Skip to main content Accessibility help
×
Home
Hostname: page-component-7f7b94f6bd-w6m4b Total loading time: 0.284 Render date: 2022-06-30T07:55:48.077Z Has data issue: true Feature Flags: { "shouldUseShareProductTool": true, "shouldUseHypothesis": true, "isUnsiloEnabled": true, "useRatesEcommerce": false, "useNewApi": true } hasContentIssue true

Is There a Trade-off between Security and Liberty? Executive Bias, Privacy Protections, and Terrorism Prevention

Published online by Cambridge University Press:  22 February 2011

TIBERIU DRAGU*
Affiliation:
University of Illinois at Urbana–Champaign
*
Tiberiu Dragu is Assistant Professor, Department of Political Science, University of Illinois at Urbana–Champaign, 605 E. Springfield Avenue, Champaign, IL 61820 (tdragu@illinois.edu).

Abstract

I develop a game-theoretic model of an interaction between an antiterrorist agency and a terrorist organization to analyze how the probability of a terrorist attack varies when the level of privacy protections changes. I derive two implications. First, privacy and security from terrorism need not be in conflict: when accounting for strategic interactions, reducing privacy protections does not necessarily increase security from terrorism. Second, and more important, the antiterrorist agency will always want less privacy. The very agency whose expertise affords it disproportionate influence on policy making will prefer a reduction in privacy protections even when that reduction harms security from terrorism. The analysis has implications for understanding the relationship between government powers and civil liberties in the context of terrorism prevention and times of emergencies more generally.

Type
Research Article
Copyright
Copyright © American Political Science Association 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Ackerman, Bruce. 2004. “The Emergency Constitution.” Yale Law Journal 113: 1029–91.CrossRefGoogle Scholar
Ackerman, Bruce. 2006. Before the Next Attack: Preserving Civil Liberties in the Age of Terrorism. New Haven, CT: Yale University Press.Google Scholar
Alexander, Yonah. 2006. Counterterrorism Strategies: Successes and Failures of Six Nations. Washington, DC: Potomac Books.Google Scholar
Becker, Garry. 1968. “Crime and Punishment: An Economic Approach.” Journal of Political Economy 76: 169217.CrossRefGoogle Scholar
Bianco, William, Ordeshook, Peter, and Tsebelis, George. 1990. “Crime and Punishment: Are One-shot, Two Person Games Enough?American Political Science Review 84: 569–86.CrossRefGoogle Scholar
Breton, Albert, and Wintrobe, Ronald. 1982. The Logic of Bureaucratic Control. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Bueno de Mesquita, Ethan. 2005. “The Quality of Terror.” American Journal of Political Science 49 (3): 515–30.CrossRefGoogle Scholar
Bueno de Mesquita, Ethan. 2007. “Politics and the Suboptimal Provision of Counterterror.” International Organization 61 (1): 936.CrossRefGoogle Scholar
Bueno de Mesquita, Ethan, and Dickson, Eric. 2007. “The Propaganda of the Deed: Terrorism, Counterterrorism, and Mobilization.” American Journal of Political Science 51 (2): 364–81.CrossRefGoogle Scholar
Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction. 2005. “Report of the Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction.” Washington, DC: Government Printing Office.Google Scholar
Cox, Gary. 1994. “A Note on Crime and Punishment.” Public Choice 78: 115–24.CrossRefGoogle Scholar
Dershowitz, Alan. 2002. Why Terrorism Works. New Haven, CT: Yale University Press.Google Scholar
Donohue, Laura. 2008. The Cost of Counterterrorism: Power, Politics, and Liberty. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Downs, Anthony. 1967. Inside Bureaucracy, A Rand Corporation Research Study. Boston: Little, Brown.Google Scholar
Ferejohn, John, and Pasquino, Pasquale. 2004. “The Law of the Exception: A Typology of Emergency Powers.” International Journal of Constitutional Law 2 (2): 210–39.CrossRefGoogle Scholar
Garicano, Luis, and Posner, Richard. 2005. “Intelligence Failure: An Organizational Economic Perspective.” Journal of Economic Perspectives 19 (4): 151–70.CrossRefGoogle Scholar
Gould, Eric, and Stecklov, Guy. 2009. “Terror and the Costs of Crime.” Journal of Public Economics 93: 1175–88.CrossRefGoogle Scholar
Gross, Oren, and Aoláin, FionnualaN.. 2006. Law in Times of Crisis: Emergency Powers in Theory and Practice. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Gunaratna, Rohan. 2004. “The Post-Madrid Face of Al Qaeda.” Washington Quarterly 27: 91100CrossRefGoogle Scholar
Hardin, Russell. 2004. “Civil Liberties in the Era of Mass Terrorism.” Journal of Ethics 8 (1): 7795.CrossRefGoogle Scholar
Hewitt, Steve. 2008. The British War on Terror. London: Continuum.Google Scholar
Heymann, Philip B. 2003. Terrorism, Freedom, and Security. Cambridge, MA: MIT Press.Google Scholar
Hirshleifer, Jack, and Rasmussen, Eric. 1992. “Are Equilibrium Strategies Unaffected by Incentives?Journal of Theoretical Politics 4: 353–67.CrossRefGoogle Scholar
Holmes, Stephen. 1995. Passions and Constraint: On the Theory of Liberal Democracy. Chicago: University of Chicago Press.Google Scholar
Holmes, Stephen. 2007. The Matadors Cape: America's Reckless Response to Terror. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Holmstrom, Bengt, and Milgrom, Paul. 1991. “Multitask Principal–agent Analyses: Incentive Contracts, Asset Ownership, and Job Design.” Journal of Law, Economics, and Organization 7 (Special Issue): 2452.CrossRefGoogle Scholar
Home Department. 2004. “Counter-terrorism Powers: Reconciling Security and Liberty in an Open Society: A Discussion Paper.” www.statewatch.org/news/2004/feb/uk-CT-discussion-paper.pdf (accessed January 6, 2010).Google Scholar
Jacobson, Michael. 2006. “The West at War: U.S. and European Counterterrorism Efforts, Post–September 11.” Washington, DC: Washington Institute for Near East Policy.Google Scholar
Justice Department. 2004. “Prepared Remarks of Attorney General John Ashcroft Regarding the Indictment of HAMAS” www.justice.gov/archive/ag/speeches/2004 (accessed January 6, 2011).Google Scholar
Kydd, Andrew, and Walter, Barbara. 2006. “The Strategies of Terrorism.” International Security 31 (1): 4979.CrossRefGoogle Scholar
Manin, Bernard. 2008. “The Emergency Paradigm and the New Terrorism.” In Les Usages de la Sparation des Pouvoirs—The Uses of the Separation of Powers, eds. Baume, Sandrine and Fontana, Biancamaria. Paris: Michel Houdiard, 135–71.Google Scholar
Milgrom, Paul, and Roberts, John. 1990. “Bargaining Costs, Influence Costs and the Organization of Economic Activity.” In Perspectives on Positive Political Economy, eds. Alt, James E. and Shepsle, Kenneth A.. Cambridge: Cambridge University Press, 5789.CrossRefGoogle Scholar
Milgrom, Paul, and Roberts, John. 1988. “An Economic Approach to Influence Activities and Organizational Responses.” American Journal of Sociology 94 (2): 154–79.CrossRefGoogle Scholar
Milgrom, Paul, and Roberts, John. 1992. Economics, Organization and Management. Englewood Cliffs, NJ: Prentice Hall.Google Scholar
Moe, Terry. 1984. “The New Economics of Organization.” American Journal of Political Science 283 (4): 739–77.CrossRefGoogle Scholar
National Commission on Terrorist Attacks upon the United States. 2004. “The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States.” Washington, DC: Government Printing Office.Google Scholar
Niskanen, William. 1971. Bureaucracy and Representative Government. Chicago: Aldine-Atherton.Google Scholar
Pfeffer, Jeffery 1993. Managing With Power: Politics and Influence in Organizations. Cambridge, MA: Harvard Business Press.Google Scholar
Posner, Eric A., and Vermeule, Adrian. 2007. Terror in the Balance: Security, Liberty, and the Courts. New York: Oxford University Press.Google Scholar
Posner, Richard. 2005. Preventing Surprise Attacks. New York: Rowman and Littlefield.Google Scholar
Posner, Richard. 2006a. Not a Suicide Pact: The Constitution in a Time of National Emergency. Oxford: Oxford University Press.Google Scholar
Posner, Richard. 2006b. Uncertain Shield: The U.S. Intelligence System in the Throes of Reform. New York: Rowman and Littlefield.Google Scholar
Posner, Richard A. 2006c. “The Reorganized U.S. Intelligence System after One Year.” AEI Outlook Series. www.aei.org/outlook/24213 (accessed January 6, 2011).Google Scholar
Powell, Robert. 2007a. “Defending against Terrorist Attacks with Limited Resources.” American Political Science Review 101 (3): 527–41.CrossRefGoogle Scholar
Powell, Robert. 2007b. “Allocating Defensive Resources with Private Information about Vulnerability.” American Political Science Review 100 (4): 799809.CrossRefGoogle Scholar
Przeworski, Adam. 2003. States and Markets: A Primer in Political Economy. Cambridge: Cambridge University Press.Google Scholar
Ramraj, Victor, Hor, Michael and Roach, Kent, eds. 2005. Global Anti-terrorism Law and Policy. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Regan, Priscilla M. 1995. Legislating Privacy: Technology, Social Values, and Public Policy. Chapel Hill: University of North Carolina Press.Google Scholar
Rehnquist, William H. 1998. All the Laws But One: Civil Liberties in Wartime. New York: Knopf.Google Scholar
Rosendorff, Peter, and Sandler, Todd. 2004. “Too Much of a Good Thing? The Proactive Response Dilemma.” Journal of Conflict Resolution 48 (5): 657–71.CrossRefGoogle Scholar
Rourke, Francis. 1984. Bureaucracy, Politics, and Public Policy. Boston: Little, Brown.Google Scholar
Schmid, Alex P. 1993. “Western Responses to Terrorism.” In Terrorism and Political Violence, eds. Schmid, Alex P. and Crelinsten, Ronald D.. London: Frank Cass, 1525.Google Scholar
Siqueira, Keith, and Sandler, Todd. 2006. “Terrorists vs the Security Agency: Strategic Interaction, Support, and Sponsorship.” Journal of Conflict Resolution 50 (6): 878–98.CrossRefGoogle Scholar
Solove, Daniel. 2008. Understanding Privacy. Cambridge, MA: Harvard University Press.Google Scholar
Treverton, Gregory. 2008. Reorganizing U.S. Domestic Intelligence: Assessing the Options. Santa Monica, CA: RAND.Google Scholar
Tsebelis, George. 1989. “The Abuse of Probability in Political Analysis: The Robinson Crusoe Fallacy.” American Political Science Review 83: 7791.CrossRefGoogle Scholar
Tsebelis, George. 1990. “Penalty Has No Impact on Crime: A Game Theoretic Analysis.” Rationality and Society 2: 255–86.CrossRefGoogle Scholar
Waldron, Jeremy. 2003. “Security and Liberty: The Image of Balance.” Journal of Political Philosophy 11 (2): 191.CrossRefGoogle Scholar
Walker, Clive. 1992. The Prevention of Terrorism in British Law. 2nd ed. New York: Manchester University Press.Google Scholar
White, Jonathan R. 2003. Terrorism: 2002 Update. 4th ed. Belmont, CA: Wadsworth.Google Scholar
Wilson, James Q. 1989. Bureaucracy: What Government Agencies Do and Why They Do It. New York: Basic Books.Google Scholar
Zegart, Amy. 2007. Spying Blind: The CIA, the FBI, and the Origins of 9/11. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
43
Cited by

Save article to Kindle

To save this article to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Is There a Trade-off between Security and Liberty? Executive Bias, Privacy Protections, and Terrorism Prevention
Available formats
×

Save article to Dropbox

To save this article to your Dropbox account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your Dropbox account. Find out more about saving content to Dropbox.

Is There a Trade-off between Security and Liberty? Executive Bias, Privacy Protections, and Terrorism Prevention
Available formats
×

Save article to Google Drive

To save this article to your Google Drive account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your Google Drive account. Find out more about saving content to Google Drive.

Is There a Trade-off between Security and Liberty? Executive Bias, Privacy Protections, and Terrorism Prevention
Available formats
×
×

Reply to: Submit a response

Please enter your response.

Your details

Please enter a valid email address.

Conflicting interests

Do you have any conflicting interests? *