A terrorism-based differential game: Nash differential game

In this paper, we investigate the problem of combating terrorism by the government, which is one of the most serious problems that direct governments and countries. We formulate the problem and use the Nash approach of a differential game to obtain the optimal strategies for combating terrorism. We study the relationship between each of the government’ strategies and terrorism when the government is on the defensive (reactive), and we study when the government expects terrorist attacks and develops its strategies to combat terrorism. Also, we study the relationship between government activity and its strategies as well as government activity and the strategy of terrorist organizations.


Introduction
Terrorism is defined as the deliberate use of indiscriminate violence in order to achieve political, religious, or ideological objectives. Throughout the world, terrorism has become a major threat. Counter-terrorism requires government initiatives to promote education quality, employment opportunity, social fairness, religious awareness, and security systems. Some mathematical areas, such as operations research, have been used to develop techniques to combat terrorism. In order to prevent terrorist attacks, governments have imposed restrictions on terrorist organizations, such as freezing their assets and launching military invasions to remove the terrorists. Counter-terrorist measures take into account the reactions of terrorists. In this research, we analyze the interaction strategies between the government and terrorist organizations using a differential game technique. Weapons, financial wealth, and technological competence are used to quantify an organization's power. While the recruitment of terrorists is carried out by existing terrorists, their own activities and government anti-terrorist measures influence the rate of terrorist recruitment. However, the government incurs costs in countering terrorism in addition to limiting terrorist resources and activity. Terrorist organizations, on the other hand, want to maximize their strength in terms of both size and terrorist acts. As a result, this study examines how to assist governments in their fight against terrorism. Notably, the Nash differential game plays a critical role in the fight against terrorism.
Caulkins et al. [1] explored the optimal control of terrorism and global reputation. They concluded that the ability to combat terrorism depends on public opinion, and two water and fire management techniques were compared. The efficiency of water and fire strategies were compared by Caulkins et al. [2]. A differential game which controls the movements of two territories that can be moveable and fixed was introduced by Hsia et al. [3,4]. They analyzed the question of territorial defense and defined it as a fuzzy differential game, and they introduced a fuzzy control technique to handle this issue. The parametric Nash collative differential games were investigated by Youness et al. [5]. They introduced a parametric examination of this problem, as well as the solvability set and first-and second-kind stability sets. Megahed et al. [6] presented a large-scale differential game problem. They developed a Nash method for resolving this issue. Additionally, they used Nash and min-max zero-sum techniques to find the best control strategy for the fuzzy differential game [7][8][9]. Nova et al. [10] addressed a terrorism-related differential game. They discussed the Nash and Stackelberg strategies as well as their sensitivity analyses. Roy et al. [11] developed the concept of strategic interdependence between countries for the purpose of deterring terrorism. In a game with multiple stages and incomplete information, they investigated the balance reactions (for defence, R&D, and prevention) to a hypothetical terrorist attack in a two-country context. Megahed [12,13] used the min-max approach to define the government and international terrorist organization's (ITO) optimal strategy. He looked at two questions, i.e., -governments and ITO, and showed how important government procedures are in the fight against terrorism. In [14], he also described the Stackelberg differential game involving an E-differentiable function and an E-convex set. Additionally, Megahed in [15] emphasized the importance of the government's operations in counterterrorism, and the Stackelberg approach was used to analyze the differential game between the government and terrorists. Arce et al. [16] examined the prevalence of deterrence over preemption when governments can pick between the two approaches or combine them. In [17], they conducted a review of previous uses of game theory to the study of terrorism. Short et al. [18] researched how small violent fringe groups grow into huge, indoctrinated civilizations by modeling radicalization. In [19], they studied the spatiotemporal correlation of terrorist activities by al-Qaeda, the Islamic State of Iraq and Syria (ISIS), and local militants in six geographical locations, and in [20] they used game theory to protect oil and gas infrastructure from terrorism. Lazreg et al. in [21] studied the impulsive Caputo-Fabrizio fractional differential equations in b-metric spaces. Adiguzel et al. [22] discussed the use of Geraghty type hybrid contractions to solve fractional differential equations. Sevinik, Adiguzel et al. [23] looked at how to solve a boundary value problem involving a fractional differential equation. Adiguzel et al. [24] discussed how unique solutions exist for higher-order nonlinear fractional differential equations with multi-point and integral boundary conditions. Nguyen Duc Phuong et al. [25] developed a modified quasi boundary value method for the bi-parabolic equation's inverse source problem, and semilinear problems involving nonlinear operators of monotone type were studied by In-Sook Kima [26].

Problem formulation
Consider the state variable Z(t) in the differential game, which represents an ITO's resources that include weapons, financial capital, and a support network. Take another variable state κ(t) that describes the operations of the government (All these factors must be taken into account, including the quality of education, employment opportunities, social justice, religious awareness, and security arrangements.) t ∈ [0, ∞). The two participants are the government, which has a nonnegative strategy ν 1 (t), and the ITO, which has a nonnegative strategy ν 2 (t). The resource stock of the ITO grows in a linear function G(Z), i.e., G(Z) = r Z, r > 0, and government activity rises in a linear function B(κ) = ξκ, ξ > 0 is the government activity's rate of growth. Attacking slows the increase of the resource pool because it has a negative impact on the number of terrorists as well as weapons and money resources (for example, due to suicide bombings or terrorists being caught or killed). It is possible that the network of supporters will shrink as a result. The reduction in resource stock growth, on the other hand, is dependent not only on the intensity of the assault ν 2 , but also on counter-terrorism efforts ν 1 . The harvest function h(ν 1 , ν 2 ) represents the influence of the two players' control variables on resource growth. As a result, the resource stock's Z(t) dynamics can be stated like this: The initial terrorist stock is Z 0 , while κ 0 is the initial activities of the government, and a 1 , b 1 > 0. Moreover, we assume the following nonnegativity constraints along trajectories Z(t) and κ(t).
We assume that the partial derivatives are greater than zero because higher intensity of counter-terrorism efforts and attacks leads to a decline in growth: ∂h ∂ν 1 > 0, ∂h ∂ν 2 > 0. The effectiveness of counter-terrorism efforts is dwindling ∂ 2 h ∂ν 1 ∂ν 2 < 0. Furthermore, a higher attack rate results in disproportionately higher resource losses, i.e., ∂ 2 h ∂ν 2 2 > 0. Finally, the instruments complement one another, i.e., ∂ 2 h ∂ν 1 ∂ν 2 > 0. This is financially sound. Because active and visible terrorists are easier to manage than concealed terrorists, this positive relationship suggests that the marginal efficiency of counter-terrorism actions rises as the intensity of terrorist assaults rises. We also suppose that the economic literature's Inada requirements are met [27].
This ensures that the best strategies are not negative, ν 1 ≥ 0 and ν 2 ≥ 0. Player 1 (Government) derives benefit from its actions κ(t), harvest function h(ν 1 , ν 2 ), the depletion of terrorist resources (-c Z(t)). However, inefficiencies due to the ITO's size (-k ν 2 ), terrorist activities, and their own counter-terrorism measures all add up to costs. (-α 1 ν 1 ) The government's ongoing payment at time intervals of [0, ∞) (the government's goal) is where ω 1 , c, k, q, and α 1 > 0 The utility of the second player (ITO) is derived from the stock of resources. (σ 1 Z) as well as terrorist acts (-γ 1 κ(t)) at a high level (β 1 ν 2 ), then the ITO's running payout (its goal) is to maximize the following problem's payoff: where σ 1 , β 1 , and γ 1 > 0 It is expected that the declining rates ζ i , i = 1, 2, are greater than r and ξ growth and activity rates: The Nash equilibria are calculated in this study. The approach for solving the problem is based on Pontryagin's maximum principle [9].

Nash differential game
A continuous differential game with N players is a Nash differential game. Ordinary differential equations regulate how the game's state is evaluated throughout time. Each participant affects the outcome of the game by selecting an acceptable strategy. The cost of a player is determined by all players' strategies and the state's related evaluation. Differential equations are used to express information about the players, such as the target set, all players' cost functions, and the current space. It is assumed that each player's opponents are rational and that each player employs an optimal strategy, in which each player seeks to maximize his own gain. The Nash equilibrium notion essentially states that if one person tries to change his approach unilaterally, he will not be able to better his own optimization.

Nash equilibrium
Take the next problem: The Hamiltonian government's H 1 function is defined by where χ 1 and χ 2 are called the costate variables or the adjoint variables associated with the state variables Z(t) and κ(t) for ITO and the government, respectively. The ITO's Hamiltonian is defined as where 1 and 2 are the costate variables or adjoint variables for ITO and government, respectively, and are related with the state variables Z(t) and κ(t).

Proposition 1 The Nash problem's best strategies can be found in
Proof From the necessary conditions We have obtained the following results from the harvest function h(ν 1 , ν 2 ): thus, By solving (16) and (17), we obtain

Remark
1. In (16), since > 1; 0 < τ 1 < 1, then the power of ν 2 is greater than 1 ( 1-τ 1 > 1)). This relation shows that the government is more aggressive when ITO increases their attacks and when the harvest function increases, as shown in Fig. 1. More discussion: Equation (16) showed the relationship between the strategy of the terrorist organization and the strategy of the government. We obtained this relationship from the condition ∂H 1 ∂ν 1 = 0. The government had neglected for short time the fight against terrorist organizations, after that it became aware and began to take measures and developed its strategies, this was shown in Fig. 1. We found that the government had played its role and taken control of the situation; for this, the activity of terrorist organizations stopped at a specific level, which was some light work. Also, we note that the government's actions were a reaction to the terrorist organizations, but the reaction continued until the government took complete control of the situation.   (17), since > 1, 0 < τ 1 < 1, then the power of ξ 1 is less than 1, ( τ 1 1-< 1) an increase in counter-terror measures leads to a more cautious behavior by the terrorists and a lower harvest function, as shown in Fig. 2. Also, equation (17) showed the relationship between the strategies of terrorist organizations and the strategies of the government, which we obtained from the condition ∂H 2 ∂ν 2 = 0. Through this relationship, we noticed that when the government neglected the fight against terrorism, the organizations developed themselves and spread widely, this is clear from Fig. 2 ν 1 → 0 as ν 2 → ∞; and when the government fulfilled its duty towards this problem, the activities of the organizations began to decline, and the government did not stop until it took control of the situation, which put things back in order, restricted terrorism, and the situation became stable ν 1 → ∞ as ν 2 → 0. Lemma 1 For a constant harvest and constant strategies h(ν 1 , ν 2 ) and ν 1 , ν 2 for the governments' objective J 1 and ITO' objective J 2 are Proof The differential equation's solution dκ dt = ξκ + b 1 ν 2a 1 ν 1 is From (16) in (19), we have and from (17) in (19), we have and the differential equation's solution dZ dt = rZh(ν 1 , ν 2 ) is In the government objective J 1 and the ITO objective J 2 , from (19) and (22), where ν 1 , ν 2 as well as h(ν 1 , ν 2 ) are given in (18).

Remark
1. Equation (20) represents the relationship between government activity κ(t) and the strategies of the terrorist organization ν 2 . When ν 2 → 0, the government had a clear activity, and the relationship became increasing until the maximum value. After that the relationship became decreasing as the organizations increased their activity and developed their strategies, which affected the government that abandoned some of its duties until the organization took control of the state's capabilities as shown in Fig. 3. 2. Equation (21) represents the relationship between the government's activity κ(t) and its strategies ν 1 . When the strategies were weak, this reflected on the government's performance, which also became weak; when the government developed its strategy, this led to an increase in its activity, and this activity continued with the development of government strategies until it reached to the stability, this is evident in Fig. 4.

Conclusions
We studied the problem of combating terrorism, so we formulated the problem and used the Nash approach of a differential game for obtaining the optimal strategies for combating terrorism, and we obtained several relationships, which are the relationship between the strategies of the government and terrorist organizations when the government is in a state of reaction and vice versa. We saw that the government is more violent when it is attacked by terrorist organizations. Likewise, when the government neglects its role, the terrorist organizations control the situation, this is clear in Fig. 1 and Fig. 2. Also, we deduced the relationship between the government's activity and strategies, as well as the strategies of terrorist organizations, this is evident in Figs. 3 and 4.