Uploaded by badamig2694

Analytical Methods to Study Terrorism

advertisement
International Studies Perspectives (2007) 8, 287–302.
Applying Analytical Methods to Study
Terrorism*
Todd Sandler
University of Texas at Dallas
Walter Enders
University of Alabama
This paper presents a perspective on the application of theoretical and
empirical methods to the study of domestic and transnational terrorism. The use of such methods can lead to informed policy making. On
the theoretical side, both choice-theoretic and game-theoretic methods
are examined. For empirical applications, the paper focuses on the
study of trend, cycles, and forecasting. Additionally, the use of intervention analysis in various forms is reviewed with to regards to evaluating
policy effectiveness and quantifying the economic impact of terrorism.
Although this paper is not intended as a literature review, some key
studies are highlighted for readers to pursue in greater depth.
Keywords: terrorism, game theory, intervention analysis, forecasting, policy effectiveness
The four hijackings on September 11, 2001 (henceforth, 9 ⁄ 11), was a wake up
call to the world, which had viewed terrorism as an annoyance in a globalized
world. The unprecedented 9 ⁄ 11 incidents resulted in a death toll greater
than the total number killed from all transnational terrorist attacks (incidents
impacting more than one nation) during the prior decade when 2,695
people perished.1 Moreover, this single incident resulted in losses estimated in the
$80–100 billion range (Kunreuther and Michel-Kerjan 2004). Even beyond these
losses, at-risk countries lost essential freedoms as civil liberties were sacrificed for
enhanced security. This loss of freedoms is underscored by the current restrictions on liquids, creams, and gels in carry on luggage following British authorities stopping an alleged plot in August 2006 to blow up trans-Atlantic U.S.-bound
passenger planes with improvised bombs. In the United States, tens of billions of
dollars are now spent on homeland security to protect against terrorist threats
1
This figure comes from Figure 5 in Sandler and Enders (2004:303), which is based on U.S. Department of
State data published in annual reports entitled, Patterns of Global Terrorism. The National Counterterrorism Center’s
(NCTC) ‘‘Report on Incidents of Terrorism 2005’’ is not a consistent replacement for Patterns of Global Terrorism,
insofar as NCTC inflates the number of events by including many domestic events. By including domestic events
worldwide, NCTC reduces the proportion of fundamentalist-based terrorist attacks.
*
Sandler’s research was partially supported by the U.S. Department of Homeland Security (DHS) through the
Center for Risk and Economic Analysis of Terrorism Events (CREATE) at the University of Southern California,
grant number N00014-05-0630. However, any opinions, findings, and conclusions or recommendations are solely
those of the authors and do not necessarily reflect the views of the DHS. We have profited from the comments of
three reviewers.
2007 International Studies Association.
Published by Blackwell Publishing, 350 Main Street, Malden, MA 02148, USA, and 9600 Garsington Road, Oxford OX4 2DQ , UK
288
Applying Analytical Methods to Study Terrorism
that now include biological, chemical, and radiological agents. The DHS budget
for 2006 is approximately $41 billion, of which 61% guards against terrorism on
U.S. soil (Enders and Sandler 2006:231–235). This enhanced expenditure
on homeland security does not include the tens of billions of dollars spent on
terrorism-related military operations. Antiterrorism actions redirect government
funds away from social welfare, education, highways, and scientific research. On
9 ⁄ 11, a traumatized public began to appreciate the risks posed by today’s fundamentalist-based terrorism. Subsequent attacks at a Bali nightclub on October 12,
2002, against Madrid commuter trains on March 11, 2004, and on the London
transport system on July 7, 2005, underscored the continued threat of terrorism.
With the creation of DHS, the Science and Technology directorate funded
Centers of Excellence for the study of terrorism at the University of Southern
California, Texas A & M University, the University of Minnesota, the University
of Maryland, and elsewhere. In part, these centers apply various theoretical and
empirical techniques to the study of terrorism. The use of analytical techniques
dates back to a study by Landes (1978) that measured the deterrent effects of
airport metal detectors (introduced in January 1973), air marshals, and prison
sentences for skyjackings. Well before 9 ⁄ 11, numerous studies used analytical
techniques as a way of predicting terrorist behavior and improving governments’
responses.2 DHS Centers of Excellence need to tap into these earlier studies.
Terrorism is a powerful weapon that exploits crucial asymmetries between governments and terrorists to governments’ disadvantage and terrorists’ advantage.
The purpose of this article is to provide a perspective for international studies’
students, researchers, and practitioners on how analytical methods—both empirical and theoretical—can inform policy makers and enlighten governments
about the challenges that terrorism poses to a globalized society, where borders
are porous. Counterterrorism actions at home have far-reaching implications, as
augmented fortifications can displace attacks to foreign venues, while foreign
countermeasures can shift an attack to home territory.
What Is Terrorism?
Terrorism is the premeditated use or threat to use violence by individuals or subnational groups against noncombatants to obtain political or social objectives
through the intimidation of a large audience, beyond that of the immediate victims. In this definition, two essential ingredients are violence and the political ⁄ social motive; violent acts without such motives are merely criminal. Much has
been written on the definition of terrorism, with the debate centering on the identity of the victim, perpetrator, and audience (Hoffman 1998; Wilkinson 2001). For
example, some definitions (U.S. Department of State) exclude attacks against an
occupying army as terrorism, while others (U.S. Department of Defense) do not.
Our definition is the nearest to that of the U.S. Department of State, whose data
are only for transnational attacks (see below). Alternative definitions influence the
number of events and, hence, the need for policy makers to allocate resources to
counterterrorism. By making their acts appear random and disperse, terrorists
seek to cause anxiety to the widest possible audience. These acts are not random,
but are aimed at exploiting the targeted society’s least defended venues—that is,
protective measures for government officials made the general public a more
attractive target. Terrorists succeed when the targeted audience pressures its policy
2
Early empirical studies include Brophy-Baermann and Conybeare (1994), Enders and Sandler (1993), Enders,
Sandler, and Cauley (1990), Im, Cauley, and Sandler (1987), Nelson and Scott (1992), and Poe (1988), while early
theoretical studies include Islam and Shahin (1989), Lapan and Sandler (1988, 1993), Lee (1988), Overgaard
(1994), Sandler and Lapan (1988), Sandler, Tschirhart, and Cauley (1983), and Selten (1988).
Todd Sandler and Walter Enders
289
makers to concede to terrorist demands and they cave in to this pressure, because
the cost of holding firm becomes greater than that of conceding.
Terrorism is further subdivided into domestic and transnational. Domestic
terrorism is homegrown and has consequences for just the host country, its institutions, citizens, property, and policies. In contrast, a transnational terrorist
event, such as 9 ⁄ 11, involves perpetrators, victims, institutions, governments, or
citizens from at least two countries. Attacks that kill foreign visitors or include
terrorists from abroad are transnational. Additionally, the kidnapping of a foreign journalist in Baghdad for political demands (e.g., releasing all women prisoners) is a transnational terrorist incident. Although domestic incidents
outnumber transnational incidents almost eight to one,3 the latter poses the
greatest risks to the developed world, whose assets (people and property) are
vulnerable worldwide. In recent years, relatively few domestic attacks have
occurred in developed countries (except for Israel); most domestic attacks have
taken place in conflict-ridden developing countries. Globalization has, however,
blurred the distinction between domestic and transnational terrorist events,
because some homegrown incidents may have international ramifications. For
instance, long-term domestic terrorist campaigns may destabilize neighboring
countries, resulting in transnational implications.
Methods Used
Appropriate theoretical methods include game theory in which strategic behavior among rational players is assumed that allows a player to anticipate the
response of others to its own actions.4 Each player tries to outguess the other
players’ behavior by imagining how he or she would respond when in the other
players’ shoes. Thus, a government that installs metal detectors in airports
should not be surprised when terrorists respond by abducting hostages at other
venues. Games are played between terrorists and a government, among targeted
governments, among terrorist groups, or among factions within terrorist groups.
Economists and political scientists who model terrorists as rational players judge
their rationality based on an appropriate (predictable) response to changes in
their constraints as they seek objectives. Researchers do not brand terrorists as
irrational because their goals or techniques are repugnant to most people. Moreover, engaging in risky, even deadly, activities is not indicative of irrationality, as
firefighters and ordinary people assume such risks daily (e.g., driving to work).
Game theory is appropriate because it captures the strategic interplay among
adversaries and allies, characteristic of terrorist campaigns. Moreover, game theory
allows adversaries to issue threats and promises for strategic advantage—for example, the issuing of a never-to-negotiate pledge by governments to discourage hostage taking. Game theory also incorporates uncertainty and learning relevant
when, for instance, a government is uninformed about the terrorists’ true strength
and must update its beliefs based on terrorists’ past actions. Additionally, game
theory includes bargaining behavior, germane to terrorist negotiation scenarios.
As a weak adversary, terrorists must behave strategically to be a formidable
threat against a vastly stronger government opponent. Terrorists exploit many strategic asymmetries to obtain an advantage. For example, they gain a second-mover
advantage by identifying soft targets after the government has allocated a limited
3
This statement is based on comparing data for domestic and transnational terrorist incidents as reported in
the National Memorial Institute for the Prevention of Terrorism (2006) website at http://www.mipt.org.
4
Sandler and Arce (2007) provide an up-to-date survey of game-theoretic papers on terrorism. There is
currently a lot of interest in applying game theory to the study of terrorism with recent contributions by Arce and
Sandler (2007), Bueno de Mesquita (2005), Heal and Kunreuther (2005), and Siqueira (2005).
290
Applying Analytical Methods to Study Terrorism
defensive budget among alternative potential targets. By always identifying a weakness or vulnerable target, terrorists can force governments to spend ever-greater
amounts on defense, thereby being a costly nuisance. Nations are target-rich; terrorists are target-poor. The latter is heightened by locating operatives (i.e., sleeper
cells) among the general population where governments must be restrained in
their actions. Terrorists overcome collective action barriers and form networks.
Terrorist groups’ weakness gives them little choice but to join forces, while leaders’ lifetime tenure means that they view their interactions with other leaders as
infinitely repeated games. As such, they are able to overcome prisoner’s dilemmas
and other collective action concerns. In contrast, governments’ perceived strength
and limited office periods hamper their ability to cooperate. The withdrawal of
Spanish forces from Iraq and Afghanistan following the Madrid train bombings
and the election of the socialist Zapatero government in 2004 is a case in point.
Other theoretical methods include choice-theoretic models where an agent is
viewed as maximizing some objective subject to a constraint. For instance, policy
makers allocate a fixed counterterrorism budget among alternative terrorismthwarting activities to achieve the greatest reduction in terrorism. Another
instance concerns how a terrorist group allocates its resources among various
attack modes, each with its own risks and costs. In doing so, terrorists must balance net expected benefits at the margin. A wide range of empirical tools can
be applied to test theoretical predictions and to forecast terrorism patterns.
These analytical tools have investigated the effectiveness of counterterrorism
policies (e.g., metal detectors and U.N. conventions). Policy choices between
preemptive and defensive action have also been studied. Lapan and Sandler
(1988) applied game theory to show the pitfalls of implementing a never-tonegotiate policy whose effectiveness hinges on unstated assumptions (e.g., the
value of a future hostage is not too high or the government’s pledge is believed)
that do not hold in practice.
Data and Patterns
Much of the empirical work on terrorism has relied on events data that draw
information from the media. Information on each terrorist event—for example,
the number of terrorists, the type of event, number of deaths, and venue—are
coded for researchers. The most used data set is International Terrorism: Attributes of
Terrorist Events (ITERATE), which was originally devised by Mickolus (1982) and
later updated by Mickolus, Sandler, Murdock, and Flemming (2006). An overlap
of coders has maintained coding consistency for ITERATE, which contains information on about 15,000 transnational terrorist incidents from 1968 to 2005. ITERATE relies on a host of sources, including the Associated Press, United Press
International, Reuter tickers, New York Times, Washington Post, the Foreign Broadcast
Information Service (FBIS) Daily Reports, ABC, NBC, and CBS evening news. Up
through 1996, the regional FBIS Daily Reports have been invaluable: these reports
draw from hundreds of world print and electronic media services and are the
most comprehensive source for foreign coverage of terrorist incidents. The
biggest drawback of ITERATE is that it only records transnational terrorist events.
Another data set is the National Memorial Institute for the Prevention of
Terrorism (2006), which was jointly gathered by RAND and researchers at
St. Andrews University, Scotland. Up until 1997, National Memorial Institute for
the Prevention of Terrorism (MIPT) only recorded transnational terrorist incidents. Beginning in 1998, it includes domestic and transnational terrorist incidents (http://www.mipt.org). A third data set for transnational terrorist events
had been maintained by the U.S. Department of State and reported in Patterns
of Global Terrorism through 2004 when the Bush administration abolished this
Congress-mandated report. Time series plots of these data sets are quite similar
Todd Sandler and Walter Enders
291
(Enders 2007) when inclusion of terrorist events are made homogeneous—
for example, leaving out domestic incidents for MIPT. A fourth terrorism data
set—Terrorism in Western Europe: Events Data (TWEED)—concerns ‘‘internal’’ terrorist events in 18 Western European countries for 1950–2004 (Engene 2004).
This data set excludes transnational terrorists incidents if the terrorist came
from outside of Western Europe—for example, spillover terrorism from the Middle East, such as the Madrid train bombings. The data include some transnational events where, say, Irish terrorists engage in a terrorist attack in Spain;
however, the overwhelming majority of incidents in TWEED are domestic. This
data can be downloaded at http://www.uib.no/people/sspje/tweed.htm and are
useful for investigating the impact of European terrorism on tourism, foreign
direct investment, and local economies.
Based on ITERATE data, Figure 1 displays quarterly totals for all transnational
incidents and bombings for the 1968–2005 period. Transnational terrorist events
display peaks and troughs, suggestive of cycles. Bombings are terrorists’ favorite
types of attack, accounting for about half of all transnational terrorist incidents.
In addition, the bombings time series tracks the all-incident series rather well
and generally imparts its pattern to that of the overall series. From the early
1990s to about 2002, there is a downward trend to both series due to fewer states
sponsoring terrorism in the post–Cold War era (Hoffman 1998). The fall of
Communist regimes also meant that Leftist groups experienced trouble in
attracting supporters and adherents, which eventually resulted in the demise of
some groups—for example, Red Army Faction and April 19. Efficient police
operations ended other Leftist groups—Italian Red Brigades, Combatant Communist Cells, and 17 November (Alexander and Pluchinsky 1992; Hoffman
1998). Other long-standing terrorist campaigns—in Northern Ireland—cooled
down during this period. An upturn occurs in 2002 about the time that the United States launched its ‘‘war on terror.’’ A new downturn in transnational terrorism takes place in 2005; ironically, this downturn has not been publicized
because Patterns of Global Terrorism is no longer published. A display of the quarterly time series for assassinations and hostage-taking events (e.g., skyjackings
and kidnappings) for 1968–2005 would also show cycles. The quarterly totals for
assassinations and hostage events are smaller compared with bombings. This is
consistent with terrorists, as rational actors, responding to risk and engaging less
frequently in more dangerous and logistically complex attacks.
350
All
Bombings
Incidents per quarter
300
250
200
150
100
50
0
1968 1970 1973 1975 1978 1980 1983 1985 1988 1990 1993 1995 1998 2000 2003 2005
FIG. 1. All Incidents and Bombings.
292
Applying Analytical Methods to Study Terrorism
1
0.9
0.8
Proportion of total
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
1968
1970
1973
1975
1978
1980
1983
1985
1988
1990
1993
1995
1998
2000
2003
2005
FIG. 2. Proportion of Casualty Incidents.
Until the start of the 1990s, Left-wing terrorist organizations that wanted to
win the hearts and minds of the people were the dominant influence. Such
terrorists tried to avoid casualties, except for individuals characterizing the establishment or the ‘‘enemy.’’ Beginning in 1979, Left-wing and secular terrorist
groups began to be replaced by religious fundamentalist groups. The number of
such fundamentalist groups increased as a proportion of active groups: 2 of 64
groups in 1980; 11 of 48 groups in 1992; 16 of 49 groups in 1994; and 25 of 58
in 1995 (Hoffman 1998). Rapoport (2004) calls the dominance of fundamentalist terrorists in recent years as the ‘‘Fourth Wave.’’ With the rise of al-Qaeda and
other fundamentalist terror groups, terrorists purposely sought out greater casualties, viewing anyone not sharing their beliefs as a legitimate target, as 9 ⁄ 11
underscored. In a statistical analysis, Enders and Sandler (2000) established that
a significant rise in casualties from transnational terrorism can be traced back to
the takeover of the U.S. embassy in Tehran and the Soviet invasion of Afghanistan in the last quarter of 1979, which marked the start of fundamentalist terrorism.5 In Figure 2, we display the quarterly proportion of transnational terrorism
incidents with casualties (i.e., injuries or deaths) for 1968–2005. The fundamentalist impact is unmistakable as the proportion of casualty incidents trends
upward from the 1990s once the fundamentalist terrorists became the dominant
influence (Rapoport 2004). From 2002 on, the drift is upward after a brief
downturn following 9 ⁄ 11. Today’s terrorists mean business—incidents with casualties almost always now involve deaths.
Forecasting Terrorism
The key ingredient in forecasting is to relate statistically the current number of
terrorist incidents to their past values, time, and potential shocks or interventions (events such as a policy change or the rise in fundamentalism). There
are some important forecasting insights. First, observed patterns in the time
series can be used for forecasting purposes. Second, short-run forecasts are more
5
Enders and Sandler (2000) time-series test supported Hoffman’s (1998) informed hypothesis that the fundamentalists changed the nature of terrorism in late 1979. A test for structural changes at quarters on either side of
1979 pinpointed the maximum alteration at the fourth quarter of 1979.
Todd Sandler and Walter Enders
293
accurate than long-run forecasts—for example, it is easier to forecast the weather tomorrow than to forecast it 2 weeks or a year hence. Because a time series
of terrorist events that relates today’s incidents to past incidents and other influences is not completely regular, the cumulated errors mean that long-term forecasts will be associated with rather large errors. Third, a time series of terrorist
incidents can be forecast without knowing precisely why the numbers of incidents change in a particular regular pattern. Fourth, the ability to forecast patterns of, say, skyjackings does not mean that one can predict a particular
catastrophic event such as 9 ⁄ 11. Enders and Sandler’s (2000) forecast in 2000
cautioned about the rising severity of transnational terrorism, but did not foresee 9 ⁄ 11. Only intelligence or infiltrating a terrorist group can do that.
A typical time-series model, given by equation (1) for skyjackings (SKY), might
have the following functional form:
SKY t ¼ a0 þ a1 t þ b1 SKY t1 þ b2 SKY t2 þ et
ð1Þ
where SKYt is the number of skyjackings in period t ; a0 + a1t denotes a linear
trend; b1SKYt)1 + b2SKYt)2 represents the short-run dynamics based on the
number of skyjackings in the two previous periods; and et stands for an error
term. Every time series of terrorist events can be broken down into at least
three primary ingredients: trend, cyclical components, and noise. Trend refers
to long-run movements in a time series that can be predicted far into the
future. The standard technique for estimating trend is to fit a polynomial
involving time (t)—i.e., t + t2 + …—to describe the current value of incidents.
Time terms are added until they are no longer statistically significant. If, for
example, the only significant time term is t, then the event series possesses a
linear trend as in equation (1) indicating that it either rises or declines at a
constant rate over time. If, instead, a quadratic time term is significant, then
the trend is parabolic representing a hill or a valley. Although most commentators and experts describe terrorism trend in linear terms, past research
shows that no terrorist time series shows linear trend; rather, time series display parabolic (hill or valley shaped), or more complex patterns (Sandler and
Enders 2004:306).
Any series will temporarily diverge from its long-run trend. This can be seen
in Figure 1, shown earlier, where the all-incident series displays a positive jump
at the end of 1998 and appears to depart from its trend for several quarters.
Such departures are part of the short-run dynamics of the series, known as its
irregular or cyclical component. If the nature of these short-run movements is
known, the observed discrepancies from trend facilitate forecasting. Cycles in
terrorism can be attributed to various factors that result in the bunching of
incidents on a regular basis. A successful event can induce others to copy the
attack’s strategy until the authorities devise the means and acquire the resources
for effective countermeasures. As new antiterrorism measures block more
attacks, terrorists hold off until they develop ways to circumvent these measures—for example, metal detectors induced terrorists to use ground crews to
plant guns on planes. This cat-and-mouse game can induce cycles. Enders and
Sandler (2006) argued that each kind of attack mode has its own characteristic
cycle, where logistically complex modes (e.g., skyjacking, kidnapping, and assassination) have longer cycles than simpler events (e.g., threat) as the cat-andmouse game takes longer to play out.
To test this conjecture, Enders and Sandler (2006:72) applied spectral analysis, which fits sine and cosine terms to the detrended time series for various
types of transnational terrorist events. They found that threats had a primary
cycle of just under a year, while incidents with deaths had a primary cycle of
almost 10 years. Hostage events had a primary cycle of seven and a half years,
and assassinations had a primary cycle of 4 years. Moreover, the length of cycles
294
Applying Analytical Methods to Study Terrorism
associated with various types of attack modes generally increased with logistical
complexity. A knowledge of these cycles allows officials to know when to augment defenses, say, against skyjackings after a lull. In essence, authorities would
have the means to allocate resources more efficiently by raising them during
anticipated peaks and reducing them during expected troughs. As cycles among
types of attacks are often out of sync, counterterrorist resources can be allocated
to thwart various events with a minimal outlay.
Finally, the noise component reflects the portion of the time series that cannot be predicted. But even this component can guide forecasting. Enders and
Sandler (1999) showed that the noncasualties terrorism series is white noise with
no deterministic information or predictive value. By purging these incidents
which include threats and nuisance bombings, forecasting improves with the
residual casualty time series. This insight improves forecasting and can guide
countermeasure resource allocations over time.
Counterterrorism Effectiveness
Intervention analysis is a statistical technique that indicates whether an abrupt
change in the pattern of time series is due to a particular policy or to an outside force. In essence, this analysis relates the current value of a series
(e.g., today’s skyjackings) to its lagged values and to intervention variables. The
latter can capture not only the magnitude and significance of a policy’s impact,
but also its temporal nature—for example, was its effectiveness immediate and
ephemeral or gradual and enduring. In particular, intervention variables are
added to equation (1) that reflect either an ephemeral impact—say, lasting one
period following the policy action—or a continuous impact. In the latter case,
the impact is felt in all periods after the action or event. Other temporal patterns for the intervention are possible. In January 1973, the introduction of
metal detectors in the United States had an immediate and enduring effect of
decreasing the number of U.S. hijackings by 5.62 attacks per quarter (Enders
et al. 1990). Transnational skyjackings decreased from three incidents per quarter to just over one per quarter following the installation of metal detectors.
Moreover, these detectors’ long-run effectiveness exceeded their short-run
effectiveness. Unfortunately, metal detectors were also associated with an
increase in terrorist events with casualties as terrorists substituted into more
deadly attacks, an unintended consequence (Enders and Sandler 2006:82).
Intervention investigation also showed that U.N. conventions and resolutions to
outlaw attacks against diplomats, hostage taking, and even bombings had no
impact. This is noteworthy because some terrorist experts view these U.N.
responses as the most effective means for thwarting terrorism (Wilkinson 2001).
Retaliatory raids—for example, the U.S. bombing of Libya on the morning of
April 15, 1986, in retaliation for the La Belle discotheque bombing—had the
unintended consequence of temporarily increasing attacks against U.S. and U.K.
interests, followed by a short-lived decrease as terrorists paused to build
up depleted resources (Enders et al. 1990). A subsequent study by BrophyBaermann and Conybeare (1994) found similar surprising results for Israeli retaliatory raids. Although these reactive raids have no demonstrated ameliorating
effect on terrorism, they do have a political effect by showing the electorate that
the government is lashing back at the terrorists. This political benefit needs to
be modeled in future studies.
In a subsequent work, Enders and Sandler (1993) applied a more sophisticated intervention analysis that accounts for the interdependency among various
terrorist series. This newer technique is vector-autoregression (VAR) intervention
analysis. Because terrorists will react to barriers, such as metal detectors, by
switching their mode of attack, a proper evaluation of the effectiveness of these
Todd Sandler and Walter Enders
295
detectors requires ascertaining the effects of metal detectors on related modes
of attacks—for example, attacks against protected persons (including diplomats),
other hostage events (e.g., kidnappings), and other terrorist incidents. This technique also permits a researcher to investigate the impact of more than one intervention—for example, metal detectors in January 1973, embassy fortification in
1976 and 1985, and the Libyan retaliatory raid in 1986.
Figure 3 illustrates the results of this VAR intervention study. The four panels measure the number of incidents per quarter for four types of terrorist
attacks, in which the vertical lines in each panel correspond to the four interventions. The irregular dashed lines denote the actual time paths, while the
solid lines are the estimated time paths that account for the effects of the various interventions. In the figure, there are abrupt changes in the skyjacking,
other hostage-taking and protected-person attacks series with the installation of
metal detectors. Skyjackings dropped precipitously; however, other hostage-taking attacks rose abruptly. This rise greatly limits the true effectiveness of metal
detectors as terrorists substituted to softer targets. With a lag, attacks against
protected persons fell as metal detectors were placed in embassies after their
introduction in airports. Subsequent fortification of embassies in 1976 and
1985 did not have a marked effect on the time series displayed. The VAR-intervention method has been used for alternative time series representations. In
particular, Enders and Sandler (1993) found that securing embassies resulted
in more assassinations and attacks against embassy officials in nonsecure
venues. VAR analysis revealed the unintended consequences of well-intended
policies. By only examining skyjackings, Landes (1978) never identified the
unintended negative impacts of metal detectors and thus overestimated their
benefits.
Economic Impacts of Terrorism
The techniques used to measure policy effectiveness have also been applied with
other methods to calibrate the impact of terrorism on the economy and by sectors (e.g., commercial air travel—see Ito and Lee 2005). Impacts come in two
varieties: direct and indirect costs. Direct costs can be calculated by summing
the replacement costs of damaged goods, equipment, structures, and inventories. In addition, economists have procedures—lost wages or the value of a statistical life—for evaluating the cost of lives lost. Indirect costs are trickier to
measure and include lost commerce, security costs, workman’s compensation,
raised insurance premiums, and other losses. Direct and indirect costs of the
unprecedented 9 ⁄ 11 attacks are estimated to be in the $80–100 billion range for
the United States—a high terrorist payback for an operation that cost less than
half a million dollars.
Past studies have generated some general principles. First, some sensitive
sectors (e.g., transportation, tourism, and foreign direct investment) can be
affected if the terrorists specifically target these sectors. For example, Enders
and Sandler (1996) calculated that two terrorist campaigns during 1979–1981
and 1985–1987 cost Spain $1.8 billion and $3 billion of its foreign direct investment, respectively, as money was redirected to safer countries. Second, the transfer of activities among sectors, based on perceived risk, allows large diversified
economies to withstand terrorism without displaying much overall impact on the
countries’ overall income or consumption. Moreover, these countries are able to
deploy security measures quickly to regain confidence. Third, small countries
can be greatly affected by intense terrorism campaigns. Eckstein and Tsiddon
(2004) applied a VAR model and estimated that terrorism during 2003–2005
cost Israel about 10% of its per-capita income. Similar declines were found
for the Basque Country by Abadie and Gardeazabal (2003). Fourth, with the
296
Applying Analytical Methods to Study Terrorism
Skyjackings
40
35
30
25
20
15
10
5
0
1970
1972
1974
1976 1978 1980
Interventions
1982 1984
Actual
1986
1988
1986
1988
Hostage incidents
22.5
20.0
17.5
15.0
12.5
10.0
7.5
5.0
2.5
0.0
1970
1972
1974
1976 1978 1980
Interventions
1982 1984
Actual
Protected-person attacks
22.5
20.0
17.5
15.0
12.5
10.0
7.5
5.0
2.5
0.0
1970 1972 1974 1976 1978 1980 1982 1984 1986 1988
Interventions
Actual
Other incidents
200
180
160
140
120
100
80
60
40
1970
1972
1974
1976
1978
Interventions
1980
1982
1984
1986
1988
Actual
FIG. 3. Substitutions Between Attack Modes.
exception of 9 ⁄ 11, most significant terrorist incidents were shown to have an
impact of just 1–4 days on stock exchanges by Chen and Siems (2004)—this is
good news for markets. The attacks of 9 ⁄ 11, however, took the world stock
Todd Sandler and Walter Enders
297
exchanges 30–40 days to rebound. Economies that are most vulnerable to terrorism are in less-diversified developing countries, especially when terrorism hits
their main export sectors, such as tourism or shipping (e.g., the bombing of the
USS Cole and the Limburg in Yemen resulted in a 50% decrease in its port activity—a main export sector). Greece and Spain sustained large foreign direct
investment losses in the 1980s from tourism that hurt these countries’ gross
domestic product (GDP) (Enders and Sandler 1996); however, France’s terrorism had little effect on foreign direct investment or GDP.
Advanced economies can insulate themselves from terrorism-induced economic impacts for at least three reasons: significant security response, rapid intersector reallocation of resources, and effective economic policy. The last point is
illustrated for the United States in Figure 4. In Panel 1, we see that U.S. GDP
fell prior to 9 ⁄ 11 owing to a recession. The vertical axis indicates an indexed
GDP level, where the third quarter of 2001 (2001:Q3) is assigned an index of
100. As shown, GDP grew immediately following 9 ⁄ 11 despite the fall in industrial production (see Panel 2). In fact, the latter did not recover until 2002. In
times of uncertainty, investors usually seek highly liquid assets. To address this
anticipated surge in liquidity demand that would have choked off investment,
the Federal Reserve sharply decreased the federal funds rate following 9 ⁄ 11 (the
interest rate that banks charge one another for very short-term loans) (see Panel
3). This increased liquidity and reduced interest rate encouraged borrowing
for investment and enhanced economic activity. Fiscal policy also played a supportive role owing to a tax cut that fortuitously was signed into law in May 2001,
months before 9 ⁄ 11. In Panel 4, we see that real disposable income (the after-tax
income of households) grew at the start of 2002. A Congress-approved $40 billion
in emergency spending also bolstered disposable income and spending. The message is that advanced economies possess powerful tools to offset adverse economic
effects from a large terrorist attack, which, is not true for developing countries.
Game Theory and Counterterrorism
As mentioned at the outset, game theory is an appropriate tool for understanding the strategic interactions associated with terrorists and those charged
with counterterrorism. To illustrate the usefulness of this tool, we report on a
couple of applications of game theory to the study of counterterrorism.6
We first examine a simple preemption game played by two countries—A and
B, targeted by the same terrorist group. This game is represented by the 2 · 2
bold-bordered matrix in the northwest corner of the 3 · 3 matrix of Figure 5.
Both countries have two strategies: preempt a common terrorist threat or do
nothing (i.e., maintain the status quo), indicated by the two rows for country A
and the two columns for country B. The payoffs are chosen to capture the freerider problem that such a game often presents, because weakening a common
threat is a pure public good for all at-risk countries. That is, actions by either
country would decrease the threat to both countries, so that a country would
gain the most by doing nothing and free riding on the efforts of the other
country. Suppose that each preemptor confers benefits of six on itself and on the
other country at a cost of eight to itself, where the units of measurement are billions of dollars. In the matrix, the first payoff is that of country A and the second is that of country B. If no country preempts, then the payoffs are 0. When
country A preempts and B free rides, country A receives a net gain of )2 as its
costs of eight are deducted from its benefits of six, while B gets six in benefits
6
This first analysis is based on Arce and Sandler (2005). Other game-theoretic investigations are mentioned in
footnotes 2 and 4.
298
Applying Analytical Methods to Study Terrorism
Panel 1: Real GDP
120
(2001:Q3 = 100)
115
110
105
100
95
90
1999
2000
2001
2002
2003
2004
Panel 2: Industrial production
120
(2001:Q3 = 100)
115
110
105
100
95
90
1999
2000
2001
2002
2003
2004
Panel 3: Federal funds rate
7
Percent per year
6
5
4
3
2
1
1999
2000
2001
2002
2003
2004
Panel 4: Real disposable income
120
(2001:Q3 = 100)
115
110
105
100
95
90
1999
2000
2001
2002
2003
FIG. 4. Macroeconomic Variables and 9 ⁄ 11.
2004
299
Todd Sandler and Walter Enders
Country A
Preempt
Country B
Status quo
Defend
Preempt
4, 4
–2, 6
–8, 8
Status quo
6, –2
0, 0
6, –2
Defend
8, –8
–2, 6
–4, –4
FIG. 5.
Preemption-defensive Game.
with no cost. If roles were interchanged, then the payoffs would also be
switched. Mutual action gives each country a net gain of four as its costs of eight
are deducted from the benefits of 12, received from the two preemption efforts
(i.e., 2 · 6).
The underlying game is a prisoner’s dilemma where self-interested actions
result in an equilibrium with disappointing payoffs. Each country is motivated to
maintain the status quo insofar as the payoffs associated with this strategy are
greater than the corresponding payoffs of preempting—that is, 6 > 4 and
0 > )2. Thus, this strategy is said to be dominant for both players. As they play
their dominant strategy, they end up with 0 payoffs. Ironically, this outcome is a
Nash equilibrium, from which neither player would unilaterally want to move,
because preempting alone results in a worse outcome of )2. This equilibrium is
shaded in gray. If this game were generalized to n targeted countries whose individual preemption costs exceed the associated benefits from each country’s perspective, then the outcome would be no action by any country. This follows
because the dominant strategy for every country is not to preempt in the hope
of free riding on the actions of others.
Next, we consider a simple defensive game where the roles of costs and benefits are switched. Suppose that defensive efforts cost a nation six but provide
eight in benefits to just the defender. Further, suppose that the defender’s effort
makes the other country a softer target for the terrorists. If, say, the defender
costs the other country six in losses from its increased risk, then defensive
actions have a potential negative consequence on others. The associated boldbordered 2 · 2 matrix game is displayed in the southeast corner of the 3 · 3
matrix in Figure 5. If country A defends alone, then it nets two as costs of six
are deducted from benefits of eight, while B receives )6 from its enhanced vulnerability. The other payoffs are computed as before by allowing each unit of
defense to give eight in benefits to defender and six in costs to both countries.
This defensive game is also a prisoner’s dilemma with a dominant strategy to
defend mutually. The Nash equilibrium for this 2 · 2 game is mutual defense
with losses of )4 for both countries. We should stress that less extreme losses
from mutual defense will also result in mutual defense at the equilibrium.
Finally, we allow the two-targeted nations to have three choices—preempt, do
nothing (status quo), and defend—in the 3 · 3 matrix. The cost and benefit
from preempting or defending are unchanged for the two embedded 2 · 2
games. To complete the payoffs, we must compute the payoffs when one nation
defends and the other preempts for the upper right-hand and lower left-hand
cells. The defender receives a net gain of two from its action and an additional
free-rider benefit of six from the other country’s preemption for a total gain
of eight. In contrast, the preemptor loses two from its actions and incurs an
additional loss of six from the defender’s action for a payoff of )8. By comparing country A’s (or B’s) payoff in the bottom row (right-hand column) to the
respective country’s corresponding payoffs in the other rows (or columns), we
see that each country’s dominant strategy is to defend, which gives the lower
300
Applying Analytical Methods to Study Terrorism
right-hand shaded Nash equilibrium of mutual defense for the combined preemption-defensive game. Ironically, the countries wind up with the least desirable
of the competing equilibriums. In fact, this equilibrium possesses the lowest
summed payoff in the game! Thus, the countries’ actions lead to an unsafe
world that is overly defended.
Arce and Sandler (2005) showed that this dilemma can be escaped if one
country is a prime target of the terrorists, and thus gains sufficiently from preemption to orchestrate an offensive against a common terrorism threat as others
defend. This scenario is descriptive of the post-9 ⁄ 11 era where U.S. interests are
the target of 40% of all transnational attacks. The 9 ⁄ 11 attacks gave the United
States little choice but to strike back at al-Qaeda, joined by the United Kingdom,
whose 9 ⁄ 11 losses were second to those of the United States.
Game theory shows how terrorists exploit asymmetric warfare to their strategic
advantage. Terrorist networks allow terrorists to deploy their ‘‘best-shot’’ effort
against targeted countries whose lack of cooperation means that there are always
soft targets or the weakest links for terrorists to attack for maximum gain. In
addition, terrorists choose an optimal risk-minimizing network structure, where
infiltrators learn only a few identities as terrorist cells maintain limited linkages
with other cells. This is possible because terrorist operations are generally small
scale with the need of few operatives. British authorities’ ability to infiltrate the
August 2006 plot against U.S.-bound planes is largely due to the need for so
many terrorists to attack multiple planes simultaneously. As a terrorist operation
grows in complexity, it becomes more vulnerable to intelligence. As terrorists
seek more mass-casualty attacks, they sacrifice one of their greatest advantages—secrecy.
Many other counterterrorism measures can be addressed with game theory.
Bandyopadhyay and Sandler (2006), for example, developed a two-stage preemption-defensive game, where countries can both preempt and defend. In the first
stage, the targeted countries decide preemption levels, while, in the second
stage, they decide defensive measures to deflect the attack. These authors found
that the preemptor is apt to be the high-cost defender with the greatest foreign
interests; surprisingly, the preemptor need not be the low-cost preemptor. Preemptive efforts limit the overall level of terrorism and are more advantageous to
a targeted country that has high-defense cost owing to long exposed borders
and foreign interests. Even more surprising, these authors showed that changing
the order of the stages—that is, defense before preemption—does not change
the nature of the solution. In addition, these authors found that foreign interests and being a prime target also encourage preemption. Such studies will assist
governments in allocating tens of billions of dollars between offensive and
defensive counterterrorism measures.
Many other counterterrorism choices can benefit from game-theoretic analysis.
For instance, future game-theoretic studies must allow the terrorists to be active
players (see, e.g., Rosendorff and Sandler 2004; Siqueira 2005). Often, the terrorists are treated as passive agents who merely react to counterterrorism policies. What is required are more three-agent games that include the terrorists
and two targeted governments as active players whose decision calculus is displayed. Also, domestic politics must be added so that agents include the electorate and government in at-risk countries, along with the terrorists. In some
instances, an outside terrorist sponsor (e.g., state sponsors) may be relevant as
an active agent in a strategic framework. Clearly, there are many interesting avenues to pursue. Most recent game-theoretic analyses involve continuous variables, where game matrices are eschewed for mathematical approaches (see, e.g.,
Bueno de Mesquita 2005; Rosendorff and Sandler 2004). Future investigations
will address dynamic optimization—differential games—where decisions today
influence decisions tomorrow and a plan of action must be chosen.
Todd Sandler and Walter Enders
301
Conclusion and Further Future Directions
Technology allowed modern-day terrorism to assume insidious forms. The
extreme advantage that terrorism provides to the weak against powerful governments means that terrorism is here to stay. The application of analytical techniques is a way for targeted countries to level the playing field. By identifying
the roadblocks to cooperation and more effective policy, analytical studies can
empower governments to engage in more informed counterterrorism. Empirical
methods permit governments to evaluate policy effectiveness and gauge economic impacts of terrorism. Much can be learned from these studies. Thus far,
they have yielded surprising results.
There are many future empirical applications that would cast light on terrorism and its impact on society. First, improved quantification of the economic
impact on developing economies is needed to understand aid and security policies. In doing so, cross-country studies must group more homogeneous nations,
both in terms of their economies and the extent of terrorism, to achieve a more
informative average viewpoint. Second, further studies on the microeconomic
impact for sectors other than airlines and tourism would add to our knowledge
of the costs of terrorism. If we better understand this cost, then policy makers
can exercise more informed judgments on how much to spend to defend
against terrorism. Third, novel VAR studies must investigate the influence of
policies and other events on terrorism time series. These studies would improve
greatly if both domestic and transnational terrorist incidents are included.
Fourth, statistical analyses are needed to investigate how different types of terrorist groups—for example, fundamentalist versus Left-wing terrorists—operate and
respond to policy. Fifth, there needs to be a better melding of theory and empirics, so that the empirical models follow from clearly derived behavioral models.
References
Abadie, Alberto, and Javier Gardeazabal. (2003) The Economic Cost of Conflict: A Case Study
of the Basque Country. American Economic Review 93: 113–132.
Alexander, Jonah, and Dennis Pluchinsky. (1992) Europe’s Red Terrorists: The Fighting Communist
Organizations. London: Frank Cass.
Arce, Daniel G., and Todd Sandler. (2005) Counterterrorism: A Game-Theoretic Analysis. Journal
of Conflict Resolution 49: 183–200.
Arce, Daniel G., and Todd Sandler. (2007) Terrorist Signalling and the Value of Intelligence. British Journal of Political Science 37. (Forthcoming).
Bandyopadhyay, Subhayu, and Todd Sandler. (2006) The Interplay between Preemptive and Defensive
Counterterrorism Measures: A Two-Stage Game. Unpublished manuscript, School of Economic, Political & Policy Sciences, Richardson, TX: University of Texas at Dallas.
Brophy-Baermann, Bryan, and John A. C. Conybeare. (1994) Retaliating against Terrorism:
Rational Expectations and the Optimality of Rules Versus Discretion. American Journal of Political
Science 38: 196–210.
Bueno de Mesquita, Ethan. (2005) Conciliation, Commitment and Counterterrorism: A Formal
Model. International Organization 59: 145–176.
Chen, Andrew H., and Thomas F. Siems. (2004) The Effects of Terrorism on Global Capital Markets. European Journal of Political Economy 20: 249–266.
Eckstein, Zvi, and Daniel Tsiddon. (2004) Macroeconomic Consequences of Terror: Theory and
the Case of Israel. Journal of Monetary Economics 51: 971–1002.
Enders, Walter. (2007) Terrorism: An Empirical Analysis. In Handbook of Defense Economics Vol. 2,
edited by T. Sandler and K. Hartley. Amsterdam: North-Holland.
Enders, Walter, and Todd Sandler. (1993) The Effectiveness of Anti-Terrorism Policies: A VectorAutoregression-Intervention Analysis. American Political Science Review 87: 829–844.
Enders, Walter, and Todd Sandler. (1996) Terrorism and Foreign Direct Investment in Spain
and Greece. Kyklos 49: 331–352.
302
Applying Analytical Methods to Study Terrorism
Enders, Walter, and Todd Sandler. (1999) Transnational Terrorism in the Post-Cold War Era.
International Studies Quarterly 43: 145–167.
Enders, Walter, and Todd Sandler. (2000) Is Transnational Terrorism Becoming More Threatening: A Time-Series Investigation. Journal of Conflict Resolution 44: 307–332.
Enders, Walter, and Todd Sandler. (2006) The Political Economy of Terrorism. Cambridge: Cambridge University Press.
Enders, Walter, Todd Sandler, and Jon Cauley. (1990) U.N. Conventions, Technology, and
Retaliation in the Fight against Terrorism: An Econometric Evaluation. Terrorism and Political
Violence 2: 83–105.
Engene, Jan Oskar. (2004) Terrorism in Western Europe: Explaining the Trends Since 1950. Cheltenham,
UK: Edward Elgar.
Heal, Geoffrey and Howard Kunreuther. (2005) IDS Model of Airline Security. Journal of Conflict
Resolution 49: 201–217.
Hoffman, Bruce. (1998) Inside Terrorism. New York: Columbia University Press.
Im, Eric I., Jon Cauley, and Todd Sandler. (1987) Cycles and Substitutions in Terrorist Activities:
A Spectral Approach. Kyklos 40: 238–255.
Islam, Muhammad Q., and Wassim N. Shahin. (1989) Economic Methodology Applied to Political
Hostage-Taking in Light of the Iran-Contra Affair. Southern Economic Journal 55: 1019–1024.
Ito, Harumi, and Darin Lee. (2005) Assessing the Impact of the September 11th Terrorist Attacks
on U.S. Airline Demand. Journal of Economic and Business 57: 75–95.
Kunreuther, Howard, and Erwann Michel-Kerjan. (2004) Dealing with Extreme Events: New Challenges for Terrorist Risk Coverage. Unpublished manuscript, Philadelphia, PA: Wharton, University
of Pennsylvania.
Landes, William M. (1978) An Economic Study of U.S. Aircraft Hijackings, 1961-1976. Journal of
Law and Economics 21: 1–31.
Lapan, Harvey E., and Todd Sandler. (1988) To Bargain or Not To Bargain?: That Is the Question. American Economic Association Paper and Proceedings 78: 16–20.
Lapan, Harvey E., and Todd Sandler. (1993) Terrorism and Signalling. European Journal of Political
Economy 9: 383–397.
Lee, Dwight R. (1988) Free Riding and Paid Riding in the Fight against Terrorism. American Economic Association Papers and Proceedings 78: 22–26.
Mickolus, Edward F. (1982) International Terrorism: Attributes of Terrorist Events, 1968-1977 (ITERATE
2). Ann Arbor, MI: Inter-University Consortium for Political and Social Research.
Mickolus, Edward R., Todd Sandler, Jean M. Murdock, and Peter Flemming. (2006) International
Terrorism: Attributes of Terrorist Events, 1968-2005 (ITERATE 5). Dunn Loring, VA: Vinyard Software.
National Memorial Institute for the Prevention of Terrorism. (2006) M.I.P.T. Terrorism Knowledge Base. Available at http://www.mipt.org. (Accessed September 11, 2006).
Nelson, Paul S., and John L. Scott. (1992) Terrorism and the Media: An Empirical Analysis.
Defence Economics 3: 329–339.
Overgaard, Per B. (1994) The Scale of Terrorist Attacks as a Signal of Resources. Journal of Conflict
Resolution 38: 452–478.
Poe, Steven C. (1988) Nations’ Responses to Transnational Hostage Events: An Empirical Evaluation. International Interactions 14: 27–40.
Rapoport, David C. (2004) Modern Terror: The Four Waves. In Attacking Terrorism: Elements of a Grand
Strategy, edited by A. K. Cronin and J. M. Ludes. Washington DC: Georgetown University Press.
Rosendorff, B. Peter, and Todd Sandler. (2004) Too Much of a Good Thing? The Proactive
Response Dilemma. Journal of Conflict Resolution 48: 657–671.
Sandler, Todd, and Daniel G. Arce. (2007) Terrorism: A Game-Theoretic Approach. In Handbook
of Defense Economics Vol. 2, edited by T. Sandler and K. Hartley. Amsterdam: North-Holland.
Sandler, Todd, and Walter Enders. (2004) An Economic Perspective on Transnational Terrorism.
European Journal of Political Economy 20: 301–316.
Sandler, Todd, and Harvey E. Lapan. (1988) The Calculus of Dissent: An Analysis of Terrorists’
Choice of Targets. Synthe`se 76: 245–261.
Sandler, Todd, John Tschirhart, and Jon Cauley. (1983) A Theoretical Analysis of Transnational
Terrorism. American Political Science Review 77: 36–54.
Selten, Reinhard. (1988) A Simple Game Model of Kidnappings. In Models of Strategic Rationality,
edited by R. Selten. Boston: Kluwer Academic.
Siqueira, Kevin. (2005) Political and Militant Wings within Dissident Movements and Organizations.
Journal of Conflict Resolution 49: 218–236.
Wilkinson, Paul. (2001) Terrorism versus Democracy: The Liberal State Response. London: Frank Cass.
Download