separating equilibrium, or they will bidetheir time and attack more heavily in the second period. Which side of the coin comes updepends upon whether Condition 5 or 5 holds. As either condition is independent of thegovernment’s public stance towards conceding (S), all that matters is the (anticipated)reaction to an attack () and the ability to reduce assets (R). The greater the level ofdeterrence and, thus, the lower is , the more likely that Condition 5 holds, implying apooling equilibrium with ex post M-regret and escalating attacks. More successful terroristorganizations are able to determine an effective level of violence that is at once ‘tolerable’for the local populace, tacitly acceptable to international opinion and sufficientlymodulated not to provoke massive government crackdown and reaction.35 In contrast, theTupamaros in Uruguay was a terrorist group whose level of violence was unacceptable forthe local populace and a government offensive destroyed them. The Italian Red Brigadesmet a similar fate following the 17 December 1981 kidnapping of General James LeeDozier, the senior US officer at NATO’s southern European command. Callous acts, suchas the 6 May 1978 murder of the former premier Aldo Moro, turned public opinion againstthe Red Brigades. The trade-off inherent in Conditions 5 and 5 endogenously definesthe edge of brinkmanship as it relates to the escalating behaviour of militant terrorists.

If, moreover, is time-variant, then our result is indicative of Faria’s terror cycles, wherethere is an inverse relationship between government deterrence (via law enforcement inFaria) and terrorist activities.36 We offer no formal repeated-game analysis, but, by

35 See Hoffman, Inside Terrorism, p. 162.36 Joao Ricardo Faria, ‘Terror Cycles’, Studies in Nonlinear Dynamics and Econometrics, 7 (2003), article 3.

Page 452: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Terrorist Signalling and the Value of Intelligence 585

extension, a non-stationary suggests two types of cycles through a state-dependentdetermination of whether Condition 5 or 5 holds. This is consistent with the empiricalresults that identified two cyclical components of terrorism: a high-activity and alow-activity series which are likely by-products of intertemporal substitution ofresources.37 Terrorists’ high-activity series cannot be sustained, akin to the separatingequilibrium in our model. In contrast, the low-activity series can be escalated, againconsistent with an a-pooling equilibrium with M-regret. Previous signalling models werenot indicative of such empirical findings.

The M-regret and separating equilibrium also share an important message about thedifference between successful counter-insurgency tactics and the resolution of terrorism.In either case, military tactics reduce , but may buttress the equilibrium conditions underwhich M-types attack in the second period. Defensive postures affect the magnitude, butnot the occurrence of signalling equilibriums with second-period attacks. This reinforcesthe definition of terrorism in the opening of this article, particularly when terrorists’ goalsare religious/ideological. Tactical counter-terrorism policies that are orthogonal to thesegoals do not temper terrorist actions, but instead encourage intertemporal substitution,which then places a further premium on intelligence.

CONCLUDING REMARKS

In a recent paper, Hoffman and McCormick characterized terrorism as a signalling gamewhere target governments are ill-informed about terrorist groups’ ‘objectives, resources,and commitment’.38 Given the short-term nature of most terrorist groups, with new groupsappearing each year and others splintering, governments are faced with the never-endingchore of trying to assess the threat of terrorist groups under incomplete information. Amiscalculation of this threat can either mean that a government underestimates a group’smilitancy and comes to regret its own resolve to hold firm, or else that a government failsto recognize a group’s political intent and comes to regret its concessions. The rise offundamentalist terrorism means that both militant and political groups are prevalent in thepost-Cold War era.39 This diversity in intent and resolve of terrorist groups means thatregret (i.e., responding inappropriately to terrorist demands) may have greater con-sequences for governments now than in the 1970s and 1980s when groups were morehomogeneous and less militant on average. Thus, the value of intelligence, which limitsregret, has increased in recent time.

By introducing a model that unifies the existing signalling analyses of terrorism, ourarticle offers a framework that is more descriptive of the complex world of post-9/11terrorism with militant and political terrorist groups co-existing. An important innovationis to allow for defensive and proactive policies. Defensive actions can motivateintertemporal substitutions by militant groups that strategically hold back on attacks tocatch a target government less aware. Proactive measures can reduce R and, thereby,influence the pooling and separating equilibriums. Government resolve, as reflected byhigh concession costs, also affects these equilibriums. We also give a characterization of

37 Enders and Sandler, ‘Patterns of Transnational Terrorism, 1970–1999’; Enders and Sandler, ‘TransnationalTerrorism 1968–2000’.

38 Hoffman and McCormick, ‘Terrorism, Signaling, and Suicide Attacks’, p. 244.39 Hoffman, Inside Terrorism.

Page 453: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

586 A R C E A N D S A N D L E R

optimal (regret-minimizing) counter-terrorism policy that is based on the relationshipbetween terrorist resources and government resolve.

Our article demonstrates the trade-off between hardening of targets and intelligence.Recent game-theoretic work showed that international co-operation to shore up weak links(i.e., attractive soft targets) will be woefully inadequate owing to free-riding incentives.40

As a consequence, the value of intelligence remains high in the face of al-Qaeda’s globalnetwork. Moreover, other recent work highlighted the inadequacy of proactive policies bythe international community to destroy terrorist assets with respect to global terroristnetworks.41 This, in turn, keeps terrorists’ resources high, thereby raising the valueof intelligence in a world besieged by heterogeneous terrorist threats. The inadequacy ofinternational co-operation in terms of defensive and proactive counter-terrorism elevatesthe value of intelligence, given insufficient knowledge on the nature of the terrorist threat.

40 Sandler, ‘Collective versus Unilateral Response to Terrorism’.41 Arce and Sandler, ‘Counterterrorism’.

Page 454: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

CBRN Attack Perpetrators: An EmpiricalStudy

Kate Ivanova

The Ohio State University at Newark

Todd Sandler

University of Texas at Dallas

Based on zero-inflated negative binomial regressions applied to theMonterey weapons of mass destruction data, this article assesses thefuture risks from chemical, biological, radiological, and nuclear (CBRN)terrorism. Once the threshold for CBRN attacks is surpassed, furtherattacks arise: the expected number of CBRN incidents is over one and ahalf times higher than past events. Religious cults and groups with atransnational orientation pose the largest CBRN threat to society. Otherthings constant, nationalists ⁄ separatists and religious fundamentalistsare not more apt to engage in CBRN terrorism than compared to‘‘other groups.’’ Democratic and corrupt regimes are the likely venuesfor CBRN incidents. Based on past incidents, rich countries are especi-ally vulnerable to CBRN terrorism. Thus, recent actions by the U.S.Department of Homeland Security to put more resources into guardingagainst CBRN attacks appear sound. This study indicates that nonfunda-mentalist terrorists also present CBRN risks to democracies. From a for-eign policy viewpoint, CBRN terrorism is not a problem that richdemocratic countries can confront alone, because the terrorists willmove to where there is the least vigilance. Our study indicates the likelyperpetrators and types of attacks that nations must cooperate to avoid.

Since the hijackings on September 11, 2001 (henceforth, 9 ⁄ 11) and the Tokyosubway sarin attacks on March 20, 1995, there is a worry that terrorists will resortto chemical, biological, radiological, and nuclear (CBRN) attacks (Roberts 2000;Tucker 2000; Gressang IV 2001). Such attacks would provide a means for surpass-ing the ‘‘media bar’’ imposed by 9 ⁄ 11, where future terrorist incidents must besufficiently catastrophic or costly to warrant media coverage beyond that of 9 ⁄ 11,with its near 3,000 deaths. The U.S. Department of Homeland Security (DHS)is taking the use of biological agents as a serious terrorist threat by allocating

Author’s Note: Kate Ivanova is an Assistant Professor; Todd Sandler is the Vibhooti Shukla Professor of Economicsand Political Economy. The authors thank Gary Ackerman of the Monterey Institute of International Studies forproviding the WMD data. We also thank the School of International Relations, University of Southern California,for funding data acquisition on rule of law and corruption. We have profited from the comments of three anony-mous referees. This research was partially supported by the U.S. Department of Homeland Security (DHS) throughthe Center for Risk and Economic Analysis of Terrorism Events (CREATE) at the University of Southern California,grant number N00014-05-0630. However, any opinions, findings, and conclusions or recommendations are solelythose of the authors and do not necessarily reflect the views of the DHS.

2007 International Studies Association.Published by Blackwell Publishing, 350 Main Street, Malden, MA 02148, USA, and 9600 Garsington Road, Oxford OX4 2DQ, UK.

Foreign Policy Analysis (2007) 3, 273–294

Page 455: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

billions of dollars to Project BioShield that stockpiles vaccines to counter a biolo-gical attack (US [DHS] 2005). DHS Secretary Michael Chertoff stated that def-ense against CBRN terrorism and other potentially devastating terrorist incidentsis an essential priority of the DHS budget in the near-term (Chertoff 2005).

Terrorist experts, however, disagree about the threat posed by CBRN terror-ism. One group of experts stresses a host of deterrents to the use of CBRN weap-ons that include losing constituency support and funding, drawing a massiveretaliation (e.g., U.S. actions against the Taliban and al-Qaida after 9 ⁄ 11), sur-mounting the weaponization hurdle, accepting the handling risks, and ignoringthe cost-effectiveness of conventional terrorist attacks (Rapoport 1999; Dishman2001; Enders and Sandler 2006: 251–252). For example, Rapoport (1999) indi-cates that, on a per-incident basis, conventional terrorist attacks kill more peoplethan CBRN attacks.1 Another group of experts highlights factors that promotesuch attacks. These factors include the availability of information and expertise,heightened frustrations of terrorists, demonization of a target population, deep-seated grievances of perpetrators, and the possession of a millenarian, apocalyp-tic, or messianic vision (Vegar 1998; Roberts 2000; Simon and Benjamin 2000;Blum, Asal, and Wilkenfeld 2005; Enders and Sandler 2006:253).

Experts also differ on the likely perpetrator of CBRN incidents if such attackswere to take place. Many researchers characterize religious cults and religiousfundamentalists as the likely users of CBRN weapons, particularly when thesegroups address an ethereal audience, emphasize hatred of nonbelievers, and dis-play an inapposite relationship (see, especially, Gressang IV 2001; but also seeHoffman 1995; Betts 1998; Cameron 1998; Dishman 2001; Palfy 2003; Post2005). In contrast, other researchers argue that nationalists ⁄ separatists and othersecular actors (including loners) presented the greatest CBRN risk in the pastand will likely present the largest such risk in the future (Rapoport 1999; Tucker2001; Sinai 2005). In many ways, assessing CBRN risks and the likely perpetratorsis an empirical question that requires studying past events, because there arecompelling arguments on both sides of these debates.

The primary purpose of this paper is to apply statistical inferential proceduresto ascertain the likely perpetrators of CBRN terrorist attacks, based on data onCBRN incidents collected by the Monterey Institute of International Studies(2005). Although we suggest some logically drawn hypotheses, our main task isto ascertain which side of competing hypotheses in the literature is supported bythe data gathered to date on CBRN incidents. In addition, we determine if pastCBRN incidents are a determining factor of future attacks—that is, does the pastportend the future for CBRN attacks? We also investigate whether a terroristgroup’s transnational orientation supports its proclivity to employ CBRN attacks.For each class of potential perpetrators, we relate regime characteristics (i.e.,democracy, rule of law, and corruption) to its likely use of CBRN weapons in ter-rorist attacks. We find that, among groups, religious cults pose the greatestCBRN threat to date. Other things constant, a transnational orientation (i.e.,engaging in transnational terrorist attacks) also increases a group’s reliance onCBRN attacks. Past CBRN incidents increase the likelihood of future CBRNattacks for all perpetrators as a group and nationalists ⁄ separatists as a cohort.For each type of perpetrator, democracy increases the risks of CBRN attacks,while corruption also heightens this risk. Wealth, as measured by income percapita, augments the likelihood of CBRN incidents. These findings can informgovernments about likely threat and perpetrators of CBRN attacks.

The current study differs in a number of ways from a recent paper by Ivanovaand Sandler (2006) that also relied on the Monterey Institute’s weapons of mass

1 Ivanova and Sandler (2006) note that the average conventional terrorist incident killed one person, while theaverage CBRN attack killed just a half a person.

274 CBRN Attack Perpetrators

Page 456: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

destruction (WMD) dataset (henceforth, called Monterey WMD data). This ear-lier study primarily presented odds ratio tests to investigate correlates to CBRNattacks; the current study presents a variety of regressions that explain the vari-ation in CBRN attacks. Unlike the earlier study, the current paper identifiesinfluences on various cohorts of potential CBRN terrorists. For example, we indi-cate how regime characteristics affect a cohort’s likely use of CBRN weapons. Inaddition, the current study investigates the underlying dynamics of CBRN attacksby ascertaining how past CBRN incidents affect current CBRN incidents. Eachcohort of perpetrators is analyzed separately, thereby displaying how regimecharacteristics can impact types of perpetrators differently.

The body of the paper contains five sections. In the first section, essential defi-nitions and concepts are given, along with a discussion of the datasets and varia-bles. Justifications are also indicated for examining CBRN incidents in isolationfrom traditional terrorist incidents. The second section puts forward the sixempirical hypotheses that underlie the empirical study. The relationship betweengroup type and CBRN terrorism is investigated in the third section. Followingthe presentation of the statistical model, we provide and discuss the statisticalresults. For alternative cohorts of perpetrators, we investigate the influence ofregime type, country wealth, and past CBRN terrorist incidents on current CBRNincidents in the fourth section. Conclusions and policy implications are drawn inthe final section. Our study is in the spirit of Ackerman’s (2005:141) recommen-dation for careful empirical analysis of past CBRN incidents to identify potentialterrorists and the factors that may determine their use of CBRN terrorism. Suchan exercise can inform intelligence and law enforcement agents, while helpingto formulate public policy.

Definitions, Datasets, and Variables

Terrorism is the premeditated use or threat of use of violence by individuals orsubnational groups against noncombatants to obtain political or social objectivesthrough intimidation of a large audience beyond that of the immediate victim.The presence of a political or social motive is a key ingredient of terrorism. Incontrast, criminal acts—for example, kidnappings for ransom, murder, or extor-tion—are not terrorist acts when there is no political or social agenda. Our defi-nition excludes state terror by identifying the terrorists as individuals orsubnational groups. Noncombatants are viewed as targets of terrorism, so thatroadside bombs against an occupying military force are not classified as terroristevents. To pressure a targeted country, terrorists try to create a general atmo-sphere of anxiety where everyone feels at risk. If terrorist attacks appear to berandom, then this elevates fear and a sense of general vulnerability. Govern-ments then must guard everywhere to reassure citizens that they are safe. Byresorting to mass-casualty terrorism (e.g., 9 ⁄ 11), terrorists achieve even greateranxiety that necessitates more elaborate and expensive countermeasures. Even asuggestion of a CBRN attack cajoles a liberal democracy, entrusted with protect-ing lives and property, to spend massive amounts on homeland security to coun-ter such attacks. Thus, there are circumstances where some terrorists may resortto such unconventional measures despite inhibitors, mentioned earlier.

Terrorist attacks are also distinguished by their national ⁄ international implica-tions. Domestic terrorism is homegrown with consequences for just the hostcountry, its institutions, citizens, property, and policies. For domestic terrorism,the victims, perpetrators, and audience are all from the venue country. By thesecriteria, the anthrax letter attacks following 9 ⁄ 11 was domestic terrorism, sincethe unknown terrorist appears to have been a U.S. citizen and the other criteriafor a domestic incident are met. In contrast, transnational terrorism involvesperpetrators or victims from two or more countries and has international

275Kate Ivanova and Todd Sandler

Page 457: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

implications. The Madrid commuter train bombings of March 11, 2004 representa transnational terrorist incident because the perpetrators were foreign, as weresome of the victims. The 9 ⁄ 11 hijackings were transnational terrorist incidents,whose financial implications were felt on stock markets worldwide (Chen andSiems 2004). Moreover, 9 ⁄ 11 involved foreign perpetrators whose attacks harmedvictims from over 80 countries.

At the outset, we must be clear about the relationship between CBRN andWMD terrorism. The terrorism literature has in a misleading fashion character-ized WMD terrorism as terrorist events employing any mine, bomb, or devicethat releases chemicals, biological agent, or radiation in sufficient amount tocause deaths (Bunker 2000; Blum et al. 2005). There is no requirement in the lit-erature that mass casualties must result; the mere use of a CBRN device is suffi-cient to qualify as WMD terrorism. In practice, CBRN terrorism may kill orinjure many or few and, to date, have killed few. The anthrax letters in the Uni-ted States in 2001 murdered 5 and sickened 22 individuals, while the sarin attackon the Tokyo subway killed twelve and sickened 1,038 people. Although theMonterey WMD data equates CBRN and WMD incidents, as does much of the lit-erature, we resist this practice and do not refer to CBRN incidents as WMDevents. Rather, we refer to CBRN incidents when CBRN substances are soughtafter, acquired, or used for a terrorist attack.

To date, much larger casualty totals have been associated with some conven-tional terrorist events (e.g., 9 ⁄ 11 and the bombings of the U.S. embassies inKenya and Tanzania on August 7, 1998). Nevertheless, it is important to analyzeCBRN terrorist incidents, as they have the potential to involve large numbers ofcasualties and cause billions of dollars in damage (i.e., a dirty bomb in a denselypopulated city). Most conventional terrorist attacks do not have the same poten-tial to cause mass casualties or significant long-term expenses from cleanup. Thestudy of CBRN incidents as a separate phenomenon provides insights as to per-petrators and likely venue, such as rich liberal democracies. If CBRN and stand-ard terrorist incidents are combined into a single dataset, then thedistinguishing characteristics of CBRN events—for example, the marginal impactof yesterday’s CBRN incidents on today’s incidents—will be lost to the analyst.These specific features can inform public policy—for example, DHS efforts toredirect resources to guarding against CBRN attacks.

The Monterey WMD terrorism database tracks politically and criminally moti-vated incidents by substate actors that involve the acquisition and ⁄ or deploymentof CBRN agents since 1900. Because we are only interested in the application ofCBRN materials for terrorist purposes, we apply rigorous criteria for the inclu-sion of CBRN incidents in our investigation. First, we include incidents from1988 to 2004, because before 1988 CBRN incidents were relatively rare so thatthere is little variation in CBRN events to explain by inferential statistics. Second,we cull criminally motivated incidents (classified as Type II in the MontereyWMD data) that do not constitute terrorism. Third, we only include those eventsthat involve: (i) the actual use of CBRN substances by the terrorists; (ii) a CBRNthreat combined with possession (or simply possession); and (iii) attemptedCBRN acquisitions supported by substantial evidence. All ‘‘plots only’’ instances,where the perpetrators never took steps to acquire the CBRN substances areculled from the data. Moreover, hoaxes, pranks, and threats are also removed. Ifthe terrorists claimed to have used CBRN material but no such substance wasused, the incident is a prank. When a similar claim is accompanied by a fake sub-stance, the act is a hoax. Cases, where CBRN use is threatened but there is noevidence of possession, attempted acquisition, or execution, are termed threats.Such incidents are removed from our sample, because they do not really repre-sent a CBRN risk even though they may result in inconvenience and costs. Thus,we only maintain about 30% of the Monterey WMD incidents.

276 CBRN Attack Perpetrators

Page 458: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Table 1 categorizes our 314-event sample by geography, type of agent (sub-stance), type of perpetrator, and delivery system. Asia and North America (theUnited States and Canada) experienced the greatest incidence of CBRN terror-ism for the sample period, followed by Europe. The remaining areas were associ-ated with many fewer CBRN events. The most common CBRN agent waschemical substances (205 incidents), which account for almost two-thirds of allsample incidents. Biological events are second with 42 instances that include twounsuccessful attempts by Aum Shinrikyo to sicken people with anthrax. Radio-logical events (26) involve serious efforts by terrorists to obtain radiologicalsubstances, as well as dirty bombs by Chechen rebels that did not explode. Theeight nuclear events mostly involved al-Qaida’s efforts to acquire enricheduranium or Chechens’ actions to secure nuclear material or nuclear devices fromex-Soviet facilities. In the latter case, the evidence is mixed as to whether theChechens ever obtained a ‘‘suitcase bomb’’ or an SS-20 missile. Perpetratorsinclude a variety of terrorists: unknown perpetrators are associated with 108 inci-dents or over a third of the sample. Nationalists ⁄ separatists engaged in 66 events,

TABLE 1. Descriptive Categories for Sample Drawn from Monterey WMD Terrorism Database

Category Subcategory Incidents

Region Asia 98Australia and Oceania 7

Europe 44Latin America 16

Middle East and North Africa 20Russia and newly independent states 29

sub-Saharan Africa 12United States and Canada 85

Worldwide 3Type of agent Biological 42

Chemical 205Combination 7

Nuclear 8Radiological 26

Unknown 26Type of group ⁄ perpetrator Criminal organization 1

Left-wing 29Lone actor(s) 23

Nationalists ⁄ separatists 66Religious cults 28

Religious fundamentalists 28Right-wing 9Single-issue 21Unknown 108

Type of delivery Aerosol ⁄ spray 19Casual ⁄ personal ⁄ direct contact 42Consumer product tampering 18

Explosive device 27Food ⁄ drink 22

Injection ⁄ projectile 19Jug ⁄ jar ⁄ canister 13Letter ⁄ package 46

Not applicable (case of possession) 45Reaction device 3

Water supply 12Ventilation system 1

Unknown 47

277Kate Ivanova and Todd Sandler

Page 459: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

while religious fundamentalists and cults together executed 56 CBRN incidents.Left-wing terrorists are associated with 29 CBRN incidents. Finally, Table 1 indi-cates the various delivery devices in which unknown (47), letter ⁄ package (46),and contact (42) garnered the highest frequencies.

Table 2 reports basic statistics for all identified groups for 1988–2004.2 Group-wise data are subdivided into five cohorts—nationalists ⁄ separatists, religious cults,religious fundamentalists, other groups (e.g., leftists), and all sample groups—toshowcase differences. In the top row, the number of groups for each cohort isindicated. The second row reports the number of transnational groups for eachcategory. Table 2 also lists the number of incidents, the number of injuries, andthe number of fatalities associated with CBRN activities by group cohorts. Foreach of these event characteristics, we report the mean, standard deviation, mini-mum (min) value, and maximum (max) value over the entire period.

According to Table 2, groups participating in CBRN events included 18nationalists ⁄ separatists, two religious cults, 14 religious fundamentalists, and 21other groups. Over half of the nationalists ⁄ separatists (11) and religious funda-mentalists (8) engaged in some transnational terrorist attacks, while less than athird of other groups (6) had perpetrated transnational terrorist attacks.Although nationalists ⁄ separatists and other groups had been responsible for two-thirds of CBRN sample incidents, religious cults had by far the highest mean(14). Of the 28 incidents, involving cults, Aum Shinrikyo was implicated in allbut a single incident, which was perpetrated by the Movement for the Restor-ation of the Ten Commandments of God, a doomsday cult in Kanungu, Uganda.

TABLE 2. Basic Statistics According to Group Identity (1988–2004)

Nationalists ⁄Separatists

ReligiousCults

ReligiousFundamentalists Others All

Number of groups 18 2 14 21 55Number of transnational groups 11 0 8 6 25Number of incidents 55 28 22 56 161

Mean 3.06 14.00 1.57 2.67 2.93Standard deviation 4.75 18.38 1.34 3.83 4.92Min 1 1 1 1 1Max 20 27 6 18 27

Number of injuries 58 11921 0 201 14512

Mean 3.22 596.00 0.00 9.57 26.38Standard deviation 11.97 842.87 0.00 27.65 161.15Min 0 0 0 0 0Max 51 1192 0 121 1192

Number of fatalities 38 8183 3054 39 12005

Mean 2.11 409.00 21.79 1.86 21.82Standard deviation 5.61 521.84 81.23 6.23 111.77Min 0 40 0 0 0Max 21 778 304 28 778

1With one outlier removed, total injuries for religious cults equal 153 with a mean of 76.5, standard deviation of108.19, and maximum of 153.2With one outlier removed, total injuries for all groups equal 412 with a mean of 7.49, standard deviation of 27.27,and maximum of 153.3With one outlier removed, total deaths for religious cults equal 40. Since only one group then remains, the meanand maximum are 40.4With one outlier removed, total deaths for religious fundamentalists equal 1 with a mean of 0.08, standard devi-ation of 0.28, and maximum of 1.5With two outliers removed, total deaths for all groups equal 118 with a mean of 2.23, standard deviation of 7.34,and maximum of 40.

2 Incidents involving unknown perpetrators or lone actors are not covered in these statistics.

278 CBRN Attack Perpetrators

Page 460: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Before a couple outliers are removed, cults were responsible for the largest num-ber of casualties for the sample period—1,192 of 1,451 injuries and 818 of 1,200deaths. After the removal of one injury incident and one death incident,3 thesefigures drop to 153 of 412 injuries and 40 out of 118 deaths. For religious funda-mentalists with the removal of an outlier, deaths drop from 305 to just 1.4 Gener-ally, CBRN incidents by religious cults and other groups involved the largestnumber of casualties, while these incidents by religious fundamentalists are likelyto result in very few casualties, especially with the Nigerian outlier (see footnote4) removed. We, however, keep the three outliers in the regression, because theunit of analysis is the number of incidents perpetrated by the groups and notthe number of associated casualties.

Based on the Monterey WMD data, Figure 1 displays the annual number ofCBRN terrorist events by group type for 1988–2004. These time series excludecriminal and unsubstantiated incidents, as described earlier. For the overallseries, the two most prominent peaks in CBRN activity took place in 1995and 2000. The former peak with 25 incidents coincided with increases in CBRNterrorists by cults, other groups, and nationalists ⁄ separatists, with cults being thelargest contributor. The 2000 peak is primarily due to a rise in CBRN terrorismby nationalists ⁄ separatists. Cycles appear to characterize CBRN events.

0

5

10

15

20

25

30

1988 1990 1992 1994 1996 1998 2000 2002 2004

Nu

mb

er o

f in

cid

ents

AllNationalists/separatistsCultsFundamentalistsOther

FIG. 1. Annual Number of CBRN Incidents by Group Type, 1988–2004.

3 The injury incident is the Tokyo subway sarin attack on March 20, 1995 by Aum Shinrikyo; the death incidentis the mass poisoning on March 17, 2000 of the followers of the Movement for the Restoration of the Ten Com-mandments of God. The Tokyo attack involved 1,039 injuries while the mass poisoning included 778 deaths.

4 The outlier is the massacre of Hausa military youths in Nigeria on February 21, 2000 where 304 died, some byarrows tipped with poison.

279Kate Ivanova and Todd Sandler

Page 461: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Other Data and Variables

To capture the relationship between perpetrators and regime characteristics, we,in part, utilize annual data drawn from the Polity Project, ‘‘Political RegimeCharacteristics and Transitions, 1800–2003’’ (Marshall and Jaggers 2004). Politydata are gathered by the Integrated Network for Societal Conflict Research (INS-CR) at the University of Maryland. The Polity database is constructed on the pre-mise that a political system does not have to be represented as either democraticor autocratic. Thus, INSCR treats democracy and autocracy as two dimensionsthat can be measured independently. According to Polity, democracy reflectsthree interdependent elements: (1) institutions and procedures that foster polit-ical participation, (ii) procedural constraints that curb executive power, and (iii)government-backed guarantees that protect civil liberties (e.g., freedom of associ-ation, freedom of speech, protection against unwarranted search and seizure,and due process under the law). Each of these three elements are assigned sub-jective codes that are then combined into an overall indicator between 0 and 10,with higher values associated with more democracy. In contrast, autocracyinvolves restraints on political participation, few limits on executive power, andsignificant restrictions on civil liberties. Subjective scores assigned to these threefactors are also aggregated into a single index that varies between )10 and 0,with lower values indicative of more autocratic rule. An overall composite isderived by summing the democracy and autocracy indicators. This democracycomposite score ranges from )10 to 10 with higher values reflecting democraticprinciples. Given Polity’s coverage only up through 2003, the democratic indica-tor is not available for 2004.

For 1998–2004, we rely on the International Country Risk Guide (ICRG),produced by the Political Risk Services (PRS) Group (2004), for two additionalregime characteristics: rule of law and honesty (or the absence of corruption).The ICRG index of law and order (i.e., rule of law) is based on two subcompo-nents: (i) the impartiality of the legal system; and (ii) people’s observance of thelaw.5 The second component is needed because a country with a high judicialsystem rating may still suffer from high crime rates and routine violation of thelaw. The rule of law variable is scaled from 0 to 6, where higher scores reflectstrong rule of law and lower scores indicate ‘‘a tradition of depending on phys-ical force or illegal means to settle claims’’ (Knack and Keefer 1995:225). TheICRG corruption index primarily measures the extent to which ‘‘high govern-ment officials are likely to demand special payments’’ (Knack and Keefer1995:25), but it also accounts for illegal payments associated with import andexport licenses, exchange rate transactions, tax assessments, policy activities, orloans. Like the rule of law index, the corruption indicator ranges from 0 to 6,with low values indicating corrupt regimes. We will, however, employ high valuesto reflect honest regimes with scrupulous government officials. Annual values ofthe rule of law and honesty indices are available for 1988–2004.

A final variable is an annual wealth measure for venue countries associatedwith CBRN incidents. Income per capita data come from the World Bank Group(2006).

Empirical Hypotheses

To underline the empirical investigation, we present six hypotheses. These hypo-theses are either drawn from the literature or else are logically deduced. Thefirst hypothesis involves the temporal nature of CBRN incidents. Technologicalinnovations diffuse through the terrorism community owing to linkages among

5 See International Country Risk Guide (2005) (ICRG) for definitions for these components.

280 CBRN Attack Perpetrators

Page 462: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

terrorist groups—that is, groups are known to share information and tactics.Thus, the discovery of a novel form of attack by one group may be passed alongto other groups. In some cases, the media greatly facilitate this transmission bymaking the method of attack public. Terrorists can then search libraries or theInternet for the necessary technical information to carry out the attack in prac-tice. When the same group is involved in multiple attacks, as was true for AumShinrikyo, economies of scale (i.e., falling unit costs with incidents) then makefuture CBRN attacks cheaper per incident once setup costs have been met.These setup costs include surpassing weaponization barriers, building a laborat-ory, obtaining the substances, acquiring knowledgeable personnel, and establish-ing the requisite infrastructure. Owing to these factors, today’s CBRN events areanticipated to be positively influenced by yesterday’s events, so that CBRNt (i.e.,events in period t) is positively influenced by CBRNt)1 (i.e., events in period t )1). This relationship may also hinge on learning economies that also lower unitcosts due to experience gained from past actions. Another positive aspect of yes-terday’s incidents on today’s actions stems from crossing the psychological andtechnical threshold that yesterday’s CBRN incidents may signal. Thus, we have:

Hypothesis 1:

Past CBRN incidents are an important positive determinant of today’s CBRN incidentsAs mentioned at the outset, the views on likely perpetrators of CBRN incidentsare controversial with two contrasting predictions in the literature. One group ofexperts sees religious cults and fundamentalists as more apt to engage in CBRNattacks than other groups, because these religious factions may demonize theirenemies, appear less restrained in their actions, view all nonsupporters as legit-imate targets, and not maintain a constituency (see, e.g., Betts 1998; Cameron1998; Dishman 2001; Palfy 2003). In the case of cults, leaders may be pursuingmillenarian, apocalyptic or messianic visions that justify any number of casual-ties—for example, Aum Shinrikyo’s apocalyptic redemption (Blum et al. 2005).One set of experts emphasizes such factors as promoting CBRN terrorism withits greater carnage potential in the case of religious terrorists. In contrast, otherexperts view opportunistic nationalists ⁄ separatists or others as a potential threat(e.g., Sinai 2005), while still others do not envision CBRN terrorism as appealingto nationalists ⁄ separatists owing to powerful inhibitors, that includes the benefit-cost effectiveness of conventional terrorism (Rapoport 1999). Monetary supportfrom a Diaspora may inhibit nationalists ⁄ separatists from CBRN attacks that mayalienate their funders. Quite simply, there is no agreement in the literature as towhom are the likely perpetrators of CBRN attacks—it is an empirical questionowing to opposing factors. As a refutable hypothesis, we offer:

Hypothesis 2:

Religious cults, followed by religious fundamentalists, are more prone to CBRN attacksagainst nonbelievers than other groupsWe place cults ahead of fundamentalists because the latter terrorists have betterdefined political goals (e.g., an Islamic state) that may make them possess someconstituency concerns.

A third hypothesis involves terrorist groups that engage in one or more trans-national terrorist events.6 Transnational terrorist groups can draw expertiseand funding from abroad, thereby putting CBRN terrorism within their reach.

6 Transnational orientation is ascertained by examining International Terrorism: Attributes of Terrorists Events(ITERATE) for CBRN perpetrators, who executed at least one transnational terrorist acts (Mickolus, Sandler, Mur-dock, and Flemming 2005).

281Kate Ivanova and Todd Sandler

Page 463: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Moreover, these transnational groups may be in a better position to obtainCBRN substances from laboratories and other facilities abroad (Blum et al.2005). Given their transnational orientation, such groups can stage a CBRNattack away from their home country, so that their nationals will not be inharm’s way. Thus, foreign venues may make the associated risks more acceptable.Transnational group may also execute large-scale, newsworthy CBRN attacks togain worldwide media attention. Given past incidents like 9 ⁄ 11 and the Madridcommuter train bombings, transnational terrorists must ratchet up the carnageto command similar media attention. Transnational terrorist groups are in amore competitive news market than domestic terrorists and this induces theformer to seek more ghastly actions. Such considerations lead to:

Hypothesis 3:

Groups with a transnational orientation are more prone to engage in CBRN attacksThe next three hypotheses involve the likely venue for CBRN terrorism. There isa growing literature that views democracy as encouraging terrorism owing tofreedom of association, availability of information, sources of funding, rights toprivacy, protection under the law, targets of opportunity, and restraints on gov-ernment (see, e.g., Eubank and Weinberg 1994, 2001; Weinberg and Eubank1998; Enders and Sandler 2006). Democracies also provide potential media cov-erage that terrorists seek. The same factors that support conventional terrorismalso provide a favorable environment for CBRN terrorism in democracies. This isparticularly true for CBRN incidents owing to a knowledge base (throughhigher-learning institutions and laboratories), protection from unwarrantedsearches, and myriad funding opportunities. Moreover, the shear volume of ship-ping in most rich democracies offers opportunities for CBRN ingredients toenter ports undetected. These risks of CBRN incidents are augmented by the vol-ume of tourism and business travelers to democracies. Hypothesis 4 indicatesthat the above considerations make democracies a likely venue for CBRN terror-ist attacks.

Hypothesis 4:

Democratic values and the rule of law are conducive to the staging of CBRN attacksFollowing 9 ⁄ 11, the Interpol chief, Ronald K. Noble (2001), stated that, ‘‘Themore sophisticated security systems, the best structures, or trained and dedicatedsecurity personnel are useless, if they are undermined from the inside by asimple act of corruption.’’ Corruption can foster CBRN terrorism by allowingterrorists to acquire the material through bribes of officials or individuals atsensitive laboratories. The presence of corruption also means that the acquisitionof CBRN substances may go unnoticed and ⁄ or unreported owing to questionablerecord-keeping practices. Corrupt businesses may sell essential ingredients toterrorists that can be used to assemble a CBRN weapon. Such considerationsgive:

Hypothesis 5:

Corrupt (honest) regimes are more (less) likely to experience CBRN incidentsA final hypothesis concerns the wealth of potential venue countries as measuredby the natural log (Ln) of the country’s income per capita. Rich countries areapt to be the venue for CBRN terrorism, insofar as these attacks are likely todraw more attention in wealthy than in poor countries. If the terrorists are aftera ransom, then wealthier countries present greater extortion possibilities. Richcountries also possess more laboratories and research facilities where CBRN

282 CBRN Attack Perpetrators

Page 464: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

substances are available. Additionally, there are more individuals with access toand knowledge of CBRN materials in wealthy countries. Funds are more readilyavailable in rich countries to support CBRN weapon acquisition. Thus, we have:

Hypothesis 6:

Rich countries are a more likely venue for CBRN terrorism

Group Type and CBRN Terrorism

We first investigate the determinants of CBRN terrorism, based on past attacksand group characteristics. To construct our dependent variable, we calculate thenumber of CBRN incidents in period t, CBRNt, perpetrated by each identifiedgroup. The dataset of 55 terrorist groups excludes loners and unknown perpetra-tors (see Table 2). We assume that a group’s count of CBRN incidents either startfrom the year of their first incident, or from 1988 if its CBRN operations predatedthe start of our sample period. Thus, we implicitly assume that the group’s firstCBRN incident indicates its genesis or its ability to employ CBRN substances forterrorist acts. Because terrorist groups may not exist or use CBRN agents at thebeginning of the sample period, the number of years varies among groups.

The dependent variable consists of the number of CBRN terrorist incidentsper year, which is characterized by a preponderance of zeros and small values.The standard model for ‘‘thin’’ count data is a Poisson regression (Cameronand Trivedi 1998:3; Greene 2003:740). However, a shortcoming of a Poissonregression is that the conditional mean of the dependent variable is assumed toequal its conditional variance. If this underlying distributional assumption failsto hold (a likely scenario), then the coefficient estimates may be consistent, buttheir standard errors will be underestimated. A negative binomial regression gen-eralizes the Poisson regression and permits greater variation (overdispersion),not constrained to equal the mean.

The negative binomial regression assumes, for a given set of regressors, thatyit—the number of CBRN incidents perpetrated by group i in year t in ourmodel—is distributed with a probability density function:

f ðyit jxitÞ ¼Cðyit þ a1Þ

Cðyit þ 1ÞCða1Þa1

a1 þ lit

a1

lit

a1 þ lit

yit

; ð1Þ

with mean parameter lit ¼ expðx0itbÞ in which b is a vector of coefficients to beestimated. In equation (1), a is the dispersion parameter. This model impliesthat the conditional mean is given by:

lit ¼ expðb0 þ b1Nationalistsit þ b2Cultsit þ b3Fundamentalistsit þ b4TransnationalitÞ:ð2Þ

In equation (2), Nationalistsit refers to a dummy variable that equals 1 if theperpetrator is classified as a nationalist ⁄ separatist group in the Monterey WMDdata and 0 otherwise. Similarly, Cultsit and Fundamentalistsit denote dummy varia-bles for religious cults and fundamentalists, respectively, with all other groupsused as the reference category. Finally, Transnationalit equals 1 if the group has atransnational orientation and equals 0 otherwise. Maximum-likelihood methodsare applied to estimate the negative binomial regression model.

We assume that observations from different years for the same group are cor-related, whereas any two observations from different years for alternative groupsare independent. To account for this correlation without assuming any particular

283Kate Ivanova and Todd Sandler

Page 465: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

within-group correlation or form of heteroscedasticity, we use a robust varianceestimator clustered over groups. The estimator allows for heteroscedastic vari-ance between and within groups (Williams 2000:645). An advantage of this vari-ance estimator is that the nature of the within-group dependence does not haveto be specified. As a consequence, estimations are robust not only to heterosce-dasticity, but also serial correlation.

The interpretation of coefficients for the negative binomial is less straightfor-ward than a linear regression model, for which estimated coefficient bj meansthat a one-unit change in the jth explanatory variable increases the expectedvalue of the dependent variable by bj units. Taking the natural log of the condi-tional mean and differentiating with respect to xj, we obtain:

bj ¼@E ½yjx@xj

1

E ½yjx ; ð3Þ

which is the percentage change in the dependent variable owing to a one-unitchange in the jth explanatory variable. As such, equation (3) is a semielasticity.If, however, an explanatory variable enters logarithmically, then the associatedcoefficient is a full elasticity giving the ratio of percentage change in the depend-ent variable to the percentage change in the independent variable. For indicator(dummy) variables, it is convenient to interpret the coefficients transformed toincidence rate ratios. For the negative binomial model, the incidence rate ratiofor a one-unit increase in indicator variable d, with all of the other variables (x2)held constant, equals

E ½yjd ¼ 1; x2E ½yjd ¼ 0; x2

¼ expðbjÞ:

This indicates that the expected count (or incidence rate) of an event is exp bj

times larger if the indicator is unity rather than zero. For a continuous variable,this would correspond to a one-unit increase.

Results

Table 3 presents the estimates of equation (2) with standard errors inparentheses. Models 1 and 2 have 433 observations for 55 terrorist groups for1988–2004. In contrast, Models 3 and 4 have just 378 observations, because 55observations are lost by lagging CBRN. To test between the negative binomialand Poisson regressions, we focus on the dispersion parameter a. For all fourmodels, we reject the hypothesis that the dispersion parameter is zero at the .01level, so that the negative binomial model is appropriate. The Wald test indicatesthat the overall model is significant at the .01 level.

Models 3 and 4 include CBRNt)1, which allows us to test Hypothesis 1, whilecontrolling for potentially relevant but omitted variables. CBRNt)1 is highly signi-ficant in both models, thus indicating that, for each group, the expected numberof CBRN incidents is over one and a half times higher than that in the perviousyear. This finding strongly supports Hypothesis 1. The chi-squared statistic withone degree of freedom for the likelihood ratio test to compare Model 1 and 3 is295,7 which is significant at the .01 level indicating a much better fit for Model 3than for Model 1. A similar calculation supports Model 4 over Model 2; hence,our remarks are focused on the coefficients in Model 3 and 4. Comparing coeffi-cient estimates, we see that the models display reasonable robustness.

Because most of the independent variables are indicator variables, the coeffi-cients are transformed to incidence rate ratios—that is, exp bj. For model 3, the

7 This statistic equals 2 · |)317.92 + 170.12|.

284 CBRN Attack Perpetrators

Page 466: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

expected number of CBRN incidents for nationalists ⁄ separatists and fundamen-talists is not significantly different than that for ‘‘all other groups.’’8 In Model 3,the expected number of CBRN incidents for religious cults is over 11 timeshigher than that for all other groups. Moreover, this coefficient is significant atthe .01 level, thus partly supporting Hypothesis 2. The same general messagecomes from Model 4 regarding religious cults being much more prone than thecomparison group to engage in CBRN terrorism. In Model 3, the coefficient ontransnational orientation indicates a six time greater likelihood than the compar-ison group to engage in CBRN attacks. Thus, Hypothesis 3 is supported.

In Model 4, we add transnational interaction terms for nationalists ⁄ separatistsand for fundamentalists to ascertain whether such an orientation has any influ-ence on the use of CBRN terrorism by these two types of groups. We do notinclude an interaction with cults since neither sample cult is classified as transna-tional. The coefficient on the nationalists interaction term is insignificant. Thissuggests that nationalists ⁄ separatists with a transnational orientation do not getmore or less involved in CBRN terrorism. Although the expected number ofCBRN incidents for fundamentalists is much lower than that for the comparisongroup in Model 4, a transnational orientation slightly increases the anticipateduse of CBRN terrorism by fundamentalists.

Regime and Group Type: Their Influence on CBRN Terrorism

Next, we investigate whether regime characteristics and country wealth affectfour perpetrator cohorts’ use of CBRN substances in terrorist acts. These cohortsinclude all perpetrators, nationalists ⁄ separatists, religious cults and fundamental-ists, and all other actors. Unlike the last section, all other actors refer not only toterrorist groups that do not belong to one of the three group categories, but alsoto lone and unknown actors (see Table 1 where there are 23 lone and 108unknown perpetrators). We combine cults and fundamentalists into a singlecohort, because there are only two cults. By subdividing perpetrators, we can

TABLE 3. Negative Binomial Regressions (Standard Errors Adjusted for Clustering on TerroristGroups) (1988–2004)

Model 1 Model 2 Model 3 Model 4

CBRNt-1 1.61*** (0.13) 1.62*** (0.13)Nationalists ⁄ separatists 1.05 (0.44) 1.53* (0.36) 1.22 (0.70) 0.76 (0.70)Religious cults 7.90*** (2.85) 9.10*** (3.27) 11.07*** (6.22) 9.33*** (5.32)Religious fundamentalists 0.73 (0.30) 1.15 (0.48) 0.47 (0.29) 5.80E-07*** (4.37E-07)Transnational groups 2.82*** (0.92) 3.81*** (1.97) 6.28*** (3.53) 4.80** (3.62)Nationalists · transnational 0.56 (0.36) 1.83 (2.10)Fundamentalists ·transnational

0.48 (0.35) 1.02E+06*** (1.05E+06)

a 2.15*** 2.12*** 2.81*** 2.81***Wald test (v2) 45.64*** 46.17*** 112.78*** 969.69***Log-likelihood )317.92 )317.10 )170.12 )169.43Observations 433 433 378 378

Note: Dependent variable is the number of CBRN incidents per year. Coefficients are transformed to incidence-rateratios [i.e., exp(b) rather than b]. Standard errors (in parentheses) are similarly transformed. The constant is notshown.*Significant at the .10 level.**Significant at the .05 level.***Significant at the .01 level.

8 ‘‘All other groups’’ involve groups that are not nationalists ⁄ separatists, cults, or fundamentalists.

285Kate Ivanova and Todd Sandler

Page 467: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

determine whether regime characteristics, past CBRN incidents, and wealthaffect the classes of perpetrators differently. Regime characteristics includedemocracy, rule of law, and honesty indices described earlier. The ensuingempirical investigation allows us to test Hypotheses 1, 4–6.

To explain the variation in the number of CBRN incidents for the variouscohorts based on regime characteristics, we compute the number of CBRN inci-dents that took place in each sample country in each year. Our sample includesnot only countries that did not experience any CBRN attacks, but also countriesthat experienced one or more CBRN incidents during the sample period.Because the value of the dependent value is always zero for the former countries,while the value is positive for some years and zero otherwise for the latter coun-tries, we assume that the zero and nonzero counts in this setting are generatedby different processes. That is, there are countries that are never at risk of CBRNterrorist attacks (i.e., terrorists never find them to be attractive targets), whilethere are other countries that are at risk of CBRN terrorist events where terror-ists may or may not strike in any given year. Terrorists’ locational choice for aspecific CBRN event is based on a two-step process. First, they decide whichcountries are potential venues. Second, in a particular year, terrorists choosewhich of these potential sites to stage a CBRN incident.

The negative binomial regression model, discussed in the previous section,only accounts for one source of overdispersion, namely unobservable individ-ual heterogeneity (i.e., certain unidentified socio-political characteristics of thecountries that may or may not attract terrorists). In addition to individualheterogeneity, a zero-inflated negative binomial (ZINB) model considersanother source of overdispersion—that is, excess zeros arising from the two-step data-generating process (Greene 1994). Countries can fall into two categ-ories: with probability /, a country may never experience a CBRN incident,and with probability 1–/, a country may be at risk for CBRN incidents. Prob-ability / is a function of the characteristics z of the country and is deter-mined by a logit model. Both zero and positive counts in the second groupare generated by a negative binomial process in which the exponential meanis modeled as

lit ¼ exp½b0 þ b1Democracyit þ b2Honestyit þ b3Lawit þ b4LnðGDP=PopulationÞit ;ð4Þ

where Democracyit, Honestyit, and Lawit refer to the polity, rule of law, and honestyindices, respectively, and Ln(GDP ⁄ Population)it denotes logged gross domesticproduct (GDP) per capita. Hence,

yit = 0, with probability /it;yit = negative binomial[lit], with probability 1–/it; and

/ ¼ expðz0itcÞ1þ expðz0itcÞ

;

where c is a vector of coefficients to be estimated for the logit model.We include a constant and past CBRN incidents (i.e., CBRNt–1) in vector zit

CBRNt–1 is used as an explanatory variable in the logit model to test for any poss-ible state-dependence effects. Terrorists may repeatedly stage their attacks in thesame countries on account of networks and infrastructure formed from pastactions. If, moreover, terrorists have to meet setup costs to achieve their firstattack in a particular venue, they will choose to strike in those countries whereCBRN attacks have been previously perpetrated by other terrorists, with whomthey can form linkages to reduce initial costs. Thus, under the zero-inflatedmodel, countries that have never experienced CBRN incidents will be predictedto have zero CBRN events in the current period.

286 CBRN Attack Perpetrators

Page 468: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

We again assume that observations across countries are independent but thatany two observations within a country are correlated. Thus, we apply a robustvariance estimator clustered over countries. Although our sample includes bothcountries that have and have not experienced CBRN incidents, our sample sizeis restricted by the availability of data on the countries’ regime characteristics,used to predict the number of CBRN events. Since we only have data on demo-cracy until 2003, the time span of our study is from 1988 to 2003. Furthermore,we do not have data on democracy, corruption, and rule of law for all of thecountries in each of the years, so that we end up with 126 countries. The num-ber of available years for each country ranges from 2 to 16 (with an average of14.6 years per country). The resulting number of observations is 1729. (We‘‘lose’’ 106 observations due to the inclusion of the lag of the number of CBRNincidents in the logit model.)

In Table 4, we present the results of the estimation of equation (4) using thefour cohorts. For the three subsamples, we exclude certain perpetrators, but thenumber of countries and years that could serve as the venue and time of poten-tial attacks remains the same. Hence, the number of observations (i.e., 1729) ineach subsample is identical as that for the entire (All) sample. To account forcollinearity between the log of GDP per capita and rule of law (the correlation is0.65), we present the results of estimating an alternative specification where thelog of GDP per capita is dropped from the model. Thus, there are eight alternat-ive models, numbered (1)–(8), in Table 4. In Table 5, we include the lag of thedependent variable (i.e., CBRNt-1) as an additional determinant of the exponen-tial mean to account for any path dependence effects, associated with the num-ber of CBRN incidents in a country. This additional variable allows for a test ofHypothesis 1 for the various cohorts of perpetrators.

To judge between the negative binomial and zero-inflated negative binomialmodels, Greene (1994) proposes the use of a test by Vuong (1989) for non-nested models. However, since we rely on a robust variance estimator clusteredover countries, the Vuong statistic cannot be applied. We, thus, base our decis-ion to use the zero-inflated model on substantive justification, which Long(1997) views as the most compelling evidence. In our case, there are countrieswhere terrorists do not stage CBRN terrorist attacks for structural reasons. At thesame time, there are other countries where CBRN events are potentially anticipa-ted, but do not occur by chance in given periods. Additionally, the negativebinomial model for positive counts appears preferable to the Poisson model,because it is likely that there are unobserved sources of heterogeneity that differ-entiate the countries. This latter assumption is supported by the fact that we canreject the hypothesis that the dispersion parameter a equals zero for all samplesand specifications in Tables 4 and 5. Thus, we rely on the ZINB model to makepredictions about the expected number of CBRN events based on regime charac-teristics in different countries. The Wald test for all 16 models indicates that wecan reject the hypothesis that all coefficients are simultaneously zero at the .01level of significance. The results are broadly consistent for all comparative sam-ples and specifications in Tables 4 and 5.

For all samples, except Cults and Fundamentalists, the odds of CBRN eventsoccurring depend significantly on the number of CBRN incidents in the pre-ceding year. The negative coefficients on CBRNt–1 in the logit model indicatethat past CBRN incidents decrease the odds that the number of CBRN incidentswill be zero in the next period. Moreover, the positive coefficients on pastCBRN incidents in the negative binomial model in Tables 4 and 5 imply thatthe number of CBRN events is apt to be higher in those countries with morepast CBRN incidents. The effect of CBRNt–1 is marginally significant for theentire sample and for nationalists ⁄ separatists subsample. Thus, we concludethat past CBRN events have a much stronger influence on the odds of CBRN

287Kate Ivanova and Todd Sandler

Page 469: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

TABLE 4. Zero-Inflated Negative Binomial Regressions on Regime Types (Standard Errors Adjusted for Clustering on Countries) 1988–2003

Independent All Nationalists ⁄ Separatists Cults and Fundamentalists All Other Actors

Variables (1) (2) (3) (4) (5) (6) (7) (8)

Negative binomial modelDemocracy 0.10** (0.04) 0.14*** (0.03) 0.12*** (0.04) 0.12*** (0.04) 0.12** (0.05) 0.14*** (0.05) 0.02 (0.08) 0.14*** (0.05)Honesty )0.52*** (0.11) )0.42*** (0.11) )0.56*** (0.11) )0.56*** (0.10) )0.32 (0.46) )0.11 (0.44) )0.65*** (0.16) )0.64*** (0.21)Rule of law 0.18 (0.16) 0.36** (0.16) )0.004 (0.14) )0.01 (0.13) 0.40 (0.27) 0.49* (0.26) 0.13 (0.24) 0.60** (0.29)ln (GDP per capita) 0.38** (0.16) )0.002 (0.15) 0.29 (0.22) 0.86*** (0.27)Constant )2.81*** (0.97) )0.96* (0.58) 0.44 (0.89) 0.43 (0.57) )4.59*** (1.19) )3.21*** (0.84) )6.09*** (1.37) )1.37 (1.22)

Logit modelCBRNt-1 )2.60*** (0.63) )2.69*** (0.67) )16.40*** (2.24) )38.68*** (2.22) )1.63 (1.08) )1.73 (1.05) )2.76*** (0.67) )2.79*** (0.62)Constant 2.07*** (0.35) 2.15*** (0.35) 3.23*** (0.30) 3.23*** (0.30) 2.99*** (0.74) 3.21*** (0.62) 2.46*** (0.53) 2.62*** (0.55)

a 1.40*** 1.46*** 0.79*** 0.78*** 1.39*** 1.07*** 1.36*** 1.58***Wald test (v2) 43.45*** 39.24*** 63.44*** 59.89*** 27.60*** 18.16*** 31.96*** 16.08***Log-pseudolikelihood )477.24 )481.58 )162.44 )162.44 )130.27 )130.93 )294.54 )302.36Observations 1729 1729 1729 1729 1729 1729 1729 1729

Notes: Dependent variable is the number of CBRN incidents per year (CBRNt). Standard errors are in parentheses. Each column provides the estimates from different parsings of the databased on the perpetrator’s identity—for example, all perpetrators (All) and nationalists ⁄ separatists.*Significant at the .10 level.**Significant at the .05 level.***Significant at the .01 level.

288C

BR

NA

ttackP

erpetrators

Page 470: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

terrorist incidents occurring than on the number of incidents in any particularyear.

The application of a robust variance estimator clustered over countries pre-vents us from conducting likelihood ratio tests to compare different specifica-tions of the model (such as Model 1 in Tables 4 and 5 or Model 1 and Model 2in Table 5) owing to the presence of log pseudolikelihood values. As the oddnumbered models in Table 5 represent the most complete specifications, wefocus our discussion on the coefficient estimates obtained from these models.

Democracy has a significant positive influence on the number of CBRN inci-dents across different samples and specifications, thereby partly supportingHypothesis 4. The rule of law, however, does not have a significant influence onthe number of CBRN incidents in the odd numbered models. Based on Model 1in Table 5, a one-point increase in the democracy index increases the expectednumber of CBRN incidents for all perpetrators by 9%. The size of this is approxi-mately the same for all samples with cults and fundamentalists displaying the lar-gest percentage increase. Honesty has a significant negative impact on the use ofCBRN terrorism by different types of perpetrators taken separately and together,which supports Hypothesis 5. According to Model 1, a one-point increase in thehonesty indicator results in 46% fewer CBRN incidents for the entire sample.The effect is particularly pronounced for religious cults and fundamentalists,where a one-point increase leads to a 56% decline in CBRN incidents. This sug-gests that corruption plays an important role in motivating religious groups toresort to CBRN substances. For the entire sample, the impact of corruption isabout four times greater than that of democracy. Wealth is a significant positiveinfluence of CBRN incidents for the entire sample and all other actors—the twobiggest numbers of perpetrators—thus supporting Hypothesis 6 for these sam-ples. Hypothesis 6 is not, however, supported for nationalists ⁄ separatists or cultsand fundamentalists. For models 1 and 7, the influence of income per capita isfairly large.

For the negative binomial regression, the marginal effect of a regressordepends on the expected value of the count variable, which depends on thevalues of all independent variables. Marginal effects are computed with all varia-bles held at their means. Based on the coefficient estimates of Tables 5 and 6presents the marginal effect of democracy, honesty, rule of law, and log of GDPper capita on the expected number of CBRN events. Of all of the explanatoryvariables, CBRNt–1 has the largest marginal impact on the expected number ofCBRN incidents for all but the cults and fundamentalists sample. This impact isparticularly important for nationalists ⁄ separatists, where an increase in one inci-dent in the previous year, with all variables held at their means, raises the expec-ted number of CBRN events by 0.36. The marginal effects of democracy andhonesty, though significant, are not very large. For example, in Model 1, if acountry’s democracy score improves by one unit, then the expected number ofCBRN events increases by just 0.007. If, similarly, a country’s ranking in terms ofthe honesty index increases by one, then the expected number of CBRN inci-dents decreases by 0.036. These marginal effects are small since there have notbeen many CBRN incidents to date.

Concluding Remarks

Currently, the Monterey WMD data indicates that CBRN terrorism has not beenvery deadly even though the number of terrorism-based CBRN events hasincreased since 1988. On average, a CBRN incident has been only half as deadlyas a conventional terrorist incident. Nevertheless, the authorities must be con-cerned about such events because some terrorists are clearly interested in usingCBRN substances. CBRN incidents could some day result in mass death and

289Kate Ivanova and Todd Sandler

Page 471: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

TABLE 5. Alternative Zero-Inflated Negative Binomial Regressions on Regime Types (Standard Errors Adjusted for Clustering on Countries) 1988–2003

Independent All Nationalists ⁄ Separatists Cults and Fundamentalists All Other Actors

Variables (1) (2) (3) (4) (5) (6) (7) (8)

Negative binomial modelCBRNt-1 0.18* (0.09) 0.19** (0.09) 0.21* (0.11) 0.21* (0.12) 0.48 (0.30) 0.48 (0.34) 0.11 (0.11) 0.15 (0.14)Democracy 0.09** (0.03) 0.12*** (0.03) 0.11*** (0.04) 0.11*** (0.04) 0.13** (0.06) 0.15*** (0.05) 0.03 (0.07) 0.13** (0.05)Honesty )0.46*** (0.09) )0.37*** (0.09) )0.47*** (0.11) )0.47*** (0.10) )0.56* (0.29) )0.44 (0.37) )0.58*** (0.19) )0.52** (0.23)Rule of law 0.14 (0.15) 0.29* (0.15) )0.04 (0.15) )0.04 (0.14) 0.29 (0.32) 0.41 (0.29) 0.12 (0.24) 0.50* (0.26)ln (GDP per capita) 0.32** (0.15) 0.01 (0.15) 0.28 (0.26) 0.75*** (0.26)Constant )2.74*** (0.91) )1.15** (0.57) 0.04 (0.84) 0.07 (0.57) )4.53*** (1.48) )3.18*** (0.85) )5.70*** (1.23) )1.65 (1.34)

Logit modelCBRNt-1 )2.84*** (0.95) )2.97*** (1.09) )16.83*** (1.23) )16.66*** (1.23) )1.31 (1.03) )1.42 (1.08) )2.92*** (0.85) )2.99*** (0.89)Constant 1.79*** (0.51) 1.85*** (0.50) 3.04*** (0.35) 3.04*** (0.35) 1.88 (1.28) 2.01 (1.47) 2.27*** (0.75) 2.37*** (0.81)

a 1.66*** 1.73*** 0.85*** 0.84*** 2.33*** 2.21*** 1.63*** 1.94***Wald test (v2) 78.12*** 68.99*** 80.18*** 80.35*** 36.95*** 41.86*** 82.37*** 56.36***Log-pseudolikelihood )472.04 )475.48 )161.50 )161.50 )125.28 )126.08 )293.22 )299.90Observations 1729 1729 1729 1729 1729 1729 1729 1729

Notes: Dependent variable is the number of CBRN incidents per year (CBRNt). Standard errors are in parentheses. Each column provides the estimates from different parsings of the databased on the perpetrator’s identity—for example, all perpetrators (All) and nationalists ⁄ separatists.*Significant at the .10 level.**Significant at the .05 level.***Significant at the .01 level.

290C

BR

NA

ttackP

erpetrators

Page 472: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

TABLE 6. Marginal Effects Evaluated at the Sample Mean of Regressors (Based on Table 5)

Independent All Nationalists ⁄ Separatists Cults and Fundamentalists All Other Actors

Variables (1) (2) (3) (4) (5) (6) (7) (8)

CBRNt-1 0.194** (0.075) 0.218** (0.088) 0.358*** (0.125) 0.352*** (0.123) 0.015 (0.010) 0.017* (0.009) 0.090** (0.035) 0.114** (0.044)Democracy 0.007** (0.003) 0.010*** (0.003) 0.002** (0.001) 0.002** (0.001) 0.001** (0.001) 0.001*** (0.001) 0.001 (0.002) 0.005** (0.003)Honesty )0.036*** (0.010) )0.031*** (0.009) )0.011** (0.005) )0.011** (0.005) )0.005** (0.002) )0.004 (0.003) )0.019** (0.009) )0.021* (0.011)Rule of law 0.011 (0.012) 0.024* (0.012) )0.001 (0.003) )0.001 (0.003) 0.003 (0.003) 0.004 (0.003) 0.004 (0.008) 0.020** (0.010)ln (GDP per capita) 0.025** (0.012) 0.0002 (0.003) 0.003 (0.003) 0.025** (0.011)

Notes: Dependent variable is the number of CBRN incidents per year (CBRNt). Standard errors are in parentheses. Each column provides the estimates from different parsings of the databased on the perpetrator’s identity—for example, all perpetrators (All) and nationalists ⁄ separatists.*Significant at the .10 level.**Significant at the .05 level.***Significant at the .01 level.

291K

at

eIv

an

ov

aa

nd

To

dd

Sa

nd

ler

Page 473: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

significant economic losses. Thus, recent action by the DHS in the United Statesto prepare for such events appears to be prudent. The real question is howmuch to spend and whom to protect against. Another question concerns the for-eign policy implications of this preparation.

We have applied inferential statistics to provide a picture of the likely risksfrom CBRN terrorism. The picture that emerges is that past CBRN incidents leadto future incidents regardless of the class of perpetrator. An increase of oneCBRN incident in the previous year leads to a 0.194 to 0.358 increase of CBRNevents in a given country per year. Once terrorists surpass the threshold associ-ated with CBRN terrorism, they generally continue such attacks. Thus, past inci-dents inform policymakers as to where the greatest risks lie. Past CBRN incidentshave the greatest marginal impact on future incidents, followed by corruptionand then democratic principles.

Religious cults and groups with a transnational orientation pose the largestthreat, based on an analysis of past data. Contrary to the views of some experts(e.g., Hoffman 1995; Cameron 1998; Post 2005), religious fundamentalists andnationalists ⁄ separatists do not present as significant of a CBRN concern. Demo-cratic principles and protection are conducive to CBRN terrorism, while regimehonesty is not supportive of such terrorism. Other things constant, rich countriesare more likely venues for CBRN terrorism by loners and other actors, notusually identified in the literature as the likely culprits.

So what policy lessons should be drawn from this study? In terms of perpetra-tors, governments must be especially vigilant against cults, since they appear tobe the most likely to deploy such attacks. In addition, transnational terroristgroups—for example, al-Qaida—present a CBRN risk as they try to surpass thecarnage level of 9 ⁄ 11. The renewed strength of al-Qaida indicates CBRN con-cerns. Given the casualties associated with conventional terrorism relative to pastCBRN incidents, authorities need to recognize that conventional attacks stillrepresent the greater risks when allocating antiterrorism resources. Failed statesmay provide a haven for terrorists to organize and train, but rich democraticcountries have been the location for past CBRN terrorist incidents and the likelyvenue for future attacks. Thus, some resources must be allocated to curb suchattacks. This also means that rich liberal democracies must cooperate with oneanother in monitoring and addressing the CBRN threat. From a foreign policyviewpoint, this is not a problem that rich democracies can confront alone becausethe terrorist will set up shop where there is the least vigilance. Because corruptionhas been a prime determinant of CBRN incidents, rich democratic countries musttake extra precautions to screen and monitor personnel at laboratories, univer-sities, hospitals, and nuclear power plants where CBRN materials can be obtained.This is also true of infrastructure workers (e.g., truck drivers for nuclear waste).Given the current CBRN threat, governments must display a measured vigilancethat does not squander funds on what remains a moderate threat.

References

Ackerman, Gary. (2005) WMD Terrorism Research: Whereto from Here? International Studies Review7:140–143.

Betts, Richard K. (1998) The New Threat of Mass Destruction. Foreign Affairs 77:26–41.Blum, Andrew, Victor Asal, and Jonathan Wilkenfeld. (2005) Editors’ Introduction to Nonstate

Actors, Terrorism, and Weapons of Mass Destruction: Forum. International Studies Review 7:133–137.

Bunker, Robert. (2000) Weapons of Mass Disruption and Terrorism. Terrorism and Political Violence12:37–46.

Cameron, Gavin. (1998) The Likelihood of Nuclear Terrorism. Journal of Conflict Studies 18:5–28.Cameron, A. Colin, and Pravin K. Trivedi. (1998) Regression Analysis of Count Data. Cambridge:

Cambridge University Press.

292 CBRN Attack Perpetrators

Page 474: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Chen, Andrew H., and Thomas F. Siems. (2004) The Effects of Terrorism on Global Capital Mar-kets. European Journal of Political Economy 20:349–366.

Chertoff, Michael. (2005) Remarks by Secretary Michael Chertoff on the Second Stage Review ofthe Department of Homeland Security. Available at http://www.dhs.gov/dhspublic/interapp/press_release_0703.xml (Accessed November 10, 2005).

Dishman, Chris. (2001) Understanding Perspectives on WMD and Why They are Important. Studiesin Conflict and Terrorism 24:303–313.

Enders, Walter, and Todd Sandler. (2006) The Political Economy of Terrorism. Cambridge: Cam-bridge University Press.

Eubank, William L., and Leonard B. Weinberg. (1994) Does Democracy Encourage Terrorism?Terrorism and Political Violence 6:417–435.

Eubank, William L., and Leonard B. Weinberg. (2001) Terrorism and Democracy: Perpetratorsand Victims. Terrorism and Political Violence 13:155–164.

Greene, William H. (1994) Accounting for Excess of Zeros and Sample Selection in Poisson and NegativeBinomial Regression Models. Discussion Paper EC-94-10. New York: Department of Economics, NewYork University.

Greene, William H. (2003) Econometric Analysis, 5th edition. Upper Saddle River, NJ: Pearson Educa-tion.

Gressang IV, Daniel S. (2001) Audience and Message: Assessing Terrorist WMD Potential. Terrorismand Political Violence 13:83–106.

Hoffman, Bruce. (1995) Holy Terror: The Implications of Terror Motivated by a Religious Impera-tive. Studies in Conflict and Terrorism 18:271–284.

International Country Risk Guide. (2005) About ICRG. Available at http://www.icrgonline.com/page.aspx?page=icrgmethods (Accessed October 31, 2005).

Ivanova, Kate, and Todd Sandler. (2006) CBRN Incidents: Political Regimes, Perpetrators, andTargets. Terrorism and Political Violence 18:423–448.

Knack, Stephen, and Philip Keefer. (1995) Institution and Economic Performance: Cross-CountryTests Using Alternative Institutional Measures. Economics and Politics 7:207–227.

Long, J. Scott. (1997) Regression Models for Categorical and Limited Dependent Variables. Thousand Oaks,CA: Sage Publications.

Marshall, Monty G., and Keith Jaggers. (2004) Polity IV Project: Political Regime Characteristics andTransitions, 1800-2003 Dataset User’s Manual. College Park, MD: Integrated Network for SocietalConflict Research (INSCR) Program, Center for International Development and Conflict Man-agement (CIDCM), University of Maryland. Available at <http://www.cidcm.umd/inscr/polity>(Accessed November 10, 2005).

Mickolus, Edward F., Todd Sandler, Jean M. Murdock, and Peter A. Flemming. (2005) Inter-national Terrorism: Attributes of Terrorist Events, 1968-2004. Dunn Loring, VA: Vinyard Software.

Monterey Institute of International Studies. (2005) WMD Terrorism Database. Monterey, CA:Monterey Institute of International Studies.

Noble, Ronald K. (2001) Interpol’s Chief Links Terrorism to Corruption. Available at http://www.interpol.int/Public/ICPO/PressReleases/PR2001/PR200129.asp (Accessed July 13, 2006).

Palfy, Arpad. (2003) Weapon System Selection and Mass-Casualty Outcomes. Terrorism and PoliticalViolence 15:81–95.

Political Risk Services (PRS) Group. (2004) International Country Risk Guide. East Syracuse, NY:The PRS Group.

Post, Jerrold M. (2005) The Psychology of WMD Terrorism. International Studies Review 7:148–151.Rapoport, David C. (1999) Terrorism and Weapons of the Apocalypse. National Security Studies Quar-

terly 5:49–67.Roberts, Brad Ed. (2000) Hype or Reality: The ‘‘New Terrorism’’ and Mass Casualty Attacks. Alexandria,

VA: Free Hand Press.Simon, Steve, and Daniel Benjamin. (2000) America and the New Terrorism. Survival 42:59–75.Sinai, Joshua. (2005) Forecasting Terrorists’ Likelihood to Embark on ‘‘Conventional’’ to CBRN

Warfare. International Studies Review 7:151–153.Tucker, Jonathan B.Ed. (2000) Toxic Terror: Assessing Terrorist Use of Chemical and Biological Weapons.

Cambridge, MA: The MIT Press.Tucker, David. (2001) What Is New about the New Terrorism and How Dangerous Is It? Terrorism

and Political Violence 13:1–14.United States Department of Homeland Security (DHS). (2005) Budget-in-Brief, Fiscal Year

2006. Available at http://www.dhs.gov/interweb/assetlibrary/Budget_BIB-FY2006.pdf (AccessedJuly 13, 2006).

293Kate Ivanova and Todd Sandler

Page 475: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Vegar, Jose. (1998) Terrorism’s New Breed. Bulletin of Atomic Scientists 54(2):50–55.Vuong, Quang H. (1989) Likelihood Ratio Tests for Model Selection and Non-nested Hypothesis.

Econometrica 57:307–333.Weinberg, Leonard B., and William L. Eubank. (1998) Terrorism and Democracy: What Recent

Events Disclose. Terrorism and Political Violence 10:108–118.Williams, Rick L. (2000) A Note on Robust Variance Estimation for Cluster-Correlated Data.

Biometrics 56:645–646.World Bank Group. (2006) World Development Indicators Online. Available at http://devdata.

worldbank.org/dataonline (Accessed January 16, 2006).

294 CBRN Attack Perpetrators

Page 476: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

ECONOMIC CONSEQUENCES OF TERRORISM IN DEVELOPED AND DEVELOPING COUNTRIES: AN OVERVIEW

By

Todd Sandler*

School of International Relations University of Southern California

Von Kleinsmid Center 330 Los Angeles, CA 90089-0043

USA [email protected]

213-740-9695 323-256-7900 (fax)

Walter Enders

Department of Economics, Finance and Legal Studies

University of Alabama Tuscaloosa, AL 35487

USA [email protected]

205-348-8972 205-348-0590 (fax)

* Todd Sandler is the Robert R. and Katheryn A. Dockson Professor of International Relations and Economics at the University of Southern California. Walter Enders is the Bidgood Chair of Economics and Finance at the University of Alabama.

Page 477: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

ECONOMIC CONSEQUENCES OF TERRORISM IN DEVELOPED AND DEVELOPING COUNTRIES: AN OVERVIEW

Terrorism is the premeditated use or threat of use of violence by individuals or

subnational groups to obtain a political or social objective through the intimidation of a large

audience, beyond that of the immediate victim. Although the motives of terrorists may differ,

their actions follow a standard pattern with terrorist incidents assuming a variety of forms:

airplane hijackings, kidnappings, assassinations, threats, bombings, and suicide attacks. Terrorist

attacks are intended to apply sufficient pressures to a government so that it grants political

concessions. If a besieged government views the anticipated costs of future terrorist actions as

greater than the costs of conceding to terrorist demands, then a government will make some

accommodation. Thus, a rational terrorist organization can, in principle, reach its goal quicker if

it is able to augment the consequences of its campaign. These consequences can assume many

forms including casualties, destroyed buildings, a heightened anxiety level, and myriad economic

costs. Clearly, the attacks on September 11, 2001 (henceforth, 9/11) had significant costs that

have been estimated to be in the range of $80 to $90 billion when subsequent economic losses in

lost wages, workman’s compensation, and reduced commerce are included (Kunreuther, Michel-

Kerjan, and Porter, 2003).

Terrorism can impose costs on a targeted country through a number of avenues. Terrorist

incidents have economic consequences by diverting foreign direct investment (FDI), destroying

infrastructure, redirecting public investment funds to security, or limiting trade. If a developing

country loses enough FDI, which is an important source of savings, then it may also experience

reduced economic growth. Just as capital may take flight from a country plagued by a civil war

(see Collier et al., 2003), a sufficiently intense terrorist campaign may greatly reduce capital

inflows (Enders and Sandler, 1996). Terrorism, like civil conflicts, may cause spillover costs

Page 478: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

2

among neighboring countries as a terrorist campaign in a neighbor dissuades capital inflows, or a

regional multiplier causes lost economic activity in the terrorism-ridden country to resonate

throughout the region.1 In some instances, terrorism may impact specific industries as 9/11 did

on airlines and tourism (Drakos, 2004; Ito and Lee, 2004). Another cost is the expensive

security measures that must be instituted following large attacks – e.g., the massive homeland

security outlays since 9/11 (Enders and Sandler, 2006, Chapter 10). Terrorism also raises the

costs of doing business in terms of higher insurance premiums, expensive security precautions,

and larger salaries to at-risk employees.

The size and the diversity of an economy have much to do with the ability of a country to

withstand terrorist attacks without showing significant economic effects. Yemen’s shipping

industry suffered greatly after the terrorist attacks on the USS Cole and the Limburg diverted half

of Yemen’s port activities to competitive facilities in Djibouti and Oman due to a 300% increase

in insurance premiums (US Department of State Fact Sheet, 2002). In a more diversified and

developed economy, such losses may have a temporary influence as resources are reallocated to

other sectors or better security measures are deployed to allay concerns. Moreover, developed

economies have better monetary and fiscal capabilities to limit macroeconomic impacts of

terrorist attacks than small developing countries. Thus, we should anticipate that developed

countries are more likely to display sector-specific reactions to terrorism attacks, while

developing countries are apt to exhibit some macroeconomic consequences to a particularly

vicious attack or a sustained terror campaign.

This paper has five purposes. First and most important, the paper takes stock of the

literature on the economic consequences of terrorism and evaluates the methodology used to

date. The literature dates back to the early 1990s, with most of the contributions coming after

9/11. Second, macroeconomic influences of terrorism are distinguished from microeconomic

Page 479: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

3

sector- or industry-specific effects. Third, terrorism impacts in developed countries are

contrasted with those in developing countries. Fourth, we indicate how researchers can better

account for economic consequences in developing countries. Finally, data needs are addressed.

The remainder of the paper contains eight sections. Section 1 reviews concepts and

definitions that are necessary for understanding the economic consequences of terrorism. In

Section 2, we investigate how the United States, representative of other developed nations,

cushioned the blow and sped recovery from the unprecedented attacks of 9/11 through monetary,

fiscal, and other policies. Section 3 reviews and evaluates some macroeconomic studies of the

impact of terrorism, whereas Section 4 contrasts anticipated differences between how developing

and developed countries are affected by terrorism. In Section 5, we review and analyze past

microeconomic studies of the economic fallout from terrorism. Section 6 discusses past

methodologies. In Section 7, we indicate data availability and needs. Section 8 provides future

directions and conclusions.

1. Essential Concepts

Studies over the last decade have established that internal conflicts can have significant

economic consequences in terms of reduced growth within a conflict-ridden country (e.g.,

Collier and Hoeffler, 2004; Collier et al., 2003; Collier and Sambanis, 2002) and in neighboring

countries (Murdoch and Sandler, 2002, 2004). But a civil war is a broader conflict than

terrorism, since the former usually involves a minimum of 1000 deaths and may result in tens of

thousands of casualties, while a terrorist incident results, on average, in a single death (Sandler,

2003). Thus, a country may be plagued with terrorism in, say, ten of ten years, but experience

relatively few deaths and modest property damage. Civil wars may stem from an insurrection

that tries to overthrow the government. In other cases, civil wars can erupt from grievances

Page 480: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

4

between groups with deep-seated differences (hatreds). Terrorism is a tactic that may or may not

be associated with a civil war, insurrection, or other form of political violence. As such,

terrorism typically involves little loss of life and property. Naturally, there are exceptions, such

as the March 11, 2004 Madrid train bombings or the December 21, 1988 downing of Pan Am

flight 107, where two to three hundred people perished, respectively. But even in these cases,

the loss of life, though tragic, is trivial compared with most internal conflicts so that the likely

macroeconomic impact of terrorist events is not anticipated to rival civil wars.

This prediction may change under a few scenarios: a large-scale attack like 9/11, a

protracted terrorist campaign with many deadly incidents, or some devastating attack on a

developing country’s primary sector (recall the Yemen shipping example). One should not

expect that a modest number of terrorist incidents in most countries will affect the countries’

income growth. This is an essential insight, because it indicates that indices of risks that include

internal conflicts and terrorism may be merely picking up significant disruptions associated with

the former. Additionally, sector-specific microeconomic influences are often the most likely

consequences from terrorism.

Cost distinction

There are numerous cost distinctions that could be drawn regarding terrorism losses.

Direct costs, for example, involve the immediate losses associated with a terrorist attack or

campaign and include damaged goods, the value of lives lost, the costs associated with injuries

(including lost wages), destroyed structures, damaged infrastructure, and reduced short-term

commerce. In contrast, indirect or secondary costs concern attack-related subsequent losses,

such as raised insurance premiums, increased security costs, greater compensation to those at

high-risk locations, and costs tied to attack-induced long-run changes in commerce. Indirect

Page 481: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

5

costs may surface as reduced growth in gross domestic product (GDP), lost FDI, changes in

inflation, or increased unemployment. A judgment must be made as to how to distinguish

between direct and indirect costs, in which any distinction would strike some researchers as

arbitrary.

Fortunately, this distinction is not really necessary to characterize the economic impact of

terrorism, which can be represented in terms of some well-defined macroeconomic (e.g., real per

capita GDP growth) or microeconomic variable (e.g., reduced tourist receipts). These variables

then represent the consequences of terrorism in terms of aggregate or sectoral activity. If lost

output, casualties, and damaged infrastructure are sufficiently large, then they will affect the

economy’s productive capacity with macroeconomic or microeconomic repercussions. The

identification of these impacts is of greater importance than the mere tally of losses if policy is to

ameliorate the economic ramifications of terrorism. Thus, we concentrate on relating terrorism

to macroeconomic and microeconomic variables that policy can be designed to bolster.

Domestic versus transnational terrorism

Terrorism comes in two essential types: domestic and transnational. Domestic terrorism

is homegrown with consequences for just the host country, its institutions, citizens, property, and

policies. In a domestic terrorist incident, the victim and perpetrators are from the host country.

The Oklahoma City bombing on April 19, 1995 was a domestic terrorist event as was the

kidnapping of members of Parliament by Colombian terrorists. Many ethno-nationalist conflicts

(e.g., the Tamils of Sri Lanka) are associated with mostly domestic terrorism, unless the rebels

desire to target citizens from other countries to publicize their cause to the world. Domestic

events tend to outnumber transnational terrorist events by eight to one (Enders and Sandler,

2006).

Page 482: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

6

In contrast, transnational terrorism involves more than one country. This international

aspect can stem from the victims, targets, institutions, supporters, terrorists, or implications. For

example, 9/11 is a transnational terrorist event because the victims were from many different

countries, the mission was financed and planned from abroad, the terrorists were foreigners, and

the implications of the events (e.g., financial and security) were global. A hijacking that

originates in one country but terminates in another country is an instance of transnational

terrorism as is the assassination for political ends of a foreigner on a city street. Transnational

terrorist attacks often entail transboundary externalities: actions or authorities in one country

impose uncompensated consequences on person or property in another country. Thus, spillover

costs can result so that the economic impact of a terrorist event may transcend the host country.

The toppling of the World Trade Center towers on 9/11 killed many British nationals and had

ramifications for British financial institutions. Chen and Siems (2004, Table 2, Figures 2-3)

showed that 9/11 negatively influenced average returns on stock markets globally. In fact, the

11-day cumulative average abnormal returns were larger on the London, Frankfurt, Paris,

Toronto, Amsterdam, Switzerland, Italy, and Hong Kong stock markets than on the New York

Stock Exchange following 9/11. The four blasts on 9/11 reverberated on capital markets

worldwide.

The distinction between domestic and transnational terrorism is of utmost importance

when determining the right data for calculating the economic consequences of terrorism.

Suppose that we want to relate the growth in real per capita GDP to the level of terrorism. Then,

for a country plagued by both domestic and transnational terrorism, it becomes imperative that

all forms of terrorism are included in the terrorism measure on the right-hand side of the

equation. This is also true for a country-specific study of terrorism’s consequences on

macroeconomic variables. If, however, one is interested in the impact of terrorism on a host

Page 483: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

7

country’s net foreign direct investment (NFDI), then transnational terrorist attacks are most

germane, since these attacks pose a more direct risk on foreign investors’ interests. If only

transnational terrorist attacks are included as a determinant of GDP growth, and if, additionally,

domestic attacks tend to be correlated with transnational terrorist incidents, then the coefficient

on terrorism will be biased. Furthermore, the coefficient on terrorism may reveal little about the

true quantitative relationship when domestic terrorism greatly exceeds the number and/or

intensity of transnational terrorism.

Causality

A final preliminary concerns the causal nature between terrorism and the macroeconomic

variable that proxies the consequences of terrorism. If economic downturns can create

grievances that result in terrorism, then economic conditions may be both a root cause of

terrorism and a consequence of terrorism. Recently, researchers have established with panel

estimates that economic conditions, particularly downturns, can generate transnational terrorist

attacks.2 Given this evidence, a researcher must be prudent to test and/or correct for a potential

endogeneity bias.

2. Macroeconomic Effects of Terrorism

An economy as rich and diverse as that of the United States is anticipated to withstand

most terrorist events with little macroeconomic consequences. During most years, the United

States experienced few terrorist events on its own soil – e.g., in 1998, 2000, and the years

following 2001, there were no terrorist events in the United States (Sandler and Enders, 2004;

US Department of State, 1999-2004). Moreover, the breadth of US economic activities is

sufficiently diverse to absorb the impact of an attack by shifting activities to unaffected sectors.

Page 484: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

8

The immediate costs of typical terrorist acts, such as kidnappings, assassinations, or bombings,

are localized, not unlike ordinary crimes. Currently, crimes such as identity thief have far greater

potential economic consequences than terrorism to developed countries. In most developed

countries, terrorism generally causes a substitution from sectors vulnerable to terrorism into

relatively safe areas and, thus, does not affect the entire macroeconomy.3 If airlines become

risky, factors of production will shift from the airline sector to other relatively safer sectors. Of

course, a terrorist act of the magnitude of 9/11 can shake confidence and influence sufficiently

many sectors to have macroeconomics repercussions. But as we show below, developed

countries are positioned to take actions to limit these impacts.

This representation is in marked contrast to small economies in which terrorism is

prevalent and affects daily activities as in Colombia, Israel, and the Basque region of Spain. For

these economies, terrorism can reduce GDP and curb development, especially during prolonged

campaigns (e.g., Israel since September 27, 2000). Protracted terrorism leads to the anticipation

of future events, which create risk premiums that limit activities in terrorism-prone sectors.

Investors, both at home and abroad, may decide to direct their assets to safer activities in other

countries. If terrorists succeed in scaring away investments, they may be emboldened to take

further actions to cause economic losses.

US experience in light of 9/11

Figure 1 provides strong evidence for the view that the US economy quickly rebounded

from 9/11. The vertical line in the center of each panel of Figure 1 represents the third quarter of

2001 (i.e., 2001:Q3) corresponding to 9/11. Panel 1 shows that real GDP was virtually

unchanged throughout 2000 and fell slightly in the first and third quarters of 2001. The key

feature is that real GDP began to grow sharply beginning in the fourth quarter of 2001 following

Page 485: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

9

9/11. Panel 2 shows that the Conference Board’s measure of consumer confidence plummeted

right before the onset of the 2001 recession; however, immediately following 9/11, confidence

actually soared. Some of this increase might be attributed to the patriotism of the American

public. As displayed in Panel 3, the rebound in economic activity was buoyed by strong

consumer demand for durables. These “big-ticket” items are the most volatile component of

total consumption, which jumped in the fourth quarter of 2001. Panel 4 indicates that the

unemployment rate was rising prior to 9/11, and rose dramatically after the attack. Because the

unemployment rate is a lagging indicator of economic activity, this rate would likely have

increased even without 9/11. Thus, we must wonder what would have happened to

unemployment in the absence of 9/11 – i.e., the unemployment rate may have risen even faster.

There is an overwhelming consensus that well-orchestrated macroeconomic

policymaking cushioned the shock from 9/11 in the United States. The financial markets were in

disarray as bond market trading was suspended for a day and stock market trading did not

resume until the following week. During uncertain times, risk-averse asset holders increase the

proportion of highly liquid assets in their portfolios. As shown in Panel 5, the Federal Reserve

reacted to this surge in liquidity demand by sharply cutting the Federal Funds rate, thereby

keeping funds available for investment and other needs. Fiscal policy also performed a

supportive role. The first tax cut since 1985 was signed into law in May 2001, months before

9/11. As a direct of 9/11, the US Congress approved a $40 billion supplemental appropriation

for emergency spending for such items as search and rescue efforts at the four crash sites and

tightened security at US airports and other venues. In addition to the needed disaster relief, this

surge in government spending acted as a powerful stimulus to aggregate demand. Starting on

October 7, 2001, the war in Afghanistan also bolstered government spending. As shown in Panel

6, government saving (i.e., the negative of what many call the federal government’s budget

Page 486: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

10

deficit) plummeted from uncharacteristic surpluses to record deficits. Although the government

budget deficit can have some long-term undesirable influences, US fiscal and monetary policies

clearly played an essential role in restoring consumer and business confidence.

3. Review of Macroeconomic Literature on Terrorism Impacts

The literature on the macroeconomic consequences of terrorism only began in 2003 and

involves only a handful of studies. One set of studies examines the influence of various terrorist

variables on real per capita GDP growth, while a second set of studies consists of case studies of

a country experiencing a long-term terrorist campaign.

Blomberg, Hess, Orphanides (henceforth BHO) (2004) examined a pooled cross section

of 177 countries from 1968 to 2000. Their estimating equation is:

0 1 2 3 0 4 5 6 7COM AFRICA ln ,i i i i i i i iy y I Y T I Eβ β β β β β β β ε∆ = + + + + + + + + (1)

where iy∆ is country i’s average per capita GDP growth rate, sβ are coefficients, COM is a

dummy variable for non-oil commodity exporters, AFRICA is a dummy for African countries,

0iy is country i’s initial income, iI Y is country i’s investment rate over the full sample, Ti is a

transnational terrorism indicator (e.g., a dummy for terrorism occurring in a given year), Ii

denotes the presence of an internal conflict in i, Ei indicates i’s involvement in an external

conflict, and iε is the error term. Their baseline regression indicated that non-oil commodity

exporters and African nations had lower average per capita GDP growth of 1.2% and 1.36%,

respectively. We are primarily interested in BHO’s terrorism variable’s impact on economic

growth. BHO found that if a country experienced transnational terrorist incidents on its soil in

each year of the sample period, then per capita income growth fell by 1.587 percentage points

over the entire sample period. Given the definition of Ti, each year of terrorism led on average to

Page 487: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

11

a fall in growth of only 0.048% (=1.587/33). BHO’s initial terrorism measure treated a year with

50 deadly incidents the same as a year with a single nonfatal incident. Moreover, these authors

used just transnational terrorism incidents drawn from the International Terrorism: Attributes

of Terrorist Events (ITERATE) data set (Mickolus et al., 2004). Most sample countries would

have experienced a far greater amount of domestic terrorism, which was not directly controlled

in the study. BHO were careful to control for internal and external conflict: internal conflict had

a significant negative effect on growth for some empirical specifications, while external conflict

did not have a significant influence. The internal conflict measure may be picking up some of

the impact of domestic terrorism because the later is often correlated with such conflicts.

BHO’s study controlled for some endogeneity bias. An especially interesting part of their

study is their panel estimates for nondemocractic countries, OECD countries, African countries,

the Middle Eastern countries, and Asian countries. The panel estimates altered some right-hand

side variables compared with the cross-sectional regressions – e.g., COMi was dropped and trade

openness was added along with lagged per capita growth. Except for the African panel, BHO’s

terrorism indicator was not significant, which is a cause of concern. As a geographical area,

Africa displayed the least amount of terrorism in an average year (see Blomberg, Hess, and

Orphanides, 2004, Table 1; Enders and Sandler, 2005, Figures 5-6), yet Africa was the only

panel where the estimated terrorism coefficient was significant. This rather paradoxical finding

was never addressed. The full panel estimates gave a much greater impact of terrorism on

growth – i.e., terrorism in a single year reduced per capita GDP growth by over a half a percent

– compared with the cross-sectional estimates. No explanation was offered for this huge

difference in the consequences of terrorism between the two estimating procedures. We find it

worrying that terrorism’s average influence on growth for the entire sample is not reflected in

any of the panels where terrorism is the greatest concern. Moreover, their large cross-section

Page 488: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

12

analysis did not discriminate between different time periods where terrorism changed in

character – for example, from left-wing groups to fundamentalist groups.

In another set of panel estimates, BHO (2004) changed their terrorism indicator to

terrorist incidents per capita. This change gives a significant terrorism impact on per capita GDP

growth for the full sample, the nondemocratic panel, the OECD panel, and the African panel.

Even though more panels displayed a significant impact of terrorism, the reader was never

informed why this terrorist indicator is preferred to the earlier indicator. Moreover, the impact of

terrorism varies widely between the full sample and the smaller cohort panels, leading one to

worry that the full sample “average” picture may not be representative of how smaller cohorts or

individual countries respond to terrorism.

Toward the end of the paper, BHO (2004) performed some panel estimates regarding

terrorism’s influence on investment share of GDP and government spending share of GDP.

These estimates are interesting because they tried to establish the pathway by which terrorism

effects economic growth. BHO found that terrorism increased the government spending share,

while it decreased the investment share. This reallocation can affect growth by diverting

government activities away from more productive activities to security. Moreover, reduced

investment will limit growth directly.

Gupta et al. (2004) focused on a sample of 66 low- and middle-income countries to

ascertain the impact of armed conflict and terrorism on macroeconomic variables. For their

econometric estimates, they used three structural equations, where the dependent variables are

growth of real per capita income, government revenue as a share of GDP, and defense spending

as a share of GDP. Unlike BHO, Gupta et al. (2004) were interested in the joint impact of

internal conflict and terrorism on these three macroeconomic variables. For the conflict

measure, they used the Internal Country Risk Guide (ICRG) rating on internal conflict. In this

Page 489: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

13

study, the ICRG conflict measure did not have a significant negative direct impact on per capita

income growth. However, this index had a significant positive influence on the share of defense

spending, which, in turn, had a significant negative influence on economic growth. Thus,

conflict indirectly reduced economic growth by increasing the defense spending share of

government spending.

A real advantage of this study is that it has a cohort of developing countries unlike BHO,

who included countries at all stages of development, thereby making it difficult to draw

conclusions about developing countries. The main drawback of the Gupta et al. study is that it

really did not measure the effect of terrorism per se on macroeconomic variables, because no

direct measure of terrorism was used. The ICRG index can indicate high risk when civil conflict

is high but terrorism is low or absent. Moreover, the index may point to low risk in the face of

terrorism if the overall intensity of internal conflict is low.

A third cross-sectional study by Tavares (2004) examined the cost of terrorism in terms

of reduced per capita GDP growth. His sample period was 1987-2001 for a large unspecified

sample of countries. The estimating equation is:

0 1 , 1 2 3

4 5

Growth Growth Terrorism

Natural Disaster Currency Crisis Additional Controls ,it i t it it

it it it

GDPpc GDPpc GDPpcβ β β ββ β ε

−= + + ++ + + +

(2)

where GrowthGDPpc is per capita GDP growth. On the right-hand side of equation (2), there is

lagged per capita GDP growth, per capita GDP, a terrorism measure, a natural disaster index, a

currency index, additional controls, and an error term. The terrorism measure is either the total

number of attacks per capita or the total number of casualties per capita. Tavares (2004) drew

his terrorism variable from data provided by the International Policy Institute for

Counterterrorism (2003). This data consist of 1427 “selected” transnational terrorist events for

the 1987-2001 period.

Page 490: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

14

Using instrumental variables to address the potential endogeneity between terrorism and

real per capita GDP growth, Tavares found that the terrorism variable had a small but significant

negative impact on GDP growth of 0.038% (Tavares, 2004, Table 4). Once additional

determinants of growth (e.g., an education variable, trade openness, primary goods exports, and

the inflation rate) were introduced into the estimating equation, terrorism was no longer a

significant or negative influence on economic growth. This raises a concern because many of

these additional variables are in standard analyses of growth, so that Tavares’ earlier findings

about the consequences of terrorism must be questioned. The absence of key growth variables in

his earlier equations suggests that they were misspecified.

Tavares (2004) went on to compare the costs of terrorism in democratic versus

nondemocratic countries. For our purposes, the key part of his regression equation is:

( )10.261 0.029 0.121 other explanatory variables,it it it it ity y T T R−∆ = ∆ − + × + (3)

where ity∆ is country’ i’s growth of per capita GDP in year t, 1ity −∆ is country i’s growth of per

capita GDP in year t − 1, Tit is the number of terrorist attacks in country i in year t, and Rit is a

measure of political rights in country i in year t. This last variable increases when the level of

political freedom rises.

Equation (2) is a dynamic specification for which current period growth is affected by

growth in the previous period. In contrast to Tavares’ original specification that ignored political

rights, all of the coefficients reported in equation (2) are statistically significant. The coefficient

on Tit indicates that a single terrorist incident in country i in year t reduces annual growth for that

year by 0.029%. Since the model is dynamic, this growth effect is persistent. These results are

consistent in size with those of BHO. An interesting finding involves the positive coefficient on

the interaction term Tit × Rit, for which the effect of a typical terrorist attack decreases as the level

Page 491: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

15

of political freedom increases. That is, democracies are better able to withstand terrorist attacks

than other types of governments with less flexible institutions. Yet another interpretation is that

democracies are better prepared to weathered attacks because they rely on markets to allocate

resources.

Case studies

To date, there are two careful macroeconomic case studies on specific terrorism-ridden

economies. Both studies are careful and utilize methodologies that could be applied to other

countries – e.g., Colombia – that have experienced a prolonged campaign of terrorism. For the

Basque region, Abadie and Gardeazabal (2003) tried to estimate the per capita GDP losses that

are attributable to a twenty-year terrorist campaign. Because the Basque region differs from

other regions in Spain, the authors had to construct a “synthetic” comparison region by taking a

weighted average combination of other Spanish regions. The weights were chosen to yield the

values to key growth variables – e.g., real per capita GDP, investment share of GDP, population

density, and human capital measures – that are nearly identical to those of the Basque region

prior to its terrorism. The authors demonstrated that the Basque and synthetic regions displayed

similar per capita GDP values prior to 1975 and the start of the terror campaign. Thereafter, a

GDP gap opened that averaged 10% over the next twenty years. During high-terrorism episodes,

the gap exceeded 10%, while, during low-terrorism episodes, the gap closed somewhat. This is a

clever methodology where the synthetic region serves as the counterfactual control.

Eckstein and Tsiddon (2004) applied a vector autoregression (VAR) methodology to

investigate the effects of terrorism on the macroeconomy of Israel. These authors used quarterly

data from 1980 through 2003 to analyze the effects of terrorism on real GDP, investment,

exports, and nondurable consumer goods. Each of these variables served as a dependent variable

Page 492: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

16

in their four-equation VAR system. Their measure of terrorism was a weighted average of the

number of Israeli fatalities, injuries, and noncasuality incidents. Their terrorism data included

domestic and transnational attacks in Israel. They found that the initial impact of terrorism on

economic activity was as short as a single quarter. Moreover, terrorism’s impact on exports and

investment was three times larger than on nondurable consumption and two times larger than on

GDP.

Eckstein and Tsiddon (2004) also employed their VAR estimates to calculate the

counterfactual time paths of the four macroeconomic variables under the assumption that all

terrorism ceased at the end of 2003:Q4. In this counterfactual exercise, real per capita GDP is

forecasted to grow 2.5% from the beginning of 2003:Q4 to 2005:Q3. If, however, terrorism held

steady, then the estimated VAR predicted a zero rate of per capita GDP growth. Finally, if

terrorism in Israel were to continue its upward trend, real per-capita GDP would fall by about

2%. The figures for investment were even more dramatic because investment would decline by

10% annually with this upward trend.

In another set of experiments, Eckstein and Tsiddon (2004) calculated the economic

consequences of the Intifada. They used their data to estimate the VAR through 2000:Q3 (the

beginning of the Intifada) and forecasted real GDP for quarters 2000:Q4 through 2003:Q4.

Forecasts were conducted assuming either no subsequent terrorism or terrorism at the levels that

actually prevailed for these three years. The differences in forecasts translated into a per capita

GDP loss of about 10% for terrorism continuing at its prevailing elevated level, which is quite

substantial.

The five key macroeconomic studies are summarized in Table 1 for ready reference. The

first column indicates the study and its basic methodology,4 while the second column provides a

short description of the study. In the right-hand column, some key findings are indicated.

Page 493: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

17

4. Developed and Developing Countries Contrasts

The macroeconomic case studies have been for two small high-income countries. In

Tavares (2004) and BHO (2004), a wide range of countries have been included in the cross

section making it difficult to know anything specific about developing countries. This is

underscored by the failure in BHO (2004) of many of the regional panels for Asia and elsewhere

to yield significant findings for the terrorist variable. Within each regional sample, there was no

culling of the developed or richer countries. The cross-sectional study that investigated

developing countries per se is Gupta et al. (2004), which has some key failings. First, there is no

true terrorism measure, so that the ICRG index is more reflective of internal conflict than of

terrorism. Second, this study combined countries with vastly different types of internal conflict;

thus, the average picture that emerges may not reflect of what most developing countries

suffered from terrorism. Developing countries with similar terrorist campaigns should be

combined in the same panel. Third, the cross section included countries with diverse political

and economic institutions. Developed institutions should enable a country to better absorb

terrorist attacks. To date, there is no cross-sectional study of the consequences of terrorism on

developing countries.

There are a number of anticipated differences between how developed and developing

countries are able to handle terrorism. Developed countries possess more capable governmental

institutions that can apply monetary, fiscal, and other policies to recover from either a large-scale

attack or a prolonged campaign. The United States case, discussed above, is instructive. For

example, the insurance crisis caused by 9/11 was addressed by the US Congress approving

emergency insurance legislation to cover catastrophic terrorism losses in the short run

(Kunreuther, Michel-Kerjan, and Porter, 2003). Markets are better able in developed, than in

Page 494: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

18

developing, countries to respond to terrorism-induced changes in risk. Developed countries are

also better equipped than developing countries to monitor their economies to determine the need

for monetary or fiscal stimuli following terrorist attacks. In addition, developed countries can

take decisive and effective security measures to restore confidence. Many less-developed

countries lack this capacity. Such security measures can speed recovery. Because developing

countries are more dependent on the rest of the world for demands for their products and

services, these countries are more vulnerable than richer countries to terrorism shocks in

neighbors and important trading partners. Compared with their richer counterparts, developing

countries are less diversified and more apt to experience a larger impact from a sector-specific

attack. The earlier Yemen shipping example illustrates this insight. Finally, the presence of

internal conflicts in many developing countries compromises their ability to address terrorist

attacks, which may resonate with other forms of internal strife.

These differences between developed and developing countries have implications for

panel studies. Such differences raise real issues with the information encapsulated in the average

picture given by large-scale panels that combine countries at all stages of development.

Moreover, these differences indicate that controls are needed for neighboring conflicts,

corruption, and internal conflicts. To date, only the last control is included in past panel studies.

Future studies of developing countries should take two forms: (i) case studies of specific

developing countries and (ii) panel studies of a homogeneous set of developing countries.

5. Microeconomic Consequences of Terrorism

There have been studies dating back to the early 1990s that have investigated the

microeconomic consequences of sector-specific attacks. In particular, studies have covered

tourism, trade, and financial sectors.

Page 495: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

19

Tourism

Attacks against tourist venues (e.g., airports, hotels, or attractions) or tourist mode of

transportation (e.g., airplanes) make a tourist consider the risks involved with their vacation

plans. Even a single heinous act at a popular terrorist venue can cause tourists to alter plans by

either vacationing at home or else going to a terrorism-free country for a holiday. Time-series

analysis has been used in a number of tourism studies to gauge the impact of terrorism in the

target country or region. A transfer function analysis is particularly suited to estimate the short-

and long-run effects of a terrorist attack on a country’s tourist industry. A very simple transfer

function for, say, the effect of terrorism on Spanish tourism is:

0 1 1 0 ,t t t ty a b y c x ε−= + + + (4)

where yt is the number of tourists visiting Spain in period t, xt is the number of terrorist incidents

in Spain in period t, and εt is the error term. This equation reflects that the number of tourists

visiting Spain in any period is affected by its own past, 1,ty − as well as the number of terrorist

events in Spain. Because periods with high versus low levels of tourism tend to cluster, we

expect b1 to be positive; a large yt tends to follow a large 1ty − . In (4), c0 measures the

contemporaneous effect of a terrorist incident on tourism; a negative c0 means that terrorism

negatively impacts tourism. Suppose that c0 = −3 and there are four terrorist incidents during a

particular period (i.e., xt = 4), then the contemporaneous influence of terrorism on tourism is then

−12. If the unit of measurement is a thousand, then terrorism has lost the country 12,000 tourists

following the attacks. If, moreover, b1 is not zero, then there is persistence in the system and

effects on terrorism could be long-lasting.

Equation (4) can be used to estimate the indirect effects on terrorism. To perform the

Page 496: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

20

desired counterfactual analysis, a researcher would estimate equation (4) to obtain the

magnitudes of a0, b1, and c0 for a particular country. Once these values are ascertained, what

each value of yt would have been in the absence of terrorism (i.e., xt = 0) can be calculated. The

difference between this counterfactual value and the actual value of yt is then due to the effect of

terrorism. This analysis can be generalized in a number of directions: (i) additional lagged

values of the dependent variable; (ii) lagged values of the terrorism variable; and (iii) more

complicated causality between yt and xt. The first generalization allows for a more complex

autoregressive (AR) process where persistence can be long-term, while the second generalization

permits alternative impact patterns where terrorism may affect the dependent variable with a lag.

The third generalization can permit terrorism to affect tourism and vice versa, so that an equation

is required for each of these variables. In this case, a VAR methodology applies and causality

tests can fix the direction of dependency. A fourth generalization can allow for lagged values to

the error terms, so that a moving average (MA) process applies.

Enders and Sandler (1991) applied a VAR methodology to Spain for the 1970-91 period,

during which Euzkadi ta Askatasuna (ETA) and other groups had terrorist campaigns. During

1985-87, ETA directed its bombs and threats against the Spanish tourist trade and even sent

letters of warning to travel agents in Europe. Using monthly data, we showed that the causation

was unidirectional: terrorism affected tourism but not the reversed. Each transnational terrorist

incident was estimated to dissuade over 140,000 tourist after all monthly impacts were included.

This can translate into a sizable amount of lost revenue when multiplied by the average spending

per tourist. Transnational terrorist attacks denote the appropriate terrorism measure, because we

were interested in the costs to the foreign tourist trade.

In a follow-up study, Enders, Sandler, and Parise (1992) used an autoregressive

integrated moving average (ARIMA) analysis with a transfer function to investigate the impact

Page 497: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

21

of transnational terrorism on tourism in Austria, Spain, and Italy for 1974-88 – three countries

with highly visible transnational terrorist attacks during this period. The dependent variable was

the share of tourist receipts from the region. These authors found that terrorism had a significant

negative lagged influence on these tourism shares that varied by country: two quarters for Italy,

three quarters for Greece, and seven quarters for Austria. Since it takes time for tourists to revise

plans, the lags are understandable. Losses varied by country: Austria lost 3.37 billion special

drawing rights (SDRs); Italy lost 861 billion SDRs; and Greece lost 472 million SDRs. The

authors also showed that some of the lost revenues left a sample of European countries for safer

venues in North America.

Drakos and Kutan (2003) applied the Enders-Sandler-Parise methodology to Greece,

Israel, and Turkey for 1991-2000. These authors used monthly transnational terrorism data,

drawn from ITERATE. In addition to the home-country impacts, Drakos and Kutan were

interested in cross-country or “spillover” effect – both positive and negative – that may arise if,

say, an attack in Israel shifts would-be Israeli tourists to safer venues in Italy, Greece, or

elsewhere. Their ARIMA model with a transfer function had an equation for each country’s

tourist shares, where, say, the share of tourism in Greece depends on: past tourist shares in

Greece; current and past terrorist attacks in Greece; current and past terrorist attacks in Israel;

and current and past terrorist attacks in Turkey. There was also an equation for tourist shares of

Italy, which was a relatively safe haven. Owing to transnational terrorist attacks, these authors

calculated that Greece lost 9% of its tourism market share; Turkey lost over 5% of its tourism

market share; and Israel lost less than 1% of its tourism market. Close to 89% of lost tourism

due to terrorism in Europe flowed to safer tourist venues in other countries.5 Drakos and Kutan

also uncovered significant spillover effects – low-intensity terrorist attacks in Israel reduced

Greek tourism revenues.

Page 498: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

22

Net foreign direct investment

Foreign investors must be aware of all kinds of risks, including those posed by terrorism.

This risk is especially germane when a terrorist campaign specifically targets net foreign direct

investment (NFDI). Terrorist risks raise the costs of doing business as expensive security

measures must be deployed and personnel must be duly compensated, both of which reduce the

returns to NFDI. As these risks rise, investors will redirect their investments to safer countries.

Enders and Sandler (1996) provided estimates of the effects of terrorism on NDFI in two

relatively small European countries – Greece and Spain. Large countries – e.g., France,

Germany, and the United Kingdom – draw their foreign capital inflows from diversified sources

and are able to endure attacks without a measurable diversion of inflows. Large countries are

also better equipped to take defensive measures after an attack to restore confidence. Greece and

Spain were selected as case studies insofar as both experienced numerous transnational terrorist

attacks aimed at foreign commercial interests during the 1968-91 sample period.

For Spain, we applied an ARIMA model with a transfer function that associated NFDI to

its past values and to terrorist attacks; for Greece, we applied a VAR model that related NFDI to

its past values and to terrorist attacks. Once again, we modeled a counterfactual exercise,

analogous to those for tourism, to compute the terrorism-induced losses in NFDI in these two

economies. For Spain, there was a long delay of 11 quarters between the advent of a terrorist

incident and the response in NFDI. A typical transnational terrorist incident in Spain was

estimated to reduce NFDI by $23.8 million. On average, transnational terrorism reduced annual

NFDI in Spain by 13.5%. For Greece, the story was similar, transnational terrorism curbed

annual NFDI by 11.9%. These are sizable losses for two small economies that were heavily

dependent on NFDI as a source of savings during the sample period. We also investigated the

Page 499: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

23

influence of terrorism on NFDI in a number of large economies, such as France and the United

Kindom, and found no significant terrorism influence on these countries’ NFDI.

Trade influence

In a recent contribution, Nitsch and Schumacher (2004) estimated the effects of

transnational terrorism on bilateral trade flows using a standard trade-gravity model. In their

model, trade flows between trading partners depend on terrorist attacks, the distance between the

two countries, an income variable, an income per capita variable, and a host of dummy variables.

They formally estimated the effects of terrorism within each country on all of the nation’s

trading partners. The data set consists of 217 countries and territories over the 1968-79 period.

Their terrorism data were drawn from ITERATE and only included transnational attacks, even

though domestic terrorism would have also affected trade flows. The authors found that the first

transnational terrorist attack reduced bilateral trade by almost 10%, which is a very sizable

influence that may be picking up the effect of domestic terrorism. At times, transnational

terrorism is highly correlated with domestic terrorism. Nitsch and Schumacher also found that a

doubling of the number of terrorist incidents reduced bilateral trade by 4%; hence, high-terrorism

nations had a substantially reduced trade volume. Although more recent terrorism data are

available, the authors only examined this historical period, which is not reflective of current-day

terrorism.

Financial markets

Chen and Siems (2004) applied an event-study methodology to investigate changes in

average returns of stock exchange indices to 14 terrorist and military attacks that dated back to

1915. An event study computes abnormal returns – negative or positive – following some shock

Page 500: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

24

or occurrence, such as the downing of Pan Am flight 107 or 9/11. These authors showed that the

influence of terrorist events on major stock exchanges, if any, is very transitory, lasting just one

to three days for most major incidents. The sole exception is 9/11 where DOW values took 40

days to return to normal. These authors also showed that this return period varied according to

the stock exchange – exchanges in Norway, Jakarta, Kuala Lampur, and Johannesburg took

longer to rebound, while those in London, Helsinki, Tokyo, and elsewhere took less time to

rebound. Most terrorist events had little or no impact on major stock exchanges.

Eldor and Melnick (2004) applied time-series methods to ascertain the influence of the

Israeli terror campaign following September 27, 2000 on the Tel Aviv 100 Stock Index (TA

100). Given the continual nature of these terrorist attacks, the time-series method is clearly

appropriate. Analogous to the other time-series studies, they performed a counterfactual exercise

to determine losses to the value of the TA 100 index by using the estimated time-series equation

for returns but substituting a zero value in for terrorist attacks. Their analysis estimated that the

TA 100 was 30% lower on June 30, 2003, owing to the terrorist campaign. When these authors

investigated specific types of terrorist attacks, they found that only suicide attacks had a

significant impact. Their article also related the Israeli terrorist campaign to exchange rate

fluctuations.

By way of summary, Table 2 indicates the microeconomic studies, their methods, study

description, and major findings.

6. Methodology Discussion

To date, two basic methodologies have been applied to estimate macroeconomic and

microeconomic consequences of terrorism: panel estimates with large cross sections of countries

and time-series estimates with one or more equations. Each methodology has its advantages and

Page 501: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

25

disadvantages as displayed in Table 3.

Our own view favors the time-series methods, which have been effectively used to come

up with estimates of tourism losses, NFDI losses, and stock market declines. The Eckstein and

Tsiddon (2004) study of Israel also illustrates that the same method can be employed to estimate

the consequences of terrorism on macroeconomic variables such as consumption per capita and

GDP per capita. Not only can time-series analyses lend themselves to counterfactual exercises,

but also they can be used for forecasting purposes. Although most time-series estimates do not

have antecedent behavioral models, the Eckstein and Tsiddon (2004) article shows that this need

not be the same, since their estimating equations stemmed from a dynamic theoretical model. By

incorporating a VAR analysis with multiple equations (i.e., one for each country), a researcher

can examine cross-border spillovers. This is demonstrated by Drakos and Kutan’s (2003)

analysis of tourism in the Mediterranean region.

Our concerns about cross-sectional studies involve the reliance on large samples, where

countries with wide-ranging incomes, security capacities, institutions, and terrorist experiences

are thrown into the same sample. This extreme heterogeneity for key variables means that the

“average” picture provided by the coefficient estimates may not be descriptive of the experience

of many of the sample countries. We believe that more insight is gained by doing the panel

estimates for a homogenous cohort of countries. Regarding the BHO (2004) study, we are

concerned that the geographical cohorts usually did not yield significant terrorism impacts for

the authors’ first terrorism measure, except for the region with the least terrorism; however, the

entire panel did yield significant consequences of terrorism. The logic of this finding is difficult

to accept. For this particular study, cohorts should have corresponded to countries with similar

income, institutions, and terrorism experience.

We are also concerned that so many different terrorism measures have been used. At

Page 502: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

26

times, more than one measure is employed in the same study. Table 4 lists alternative measures

and the associated study. The most natural measure of terrorism is something that reflects the

frequency of attacks – e.g., the number of terrorist attacks, the number of casualties, or some

index of these measures (e.g., the index used by Eckstein and Tsiddon, 2004). The number of

casualties is a better measure than the number of events if attack intensity is to be captured. The

temporal nature (i.e., daily, monthly, quarterly, or annual) of the attack measure depends on data

availability and econometric considerations. That is, researchers often relied on quarterly totals

to eliminate zero or near-zero observations that would violate the underlying normal distribution,

associated with many time-series methods. Because time-series techniques require many data

points, monthly or daily values may be used to expand the number of observations. If zero

values becomes a problem, estimates can then be based on a discrete Poisson distribution.

The use of a dummy to measure the occurrence of terrorism in a given year loses a lot of

useful information. In addition, a per capita measure of terrorism implies that an incident in a

country with a large population has a smaller influence than in a country with a smaller

population. In fact, the impact of a large-scale event such as 9/11 is, we believe, independent of

the population size. In fact, the impact of terrorist events in general may actually be greater for

countries with larger populations, because there are then more people to intimidate. The logic of

normalizing terrorist incidents by population has never been adequately explained in the

literature. This process is especially worrying for the BHO (2004) study because terrorism was

not significant for most panel cohorts until terrorism was normalized by population. Why this

was the case was never explained. As mentioned earlier, the ICRG measure of internal conflict

does not really capture terrorism per se, and thus, serves as a poor measure.

7. On Terrorism Data

Page 503: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

27

To date, much of the literature has relied on the ITERATE data set of terrorist events.

Based on newspaper and media accounts, ITERATE records many variables – e.g., incident date,

incident location by country, type of events, number killed, groups claiming responsibility, and

demands made – for transnational terrorist events from 1968:Q1 through 2004:Q4. ITERATE

does not classify incidents as transnational terrorism that relate to declared wars or major

military interventions by governments, or guerrilla attacks on military targets conducted as

internationally recognized acts of belligerency. However, ITERATE classifies attacks against

civilians or the dependents of military personnel as terrorist acts when such attacks are intended

to create an atmosphere of fear to foster political objectives. A number of judgments must be

made in terms of what ITERATE includes as a transnational terrorist event. For example, Irish

Republican Army (IRA) attacks in Northern Ireland are not included as transnational terrorist

acts. IRA attacks in England are, however, included.

ITERATE variables are grouped into four files: the COMMON file on incident

characteristics, terrorist characteristics, victim characteristics, and life and property losses; the

FATE file on the fate of the terrorists and extradition; the HOSTAGE file on target of terrorist

demands, negotiation behavior, results of negotiations, and other nations involved in incidents;

and the SKYJACK file on incident characteristics, airline information, location of the incident,

and the number of individuals involved. ITERATE allows a researcher to match terrorist

incidents with countries so as to compute losses from transnational terrorist campaigns. These

losses would have to be inferred from macroeconomic and microeconomic data drawn from

other sources, because ITERATE’s loss variable consists of mostly missing values. ITERATE

does not record domestic events, which are essential when computing the macroeconomic

consequences of terrorism if targeted countries are plagued by both transnational and domestic

terrorist events.

Page 504: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

28

Tavares (2004) drew his terrorism incidents from data provided by the International

Policy Institute for Counterterrorism (IPIC) (2003), whose data set is located online. IPIC

describes its 1427 terrorist incidents for 1987-2001 as “selected” transnational terrorist incidents.

The data source does not, however, give its criteria for classifying an incident as a transnational

terrorist event. Moreover, IPIC does not provide its selection criterion; ITERATE records many

times the number of incidents during the same period. The IPIC selection criterion is particularly

important for judging potential biases. When sampling the incidents, we found many that would

not have satisfied ITERATE’s transnational criterion – e.g., some Palestinian incidents in Israel.

Until this year, the US Department of State (various years) maintained a transnational

terrorism data set that was released annually as Patterns of Global Terrorism. Except for a few

aggregate totals (e.g., total events, events by region, casualties by region, type of target, and type

of event), this data set is not in a form that can be used by researchers because the data files are

not available. The annual reports also contain short descriptions of “significant” attacks that

could be coded for a few variables. Nevertheless, many other events are not reported as

significant events, but could have important economic consequences. Bombs left near foreign

corporate offices may be insignificant if they caused damage but no injuries, but they could still

reduce NFDI.

The National Memorial Institute for the Prevention of Terrorism (MIPT) (2005) also

maintains an online data set on terrorism. From 1968 through 1997, the data consists of

transnational terrorism. Thereafter, MIPT tallies both domestic and transnational terrorist events.

The website makes it easy to make graphs and other displays. A researcher would have to

expend much effort to put the data in a form that would relate incidents by countries so that

statistical analysis on the economic consequences can be accomplished. The addition of

domestic events is very useful but there are only seven years of domestic events. A researcher

Page 505: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

29

must be careful not to use the 1968-2004 data without purging the domestic incidents; otherwise,

there will be a huge inconsistency in data coverage in the post-1997 period.

There are a few data sets available for conducting specific country studies, which is

illustrated by the Abadie and Gardeazal (2003) study of Spain and the Eckstein and Tsiddon

(2004) study of Israel. In the latter case, the Israeli terrorism data came from the International

Policy Institute for Counterterrorism (2003) at the Interdisciplinary Center Herziliya

(http://www.ict.org.il). On a monthly basis, this data set includes the number of incidents,

causality figures, types of events, and other variables of interest. Domestic and transnational

events are included, a necessary inclusion for any country-specific study. We are, however, not

clear how this Israeli data set differs from the IPIC data used by Tavares (2004) for allegedly just

transnational terrorist attacks. Country-specific data sets are available for Colombia, Spain, and

few other countries (e.g., United Kingdom) that have faced significant terrorist campaigns.

The availability of country-specific data sets poses a real problem for panel studies,

because it will be a massive task to assemble sufficient domestic and transnational terrorist

incidents for a cohort of countries. The best alternative is to group together some terrorism-

ridden countries, where such data exist, for a small panel estimate. It would be interesting to

compare these countries’ terrorism-induced declines in real GDP per capita to the experience in a

cohort of rich countries whose terrorism is mostly transnational in character. When combining

country-specific data from different sources, coding consistency is an ever-present worry.

8. Concluding Remarks

Table 5 lists some of the main principles that we have gleaned regarding the economic

consequences of terrorism. A few of these principles are worth highlighting. Given the low

intensity of most terrorist campaigns, the economic consequences of terrorism are generally very

Page 506: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

30

modest and short-lived. Terrorism is not on par with civil or guerilla wars and, in general,

should have very localized economic effects. The likely candidate countries for noticeable

macroeconomic impacts are either developing or small countries that experience a protracted

terrorist campaign. In general, the economic influence of terrorism is anticipated to surface in

specific sectors that face an enhanced terrorism risk, such as the tourist industry or foreign direct

investment.

Except for a couple of case studies, we do not view any of the current macroeconomic

studies as providing convincing quantification of the economic impact of terrorism. Future

studies need to include domestic and transnational terrorist incidents for a homogeneous panel,

for which sample countries are at analogous stages of development and confront similar kinds of

terrorist campaigns. Domestic terrorist data must satisfy consistent criteria when pulled from

different sources. We also support the need for additional case studies, especially of developing

countries. We see the need to extend VAR analysis to a few countries confronting terrorist

campaigns in the same region to capture cross-border influences. Spatial econometric estimation

can identify the dispersion of the economic consequences.

We view the microeconomic estimates of terrorism consequences as being quite

successful and informative. The methodology can be extended to other countries, especially

developed countries, as case studies and small panels. More effort should be expended to

identify sector-specific, cross-border spillovers – e.g., in the case of foreign direct investment. In

addition, the methods can be applied to vulnerable sectors previously unexamined.

Page 507: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

31

Footnotes

1. For civil conflicts, these spatial spillovers are measured by Murdoch and Sandler

(2002, 2004).

2. Studies include Blomberg, Hess, and Orphanides (2004), Blomberg, Hess, and

Weerapana (2004), Li (2005), and Li and Schaub (2004). These studies investigated causes

beyond economic conditions – e.g., globalization, democracy, and government restraint.

3. On terrorism-induced substitution, see Enders and Sandler (1993, 2004, 2005).

4. Some studies utilized additional methodologies. For example, BHO (2004) also

presented a VAR analysis. Abadie and Gardeazabal (2003) did an event study of abnormal

returns of two portfolios of stocks: one for firms with business interests in the Basque region

and one for firms with business interests elsewhere. The performance of the former portfolio

was tied to terrorist events in the Basque region.

5. Sloboda (2003) also used a transfer function to analyze the effects of terrorism on

tourism revenues for the United States following the Gulf War of 1991.

Page 508: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

32

References

Abadie, Alberto and Javier Gardeazabal (2003), “The Economic Cost of Conflict: A Case Study

of the Basque Country,” American Economic Review, 93(1), 113-32.

Blomberg, S. Brock, Gregory D. Hess, and Athanasios Orphanides (2004), “The Macroeconomic

Consequences of Terrorism,” Journal of Monetary Economics, 51(5), 1007-32.

Blomberg, S. Brock, Gregory D. Hess, and Akila Weerapana (2004), “Economic Conditions and

Terrorism,” European Journal of Political Economy, 20(2), 463-78.

Chen, Andrew H. and Thomas F. Siems (2004), “The Effects of Terrorism on Global Capital

Markets,” European Journal of Political Economy, 20(2), 249-66.

Collier, Paul, V. L. Elliott, Håvard Hegre, Anke Hoeffler, Marta Reynal-Querol, and Nicholas

Sambanis (2003), Breaking the Conflict Trap: Civil War and Development Policy

(Washington, DC: World Bank and Oxford University Press).

Collier, Paul and Anke Hoeffler (2004), “Greed and Grievance in Civil War,” Oxford Economic

Papers, 56(4), 563-95.

Collier, Paul and Nicholas Sambanis (2002), “Understanding Civil Wars: A New Agenda,”

Journal of Conflict Resolution, 46(1), 3-12.

Drakos, Konstantinos (2004), “Terrorism-Induced Structural Shifts in Financial Risk: Airline

Stocks in the Aftermath of the September 11th Terror Attacks,” European Journal of

Political Economy, 20(2), 436-46.

Drakos, Konstantinos and Ali M. Kutan (2003), “Regional Effects of Terrorism on Tourism in

Three Mediterranean Countries,” Journal of Conflict Resolution, 47(5), 621-41.

Eckstein, Zvi and Daniel Tsiddon (2004), “Macroeconomic Consequences of Terror: Theory

and the Case of Israel,” Journal of Monetary Economics, 51(5), 971-1002.

Eldor, Rafi and Rafi Melnick (2004), “Financial Markets and Terrorism,” European Journal of

Page 509: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

33

Political Economy, 20(2), 367-86.

Enders, Walter and Todd Sandler (1991), “Causality between Transnational Terrorism and

Tourism: The Case of Spain,” Terrorism, 14(1), 49-58.

Enders, Walter and Todd Sandler (1993), “The Effectiveness of Anti-Terrorism Policies: A

Vector-Autoregression-Intervention Analysis,” American Political Science Review,

87(4), 829-44.

Enders, Walter and Todd Sandler (1996), “Terrorism and Foreign Direct Investment in Spain and

Greece,” Kyklos, 49(3), 331-52.

Enders, Walter and Todd Sandler (2004), “What Do We Know About the Substitution Effect in

Transnational Terrorism?,” in Andrew Silke (ed.), Research on Terrorism: Trends,

Achievements and Failures (London: Frank Cass), 119-37.

Enders, Walter and Todd Sandler (2005), “Distribution of Transnational Terrorism among

Countries by Income Class and Geography after 9/11,” International Studies Quarterly,

49(4), forthcoming.

Enders, Walter and Todd Sandler (2006), The Political Economy of Terrorism (Cambridge:

Cambridge University Press), forthcoming.

Enders, Walter, Todd Sandler, and Gerald F. Parise (1992), “An Econometric Analysis of the

Impact of Terrorism on Tourism,” Kyklos, 45(4), 531-54.

Gupta, Sanjeev, Benedict Clements, Rina Bhattacharya, and Shamit Chakravarti (2004). “Fiscal

Consequences of Armed Conflict and Terrorism in Low- and Middle-Income Countries,”

European Journal of Political Economy, 20(2), 403-21.

International Policy Institute for Counterterrorism (2003), Terrorism Database [http://ict.org.il],

accessed May 19, 2005.

Ito, Harumi and Darin Lee (2004), “Assessing the Impact of the September 11 Terrorist Attacks

Page 510: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

34

on U.S. Airline Demand,” unpublished manuscript, Brown University, Providence, RI.

Kunreuther, Howard, Erwann Michel-Kerjan, and Beverly Porter (2003), “Assessing, Managing

and Financing Extreme Events: Dealing with Terrorism,” Working Paper 10179,

National Bureau of Economic Research, Cambridge, MA.

Li, Quan (2005), “Does Democracy Promote Transnational Terrorist Incidents?,” Journal of

Conflict Resolution, 49(2), 278-97.

Li, Quan and Drew Schaub (2004), “Economic Globalization and Transnational Terrorism,”

Journal of Conflict Resolution, 48(2), 230-58.

Mickolus, Edward F., Todd Sandler, Jean M. Murdock, and Peter Flemming (2004),

International Terrorism: Attributes of Terrorist Events, 1968-2003 (ITERATE) (Dunn

Loring, VA: Vinyard Software).

Murdoch, James C. and Todd Sandler (2002), “Economic Growth, Civil Wars, and Spatial

Spillovers,” Journal of Conflict Resolution, 46(1), 91-110.

Murdoch, James C. and Todd Sandler (2004), “Civil Wars and Economic Growth: Spatial

Spillovers,” American Journal of Political Science, 48(1), 138-51.

National Memorial Institute for the Prevention of Terrorism (2005). MIPT Terrorism Database

[http://www.mipt.org], accessed May 19, 2005.

Nitsch, Volker and Dieter Schumacher (2004), “Terrorism and International Trade: An Empirical

Investigation,” European Journal of Political Economy, 20(2) 423-33.

Sandler, Todd (2003), “Collective Action and Transnational Terrorism,” World Economy, 26(2),

779-802.

Sandler, Todd and Walter Enders (2004), “An Economic Perspective on Transnational

Terrorism,” European Journal of Political Economy, 20(2), 301-16.

Sloboda, Brian W. (2003), “Assessing the Effects of Terrorism on Tourism by the Use of Time

Page 511: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

35

Series Methods,” Tourism Economics, 9(2), 179-90.

Tavares, Jose (2004), “The Open Society Assesses its Enemies: Shocks, Disasters and Terrorist

Attacks,” Journal of Monetary Economics, 51(5), 1039-70.

United States Department of State (various years), Patterns of Global Terrorism (Washington,

DC: US Department of State).

United States Department of State Fact Sheet (2002), “Yemen: The Economic Cost of

Terrorism,” [http://www.state.gov/s/ct/rls/fs/2002/15028.htm], accessed 12 December

2004.

Page 512: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Figure 1. Macroeconomic variables and 9/11Panel 1: Real GDP

(200

1:Q

3 =

100)

1999 2000 2001 2002 2003 200490

95

100

105

110

115

120

Panel 4: Unemployment rate

per

cen

t o

f la

bo

r fo

rce

1999 2000 2001 2002 2003 20043.5

4.0

4.5

5.0

5.5

6.0

6.5

Panel 2: Consumer confidence

(198

5 =

100)

1999 2000 2001 2002 2003 200460

70

80

90

100

110

120

Panel 5: Federal funds rate

per

cen

t p

er y

ear

1999 2000 2001 2002 2003 20041

2

3

4

5

6

7

Panel 3: Consumption of durables

(200

1:Q

3 =

100)

1999 2000 2001 2002 2003 200490

95

100

105

110

115

120

Panel 6: Federal government savings

Bill

ion

s o

f $

1999 2000 2001 2002 2003 2004-500

-250

0

250

Page 513: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Table 1. Macroeconomic studies of the impact of terrorism Study and method Description Findings

Blomberg, Hess, and Orphanides (2003) Cross section and panel

Growth in per capita income as a function of conflict, terrorism, and standard growth variables. Some runs control for endogeneity concerns. Entire sample and select cohorts are analyzed.

Terrorism has a small effect on per capita income growth for entire sample, but not for most cohorts. Terrorism reduces I/Y, while it increases G/Y.

Gupta, Clements, Bhattacharya, and Chakravarti (2004) Three-equation cross-section structural model.

Eq. (1) is for the determinants of real per capita GDP growth; eq. (2) is for the determinants of governmental revenue as a share of GDP; and eq. (3) is for the determinants of defense spending as a share of GDP. A conflict-terrorism index is a dependent variable in each equation.

The conflict index has no direct effect on economic growth; it has an indirect effect by increasing the defense spending share, which lowers economic growth.

Tavares (2004) Cross section

Growth in real per capita GDP is a function of logged growth in real per capita GDP, terrorism, other crises, and growth variables. Some runs account for simultaneity bias. Introduces an interactive term between terrorism and political rights as a determinant of growth in per capita GDP.

Terrorism has a small effect on growth when standard growth variables are left out. When these variables are included, terrorism has no influence. Evidence that countries with well-developed democratic institution can withstand terrorism attacks

Abadie and Gardeazabal (2003) Case study for Spain

Contrast the Basque region with terrorism and a “synthetic” region without terrorism. The latter is based on a weighted composite of other peaceful regions in Spain.

Finds a 10% average gap in per capita GDP that they attribute to terrorism over a twenty-year period

Eckstein and Tsiddon (2004) VAR for Israel

The four interactive time series include per capita GDP, investment, exports, and nondurable consumption.

Terrorism has a significant negative impact on per capita GDP, investment, and exports. Terrorism’s influence on investment and exports is three times its effect on per capita GDP. Counterfactual exercise shows that the high recent levels of terrorism resulted in a 2% annual decline in per capita GDP.

VAR denotes vector autoregression

Page 514: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Table 2. Microeconomic studies of the impact of terrorism Study and method Description Findings

Enders and Sandler (1991) VAR

Using monthly data for 1970-99, the study relates terrorism and tourism for Spain. A causality test establishes that terrorism affects tourism, but not the reverse.

A typical terrorist incident is estimated to scare away just over 140,000 tourists when all monthly impacted are combined.

Enders, Sandler, and Parise (1992) ARIMA with a transfer function

Relates share of tourist receipts to lagged shares of tourist receipts and lagged terrorist attacks. Focuses on Austria, Spain, and Italy for 1974-88. Other continental countries included to investigate out-of-region losses.

During sample period, tourist losses varied: Austria lost 3.37 billion SDRs; Italy lost 861 million SDRs; and Greece lost 472 million SDRs. The sample of Europe countries lost 12.6 billion SDRs of tourist receipts to North America.

Drakos and Kutan (2003) ARIMA with a transfer function

Using monthly data for 1991-2000, the study relates a country’s share of tourist receipts to terrorism. Focuses on Greece, Israel, and Turkey. Allows for terrorist-induced substitutions within and among regions.

Greece lost about 9% of its tourism market shares due to terrorism; Israel lost less than 1% of its tourism market share due to terrorism; and Turkey lost just over 5% of its tourism market share due to terrorism. About 89% of lost European tourism flowed to safer regions.

Enders and Sandler (1996) ARIMA with transfer function for Spain VAR for Greece.

Employs time-series methods to ascertain losses in net foreign direct investment (NFDI) due to terrorism. The sample period is 1968-91.

On average, terrorism reduced annual NFDI in Spain by 13.5%, while it lowered annual NFDI in Greece by 11.9%. There was a long lag between an incident and its impact on NFDI. Large rich countries weathered terrorism without displaying a loss in NFDI.

Nitsch and Schumacher (2004) Trade-gravity model

Terror attacks are added to a gravity model to ascertain their impact on bilateral trades for over 200 countries for 1960-93. Independent variables include a language dummy, a colonizer dummy, common border, and other controls.

Terrorist incidents in a trading partner reduce bilateral trade by almost 10%, compared with terrorism-free trading partners.

Page 515: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

VAR denotes vector autoregression and ARIMA is autoregressive integrated moving average.

Table 2. continued Chen and Siems (2004) Events-study methodology

This study applies the events-study methodology to uncover how many days are required for stock markets to recover their value after a large-scale terrorist attack.

For the Dow, market value is recovered in 1 to a few days following large-scale terrorist attacks. For 9/11, the Dow recovered in 40 days. Major conflicts are associated with long recovery periods.

Eldor and Melnick (2004) Time-series methods

Relies on time-series methods to display the influence of terrorist attacks on the Israeli stock market. Daily observations are utilized.

The terrorist campaign beginning on September 27, 2000 lowered stock values on the Tel Aviv exchange by 30%. Only suicide attacks had a significant influence. The size of the attack in terms of casualties was a significant determinant of financial market losses.

Page 516: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Table 3. Measurement of economic consequences of terrorism: panel versus time series Panel estimation ! Advantages

• A wide variety of countries can be considered. • Variation in key variables (e.g., per capita GDP) is larger. • Degrees of freedom are large. • The influence of terrorism on cohorts can be compared and contrasted.

! Disadvantages

• The estimation’s average picture may not be descriptive of many (any) sample countries, especially when the panel includes vastly diverse countries.

• Data problems may arise from using different sources. • The dynamic effect of terrorism on key variables are not displayed. • Cross-border spillovers are difficult to identify.

Time-series estimation ! Advantages

• There is no need to construct a behavioral model with explicit exogenous and endogenous variables.

• Dynamic processes can be readily identified; i.e., can evaluate shocks and the pattern of adjustment over time.

• Forecasts can be provided. • Microeconomic impacts can be readily identified. • Cross-border spillovers can be estimated.

! Disadvantages

• The estimated model may be atheoretical with no antecedent behavioral model. • The number of countries examined is severely limited. • A large number of observations are required. • A generalized picture across nations is not given.

Page 517: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Table 4. Alternative measures for terrorism Number of terrorist attacks Drakos and Kutan (2003): monthly totals Eldor and Melnick (2004): daily totals Enders and Sandler (1991): monthly totals Enders and Sandler (1996): quarterly totals Enders, Sandler, and Parise (1992): quarterly totals Nitsch and Schumacher (2004): annual totals and totals for entire 1968-79 period Tavares (2004): annual totals Occurrence of terrorism in a given year (dummy variable) Blomberg, Hess, and Orphanides (2004) Nitsch and Schumacher (2004) Terrorism incidents per capita Tavares (2004): annual total attacks per capita

also broken down according to target, organization, and casualties. Blomberg, Hess, and Orphanides (2004) International Country Risk Guide ratings on international conflict Gupta, Clements, Bhattacharya, and Chakravarti (2004) Specific terrorist events Abadie and Gardeazabal (2003) Chen and Siems (2004) Terrorism index Eckstein and Tsiddon (2004): equally weights the number of attacks, the number of deaths, and the number of injured. Number of deaths from terrorism Abadie and Gardeazabal (2003)

Page 518: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

Table 5. Economic impact of terrorism: summarizing principles • For most economies, the economic consequences of terrorism are generally very modest and

of a short-term nature. • Large diversified economies are able to withstand terrorism and not display adverse

macroeconomic influences. Recovery is rapid even from a large-scale terrorist attack. • Developed countries can use monetary and fiscal policies to offset adverse economic impacts

of large-scale attacks. Well-developed institutions also cushion the consequences. • The immediate costs of most terrorist attacks are localized, thereby causing a substitution of

economic activity away from a vulnerable sector to relatively safe areas. Prices can then reallocate capital and labor quickly.

• Terrorism can cause a reallocation from investment to government spending. • The effects of terrorism on key economic variables – e.g., net foreign direct investment – are

anticipated to be greatest in small economies confronted with a sustained terrorist campaign. • Some terrorist-prone sectors – e.g., tourism – have displayed substantial losses following

terrorist attacks. • Small countries, plagued with significant terrorist campaigns, display macroeconomic

consequences in terms of losses in GDP per capita.

Page 519: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

January 2008 VITA for Todd Sandler PERSONAL DATA Name: Todd Sandler Marital Status: Married, 1 son (Tristan) Rank: Vibhooti Shukla Professor of Economics and Political Economy Wife’s Name: Jean Marie Murdock Address: School of Economic, Political and Policy Sciences Home Fax: 972-470-0103

University of Texas at Dallas Office Phone 972-883-6725 800 W Campbell Road Fax: 972-883-6486 Richardson, TX 75080-3021 e-mail: [email protected]

EDUCATIONAL BACKGROUND:

B.A., (cum laude) State University of New York at Binghamton, 1968. M.A., State University of New York at Binghamton, 1970 (one semester at Texas A & M, 1968). Ph.D. in Economics, State University of New York at Binghamton, 1971.

DISSERTATION TITLE: A Contribution to the Theory of Devaluation MAJOR AREAS:

Public Economics and Public Choice Applied Microeconomic Theory International Political Economy International Relations Study of Terrorism Natural Resources and Environmental Economics Defense and Peace Economics International Trade and Finance

COURSES TAUGHT:

Intermediate Micro; Intermediate Macro; Mathematical Economics; Graduate Seminar in Micro; Graduate Micro I; Graduate Micro II; Graduate Macro I; Principles of Economics (Micro, Macro); Graduate Seminar in Public Finance; Public Choice; Environmental Economics; Graduate Managerial Economics; Graduate Welfare Theory; Graduate Theory of Public Goods and Externalities; Honors Microeconomic Principles, Honors Seminar on Terrorism; Undergraduate Public Finance; Seminar in Economics and Security; International Policy Analysis; Global Economy; International Terrorism and Liberal Democracy, Graduate Public Finance; Honors Game Theory; and Political Economy of Terrorism.

Page 520: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

2

ACADEMIC POSITIONS:

• Vibhooti Shukla Professor of Economics and Political Economy, University of Texas at Dallas, August 2006 on.

• Joint appointment as Professor of International Relations, Economics, and Law, Law

School, University of Southern California, March 2005 on. • Robert R. and Katheryn A. Dockson Professor in International Relations and Economics,

University of Southern California, August 2000 on.

• Distinguished Professor of Economics and Political Science, Iowa State University, April 1995 to August 2000. Leaves of Absence:

Visiting Fellow, University of Keele, UK, Fall semester 1996. Visiting Distinguished Scholar, University of Newcastle, Australia, May 1996 to

June 30, 1996.

• Professor of Economics, Iowa State University, May 1986 to April 1995. (also given title of Professor of Political Science in September 1988)

Leave of Absence: Honorary Fellow, University of Wisconsin-Madison, January 1990 to June 1, 1990.

• Professor of Economics, University of South Carolina, August 1985 to May 1986.

• Professor of Economics, University of Wyoming, July 1979 to December 1985.

Leaves of Absence: Visiting Fellow, University of York, U.K., August 1983 to October 1983 and May

1984 to July 1, 1984. Visiting Fellow, Australian National University, September 1981 to December

1981 and May 1982 to September 1982. Visiting Scholar, Institute of Social and Economic Research, University of York,

U.K., Summer 1980. Visiting Fellow, University of Aberdeen, Scotland, June to July 1979.

• Associate Professor of Economics, University of Wyoming, June 1976 to June 1979.

Leave of Absence: NATO Fellow, Institute of Social and Economic Research, University of York,

United Kingdom, June 1977 to June 1978.

• Associate Professor of Economics, Arizona State University, September 1975 to June 1976. Leave of Absence:

Visiting Assistant Professor of Economics, State University of New York at Binghamton, September 1974 to August 1975.

• Assistant Professor of Economics, Arizona State University, Tempe, Arizona, September

1971 to August 1975.

Page 521: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

3

HONORS, GRANTS:

• Principal Investigator, Department of Homeland Security, CREATE grant, “Understanding Counterterrorism in a Globalized World,” $75,000, October 2006 to September 2007; $100,000, August 2007 to September 2008.

• Duncan Black Award for best article in Public Choice, 2005. • Co-recipient National Academy of Sciences Award for Behavioral Research Relevant to

the Prevention of Nuclear War, 2003. • Principal Investigator, Swedish Ministry of Foreign Affair, EGDI grant, “Regional Public

Goods,” $40,000, April 2001 to February 2002. • Honorary Visiting Professor, Department of Economics, University of York, October

1999-September 2002, October 2003 to September 2006. • Annual Award for Excellence in Honors Teaching for 1998. One award given per year

for best honors teacher at Iowa State University. • NATO-EAPC Research Fellowship, 1998-2000. • Quality of Communication Award, American Agricultural Economics Association 1998

for book, Global Challenges: An Approach to Environmental, Political, and Economic Problems, first prize.

• Quality of Communication Award, Honorable Mention, American Agricultural Economics Association, 1997 for co-authored book, The Theory of Externalities, Public Goods, and Club Goods, 2nd Edition.

• Visiting Distinguished Scholar, University of Newcastle, Australia, May-June 1996. • Quality of Research Excellence Award, American Agricultural Economics Association,

August 1995 for co-authored paper, “Agricultural Research Expenditures in the U.S.: A Public Goods Perspective,” first prize.

• Liberal Arts and Sciences College Outstanding Teacher at the Introductory Level, 1995. • Visiting Fellow, Federalism Research Centre, Australian National University, May-July

1994. • Senior Fellow, Institute for Policy Reform, Washington, DC, 1994. • Principal Investigator, National Science Foundation grant SBR92-22953 “Alternative

Theories and Tests of Alliance Behavior, Environmental Pacts, and Global Collective Action,” $85,680, June 1, 1993 to November 30, 1994.

• Senior Fellow, Institute for Policy Reform, Washington, DC, 1993. • Senior Fellow, Institute for Policy Reform, Washington, DC, 1992. • Senior Fellow, Institute for Policy Reform, Washington, DC, 1990-91. • Principal Investigator, National Science Foundation grant SES89-07646 “The Economics

of Terrorist Negotiations, The Effectiveness of Terrorist-Thwarting Policies, and Related Issues,” $97,711, July 1, 1989 to June 30, 1991.

• Australian National University Fellowship, 1981. • NATO Postdoctoral Fellowship in the Sciences (NSF) June 1977 to June 1978. • National Defense Education Association Fellowship (Title IV) Texas A & M, September

1968. • State University of New York at Binghamton Fellowship, September 1969 to June 1970.

Page 522: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

4

PROFESSIONAL ORGANIZATIONS: American Economic Association American Political Science AssociationAssociation of Environmental and Resource Economists China Economic Association International Defense Economics Association LIST Society Public Choice Society Public Economic Theorist Association Royal Economic Society Southern Economic Association Western Economic Association International Studies Association

REFEREED PUBLICATIONS:

“A Two-Country Investment Accelerator Model,” The Indian Journal of Economics, Volume 53, No. 1, July 1972, pp. 1-11.

“Fiscal Federalism, Spillovers and the Export of Taxes,” (with Robert B. Shelton), Kyklos,

Volume 25, No. 4, 1972, pp. 736-753. “The Rybczynski Theorem, The Gains from Trade and Nonhomogeneous Utility Functions,”

Indian Economic Journal, Volume 21, No. 1, July-September 1973, pp. 19-31. “Exchange Rate Systems, the Marginal Efficiency of Investment and Foreign Direct Capital

Movements: A Comment,” Kyklos, Volume 26, No. 4, 1973, pp. 866-868. “Optimum Population: A Further Look,” (with Timothy D. Hogan), Journal of Economic

Theory, Volume 6, No. 6, December 1973, pp. 582-584. “Devaluation, Capital Flows and the Balance of Payments: A Respecification,”

Weltwirtschaftliches Archiv., Volume 110, No. 2, June 1974, pp. 244-258. “The Short-Run Shifting of the Corporate Income Tax: A Theoretical Investigation,” (with

Jon Cauley), Public Finance, Volume 29, No. 1, 1974, pp. 19-35. “A General Class of Production Functions with Nonlinear Isoclines: Comment,” (with A.

Swimmer), Southern Economic Journal, Volume 41, No. 2, October 1974, pp. 307-308. “Public Goods Theory: Another Paradigm for Futures Research,” (with Jon Cauley),

Futures, Volume 6, No. 5, October 1974, pp. 423-428. “Pareto Optimality, Pure Public Goods, Impure Public Goods, and Multiregional Spillovers,”

Scottish Journal of Political Economy, Volume 22, No. 1, February 1975, pp. 25-38.

Page 523: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

5

“The Economic Theory of Alliances: Realigned,” in C. Liske, W. Loehr, J. McCamant (eds.), Comparative Public Policy: Issues, Theories, and Methods. (New York: John Wiley & Sons, 1975), pp. 223-239.

“Devaluation, Capital Flows and the Balance of Payments: A Reply,” Weltwirtschaftliches

Archiv., Vol. 111, No. 1, March 1975, pp. 162-163. “On the Economic Theory of Alliances,” (with Jon Cauley), Journal of Conflict Resolution,

Vol. 19, No. 2, June 1975, pp. 330-348. “The Challenge of Property Rights,” Futures, Vol. 7, No. 6, December 1975, pp. 523-525. “Intertemporal and Intergenerational Pareto Efficiency,” (with V. Kerry Smith), Journal of

Environmental Economics and Management, Vol. 2, No. 3, 1976, pp. 151-159. “Fiscal Federalism, Spillovers, and the Export of Taxes: Reply,” (with Robert Shelton),

Kyklos, Vol. 29, No. 2, 1976, pp. 315-316. “Multiregional Public Goods, Spillovers and the New Theory of Consumption,” (with Jon

Cauley), Public Finance, Vol. 31, No. 3, 1976, pp. 376-395. “The Externality Argument for In-Kind Transfers: A Defense,” (with Ryan Amacher),

Kyklos, Vol. 30, No. 2, 1977, pp. 293-296. “The Design of Supranational Structures: An Economic Perspective,” (with Jon Cauley),

International Studies Quarterly, Vol. 21, No. 2, June 1977, pp. 251-276. “Intertemporal and Intergenerational Pareto Efficiency Revisited,” (with V. Kerry Smith),

Journal of Environmental Economics and Management, Vol. 4, No. 3, September 1977, pp. 252-257.

“Impurity of Defense: An Application to the Economics of Alliances,” Kyklos, Vol. 30, No.

3, 1977, pp. 443-460. “The Properties and Generation of Homothetic Production Functions: A Synthesis,” (with A.

Swimmer), Journal of Economic Theory, Vol. 18, No. 2, August 1978, pp. 349-361. “Interregional and Intergenerational Spillover Awareness,” Scottish Journal of Political

Economy, Vol. 25, No. 3, November 1978, pp. 273-284. “Public Goods and the Theory of Second Best,” Public Finance, Vol. 33, No. 3, 1978,

pp. 330-344. “A Hierarchical Theory of the Firm,” (with Jon Cauley), Scottish Journal of Political

Economy, Vol. 27, No. 1, February 1980, pp. 17-29.

Page 524: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

6

“Burden Sharing, Strategy, and the Design of NATO,” (with John Forbes), Economic Inquiry, Vol. 18, No. 3, July 1980, pp. 425-444. Republished in James M. Buchanan and Robert D. Tollison (eds.), Theory of Public Choice - II (Ann Arbor, MI: University of Michigan Press, 1984), pp. 338-357.

“In Defense of a Collective Goods Theory of Alliances,” (with Jon Cauley and John Forbes),

Journal of Conflict Resolution, Vol. 24, No. 3, September 1980, pp. 537-547. “A General Theory of Interpersonal Exchange,” (with Jon Cauley), Public Choice, Vol. 35,

No. 5, 1980, pp. 587-606. “The Economic Theory of Clubs: An Evaluative Survey,” (with John Tschirhart), Journal of

Economic Literature, Vol. 18, No. 4, December 1980, pp. 1481-1521. “The Economics of Outer Space,” (with William Schulze), Natural Resources Journal, Vol.

21, No. 2, April 1981, pp. 371-393. “On the Number and Membership Size of Consumer-Managed Firms,” (with John

Tschirhart), Southern Economic Journal, Vol. 47, No. 4, April 1981, pp. 1086-1091. “The Social Rate of Discount for Nuclear Waste Storage: Economics or Ethics?” (with

William Schulze, David Brookshire), Natural Resources Journal, Vol. 21, No. 4, October 1981, pp. 811-832.

“A Theory of Intergenerational Clubs,” Economic Inquiry, Vol. 20, No. 2, April 1982, pp.

191-208. “A Theoretical and Empirical Analysis of NATO,” (with James Murdoch), Journal of

Conflict Resolution, Vol. 26, No. 2, June 1982, pp. 237-263. “Joint Products and Multijurisdictional Spillovers,” (with A. J. Culyer), Quarterly Journal of

Economics, Vol. 97, No. 4, November 1982, pp. 707-716. “Intertemporal and Intergenerational Pareto Efficiency: A Reconsideration of Recent

Extensions,” (with V. Kerry Smith), Journal of Environmental Economics and Management, Vol. 9, No. 4, December 1982, pp. 361-365.

“Joint Products and Interjurisdictional Spillovers: Some Public Goods Geometry,” (with A.

J. Culyer), Kyklos, Vol. 35, No. 4, 1982, pp. 702-709. “A Theoretical Analysis of Transnational Terrorism,” (with John Tschirhart and Jon Cauley),

American Political Science Review, Vol. 77, No. 1, March 1983, pp. 36-54. Republished in Rosemary O’Kane (ed.), Terrorism (Northampton, MA: Edward Elgar, 2005), pp. 444-462.

“Toward a Unified Theory of Nonmarket Institutional Structures,” (with Jon Cauley and

John Tschirhart), Australian Economic Papers, Vol. 42, June 1983, pp. 233-254.

Page 525: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

7

“On Commons and Tragedies,” (with Richard Cornes), American Economic Review, Vol. 73, No. 4, September 1983, pp. 787-792.

“Club Optimality: Further Clarifications,” Economics Letters, Vol. 14, No. 1, 1984, pp.

61-65. “The Theory of Public Goods: Non-Nash Behavior,” (with Richard Cornes), Journal of

Public Economics, Vol. 23, No. 3, April 1984, pp. 367-379. “Mixed Clubs: Further Observations,” (with John Tschirhart), Journal of Public Economics,

Vol. 23, No. 3, April 1984, pp. 381-389. “Intertemporal Incentive Allocation in Simple Hierarchies,” (with David Nickerson),

Mathematical Social Sciences, Vol. 7, No. 1, 1984, pp. 33-57. “Easy Riders, Joint Production, and Public Goods,” (with Richard Cornes), Economic

Journal, Vol. 94, No. 3, September 1984, pp. 580-598. “Complementarity, Free Riding, and the Military Expenditures of NATO Allies,” (with

James Murdoch), Journal of Public Economics, Vol. 25, No. 1-2, November 1984, pp. 83-101. Republished in Larry Neal (ed.), The International Library of Macroeconomics and Financial History: War Finance, Vol. 3 (Cheltenham, UK: Edward Elgar, 1994), pp. 539-557.

“The Simple Analytics of Pure Public Good Provision,” (with Richard Cornes), Economica,

Vol. 52, No. 1, February 1985, pp. 103-116. “Externalities, Expectations, and Pigouvian Taxes,” (with Richard Cornes), Journal of

Environmental Economics and Management, Vol. 12, No. 1, March 1985, pp. 1-13. “On the Consistency of Conjectures with Public Goods,” (with Richard Cornes), Journal of

Public Economics, Vol. 25, No. 1, June 1985, pp. 125-129. “Australian Demand for Military Expenditures: 1961-1979,” (with James Murdoch),

Australian Economic Papers, Vol. 44, June 1985, pp. 142-153. “Uncertainty and Clubs,” (with Fred Sterbenz and John Tschirhart), Economica, Vol. 52, No.

4, November 1985, pp. 467-477. “Joint Supply and the Finance of Charitable Activity,” (with John Posnett), Public Finance

Quarterly, Vol. 14, No. 2, April 1986, pp. 209-222. “The Commons and the Optimal Number of Firms,” (with Richard Cornes and Charles

Mason), Quarterly Journal of Economics, Vol. 101, No. 3, August 1986, pp. 641-646. “The Political Economy of Scandinavian Neutrality,” (with James Murdoch), Scandinavian

Journal of Economics, Vol. 88, No. 4, November 1986, pp. 583-603.

Page 526: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

8

“Nonmarket Institutional Structures: Conjectures, Distribution, and Efficiency,” (with Jon Cauley and Richard Cornes), Public Finance, Vol. 41, No. 2, 1986, pp. 153-172.

“Terrorist Success in Hostage-Taking Incidents: An Empirical Study,” (with John Scott),

Journal of Conflict Resolution, Vol. 31, No. 1, March 1987, pp. 35-53. “Terrorism in a Bargaining Framework,” (with Scott Atkinson and John Tschirhart), Journal

of Law and Economics, Vol. 30, No. 1, April 1987, pp. 1-21. Republished in Isaac Ehrlich and Zhiqiang Liu, The Economics of Crime (Northampton, MA: Edward Elgar, 2006).

“Cycles and Substitutions in Terrorist Activities: A Spectral Approach,” (with Eric Iksoon

Im and Jon Cauley), Kyklos, Vol. 40, No. 2, 1987, pp. 238-255. “On Optimal Prices and Animal Consumers in Congested Markets,” Economic Inquiry, Vol.

25, No. 4, October 1987, pp. 715-720. “Free Riding and Uncertainty,” (with Frederic Sterbenz and John Posnett), European

Economic Review, Vol. 31, No. 8, December 1987, pp. 1605-1617. “Expectations, the Commons, and Optimal Group Size,” (with Charles Mason and Richard

Cornes), Journal of Environmental Economics and Management, Vol. 15, No.1, March 1988, pp. 99-110.

“Sharing Burdens in NATO,” Challenge, Vol. 31, No. 2, March/April 1988, pp. 29-35. “To Bargain or Not to Bargain: That Is the Question,” (with Harvey Lapan), American

Economic Review, Vol. 78, No. 2, May 1988, pp. 16-21. “The Calculus of Dissent: An Analysis of Terrorists' Choice of Targets,” (with Harvey

Lapan), Synthèse, Vol. 76, No. 2, August 1988, pp. 245-261. “Fighting World War III: A Suggested Strategy,” (with Jon Cauley), Terrorism: An

International Journal, Vol. 11, No. 3, Fall 1988, pp. 181-195. “Transfers, Transaction Costs, and Charitable Intermediaries,” (with John Posnett),

International Review of Law and Economics, Vol 8, No. 4, December 1988, pp. 145-160. “Externalities, Pigouvian Corrections, and Risk Attitudes,” (with Frederic Sterbenz), Journal

of Environmental Economics and Management, Vol. 15, No. 4, December 1988, pp. 488-504.

“On the Optimal Retaliation Against Terrorists: The Paid-Rider Option,” (with Dwight Lee)

Public Choice, Vol. 61, No. 2, 1989, pp. 141-152. “Public Goods, Growth, and Welfare,” (with Richard Cornes) Social Choice and Welfare,

Vol. 6, No. 3, July 1989, pp. 243-251.

Page 527: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

9

“Demand for Charity Donations in Private Non-Profit Markets: The Case of the U.K.” (with John Posnett), Journal of Public Economics, Vol. 40, No. 2, November 1989, pp. 187-200.

“On Distinguishing the Behavior of Nuclear and Non-Nuclear Allies in NATO,” (with

Laurna Hansen and James Murdoch), Defence Economics, Vol. 1, No. 1, January 1990, pp. 37-55.

“Harvest Uncertainty and the Tragedy of the Commons,” (with Frederic Sterbenz), Journal

of Environmental Economics and Management, Vol. 18, No. 2, March 1990, pp. 155-167. “U.N. Conventions, Technology, and Retaliation in the Fight Against Terrorism: An

Econometric Evaluation,” (with Walter Enders and Jon Cauley), Terrorism and Political Violence, Vol. 2, No. 1, Spring 1990, 83-105.

“A Diagrammatic Approach for Teaching Some Aspects of Production-Cost Duality,”

Studies in Economic Analysis, Vol. 12, No. 2, Fall 1990, pp. 32-42. “Nash-Cournot or Lindahl Behavior? An Empirical Test for the NATO Allies,” (with James

Murdoch), Quarterly Journal of Economics, Vol. 105, No. 4, November 1990, pp. 875-894.

“The Triple Entente and the Triple Alliance, 1890-1914: A Collective Goods Approach,”

(with John A. C. Conybeare) American Political Science Review, Vol. 84, No. 4, December 1990, pp. 1197-1206.

“Assessing the Impact of Terrorist-Thwarting Policies: An Intervention Time Series

Approach,” (with Walter Enders and Jon Cauley), Defence Economics, Vol. 2, No. 1, December 1990, pp. 1-18.

“Economic Analysis Can Help Fight International Terrorism,” (with Walter Enders and

Harvey Lapan), Challenge, Vol. 34, No. 1, January/February 1991, pp. 10-17. Republished in Bernard Schechterman and Martin Slann (eds.), Violence and Terrorism, Annual Editions, Third Edition (Sluice Dock, CT: Dushkin Publishing Group, 1993), pp. 192-199.

“The Private Provision of Public Goods: A Perspective on Neutrality,” (with John Posnett),

Public Finance Quarterly, Vol. 19, No. 1, January 1991, pp. 22-42. “The Causality Between Transnational Terrorism and Tourism: The Case of Spain,” (with

Walter Enders), Terrorism: An International Journal, Vol. 14, No. 1, January-March 1991, pp. 49-58.

“NATO Burden Sharing and the Forces of Change: Further Observations,” (with James

Murdoch), International Studies Quarterly, Vol. 35, No. 1, March 1991, pp. 109-114.

Page 528: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

10

“An Econometric Technique for Comparing Median Voter and Oligarchy Choice Models of Collective Action: The Case of the NATO Alliance,” (with James Murdoch and Laurna Hansen), Review of Economics and Statistics, Vol. 73, No. 4, November 1991, pp. 624-631.

“Sharing Among Clubs: A Club of Clubs Theory,” (with Frederic Sterbenz), Oxford

Economic Papers, Vol. 44, No. 1, January 1992, pp. 1-19. “Agency Theory and the Chinese Enterprise Under Reform,” (with Jon Cauley), China

Economic Review, Vol. 3, No. 1, Spring 1992, pp. 39-56. Republished in Chinese in Economic Science, No. 3, 1993, pp. 47-56.

“After the Cold War, Secure the Global Commons,” Challenge, Vol. 35, No. 4, July/August

1992, pp. 16-23. “Controlling Stock Externalities: Flexible Versus Inflexible Pigovian Corrections,” (with Il-

Dong Ko and Harvey Lapan), European Economic Review, Vol. 36, No. 6, August 1992, pp. 1263-1276.

“A Time-Series Analysis of Transnational Terrorism: Trends and Cycles,” (with Walter

Enders and Gerald Parise), Defence Economics, Vol. 3, No. 4, November 1992, pp. 305-320.

“An Econometric Analysis of the Impact of Terrorism on Tourism,” (with Walter Enders and

Gerald Parise), Kyklos, Vol. 45, No. 4, 1992, pp. 531-554. “Tropical Deforestation: Markets and Market Failures,” Land Economics, Vol. 69, No. 3,

August 1993, pp. 225-233. “Multiproduct Clubs: Membership and Sustainability,” (with John Tschirhart), Public

Finance, Vol. 48, No. 2, 1993, pp. 153-170. “The Economic Theory of Alliances: A Survey,” Journal of Conflict Resolution, Vol. 37,

No. 3, September 1993, pp. 446-483. “Terrorism and Signalling,” (with Harvey E. Lapan), European Journal of Political

Economy, Vol. 9, No. 3, 1993, pp. 383-397. “State-Sponsored Violence As a Tragedy of the Commons: England's Privateering Wars

with France and Spain, 1625-1630,” (with John A. C. Conybeare), Public Choice, Vol. 77, No. 4, December 1993, pp. 879-897.

“The Effectiveness of Anti-Terrorism Policies: A VAR-Intervention Analysis,” (with Walter

Enders), American Political Science Review, Vol. 87, No. 4, December 1993, pp. 829-844. An abbreviated version was republished in Terrorism, Violence, and Insurrections, Vol. 11, No. 3, Summer 1995, pp. 1-5. Republished in War on Terrorism, edited by Alan O’Day (Aldershot, UK: Ashgate, 2004), pp. 401-416.

Page 529: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

11

“Rent Seeking and Pesticide Legislation,” (with Sherry Wise), Public Choice, Vol. 78, No. 3-4, March 1994, pp. 329-350.

“Agricultural Research Expenditures in the U.S.: A Public Goods Perspective,” (with Jyoti

Khanna and Wallace Huffman), Review of Economics and Statistics, Vol. 76, No. 2, May 1994, pp. 267-277.

“The Comparative Static Properties of the Impure Public Good Model,” (with Richard

Cornes), Journal of Public Economics, Vol. 54, No. 3, July 1994, pp. 403-421. “Are Public Goods Myths?,” (with Richard Cornes) Journal of Theoretical Politics, Vol. 6,

No. 3, 1994, pp. 369-385. “Alternative Collective-Goods Models of Military Alliances: Theory and Empirics,” (with

John A. C. Conybeare and James Murdoch), Economic Inquiry, Vol. 32, No. 4, October 1994, pp. 525-542.

“Growth and Defense: Pooled Estimates for the NATO Alliance, 1951-1988,” (with

Elizabeth S. Macnair, James C. Murdoch and Chung-Ron Pi), Southern Economic Journal, Vol. 61, No. 3, January 1995, pp. 846-860.

“Charity Donations in the U.K.: New Evidence Based on Panel Data,” (with Jyoti Khanna

and John Posnett), Journal of Public Economics, Vol. 56, No. 2, February 1995, pp. 257-272. Republished in The Economics of Nonprofit Enterprises edited by Richard Steinberg (Northampton, MA: Edward Elgar, 2005).

“Privateering, State-Sponsored Violence as a Tragedy of the Commons: A Reply,” (with

John A. C. Conybeare), Public Choice, Vol. 82, No. 3-4, March 1995, pp. 363-364. “Management of Transnational Commons: Coordination, Publicness, and Treaty Formation,”

(with Keith Sargent), Land Economics, Vol. 71, No. 2, May 1995, pp. 145-162. Republished in Governing the Global Environment edited by Carlo Carraro (Cheltenham, UK: Edward Elgar, 2003).

“On the Relationship between Democracy and Terrorism,” Terrorism and Political Violence,

Vol. 7, No. 4, Winter 1995, pp. 1-9. “NATO Burden Sharing: 1960-1992,” (with Jyoti Khanna), Defence and Peace Economics,

Vol. 7, No. 2, May 1996, pp. 115-133. “A Game-Theoretic Analysis of Carbon Emissions,” in Roger Congleton (ed.), The Political

Economy of Environmental Protection: Analysis and Evidence (Ann Arbor: University of Michigan Press, 1996), pp. 251-272.

“Terrorism and Foreign Direct Investment in Spain and Greece,” (with Walter Enders),

Kyklos, Vol. 49, No. 3, 1996, pp. 331-352. “A Multiproduct Club Approach to Transportation Infrastructure Pricing,” (with Michael A.

Lipsman), Public Finance, Vol. 51, No. 4, Supplement 1996, pp. 453-472.

Page 530: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

12

“The Voluntary Provision of a Pure Public Good: The Case of Reduced CFC Emissions and the Montreal Protocol,” (with James C. Murdoch), Journal of Public Economics, Vol. 63, No. 2, February 1997, pp. 331-349. Republished in The Political Economy of Environmental Regulation edited by Robert N. Stavins (Northampton, MA: Edward Elgar, 2004).

“Voluntary Cutbacks and Pre-Treaty Behavior: The Helsinki Protocol and Sulfur

Emissions,” (with James C. Murdoch), Public Finance Review, Vol. 25, No. 2, March 1997, pp. 139-162.

“Conscription, Peacekeeping, and Foreign Assistance: NATO Burden Sharing in the Post-

Cold War Era,” (with Jyoti Khanna), Defence and Peace Economics, Vol. 8, No. 1, March 1997, pp. 101-121.

“The Impact of Defense and Nondefense Public Spending on Growth in Asia and Latin

America,” (with James C. Murdoch and Chung-Ron Pi), Defence and Peace Economics, Vol. 8, No. 2, April 1997, pp. 205-224.

“A Tale of Two Collectives: Sulfur Versus Nitrogen Oxides Emission Reduction in Europe,”

(with James C. Murdoch and Keith Sargent), Economica, Vol. 64, No. 2, May 1997, pp. 281-301.

“Collective Action and Tropical Deforestation,” International Journal of Social Economics,

Vol. 24, No. 7-9, 1997, pp. 741-760. “The Future Challenges of NATO: An Economic Viewpoint,” Defence and Peace

Economics, Vol. 8, No. 4, November 1997, pp. 319-353. “Club Theory: Thirty Years Later,” (with John Tschirhart), Public Choice, Vol. 93, No.3-4,

December 1997, pp. 335-355. “The Intergenerational Case of Missing Markets and Missing Voters,” (with Jacobus A.

Doeleman), Land Economics, Vol. 74, No. 1, February 1998, pp. 1-15. “Sharing the Financial Burden for UN and NATO Peacekeeping: 1976-96,” (with Jyoti

Khanna and Hirofumi Shimizu), Journal of Conflict Resolution, Vol. 42, No. 2, April 1998, pp. 176-195.

“When Does Partial Cooperation Pay?,” (with Wolfgang Buchholz and Christian Haslbeck),

Finanzarchiv, Vol. 55, No. 1, 1998, pp. 1-20. “Global and Regional Public Goods: A Prognosis for Collective Action,” Fiscal Studies,

Vol. 19, No. 3, August 1998, pp. 221-247. “Transnational Terrorism in the Post-Cold War Era,” (with Walter Enders), International

Studies Quarterly, Vol. 43, No. 1, March 1999, pp. 145-167. Republished in Dimensions of Terrorism edited by Alan O’Day (Aldershot, UK: Ashgate, 2004), pp. 475-497.

Page 531: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

13

“Intergenerational Public Goods: Strategies, Efficiency and Institutions,” in Inge Kaul, Isabelle Grunberg, and Marc A. Stern (eds.), Global Public Goods: International Cooperation in the Twenty-First Century (New York: Oxford University Press, 1999), pp. 20-50. Republished in Governing the Global Environment, edited by Carlo Carraro (Cheltenham, UK: Edward Elgar, 2003), pp. 104-134.

“The Demand for UN Peacekeeping, 1975-96,” (with Jyoti Khanna and Hirofumi Shimizu),

Kyklos, Vol. 52, No. 3, 1999, pp. 345-68. “Equilibrium Existence and Uniqueness in Public Good Models: An Elementary Proof via

Contraction,” (with Richard Cornes and Roger Hartley), Journal of Public Economic Theory, Vol. 1, No. 4, October 1999, pp. 499-509.

“NATO Burden Sharing: Past and Future,” (with Keith Hartley), Journal of Peace Research,

Vol. 36, No. 6, November 1999, pp. 665-680. “Stakeholder Incentives and Reforms in China’s State-Owned Enterprises: A Common-

Property Theory,” (with Jon Cauley and Richard Cornes), China Economic Review, Vol. 10, No. 2, Fall 1999, pp. 191-206.

“Alliance Formation, Alliance Expansion, and the Core,” Journal of Conflict Resolution, Vol.

43, No. 6, December 1999, pp. 727-747. Republished in Arms Trade, Security and Conflict, edited by Paul Levine and Ron Smith (London: Routledge, 2003), pp. 137-157.

“Defence and Peace Economics: A Ten-Year Retrospective,” (with Keith Hartley), Defence

and Peace Economics, Vol. 11, No. 1, February 2000, pp. 1-16. “Pareto-Improving Redistribution and Pure Public Goods,” (with Richard Cornes), German

Economic Review, Vol. 1, No. 2, May 2000, pp. 169-186. “Is Transnational Terrorism Becoming More Threatening? A Time-Series Investigation,”

(with Walter Enders), Journal of Conflict Resolution, Vol. 44, No. 3, June 2000, pp. 307-332.

“Partners in Giving: The Crowding-In Effects of UK Government Grants,” (with Jyoti

Khanna), European Economic Review, Vol. 44, No. 8, August 2000, pp. 1543-1556. “Arms Trade, Arms Control and Security: Collective Action Issues,” Defence and Peace

Economics, Vol. 11, No. 5, September 2000, pp. 533-548. Republished in Arms Trade, Security and Conflict, edited by Paul Levine and Ron Smith (London: Routledge, 2003), pp. 209-220.

“On Sharing NATO Defense Burdens in the 1990s and Beyond,” (with James C. Murdoch),

Fiscal Studies, Vol. 21, No. 3, September 2000, pp. 297-327. Republished in The Economics of Public Spending, edited by David Miles, Gareth Myles, and Ian Preston (Oxford: Oxford University Press, 2003), pp. 237-266.

“Economic Analysis of Conflict,” Journal of Conflict Resolution, Vol. 44, No. 6, December

2000, pp. 723-729.

Page 532: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

14

“Models of Alliances: Internalizing Externalities and Financing,” (with Kevin Siqueira), Defence and Peace Economics, Vol. 12, No. 3, May 2001, pp. 249-270.

“Transnational Public Goods: Strategies and Institutions,” (with Daniel G. Arce M.), European

Journal of Political Economy, Vol. 17, No. 3, September 2001, pp. 493-516. “Economics of Alliances: The Lessons of Collective Action,” (with Keith Hartley), Journal of

Economic Literature, Vol. 39, No. 3, September 2001, pp. 869-896. “A Cooperative Game Theory of Noncontiguous Allies,” (with Daniel G. Arce M.), Journal of

Public Economic Theory, Vol. 3, No. 4, October 2001, pp. 391-411. “Weakest-Link Public Goods: Giving In-Kind or Transferring Money in a Sequential Game,”

(with Simon Vicary), Economics Letters, Vol. 74, No. 1, 2001, pp. 71-75. “Agency Cost and the Crisis of China's SOEs: A Comment and Further Observations,” (with

Jon Cauley), China Economic Review, Vol. 12, No. 4, 2001, pp. 293-297. “Economic Growth, Civil Wars, and Spatial Spillovers,” (with James C. Murdoch), Journal of

Conflict Resolution, Vol. 46, No. 1, February 2002, 91-110. “On Financing Global and International Public Goods,” in Marco Ferroni and Ashoka Mody

(eds.), International Public Goods: Incentives, Measurement, and Financing (Dordecht, NL: Kluwer, 2002), pp. 81-117.

“Patterns of Transnational Terrorism, 1970-99: Alternative Time Series Estimates,” (with

Walter Enders), International Studies Quarterly, Vol. 46, No. 2, June 2002, pp. 145-165. “A Conceptual Framework for Understanding Global and Transnational Public Goods for

Health,” (with Daniel G. Arce M.), Fiscal Studies, Vol. 23, No. 2, June 2002, pp. 195-222. “Weakest-Link Public Goods: Giving In-Kind or Transferring Money,” (with Simon Vicary),

European Economic Review, Vol. 46, No. 8, October 2002, pp. 1501-1520. “Peacekeeping and Burden Sharing: 1994-2000,” (with Hirofumi Shimizu), Journal of Peace

Research, Vol. 39, No. 6, November 2002, pp. 651-668. “Assessing the Optimal Provision of Public Goods: In Search of the Holy Grail,” in Inge Kaul,

Pedro Conceição, Katell Le Goulven, and Ronald U. Mendoza (eds.), Providing Global Public Goods: Managing Globalization (New York: Oxford University Press, 2002), pp. 131-151.

“Economic Analysis of Civil Wars,” (with Håvard Hegre), Defence and Peace Economics,

Vol. 13, No. 6, December 2002, pp. 429-433. “Civil Wars and Economic Growth: A Regional Comparison,” (with James C. Murdoch),

Defence and Peace Economics, Vol. 13, No. 6, December 2002, pp. 451-464.

Page 533: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

15

“The Participation Decision Versus the Level of Participation in an Environmental Treaty: A Spatial Probit Analysis,” (with James C. Murdoch and Wim Vijverberg), Journal of Public Economics, Vol. 87, No. 2, February 2003, pp. 337-362.

“An Evolutionary Game Approach to Fundamentalism and Conflict,” (with Daniel G. Arce

M.), Journal of Institutional and Theoretical Economics, Vol. 159, No. 1, March 2003, pp. 132-154.

“NATO Peacekeeping and Burden Sharing: 1994-2000,” (with Hirofumi Shimizu), Public

Finance Review, Vol. 31, No. 2, March 2003, pp. 123-143. “Health-Promoting Alliances,” (with Daniel G. Arce M.), European Journal of Political

Economy, Vol. 19, No. 2, June 2003, pp. 355-375. “Collective Action and Transnational Terrorism,” World Economy, Vol. 26, No. 6, June 2003,

pp. 779-802. “Pure Public Goods versus Commons: Benefit-Cost Duality,” (with Daniel G. Arce M.), Land

Economics, Vol. 79, No. 3, August 2003, pp. 355-368. “Terrorism and Game Theory,” (with Daniel G. Arce M.), Simulation & Gaming, Vol. 34, No.

3, September 2003, pp. 319-337. “The Future of the Defence Firm,” (with Keith Hartley), Kyklos, Vol. 56, No. 3, 2003, pp. 361-

380. “Civil Wars and Economic Growth: Spatial Dispersion,” (with James C. Murdoch), American

Journal of Political Science, Vol. 48, No.1, January 2004, pp. 138-151. “Collective Goods, Common Agency, and Third-Party Intervention,” (with Kevin Siqueira),

Bulletin of Economic Research, Vol. 56, No.1, January 2004, pp. 1-20. “An Economic Perspective on Transnational Terrorism,” (with Walter Enders), European

Journal of Political Economy, Vol. 20, No. 2, June 2004, pp. 301-316. Republished in The Economic Analysis of Terrorism, edited by Tilman Brück (Abingdon, UK: Routledge, 2007), pp. 13-28.

“Too Much of a Good Thing? The Proactive Response Dilemma,” (with B. Peter Rosendorff),

Journal of Conflict Resolution, Vol. 48, No. 5, October 2004, pp. 657-671. “Transnational Terrorism 1968-2000: Thresholds, Persistence, and Forecasts,” (with Walter

Enders), Southern Economic Journal, Vol. 71, No. 3, January 2005, pp. 467-483. “The Dilemmas of the Prisoners’ Dilemmas,” (with Daniel G. Arce M.), Kyklos, Vol. 58, No.

1, January 2005, pp. 3-24. “September 11 and Its Aftermath,” (with Walter Enders), International Studies Review, Vol. 7, No. 1, March 2005, pp. 65-168.

Page 534: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

16

“Counterterrorism: A Game-Theoretic Analysis,” (with Daniel G. Arce M.), Journal of Conflict Resolution, Vol. 49, No. 2, April 2005, pp. 83-200.

“After 9/11: Is It All Different Now?” (with Walter Enders), Journal of Conflict Resolution, Vol. 49, No. 2, April 2005, pp. 259-277.

“Collective versus Unilateral Responses to Terrorism,” Public Choice, Vol. 124, No. 1, July 2005, pp. 75-93. “NATO Benefits, Burdens, and Borders: Comment,” Defence and Peace Economics, Vol. 16,

No. 4, August 2005, pp. 317-321. “Donors’ Mechanisms for Financing International and National Public Goods: Loan or

Grants?,” (with Raechelle Mascarenhas), World Economy, Vol. 28, No. 8, August 2005, pp. 1095-1117.

“Recognizing the Limits to Cooperation behind National Borders: Financing the Control of

Transnational Terrorism,” in Inge Kaul and Pedro Conceição, (eds), The New Public Finance: Responding to Global Challenges (New York: Oxford University Press, 2006) pp. 194-216.

“Regional Public Goods and International Organizations,” Review of International

Organizations, Vol. 1, No. 1, March 2006, pp. 5-25. “Distribution of Transnational Terrorism among Countries by Income Classes and

Geography after 9/11,” (with Walter Enders), International Studies Quarterly, Vol. 50, No. 2, June 2006, pp. 367-393.

“CBRN Incidents: Political Regimes, Perpetrators, and Targets,” (with Kate Ivanova), Terrorism and Political Violence, Vol. 18, No. 3, Fall 2006, pp. 423-448. “Global Terrorism: Deterrence versus Preemption,” (with Kevin Siqueira), Canadian Journal of Economics, Vol. 50, No. 4, November 2006, pp. 1370-1387. “Do Donors Cooperatively Fund Foreign Aid?,” (with Raechelle Mascarenhas), Review of International Organizations, Vol. 1, No. 4, 2006, pp. 337-357. “The Impact of Transnational Terrorism on US Foreign Direct Investment,” (with Walter

Enders and Adolfo Sachsida), Political Research Quarterly, Vol. 59, No. 4, December 2006, pp. 517-531.

“Terrorists Versus the Government: Strategic Interaction, Support, and Sponsorship,” (with

Kevin Siqueira), Journal of Conflict Resolution, Vol. 50, No. 6, December 2006, pp. 878-898.

“Hirshleifer’s Social Composition Function in Defense Economics.” Defence and Peace

Economics, Vol. 18, No. 6, December 2006, pp. 645-655.

Page 535: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

17

“New Face of Development Assistance: Public Goods and Changing Ethics,” (with Daniel G. Arce), Journal of International Development, Vol. 19, No. 4, May 2007, pp. 527-544. Republished in Reflexive Governance for Global Public Goods, edited by Eric Brousseau, Tom Dedeurwaerdere, and Bernd Siebenhüner (Cambridge, MA: MIT Press) forthcoming 2008.

“Applying Analytical Methods to Study Terrorism,” (with Walter Enders), International

Studies Perspectives, Vol. 8, No. 3, August 2007, pp. 287-302. “CBRN Attack Perpetrators: An Empirical Study,” (with Kate Ivanova) Foreign Policy

Analysis, Vol. 3, No. 4, October 2007, pp. 273-294. “Terrorist Signalling and the Value of Intelligence,” (with Daniel G. Arce) British Journal of Political Science, Vol. 37, No. 4, October 2007, pp. 573-586. “Terrorist Backlash, Terrorism Mitigation, and Policy Delegation,” (with Kevin Siqueira),

Journal of Public Economics, Vol. 91, No. 9, pp. 1800-1815. “Economic Consequences of Terrorism in Developed and Developing Countries: An

Overview,” (with Walter Enders) in Philip Keefer and Norman Loayza (eds.), Terrorism and Economic Development (Cambridge: Cambridge University Press, 2008), pp. 17-47, forthcoming.

“Treaties: Strategic Considerations,” University of Illinois Law Review, Vol. 2008, No. 1,

forthcoming. “9/11: What Did We Know and When Did We Know It,” (with Walter Enders and Beom S.

Lee), Defence and Peace Economics, Vol. 19, forthcoming 2008. “IMF Retrospective and Prospective: A Public Goods Viewpoint,” (with Joseph P. Joyce),

Review of International Organizations, forthcoming 2008. “Defensive Counterterrorism Measures and Domestic Politics,” (with Kevin Siqueira),

Defence and Peace Economics, Vol. 19, forthcoming 2008. “Hostage Taking: Understanding Terrorism Event Dynamics,” (with Patrick Brandt), Journal

of Policy Modeling, forthcoming 2008. BOOKS:

Public Goods and Public Policy (edited with William Loehr), (Beverly Hills, California:

Sage Publications, Inc., 1978), 240 pages. The Political Economy of Public Goods and International Cooperation, (with William Loehr

and Jon Cauley), Monograph Series in World Affairs, Vol. 15, Book 3, University of Denver, Graduate School of International Studies, 1978, 98 pages.

The Theory and Structures of International Political Economy (edited book), (Boulder,

Colorado: Westview Press, 1980), 280 pages.

Page 536: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

18

The Theory of Externalities, Public Goods, and Club Goods (with Richard Cornes), (New York: Cambridge University Press, 1986), 303 pages.

International Terrorism in the 1980s: A Chronology of Events, Volume 1, 1980-1983 (with

Edward Mickolus and Jean Murdock), (Ames, Iowa: Iowa State University Press, 1988), 541 pages.

International Terrorism in the 1980s: A Chronology of Events, Volume 2, 1984-1987 (with

Edward Mickolus and Jean Murdock), (Ames, Iowa: Iowa State University Press, 1989), 776 pages.

The Economics of Defence Spending: An International Survey (edited with Keith Hartley),

(London: Routledge, 1990), 285 pages. Collective Action: Theory and Applications (Ann Arbor, Michigan: University of Michigan

Press, 1992), 237 pages. The Economics of Defense (with Keith Hartley), (Cambridge: Cambridge University Press,

1995), 400 pages. Republished in Japanese, Shoichi Fukaya translator (Tokyo: Nihon Hyoronsha Publishing Company, 1999); Republished in Chinese (Beijing: Beijing Institute of Technology Press, 2007).

Handbook of Defense Economics, vol. 1 (co-edited book with Keith Hartley) (Amsterdam:

North Holland, 1995), 606 pages. Republished in Chinese (Beijing: Economic Science Press, 2004).

The Theory of Externalities, Public Goods, and Club Goods, Second Edition (with Richard

Cornes), (New York: Cambridge University Press, 1996), 590 pages. Global Challenges: An Approach to Environmental, Political, and Economic Problems

(Cambridge: Cambridge University Press, 1997), 234 pages. The Political Economy of NATO: Past, Present, and Into the 21st Century (with Keith

Hartley), (Cambridge: Cambridge University Press, 1999), 292 pages. The Future of Development Assistance: Common Pools and International Public Goods

(with Ravi Kanbur and Kevin Morrison) Overseas Development Council Policy Essay No. 25 (Washington, DC: Overseas Development Council, 1999), 106 pages.

Economics of Defence (edited with Keith Hartley) Edward Elgar Critical Writings in

Economics, 3 Volumes (Aldershot, UK: Edward Elgar, 2001), 1573 pages. Economic Concepts for the Social Sciences (Cambridge: Cambridge University Press,

September 2001), 298 pages. Republished in Chinese (Taiwan: Booklife Publishing Company, 2004). Republished in Russian (Moscow: Ves Mir Publishing, 2006).

Regional Public Goods: Typologies, Provision, Financing, and Development Assistance

(with Daniel G. Arce M.) (Stockholm: Almqvist and Wiksell, 2002), 102 pages.

Page 537: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

19

Economics of Conflict (edited with Keith Hartley) Edward Elgar Critical Writings in Economics, 3 Volumes (Aldershot, UK: Edward Elgar, 2003), 2100 pages.

Global Collective Action (Cambridge: Cambridge University Press, 2004), 299 pages. The Political Economy of Terrorism (with Walter Enders) (Cambridge: Cambridge

University Press 2006), 278 pages.

Handbook of Defense Economics, vol. 2 (co-edited book with Keith Hartley) Amsterdam: North-Holland, 2007), 697 pages. OTHER PUBLICATIONS:

“Devaluation: An Analysis and Some Timely Questions,” Arizona Business, Volume 19, No. 2, February 1972, pp. 18-24.

“The Dynamic Price Expectation Effect of Devaluation,” (with Nobuo Minabe), Osaka City

University Economic Review, January 1973, No. 8, pp. 13-23. “International Monetary Reforms,” Arizona Business, Volume 20, No. 1, January 1973, pp.

17-24. “Dollars, Deficits, and Devaluation,” (with Elmer Gooding), Arizona Business, Volume 20,

No. 5, May 1973, pp. 10-16. “The Demand for International Reserves: A Respecification,” (with Shigeo Minabe), The

Hikone Ronso, No. 29, August 1973, pp. 1-11. “Domestic and International Policy Implications of the Inflation-Unemployment Trade-Off,”

(with Phil Graves), Akron Business and Economic Review, Volume 5, No. 2, Summer 1974, pp. 9-14.

“On the Public Character of Goods,” (with William Loehr), in W. Loehr and T. Sandler

(eds.), Public Goods and Public Policy (Beverly Hills, California: Sage Publications, Inc., 1978), pp. 11-37.

“Explorations in the Economics of Outer Space,” (with William Schulze), in Todd Sandler

(ed.), The Theory and Structures of International Political Economy (Boulder, Colorado: Westview Press, 1980), pp. 175-195.

“Outer Space: The New Market Frontier,” (with William Schulze), Economic Affairs, Vol. 5,

No. 4, July-September 1985, pp. 6-10. “Defense Burdens and Prospects for the Northern European Allies,” (with James Murdoch),

in David Denoon (ed.), Constraints on Strategy: The Economics of Western Security (New York: Pergamon-Brassey, 1986), pp. 59-113.

Page 538: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

20

“Economic Methods and the Study of Terrorism,” (with Scott Atkinson et al.), in Paul Wilkinson and A. W. Stewart (eds.), Contemporary Research on Terrorism (Aberdeen, Scotland: Aberdeen University Press, 1987), pp. 376-389.

“NATO Burden Sharing: Rules or Reality?” in the International Economic Association 1985

Volume entitled, Peace, Defence and Economic Analysis (London: Macmillan, 1987), pp. 363-383.

“Britain, Europe, and the Atlantic Alliance,” Institute of Economic Affairs, IEA Inquiry

Paper No. 10, London: IEA, September 1989. “Swedish Military Expenditures and Armed Neutrality,” (with James Murdoch), in Keith

Hartley and Todd Sandler (eds.), The Economics of Defence Spending: An International Survey (London: Routledge, 1990), pp. 148-176.

“On Terrorism, Guerrilla Warfare, and Insurrections,” Defence Economics, Vol. 3, No. 4,

November 1992, pp. 259-261. “Terrorism: Theory and Applications,” (with Walter Enders) in Keith Hartley and Todd

Sandler (eds.), Handbook of Defense Economics (Amsterdam: North-Holland, 1995), pp. 213-249.

“The Future of NATO,” Economic Affairs, Vol. 17(4), December 1997, pp. 15-21. “Os Desafios à NATO na região do Mediterrâneo e em outras Áreas,” Economia & Defesa,

Vol. 90, No. 2, Summer 1999, pp. 35-62. “A Radical Approach to Development Assistance,” (with Ravi Kanbur and Kevin M.

Morrison), Development Outreach, Vol. 1, No. 2, Fall 1999, pp. 15-17. “Challenges to NATO in the Mediterranean and Beyond,” in Jurgen Brauer and Keith

Hartley (eds.), The Economics of Regional Security: NATO, The Mediterranean, and Southern Africa (Reading, UK: Harwood Academic Publishers, 2000), pp. 71-92.

“On Partnerships, CDF, and Collective Action,” posted at World Bank website:

http://www.worldbank.org/html/oed/topics/cdfproceedings/pdfs/annex_sandler.pdf. “Financing Global and International Public Goods,” in Christopher D. Gerrard, Marco

Ferroni, and Ashoka Mody (eds.), Global Public Policies and Programs: Implications for Financing and Evaluation (Washington, DC: Operations Evaluation Department, World Bank, 2001), pp. 183-192.

“Understanding Global Public Goods,” OECD Observer, No. 228, September 2001, pp. 15-

17. “What Economics Tells Us to Prevent Terrorism,” An Interview in Challenge, Vol. 45, No.

3, May/June 2002, pp. 5-12.

Page 539: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

21

“Nash, Game Theory, and Global Challenges,” in Constantina Kottaridi and Gregorios Siourounis (eds.), Game Theory: A Festschrift in Honor of John F. Nash Jr. (published in Greek, Athens: Eurasia Publications, 2002), pp. 148-152.

“Terrorism and Game Theory, An Interview,” Swiss Military Review, No. 12, December

2002, pp. 4-5. “Global Challenges and the Need for Supranational Infrastructure,” in Omar Azfar and

Charles Cadwell (eds.), Market-Augmenting Government: The Institutional Foundations for Prosperity (Ann Arbor, MI: University of Michigan Press, 2003), pp. 269-294.

“Biosphere, Markets, and Governments: Comment,” in Omar Azfar and Charles Cadwell

(eds.), Market-Augmenting Government: The Institutional Foundations for Prosperity (Ann Arbor, MI: University of Michigan Press, 2003), pp. 175-176.

“What Do We Know about the Substitution Effect in Transnational Terrorism,” in Andrew

Silke (ed.), Researching Terrorism: Trends, Achievements, Failures (Ilford, UK: Frank Cass, 2004), pp. 119-137.

“Regional Public Goods: Demand and Institutions,” in Antoni Estevadeoral, Brian Frantz,

and Tam Nguyen (eds.) Regional Responses to Globalization: Regional Public Goods and Development Assistance (Washington, DC: Inter-American Development Bank and Asian Development Bank, 2004), pp. 11-30.

“Regional Public Goods: The Comparative Edge of Regional Development Banks:

Comments,” in Nancy Birdsall and Liliana Rojas-Suarez (eds.), Financing Development: The Power of Regionalism (Washington, DC: Center for Global Development, 2004), pp. 123-127.

“The Political Economy of Transnational Terrorism,” (with B. Peter Rosendorff), Journal of Conflict Resolution, Vol. 49, No. 2, April 2005, pp. 171-182. “Introduction: Security Challenges and Threats in a Post-9/11 World,” (with Carlos P.

Barros and Christos Kollias), Defence and Peace Economics, Vol. 16, No. 5, October 2005, pp. 327-329.

“Transnational Terrorism: An Economic Analysis,” in Harry W. Richardson, Peter Gordon,

and James E. Moore II (eds.), The Economic Impact of Terrorist Attacks (Aldershot, UK: Edward Elgar, 2005), pp. 11-34.

“ Economic Methods and the Study of Terrorism: An Evaluation,” in Jeffrey Victoroff (ed.),

Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism (Amsterdam: IOS Press, 2006), pp. 115-129.

“Regional Public Goods and Regional Cooperation,” in Secretariat of the International Task

Force on Global Public Goods (ed.), Meeting Global Challenges: International Cooperation in the National Interest: Cross-Cutting Issues (Stockholm: Secretariat, 2006), pp. 143-178.

Page 540: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

22

“Terrorism: A Game-Theoretic Approach,” (with Daniel G. Arce) in Todd Sandler and Keith Hartley (eds.), Handbook of Defense Economics, Vol. 2 (Amsterdam: North-Holland, 2007), pp. 775-813.

“Defense in a Globalized World: An Introduction,” (with Keith Hartley) in Todd Sandler and

Keith Hartley (eds.), Handbook of Defense Economics, Vol. 2 (Amsterdam: North-Holland, 2007), pp. 607-621.

DATA SET:

International Terrorism: Attributes of Terrorist Events 1978-1987 (ITERATE 3) (with

Edward Mickolus, Jean Murdock, and Peter Fleming). Distributed by Vinyard Software, Inc., Falls Church, VA, 1989. Update 1988-1989 (ITERATE 4) Vinyard Software, Inc., Falls Church, VA, 1990.

EDITING AND OTHER ACTIVITIES:

• Editorial Board, International Studies Perspectives, January 2007 on. • Editorial Board, American Journal of Political Science, January 2006-December 2008. • Associate Editor, Review of International Organizations, January 2006 on. • Co-Editor of special issue of Defence and Peace Economics on “Security Challenges and

Threats in a Post-9/11 World,” Vol. 16, No. 5, October 2005. • Co-Editor of special issue of Journal of Conflict Resolution on “The Political Economy

of Terrorism,” Vol. 49, No. 2, April 2005.

• Chairman, Editorial Board, Journal of Conflict Resolution, April 2004 on.

• Co-Editor of special issue of Defence and Peace Economics on “Internal and External Threats: Defence Economics Analysis,” Vol. 14, No. 6, December 2003.

• Co-Editor of special issue of Defence and Peace Economics on “Economic Analysis of

Civil Wars,” Vol. 13, No. 6, December 2002. • Editorial Board, Terrorism and Political Violence, January 2004 on.

• Editorial Board, Nação e Defesa, March 2002 on. • Editorial Board, European Review of Economics and Finance, January 2002 on.

• Editorial Board, Public Finance Review, July 2000 on.

• Editorial Board, Fiscal Studies, June 2000 on.

Page 541: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

23

• Guest Editor of special issue of Journal of Conflict Resolution on “Economic Analysis of Conflict,” Vol. 44, No. 6, December 2000.

• Co-Editor of Tenth Anniversary issue of Defence and Peace Economics, Vol. 11, No. 1,

February 2000.

• Associate Editor, Bulletin of Economic Research, February 2000 on. • Advisory Board on book series, Institutional Analysis, University of Michigan Press,

edited by Workshop in Political Theory and Policy Analysis, Indiana University, 1999 on.

• Editorial Board, International Studies Quarterly, January 1999-December 2003, January

2004-December 2007.

• Associate Editor, Journal of Public Economic Theory, May 1997-December 2005.

• Editorial Board, Social Science Quarterly, March 1996-April 2005.

• Editorial Board, Defence and Peace Economics, January 1995 on. Advising Editor from January 1999 on.

• Editorial Council on Journal of Environmental Economics and Management, January

1986 to December 1987, reappointed for January 1992-December 1993, reappointed for January 1994 December 1995, January-December 1996, January-December 1997, January-December 1998, January-December 1999, January-December 2000, January-December 2001.

• Editorial Board on Monograph Series in World Affairs, University of Denver, Graduate

School of International Studies, 1979 on.

• Editor of Defence Economics, September 1988-December 1994. (First issue appeared January 1990).

• Editor of special issue of Defence Economics on Terrorism, Guerrilla Warfare, and

Insurrections, Vol. 3, No. 4, November 1992. • Executive Board, International Defense Economics Association, 1990 on.

• Executive Board Member of Economists Allied Against the Arms Race (ECAAR), Israel

Section, 1994 on.

• Associate Editor of Journal of Environmental Economics and Management, January 1988 to January 1990.

Page 542: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

24

• Advising Board Member for Annual Editions: Violence and Terrorism, Duskin Publishing Group, 1989 on.

• Co-editor of Journal of Conflict Resolution for the June 1982 issue. • Editorial Board on Sage Series on Comparative Economy and Public Policy, 1975 to

1978. • Associate Editor, Intermountain Economic Review, September 1972 to June 1974.

• Reviewer for NSF, major economics journals, and major political science journals.

DISSERTATIONS DIRECTED:

Murdoch, James. “Contribution to the Economics of Military Alliances,” defended in

October 1982. He is professor of economics at University of Texas-Dallas. Sepassi, Reza. “A Contribution to the Theory of Clubs,” defended in January 1983. Ko, Il-Dong. “Issues in the Control of Stock Externality Problems with Inflexible Policy

Measures,” defended on September 1988 (received Research Excellence Award from ISU). He is a research fellow at Korea Development Institute.

Khanna, Jyoti. “Theory and Econometric Analysis of State Government Demand for Public

Agricultural Research,” defended on February 28, 1990. She is an associate professor of economics at Colgate University.

Wise, Sherry. “Rent-Seeking in Pesticide Policy,” defended on June 2, 1991. She is an

economic analyst at the Environmental Protection Agency, Washington, DC. Lipsman, Michael. “A Theory of Transportation Clubs with Special Application to the

Domestic Aviation System,” defended on November 9, 1994. He is an economic analyst at Iowa Legislative Fiscal Bureau, State Capital, Des Moines.

Sargent, Keith. “A Spatial Econometric Model for Transboundary Air Pollution Control

Treaties: An Analysis of Noncooperative International Behavior,” defended on March 26, 1997. He is an economic analyst at the Environmental Protection Agency, Washington, DC.

Siqueira, Kevin. “Issues of Collective Action: Common Agency, Partial Cooperation, and

Clubs,” defended on August 26, 1998. He is an associate professor at University of Texas at Dallas.

Shimizu, Hirofumi. “UN Peacekeeping as a Public Good: Analyses of the UN Member

States' Peacekeeping Financial Contribution Behavior,” defended on August 13, 1999. He is an Assistant Professor at the National Defense Academy in Japan.

Page 543: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

25

Yang, Chia-yen. “The Institutional Choice of Public Good Provision,” defended on March 29, 2000.

McCulloch, Russel. “Impure Thoughts of Charitable Giving,” defended on January 24,

2003. Mascarenhas, Raechelle, “An Empirical Analysis of Foreign Aid and the Provision of

International Public Goods,” defended June 6, 2005. She is an assistant professor at Whitman College, Walla Walla, WA.

Ivanova, Kate, “Corruption, Rule of Law and International Interaction in Environment

Pollution and CBRN Terrorism,” defended June 28, 2006. She is an assistant professor at The Ohio State University at Newark. Awarded honorable mention as best dissertation for 2006 at USC College of Liberal Arts and Sciences.

MASTERS DIRECTED:

Hansen, Laurna. “Conventional Versus Strategic Expenditures in NATO: A Public Goods

Approach,” defended on June 28, 1988 (received Research Excellence Award from ISU). She is a research associate at the Sandia National Laboratory, Livermore, CA.

Tanner, Thomas Cole. “The Spatial Theory of Elections: An Analysis of Voters' Predictive

Dimensions and Recovery of the Underlying Issue Space,” defended on April 12, 1994 (received a Research Excellence Award from ISU).

Holland, Stephen P. “Some Economic Policies for Ameliorating the Tragedy of the

Commons,” defended on May 13, 1994. He received a fellowship as a Ph.D. student in economics at University of Michigan.

Twait, Christine. “Determining the Barriers to Small Business Pollution Prevention,”

defended on April 19, 1995 (received a Research Excellence Award from ISU). She is a grant coordinator in the Business College, University of Northern Iowa, Waterloo, IA.

Kondo, Masahiro. “Theoretical and Empirical Analysis of Military Expenditures of Japan,

South Korea, and North Korea,” defended on May 6, 1998. Alonso, Julio C. “Narcotraffic, Guerrilla Warfare, and Antinarcotics Foreign Aid,” defended

on July 5, 2000. CONSULTANCY:

1980 on Consultant to book publishers 1984-1999 Consultant for James Savarese & Associates, a division of Ogilvy

& Mather, Public Relations Firm.

Page 544: Economics, Game Theory and Terrorism (Walter Enders, Todd Sandler)

26

October 1983 to Consultant on “The Economics of Defense in 1980s,” A October 1984 grant given by the Office of Net Assessment, Department of

Defense. Principal investigator in charge of the assessment of the U.K., France, and West German's future in NATO. Project coordinator was David Denoon, New York University.

Summer 1987 Consultant with David Denoon, James Murdoch on a project for

U.S. Department of Defense. September 1990-96 Consultant for Institute of Defense Analyses, Alexandria, VA. 1998-99, 2001-05 Consultant and author for Global Public Goods Projects for UN

Development Program. 1999 Author of paper for a project, Market Augmenting Governance,

IRIS, University of Maryland. 1999 Project on reforming foreign assistance for Overseas Development

Council. 1999-2002, 2005 Consultant for World Bank on various projects. 2001 Author of paper for a project on Health-Promoting Global Public

Goods, Institute for Global Health, University of California at San Francisco.

2002 Consultant for Inter-American Development Bank on projects on

Regional Public Goods

2004-2005 Consultant for the International Task Force for Global Public Goods, Stockholm, Sweden.

2006-2007 Senior advisor on global public goods for UNIDO, Geneva,

Switzerland.