Skip to main content
Log in

The Ecology of Terror Defense

  • Published:
Journal of Risk and Uncertainty Aims and scope Submit manuscript

Abstract

We draw on an ecological metaphor to analyze terror defense by governments and individuals. Governments can combat terror in part by targeting what we call the “stock of terror capacity” accumulated by a terrorist organization. The optimal control of terror stocks relies on both periodic cleanup and ongoing abatement, a lesson derived from the optimal control of other stocks of public bads, such as pollution.

Citizens can protect themselves from terror by avoiding exposure to threats and by reducing the harm they suffer if an attack occurs—actions we call “avoidance” and “amelioration,” respectively. Such measures may exert positive or negative externalities on other individuals. A simple model shows how individual responses to collective threats may undermine the effectiveness of government policies to address such threats. The model uncovers a strong analogy between the problem of individual responses to terror and the familiar congestion externality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Arrow, Kenneth J., Theodore Harris, and Jacob Marschak. (1951). "Optimal Inventory Policy,"Econometrica19, 250–272.

    Google Scholar 

  • Ayres, Ian and Steven D. Levitt. (1998). "Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack,"Quarterly Journal of Economics113, 43–78.

    Google Scholar 

  • Clotfelter, Charles T. (1978). "Private Security and the Public Safety," Journal of Urban Economics 5, 388–402.

    Google Scholar 

  • Dixit, Avinash, James Mirrlees, and Nicholas Stern. (1978). "Optimum Saving with Economies of Scale," Review of Economic Studies 42, 303–325.

    Google Scholar 

  • Falkenrath, Richard. (2001). "Analytic Models and Policy Prescription: Understanding Recent Innovation in U.S. Counterterrorism,” Studies in Conflict & Terrorism24, 159–181.

    Google Scholar 

  • Glanz, James and Eric Lipton. (2002). “A Midtown Skyscraper Quietly Adds Armor,” The New York Times, August 15, page A1.

  • Heal, Geoffrey and Howard Kunreuther. (2002). “You Only Die Once: Managing Discrete Interdependent Risks,” Mimeo, Columbia Graduate School of Business, April.

  • Hui-wen, Koo and I.P.L. Png. (1994). “Private Security: Deterrent or Diversion?”International Review of Law and Economics14, 87–101.

    Google Scholar 

  • Kahneman, Daniel and Amos Tversky. (1979). “Prospect Theory: An Analysis of Decision Under Risk,”Econometrica47, 263–291.

    Google Scholar 

  • Kaplan, Edward H., David L. Craft, and Lawrence M. Wein. (2002). “Emergency Response to a Smallpox Attack: The Case for Mass Vaccination,”Proceedings of the National Academy of Sciences 99, 10935–10940.

  • Keohane, Nathaniel O., Benjamin Van Roy, and Richard J. Zeckhauser. (2000). “Controlling Stocks and Flows to Promote Quality: The Environment, with Applications to Physical and Human Capital,”NBERWorking Paper No. 7727 (June).

  • Kunreuther, Howard and Geoffrey Heal. (2002). “Interdependent Security: The Case of Identical Agents.”NBER Working Paper No. 8871 (April).

  • Kushner, Harold J. and Paul G. Dupuis. (1992). Numerical Methods for Stochastic Control Problems in Continuous Time. New York: Springer-Verlag.

    Google Scholar 

  • National Research Council. (1995). “Protecting Buildings from Bomb Damage: Transfer of Blast-Effect Mitigation Technologies from Military to Civilian Applications,”Report of the Committee on Feasibility of Applying Blast-Mitigating Technologies and Design Methodologies from Military Facilities to Civilian Buildings. Washington, DC: National Academy Press.

    Google Scholar 

  • Scarf, Herbert. (1960). “The Optimality of (S,s) Policies for the Dynamic Inventory Problem.” In Proceedings of the First Stanford Symposium on Mathematical Methods in Social Sciences. Stanford, CA: Stanford University Press.

    Google Scholar 

  • Schelling, Thomas C. (1963). The Strategy of Conflict. Oxford: Oxford University Press.

    Google Scholar 

  • Schelling, Thomas C. (1978). Micromotives and Macrobehavior. New York: W.W. Norton & Co.

    Google Scholar 

  • Schmid, Alex P. and Albert J. Jongman. (1988). Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories and Literature. Amsterdam: North-Holland.

  • Shavell, Steven. (1991). “Individual Precautions to Prevent Theft: Private versus Socially Optimal Behavior,”International Review of Law and Economics11, 123–132.

    Google Scholar 

  • Stein, Luke C.D. (2002). "The Ecology of Terror Avoidance: Individual Responses and Group Consequences." A.B. Thesis, Harvard College (April).

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Keohane, N.O., Zeckhauser, R.J. The Ecology of Terror Defense. Journal of Risk and Uncertainty 26, 201–229 (2003). https://doi.org/10.1023/A:1024167124083

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1024167124083

Navigation