Skip to main content Accessibility help
×
Home
Hostname: page-component-59b7f5684b-npccv Total loading time: 0.582 Render date: 2022-09-25T14:54:29.758Z Has data issue: true Feature Flags: { "shouldUseShareProductTool": true, "shouldUseHypothesis": true, "isUnsiloEnabled": true, "useRatesEcommerce": false, "displayNetworkTab": true, "displayNetworkMapGraph": false, "useSa": true } hasContentIssue true

Defending against Terrorist Attacks with Limited Resources

Published online by Cambridge University Press:  26 July 2007

ROBERT POWELL
Affiliation:
University of California, Berkeley

Abstract

This paper develops a framework for analyzing a defender's allocation of scarce resources against a strategic adversary like a terrorist group in four settings: (1) a baseline case in which the sites the defender tries to guard are “independent” in that resources dedicated to protecting one site have no effect on any other site; (2) if the defender can also allocate resources to border defense, intelligence, or counterterrorist operations which, if successful, protect all of the sites; (3) if threats have strategic and nonstrategic components (e.g., the threat to public health from bioterror attacks and the natural outbreak of new diseases); and (4) if the defender is unsure of the terrorists' preferred targets. The analysis characterizes the defender's optimal (equilibrium) allocations in these settings, an algorithm or approach to finding the optimal allocations, and relevant comparative statics. These characterizations provide a general way of thinking about the resource-allocation problem in these settings.

Type
ARTICLES
Copyright
© 2007 by the American Political Science Association

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

9/11 Commission Report. 2003. Final Report of the National Commission on Terrorist Attacks upon the Unites States, New York: Norton.
9/11 Public Discourse Project Final Report. 2005. Final Report on the 9/11 Commission Recommendations. Available at www. 9-11pdp.org. Accessed on December 29, 2005.
Belke James C. 2000. Chemical Accident Risks in U.S. Industry: A Preliminary Analysis of Accident Risk Data from U.S. Hazardous Chemical Facilities. Washington, DC: U.S. Environmental Protection Agency, September 25.
Bier Vicki, Santiago Oliveros, and Larry Samuelson. 2005. “Choosing What to Protect.” Manuscript, Department of Economics, University of Wisconsin.
Blackett D. W. 1958. “Pure Strategy Solutions to Blotto Games.” Naval Research Logistics Quarterly 5: 107109.Google Scholar
Bueno de Mesquita Ethan. 2005. “Politics and the Suboptimal Provision of Counterterror.” Manuscript, Department of Political Science, Washington University, St. Louis. Available at http://bdm.wustl.edu/papers.html.
Chertoff Michael. 2005a. “Remarks for Secretary Michael Chertoff U.S. Department of Homeland Security George Washington University Homeland Security Policy Institute,” Washington, DC Department of Homeland Security, March 16. Available at www.dhs.gov/dhspublic/display?content=4391.
Chertoff Michael. 2005b. “Secretary Michael Chertoff U.S. Department of Homeland Security Second Stage Review Remarks.” Washington, DC: Department of Homeland Security, July 13. Available at www.dhs.gov/dhspublic/display?content=4597.
Chertoff Michael. 2006. “Remarks by Homeland Security Secretary Michael Chertoff at a Press Conference on the Fiscal Year 2006 Urban Areas Security Initiative Grants.” Washington, D.C. Department of Homeland Security, January 3. Available at: http://www.dhs.gov/xnews/releases/press\_release\_0825.shtm (accessed November 3, 2006).
Chyba Christopher F. 2002. “Toward Biological Security,Foreign Affairs (May/June): 12236.Google Scholar
Chyba Christopher F. 2001. “Biological Terrorism and Public Health.” Survival Spring: 93106.Google Scholar
DHS. 2005. “Draft National Infrastructure Protection Plan.” Washington, DC: Department of Homeland Security. Available at: www.fas.org/irp/agency/dhs/nipp110205.pdf. Accessed on January 4, 2006.
DHS. 2006a. “Draft National Infrastructure Protection Plan, v2.0.” Washington, DC: Department of Homeland Security. Available at: www.fas.org/irp/agency/dhs/nipp110205.pdf.
DHS. 2006b. “Progress in Developing the National Asset Database.” Washington, DC: Department of Homeland Security, Office of Inspector General (June).
Dwyer Jim, and Eric Lipton. 2005. “3-Year Federal Study of 9/11 Urges Rules for Safer Towers.” New York Times, June 22, A1.Google Scholar
Enders Walter, and Todd Sandler. 2004. “What Do We Know About the Substitution Effect in Transnational Terrorism?” In Researching Terrorism Trends, Achievments, Failures, ed. Andrew Silke and G. Ilardi. London: Frank Cass.
Flynn Stephen. 2004. America the Vulnerable. New York: Harper Collins.
Fudenberg Drew, and Jean Tirole. 1991. Game Theory. Cambridge, MA: MIT Press.
GAO. 2005. “Risk Management.” Washington, DC: Government Accountability Office. Available at: www.gao.gov/cgi-bin/getrpt? GAO-06-91.
Golman Russell, and Scott E. Page. 2006. “General Blotto: Games of Allocative Strategic Mismatch,” Manuscript, Center for Complex Systems, University of Michigan. Accessed November 3, 2006 at http://www.cscs.umich.edu/∼spage/papers\_files/blotto.pdf.
Mayer-Schönberger Viktor. 2003. “Emergency Communications: The Quest for Interoperability in the United States and Europe.” In Countering Terrorism, ed. Arnold M. Howitt and Robyn L. Pangi. Cambridge, MA: MIT Press.
Moteff John. 2004. “Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerablities and Consequences.” Washington, DC: Congressional Research Service.
Moteff John D.. 2006. “Critical Infrastructures: Background, Policy, and Implementation.” Washington, DC: Congressional Research Service.
O'Beirne Kate. 2003. “Introducing Pork-Barrel Homeland Security: A Little Here, A Lot There.” National Review, August 11, 2003.Google Scholar
O'Hanlon Michael. et al. 2003. Protecting the American Homeland: One Year On. Washington, DC: Brookings.
OMB. 2003. “2003 Report to Congress on Combating Terrorism.” Washington, DC: Office of Management and Budget, September. Available at: www.whitehouse.gov/omb/legislative/index.html.
OMB. 2004. “Analytical Perspectives, Budget of the United States Government, Fiscal Year 2005.” Washington, DC: Office of Management and Budget.
OMB. 2005. “Analytical Perspectives, Budget of the United States Government, Fiscal Year 2006.” Washington, DC: Office of Management and Budget.
Powell Robert. 2006. “Defending Against Strategic Terrorists Over the Long Run.” Manuscript, Department of Political Science, U.C. Berkeley.
Roberson Brian. 2006. “The Colonel Blotto Game,Economic Theory 29: 124.Google Scholar
Rosendorff Peter, and Todd Sandler. 2004. “Too Much of a Good Thing? The Proactive Response Dilemma.” Journal of Conflict Resolution 48 (October): 65771.Google Scholar
Sandler Todd, and Daniel G. Arce M. 2003. “Terrorism and Game Theory.” Simulation and Gaming 3434 (3): 31937.Google Scholar
Shubik Martin, and Robert Weber. 1981. “Systems Defense Games.” Naval Research Logistics Quarterly 28: 28187.Google Scholar
Tukey John W. 1949. “A Problem of Strategy.” Econometrica 17: 53.Google Scholar
White House. 2002, “National Strategy for Homeland Security.” Washington, DC: White House, July. Available at www.whitehouse.gov/homeland/book/index.html.
White House. 2003. “National Strategy for the Physical Protection of Critical Infrastructures and Key Assets.” Washington, DC: White House, February. Available at www.whitehouse.gov/pcipb/physical.htm.
Willis Henry H. Andrew R. Morral, Terrance K. Kelly, and Jamison J. Medby. 2005. Estimating Terrorism Risk. Santa Monica, CA: Rand Corporation.
179
Cited by

Save article to Kindle

To save this article to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Defending against Terrorist Attacks with Limited Resources
Available formats
×

Save article to Dropbox

To save this article to your Dropbox account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your Dropbox account. Find out more about saving content to Dropbox.

Defending against Terrorist Attacks with Limited Resources
Available formats
×

Save article to Google Drive

To save this article to your Google Drive account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your Google Drive account. Find out more about saving content to Google Drive.

Defending against Terrorist Attacks with Limited Resources
Available formats
×
×

Reply to: Submit a response

Please enter your response.

Your details

Please enter a valid email address.

Conflicting interests

Do you have any conflicting interests? *