There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to op
American Political Science Review
Vol. 105, No. 1
February 2011
doi:10.1017/S0003055410000614
Is There a Trade-off between Security and Liberty? Executive Bias, Privacy Protections, and Terrorism Prevention TIBERIU DRAGU
University of Illinois at Urbana–Champaign
I
develop a game-theoretic model of an interaction between an antiterrorist agency and a terrorist organization to analyze how the probability of a terrorist attack varies when the level of privacy protections changes. I derive two implications. First, privacy and security from terrorism need not be in conflict: when accounting for strategic interactions, reducing privacy protections does not necessarily increase security from terrorism. Second, and more important, the antiterrorist agency will always want less privacy. The very agency whose expertise affords it disproportionate influence on policy making will prefer a reduction in privacy protections even when that reduction harms security from terrorism. The analysis has implications for understanding the relationship between government powers and civil liberties in the context of terrorism prevention and times of emergencies more generally. he 9/11 terrorist attacks caused a rippling fear of vulnerability among liberal societies everywhere. Countries around the globe unhesitatingly adopted policies to enhance their governments’ capacities to prevent terrorism. Almost without exception, these policies increased governmental power at the expense of individuals’ civil liberties (Ackerman 2006; Hardin 2004; Holmes 2007; Posner 2006a). The right to privacy took the hardest hit, with liberal societies relaxing or eliminating restrictions on their governments’ surveillance powers. Within months of the attacks, not only the United States, but also France, Germany, and the United Kingdom relaxed various privacy protections by, for example, allowing warrantless interception of private communication and the retention of private data (Alexander 2006; Ramraj, Hor, and Roach 2005). Almost everyone—–citizens, policy makers, political pundits, and scholars—–approaches the formulation of counterterrorism policies as a balancing act between the allegedly competing values of privacy and security (Waldron 2003). Intuitively, this would seem to be the right way to evaluate policies designed to increase national security from terrorism. In the face of a potential large-scale terrorist attack, after all, it is unthinkable that citizens would dismiss security concerns and thus forbid all government surveillance directed at potential terrorists, just as it is unthinkable that they would dismiss all privacy concerns and give the government unlimited surveillance powers. Other than in the case of these two extremes, democratic societies and their governments face inevitable trade-offs. The critical and widely accepted assumption underlying ongoing scholarly debates and recently instituted governmental policies is that reducing privacy protections increases national security from terrorism. However, neither scholars nor practitioners have addressed the validity of this assumption by seriously scrutinizing
T
Tiberiu Dragu is Assistant Professor, Department of Political Science, University of Illinois at Urbana–Champaign, 605 E. Springfield Avenue, Champaign, IL 61820 (
[email protected]). I thank Josh Cohen, Xiaochen Fan, Jim Fearon, John Ferejohn, Jim Kuklinski, Terry Moe, Mattias Polborn, Milan Svolik, APSR Coeditor Gary Cox, the coeditors of APSR, and three anonymous reviewers for helpful comments and suggestions. All errors are mine.
64
the mechanism through which reducing privacy presumably translates into more security from terrorism. In this article, I develop a game-theoretic model of an interaction between an antiterrorist agency and a terrorist organization to analyze how the probability of a terrorist attack varies when the level of privacy protections changes. I use this framework to assess the security rationale for reducing privacy and derive two implications that are missing from the public debate. First, privacy and security from terrorism need not be in conflict: when accounting for strategic interactions, reducing privacy protections does not necessarily increase security from terrorism. Second, and more important, the antiterrorist agency always wants less privacy. The very agency whose expertise affords it disproportionate influence on policy making prefers a reduction in privacy protections even when that reduction reduces security from terrorism. Within the context of terrorism prevention, the analysis also applies to civil liberties other than privacy. Free speech immediately comes to mind. Many liberal societies have banned radical speech and the glorification of terrorism as a means to discourage the spread of extremist groups and their ideologies.1 My analysis suggests that governmental enforcement agencies will seek to restrict radical speech, regardless of whether the restriction increases security from terrorism. The result regarding the strategic bias of the executive agencies in charge of terrorism prevention contributes to a general understanding of the relationship between government powers and civil liberties in times of emergencies (Ackerman 2004; Ferejohn and ´ 2006; Manin 2008; Pasquino 2004; Gross and Aolain Posner and Vermeule 2007; Rehnquist 1998; Rossiter 1948). The very definition of emergency powers implies that when the emergency subsides, and a serious threat no longer exists, the powers will be terminated and rights will be restored. However, the analysis shows that governmental enforcement agencies lack incentive to relinquish their newly acquired powers once the emergency diminishes. To the contrary, because they are always worse off when civil liberties are expanded 1 Richard Bernstein, “What Is Free Speech, and What Is Terrorism?,” New York Times, 14 August 2005.
American Political Science Review
and better off when they are reduced, agencies seek to make the emergency reductions in civil liberties permanent. The article also makes two theoretical contributions. First, it contributes to and expands the political economy literature on law enforcement. This research ranges from Becker (1968), whose seminal paper on crime and punishment argued that people respond to the deterring incentives created by criminal law, to Tsebelis (1989, 1990), who developed a game-theoretic model to show that increasing the penalty for crime has no effect on criminal behavior, a result that challenged the deterrence hypothesis and drew an extensive scholarly debate (Bianco, Ordeshook, and Tsebelis 1990; Cox 1994; Hirshleifer and Rasmussen 1992). Note that this research focuses on situations where the enforcement agency’s task is to enforce the law and impose penalties after a crime is committed. In other words, the enforcement agency acts ex post, after a crime is committed, and the enforcement agency can only affect the likelihood of a crime indirectly, by influencing the ex ante cost–benefit calculus of criminals. My research focuses on situations where the antiterrorist agency acts ex ante, before a terrorist attack occurs, and the agency takes preemptive actions—–intelligence efforts aimed at detecting terrorist activity—–that directly affect the probability of a terrorist attack. This difference in the timing of law enforcement actions, reflecting the underlying difference between criminal deterrence and terrorism prevention, sets up a novel strategic problem from both conceptual and modeling perspectives. Second, the article contributes to the political economy literature on terrorism. This literature has addressed several critical questions about fighting terrorism, including the optimal (or suboptimal) domestic or international counterterrorism policy (Bueno de Mesquita 2005, 2007; Powell 2007a, 2007b; Rosendorff and Sandler 2004), radical mobilization (Bueno de Mesquita and Dickson 2007), terrorism recruitment and support (Bueno de Mesquita 2005; Siqueira and Sandler 2006), and strategies to fight terrorism (Kydd and Walter 2006), among other topics. However, researchers have yet to determine whether reducing civil liberties increases the effectiveness of terrorism prevention, even though nearly all prominent counterterrorism policies following 9/11 assume it does.
THE SECURITY RATIONALE FOR REDUCING PRIVACY In the aftermath of 9/11, in response to the threat of catastrophic terrorism, the public policy shifted from punishment after a terrorist attack occurs to preventing it from occurring (Jacobson 2006). Traditional law enforcement is mostly a reactive enterprise. Law enforcement organizations take actions after a crime is committed; the aim of a criminal investigation is to identify and punish those who broke the law. In contrast, terrorism prevention is a preemptive enterprise. Antiterrorist agencies take actions when the individuals or organizations planning an attack have not nec-
Vol. 105, No. 1
essarily committed any prosecutable criminal offenses; the aim of terrorist investigations is to detect threats before they matured into terrorist attacks (Posner 2006a). To this end, antiterrorist agencies need to access and collect information in order to identify individuals or groups that might be planning attacks. At its core, terrorism prevention is an explorative activity that entails gathering and analyzing data about a large number of individuals and organizations, most of whom are unlikely to pose any threat of terrorist activity (Posner 2006a). Richard Posner elegantly points out the difference between terrorism prevention and criminal deterrence: “The goal of national security intelligence is to prevent a terrorist attack, not just punish the attacker after it occurs, and the information that enables the detection of an impending attack may be scattered around the world in tiny bits. A much wider, finer-meshed net must be cast than when investigating a specific crime. Many of the relevant bits may be in the e-mails, phone conversations or banking records of U.S. citizens, some innocent, some not so innocent. The government is entitled to those data, but just for the limited purpose of protecting national security.” 2 The turn toward prevention is not surprising, given that terrorist attacks can be very destructive. However, legal requirements that constrain the initiation of criminal investigations are perceived to be in conflict with domestic intelligence powers necessary for terrorism prevention (Heymann 2003; Posner 2006a). To this end, the antiterrorism laws passed in the aftermath of 9/11 relaxed or eliminated restrictions on domestic (antiterrorism) surveillance powers. The rationale underlying these privacy-reducing measures is that, in an era of nuclear, radiological, biological, and chemical weapons, the potentially horrific costs of failing to stop another large-scale terrorist attack are too high; therefore, nations cannot afford to use the calculus they use when enforcing criminal law (Dershowitz 2002; Posner 2006a). Citizens need to accept fewer privacy protections, so the argument goes, because preventing large-scale terrorist attacks requires broader and more intrusive government surveillance powers than criminal investigations. The policy justification for reducing privacy protections is that such a reduction increases security from terrorism. Two intertwined and simultaneously occurring processes presumably serve as the means by which reduced privacy helps terrorism prevention and leads to increased security from terrorism. First, reducing privacy protections reduces the number of obstacles that antiterrorist agencies face when conducting domestic intelligence activities to foil a terrorist attack. Second, reducing privacy protections makes it more difficult for terrorist groups to undertake activities necessary for an attack. I next discuss each component of the security rationale for reducing privacy. My intention, to be clear, is not to argue that the security thesis is inherently good 2
Richard Posner, “Our Domestic Intelligence Crisis,” The Washington Post, 21 December 2005.
65
Trade-off between Security and Liberty
or normatively appealing. I merely want to lay out the security argument in order to analyze the mechanism through which reducing privacy presumably translates into more security from terrorism. The first component of the security argument states that reducing traditional privacy protections reduces the constraints on antiterrorist agencies’ domestic intelligence activities. To prevent terrorist attacks, governmental agencies must be able to detect the slightest traces of terrorist activity, and detection becomes more likely as their intelligence efforts increase. Privacy protections—taking the form of restrictions on the interceptions of communication, on data retention and data mining, as well as on government’s access to such third-party information as financial records and transactions—constrain how governmental agencies can collect information and thus conduct their (counterterrorist) intelligence operations. Thus, when these privacy protections are reduced, antiterrorist agencies can more readily gain access to and collect information related to terrorism prevention, and they can also engage in more intelligence activities for the same, fixed amount of resources. According to the second component of the security argument, reducing privacy protections creates a more hostile environment within which terrorist groups must operate. Some scholars note that terrorist organizations find liberal democracies to be suitable environments for them to grow and transmit their messages, because they can exploit the civil liberties and democratic freedoms on which liberal societies are built (Schmid 1993). Policy makers share this view. David Blanket, the British Home Secretary, observes that “our democracy and freedoms . . . . are deliberately exploited” (Home Department 2004). Along the same lines, John Ashcroft, the Secretary of Justice, said in reference to two suspected individuals indicted of terrorist charges that they “took advantage of the freedoms of an open society to foster and finance acts of terror” (Justice Department 2004). Reducing privacy protections, so goes the argument, has a chilling effect on terrorism-related activities. Reducing privacy protections might not deter true fanatics such as suicide bombers, but it does deter donors, fundraisers, facilitators, recruiters, and foot soldiers. That is, it raises the perceived costs of being associated with a terrorist group for individuals who would otherwise willingly provide various kinds of support. In turn, the terrorist support and logistical infrastructure is negatively affected: there are fewer supporters to disseminate propaganda, recruit operatives, raise money, and, if the terrorist organization wants to plan an attack, facilitate immigration, procure supplies, transfer money, forge false identities, facilitate travel, and provide safe houses. Support and logistical networks are essential for terrorist organizations to plan and execute largescale attacks (Gunaratna 2004). Reducing the level of privacy protections thus increases the terrorist organization’s costs for terrorist activities. In a liberal democracy, the tactical advantage is seemingly conceded to terrorists, who are free to exploit privacy protections, whereas the authorities are
66
February 2011
FIGURE 1.
Probability of a Terrorist Attack
a a e 0.07 0.3 e 0.03 0.05
constrained in their efforts to prevent terrorist attacks by those very privacy protections. Consequently, the intuition behind the security rationale for reducing privacy protections seems simple. Because reducing privacy protections decreases the antiterrorist agencies’ cost of counterterrorism intelligence efforts and increases the terrorist organization’s cost of terrorist activities, reducing privacy protections increases security from terrorism. However, even if we accept the premises of the security rationale, I argue that when the antiterrorist agency and terrorist organizations act strategically, reducing privacy protections can lead to less security from terrorism, whereas the antiterrorism agency prefers reducing privacy even if such a reduction leads to less security from terrorism.
A SIMPLE EXAMPLE In this section, I present a simple example to show what happens if we reduce privacy protections when terrorism prevention is an equilibrium outcome arising from the strategic interactions between an antiterrorist agency and a terrorist organization. The example is intentionally set up as minimally as possible. The purpose is to show the strategic mechanisms at work using simple numbers, rather than constructing “realistic” numbers descriptive of any particular situation. There are two players, an antiterrorist agency and a terrorist organization, and they get utility from a binary outcome: a terrorist attack occurs or it does not. The antiterrorist agency gets a payoff of 100 if a terrorist attack is prevented and a payoff of 0 otherwise. The terrorist organization gets a payoff of 100 if a terrorist attack occurs and a payoff of 0 otherwise. These payoffs are grossed of the players’ respective costs described as follows. The terrorist organization chooses a level of terrorist activities a; it chooses between a low level of terrorist activities a, and a high level of terrorist activities a. The antiterrorist agency chooses a level of counterterrorism intelligence effort e aimed at detecting terrorist activity; it chooses between a low level of effort e, and a high level of effort e. The probability of a successful terrorist attack, i.e., π(e, a), decreases in the level of counterterrorism intelligence effort e and increases in the level of terrorist activities a. The players’ actions translate into the probability of a successful attack, i.e., π(e, a), shown in Figure 1. Note that the counterterrorism intelligence effort is more effective at higher levels of terrorist activity, an assumption that states the well-established view in the terrorism scholarship that terrorist groups cannot
American Political Science Review
FIGURE 2.
Vol. 105, No. 1
The Cost cl (e, p)
FIGURE 5. Payoff Matrix if Privacy Protections Are Low
p p e 0 1 e 5 10 FIGURE 3.
a a e (93,6) (70,5) e (92,2) (90,-20)
The Cost ct (a, p)
a a
p p 1 0 25 1
FIGURE 4. Payoff Matrix if Privacy Protections Are High
a a e (92,7) (69,29) e (87,3) (85,4) increase the level of their operations without jeopardizing their anonymity and thus their chances of going undetected by enforcement agencies. The level of privacy protections p can take two values: “low” privacy protections p, or “high” privacy protections p. The level of privacy protections constrains the antiterrorist agency’s cost cl (e, p) and the terrorist organization’s cost ct (a, p) as follows: a higher p increases the antiterrorist agency’s cost and decreases the terrorist organization’s cost. Thus, if p = p, then the terrorist organization’s cost is 0 if it chooses a and 1 if it chooses a, and the antiterrorist agency’s cost is 1 if it chooses e and 10 if it chooses e. If p = p, then the terrorist organization’s cost is 1 if it chooses a and 25 if it chooses a, and the antiterrorist agency’s cost is 0 if it chooses e and 5 if it chooses e. Figures 2 and 3 show the antiterrorist agency’s and the terrorist organization’s cost as a function of p. In summary, the antiterrorist agency’s expected payoff is EUl = π(e, a) × 0 + (1 − π(e, a)) × 100 − cl (e, p) = 100 × (1 − π(e, a)) − cl (e, p),
(1)
and the terrorist organization’s expected payoff is EUt = π(e, a) × 100 + (1 − π(e, a)) × 0 − ct (a, p) = 100 × π(e, a) − ct (a, p).
(2)
We want to compare the equilibrium probability of a terrorist attack and the antiterrorist agency’s equilibrium expected payoff in the game with low privacy versus the game with high privacy. First, when p is high, Figure 4 gives the payoff matrix for the antiterrorist agency and the terrorist organization.
The terrorist organization has a dominant strategy: a. The antiterrorist agency’s best response to this action is e. Thus, the unique Nash equilibrium is for both players to choose their high-level actions, i.e., (e, a). In this equilibrium, the probability of a terrorist attack is .05, and the antiterrorist agency’s expected payoff is 85. Second, when p is low, Figure 5 gives the payoff matrix for the antiterrorist agency and the terrorist organization. The terrorist organization has a dominant strategy: a. The antiterrorist agency’s best response to this action is e. The unique Nash equilibrium is for both players to choose their low-level actions, i.e., (e, a). In this equilibrium, the probability of a terrorist attack is .07, and the antiterrorist agency’s expected payoff is 93. Reducing p induces the terrorist organization to decrease a because its cost increases. However, reducing p lowers the antiterrorist agency’s cost. But because the terrorist organization’s optimal action is a, the antiterrorist agency strategically anticipates that the terrorist threat is lower and, as a result, its optimal action is e. In this example, the antiterrorist agency’s equilibrium expected payoff is higher in the low privacy game, even though the equilibrium probability of a terrorist attack is higher (as compared to the high privacy game). Therefore, the antiterrorist agency prefers the low privacy environment even if it harms security from terrorism. In the next sections, I show that the preceding results hold in a general model of terrorism prevention.
A MODEL OF TERRORISM PREVENTION There are two players: an antiterrorist agency and a terrorist organization. The terrorist organization chooses a level of terrorist activities, a ∈ R+ . The agency chooses a level of counterterrorism intelligence effort aimed at detecting terrorist activity, e ∈ R+ . In the context of terrorism prevention, neither the antiterrorist agency nor the terrorist organization observes the other party’s choice, and, therefore, the players make their choices simultaneously. The outcome of the game is binary, and it is captured by a variable T that takes the value 0 or 1, where T = 1 denotes a successful terrorist attack and T = 0 denotes failure or absence of a terrorist attack. The actions of the antiterrorist agency and the terrorist organization translate into a probability of a successful terrorist attack, given by the function Prob(T = 1) ≡ π(e, a). This probability decreases in e, and it is convex in e (i.e., there are decreasing marginal returns to terrorism 2 prevention in e: ∂∂eπ2 > 0). Also, the probability
67
Trade-off between Security and Liberty
February 2011
increases in a, and it is concave in a (i.e., there are decreasing marginal returns to terrorism occurrence in 2 a: ∂∂aπ2 < 0). 2
π(e,a) < 0. I assume that the cross-partial derivative ∂ ∂e∂a The established view in the terrorism scholarship is that terrorism is an asymmetric form of warfare in which the weaker opponent, the terrorist organization, has an advantage by remaining unknown and plotting in secrecy. A higher level of terrorist activities jeopardizes the terrorists’ chances of going undetected by enforcement agencies, and thus the counterterrorism intelligence effort is more effective if the terrorist organization increases the magnitude of its activities. The assumption on the cross-partial essentially formalizes this substantive view (Siqueira and Sandler 2006; White 2003). The level of privacy protections p ∈ R+ affects the agency’s cost of counterterrorism intelligence effort and also the terrorist organization’s cost of terrorist activities. For one, the agency incurs a cost cl (e, p). This > 0, and the cost is convex cost increases in e, i.e., ∂cl (e,p) ∂e 2
l (e,p) in e, i.e., ∂ c∂e > 0. I assume that lime→0 ∂cl (e,p) =0 2 ∂e ∂cl (e,p) 3 and that lime→∞ ∂e = ∞. Also, the cost increases in p, i.e., ∂cl (e,p) > 0, and the marginal cost increases in ∂p 2
l (e,p) p, i.e., ∂ c∂e∂p > 0. The terrorist organization also incurs a cost ct (a, p). The terrorist organization’s cost increases in a, i.e., 2 ∂ct (a,p) t (a,p) > 0, and it is convex in a, i.e., ∂ c∂a > 0. I as2 ∂a ∂ct (a,p) = sume that lima→0 ∂a = 0 and that lima→∞ ∂ct (a,p) ∂a ∂ct (a,p) ∞. Also, the cost decreases in p, i.e., ∂p < 0, and the marginal cost of terrorist activities decreases in p, 2 t (a,p) i.e., ∂ c∂a∂p < 0. The antiterrorist agency and the terrorist organization get certain utility if the outcome of the game is no terrorist attack, and terrorist attack, respectively. Let Ul (T) be the antiterrorist agency’s payoff if the outcome is T. I assume that Ul (1) < Ul (0) (i.e., the antiterrorist agency prefers that no terrorist attack occurs). Denote the difference by l ≡ Ul (0) − Ul (1). Also, I assume that Ut (1) > Ut (0) (i.e., the terrorist organization prefers that a terrorist attack occurs). Denote the difference by t ≡ Ut (1) − Ut (0). Given these assumptions, the antiterrorist agency’s expected utility is
EUl = π(e, a)Ul (1) + (1 − π(e, a))Ul (0) − cl (e, p) = Ul (0) − π(e, a)l − cl (e, p).
(3)
Also, the terrorist organization’s expected utility is EUt = π(e, a)Ut (1) + (1 − π(e, a))Ut (0) − ct (a, p) = Ut (0) + π(e, a)t − ct (a, p).
3
(4)
These are standard Inada conditions that essentially ensure a nonzero finite equilibrium level of effort.
68
ANALYSIS I solve for the Nash equilibrium of the game. Maximizing the antiterrorist agency’s objective function, Equation (3) implies that its optimal action is the solution of the first-order condition −
∂π(e, a) ∂cl (e, p) l − = 0. ∂e ∂e
(5)
The optimization problem is strictly concave in e be2 2 l (e,p) cause the second derivative is − ∂ π(e,a) l − ∂ c∂e < 0. 2 ∂e2 Thus, there is a unique optimal e. Maximizing the terrorist organization’s objective function Equation (4) implies that its optimal action is the solution of the first-order condition ∂π(e, a) ∂ct (a, p) t − = 0. ∂a ∂a
(6)
The optimization problem is strictly concave in a 2 2 t (a,p) because the second derivative is ∂ π(e,a) t − ∂ c∂a < 2 ∂a2 0. Thus, there is a unique optimal a. The equilibrium of the game is the solution to the system of equations given by Equations (5) and (6). To show that there is a unique equilibrium, I solve for the antiterrorist agency’s and the terrorist organization’s best response functions. The antiterrorist agency’s optimization problem [Equation (5)] is strictly concave in e, and there is a unique optimal e for any given a. As a consequence, the antiterrorist agency has a well-defined best response function. Moreover, because Equation (5) is continuous in a, the antiterrorist agency’s best response function is continuous, and we can apply the implicit function theorem to Equation (5) to find the slope ∂2 π(e, a) l de ∂e∂a =− 2 . da ∂ π(e, a) ∂2 cl (e, p) − l − ∂e2 ∂e2 −
(7)
The preceding expression is strictly positive, which implies that the antiterrorist agency’s best response function e(a) strictly increases in a. The result is intuitive: if the terrorist organization increases its level of terrorist activities, in response, the antiterrorist agency increases its level of counterterrorism intelligence effort. The terrorist organization’s optimization problem [Equation (6)] is strictly concave in a, and there is a unique a for any given e. As a consequence, the terrorist organization has a well-defined best response function. Moreover, because Equation (6) is continuous in e, the terrorist organization’s best response function is continuous in e, and we can apply the implicit function theorem to Equation (6) to find the slope ∂2 π(e, a) t da ∂a∂e . =− 2 de ∂ π(e, a) ∂2 ct (a, p) − t ∂a2 ∂a2
(8)
American Political Science Review
Vol. 105, No. 1
The preceding expression is negative, which implies that the terrorist organization’s best response function a(e) strictly decreases in e. The result is intuitive as well: if the antiterrorist agency increases its level of counterterrorism intelligence effort, in response, the terrorist organization decreases its level of terrorist activities. Because the antiterrorist agency’s reaction function e(a) is strictly increasing in a and the terrorist organization’s reaction function a(e) is strictly decreasing in e, we have the following proposition. Proposition 1. The terrorism prevention game has a unique pure strategy Nash equilibrium. Proof.
In Text.
Proposition 1 shows that the game has a unique pure strategy Nash equilibrium. As a result, we can do comparative statics on how changes in privacy protections affect the players’ equilibrium actions, the players’ equilibrium payoffs, and the equilibrium probability of a terrorist attack. Changing privacy protections has two effects on both the antiterrorist agency’s and the terrorist organization’s equilibrium actions. First, it has a direct (nonstrategic) effect on each player’s equilibrium action because it affects their costs. Second, it has an indirect (strategic) effect on each player’s equilibrium action, effect that comes through how each player changes its equilibrium action in response to changes in the other player’s cost. How the equilibrium actions vary with the level of privacy protections depends on how the two effects work. In the case of the terrorist organization’s equilibrium action, both the direct (nonstrategic) and the indirect (strategic) effects work in the same direction. Ignoring strategic effects, as privacy goes up, the terrorist organization increases the level of terrorist activities because its marginal cost decreases. Now think about strategic considerations. The terrorist organization anticipates that the antiterrorist agency’s cost increases as privacy goes up, which induces the terrorist organization to increase its level of terrorist activities. The comparative static is clear: the terrorist organization increases its equilibrium level of terrorist activities if privacy increases. In the case of the antiterrorist agency’s equilibrium action, the strategic (indirect) and the nonstrategic (direct) effects work in opposite directions. Ignoring strategic effects, as privacy goes up, the antiterrorist agency decreases its level of effort because its marginal cost increases. Now think about strategic considerations. The agency anticipates that the terrorist organization’s cost decreases as privacy goes up, which induces the agency to increase its level of effort. Hence, the two effects pull in opposite directions. The following expression, evaluated at the equilibrium values a∗
and e∗ , shows when the strategic effect dominates the nonstrategic effect: ∂2 cl (e, p) ∂e∂p
0 so that cl (·) > 0, and we need p < 1 so that ct (·) > 0. The antiterrorist agency’s maximization problem is 1 2 max −a(1 − e)l − e p . (11) e 2 And the terrorist organization’s maximization problem is 1 max a(1 − e)t − a2 (1 − p) . (12) a 2 The equilibrium level of e and a can be found by solving the system of equations given by the first-order conditions: al − pe = 0
(13)
(1 − e)t − a(1 − p) = 0.
(14)
equilibrium actions are e∗ (p, t , l ) = tp and a∗ (p, t , l ) = t 2 . Therefore, l +p−p the equilibrium probability of a terrorist attack is 2 t π∗ (p, l , t ) = (pt (1−p) 2 2. l +p−p ) We can analyze how the equilibrium probability of a terrorist attack changes with changes in p. We have the following result. The
t l t l +p−p 2
Proposition 5. There is a threshold p( ˆ t , l ) such that π∗ (p) increases in p for p ∈ (0, p( ˆ t , l )) and decreases in p for p ∈ (p( ˆ t , l ), 1). The threshold p( ˆ t , l ) decreases in both t and l . Proof.
See Appendix. 6
Figure 7 illustrates this relationship.
6 The exact value of p( ˆ t , l ) depends on the specific values of the exogenous parameters. For example, the threshold is pˆ 0.67 if t =
Recall Proposition 3, which states that reducing the level of privacy protections can increase or decrease the equilibrium probability of a terrorist attack. One possible criticism of it might be that, regardless of the functional forms, a reduction in privacy will not increase the probability of a terrorist attack when privacy protections are already at high levels. If this intuition were true, my analysis, although theoretically sound, would not necessarily apply to Western liberal societies, which rank highest of all countries with respect to civil liberty protections. Indeed, some scholars have argued that liberal societies were protecting civil liberties too much while they were too stringent in their limits on government surveillance powers. For example, William Stunz writes, “Secret government snooping sounds Orwellian. But Orwell guessed wrong about some things. Today, the danger that American democracy faces is not that rulers will know too much about those they rule, nor that too many decisions will be made without public scrutiny. Another danger looms larger: that effective, active government—–government that innovates, that protects people who need protecting, that acts aggressively when action is needed—–is dying. Privacy and transparency are the diseases. We need to find a vaccine, and soon.”7 However, Figure 7 shows that this type of criticism is not valid. In the context of this parametric model, the probability of a terrorist attack increases in the level of privacy when privacy is at low levels and decreases in the level of privacy when privacy is at high levels. The equilibrium probability of a terrorist attack is most likely to increase when societies with high levels of existing privacy protections reduce them. l = 10. Note also that the threshold value depends on the relative effect of p on the cost functions cl (·) and ct (·). That is, suppose we parametrize this effect as follows. Let the agency’s cost be cl (s, p) = 1 2 1/n . Then, the threshold is pˆ 0.17 if t = l = 10 and n = 10. 2s p 7 William J. Stunz, “Against Privacy and Transparency, Secret Service,” The New Republic, 17 April, 2006.
71
Trade-off between Security and Liberty
Also, the threshold p( ˆ t , l ) decreases in both t and l . In other words, whenever either t or l increase, the range of values of p for which the equilibrium probability of a terrorist attack increases with a reduction in privacy expands. Recall that l represents the antiterrorist agency’s utility gain if a terrorist attack is prevented; therefore, we can think of l as the antiterrorist agency’s stake for terrorism prevention. Also, t represents the terrorist organization’s utility gain if a terrorist attack occurs; therefore, we can think of t as the terrorist organization’s stake for terrorism occurrence. This latter result also speaks to the conditions under which reducing privacy increases the terrorist threat. In general, the threat of terrorism extends across a wide spectrum, from attacks causing little in the way of injury or damage, to large-scale incidents. Undoubtedly, the antiterrorist agency’s stakes in terrorism prevention and the terrorist organization’s stakes in terrorism occurrence are highest in the case of large-scale terrorist attacks. Because these type of attacks cause nationalscale outcomes, governments have focused their efforts on seeking to prevent them in the aftermath of 9/11. To this end, privacy protections were reduced precisely to minimize the threat of catastrophic terrorism. The preceding result shows that the probability of a terrorist attack is more likely to increase when societies reduce privacy for the purpose of preventing catastrophic terrorist attacks.
THE PUBLIC INTEREST Proposition 4 shows that the antiterrorist agency prefers diminished privacy, including when such reduction harms security from terrorism. It suggests that there can be a conflict between the agency’s interests and the objective of national safety from terrorism. In this section, I argue more generally that diminished privacy (in the context of terrorism prevention) is not necessarily in the public’s interest. This task requires specifying how the agency’s utility function differs from that of the public. The primary reason that the utility functions of agencies and citizens differ arises from the importance that citizens place on restrictions of government surveillance powers. Like enforcement agencies, ordinary people consider security from terrorism a crucially important social objective, but one that must be balanced with the right to privacy from government intrusion, a foundational right that underpins other civil rights and liberties on which liberal societies are founded (Regan 1995; Solove 2008). Justice Brandeis noted the value of privacy when he wrote that the framers of the Constitution “sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the Government, the right to be let alone—–the most comprehensive of rights and the right most valued by civilized man.”8 With legal restrictions on surveillance powers comes a public expectation that government must not cross some admittedly 8
Olmstead v. United States, 277 U.S. 438 (1928).
72
February 2011
ill-defined boundary, a private space where individuals are free to think, make personal choices, and exercise their individual and democratic rights. The proper functioning of a democracy depends above all on a vibrant civil society: citizens who are free to formulate and express their own beliefs and engage in civic activity without fear of governmental scrutiny (Holmes 1995). Legislation that reduces traditional privacy protections represents a threat to civil society because it places at risk values that citizens in liberal societies deem essential, such as freedom of speech, freedom to dissent, and the like (Donohue 2008). Expanding the circumstances under which the government can invade citizens’ protected spheres without probable cause can have a chilling effect on freedom of speech and freedom of association. It can threaten people’s willingness to express themselves openly and explore new ideas with others, including “questionable” others. Most fundamentally, perhaps, reducing privacy can stifle political dissent, because citizens fear reprisal by government actors. Additional differences between the agency’s and the public’s utility functions can arise when we consider the various activities in which the agency engages. Many of the nonterrorist activities in which bureaucrats inevitably participate will appear as superfluous to ordinary citizens. Because within-organization diversity creates conflicts of interest, bureaucrats spend valuable time and resources trying to gain power and influence within their agency (Pfeffer 1993; Wilson 1989). For example, individuals lobby for pay increases, promotions, and job assignments, and whole units lobby for more resources, acceptance of their policy proposals, continuation of their programs, and abandonment of projects harmful to their interests. Milgrom and Roberts (1988, 1990) argue that such influence activities are endemic to hierarchical organizations where some individuals have discretion over decisions with distributive consequences. Antiterrorist agencies might be particularly prone to influence activities because they are, in the words of James Q. Wilson (1989), “coping organizations,” organizations where outputs are not easily measurable and where individual effort for producing intelligence is unobservable (Posner 2005). Exacerbating the problem, terrorism prevention requires spending most of the time and resources on null results. As a Federal Bureau of Investigation (FBI) agent puts it, “a lot of time we are chasing shadows.” For example, the New York Times reports that the FBI 21-member threat squad, known as Counterterrorism 6, followed 5,500 leads between 2004 and 2009, none of which foiled a specific terrorist plot.9 And for antiterrorist agencies to foil a terrorist attack, a rare event, such outcome requires the coordination and concerted effort of many individuals and organizations. Because individual performance of intelligence work is difficult if not impossible to objectively evaluate, subjective evaluations are inevitable, inducing agents to put valuable effort into influencing 9 Eric Schmitt, “F.B.I. Agents Role Is Transformed by Terror Fight,” New York Times, 18 August, 2009.
American Political Science Review
Vol. 105, No. 1
their superiors’ perceptions of their work (Garicano and Posner 2005). Internal competition represents only one dimension of influence activities. Bureaucratic agencies also spend valuable time and resources on across-agency power struggles that pervade the corridors of government (Rourke 1984). These struggles take a variety of forms, including competing for resources, jurisdiction, and political access to elected officials. To this point, the turf battles among U.S. counterterrorism bureaucracies have constantly made the headlines10 and have been highlighted in governmental reports as a possible cause of intelligence failures. For example, the 9/11 Commission Report (National Commission 2004) and the WMD Commission report (The Commission on the Intelligence 2005) both document the turf battles between the FBI and the CIA before and after 9/11. More generally, an extensive literature on bureaucracy discusses agency costs inherent in managing the public bureaucracy (Breton and Wintrobe 1982; Downs 1967; Moe 1984; Niskanen 1971). In Przeworski’s (2003) words, “the objectives of the bureaucrats need not be the same as those of the citizens.” In the context of terrorism prevention, scholars and governmental reports have documented numerous agency problems and the resulting bureaucratic inefficiencies in intelligence operations: collecting data of questionable quality, lack of coordination among collection efforts, insufficient investment in the quality of intelligence analysis, bureaucratic culture rewarding quantity over quality, a focus on short-term at the expense of long-term strategic analysis, inability to connect the dots and combine pieces of intelligence into a coherent story, and a breakdown of information sharing within and across agencies (The Commission on the Intelligence 2005; Garicano and Posner 2005; National Commission 2004; Posner 2005, 2006b; Treverton 2008).11 The Washington Post has conducted a two-year long investigation into the national security buildup in the United States that followed the 9/11 terrorist attacks. Their report suggests that many counterterrorism resources have been extensively used for nonvaluable activities. This investigation extensively documents how the increase of counterterrorism resources has actually increased bureaucratic inefficiency, empire building, unnecessary overlap, and redundancies.12 Additional distorted incentives can arise when the antiterrorist agency works on multiple issues that vary with respect to how adequately performance can be measured. In such an organization, individuals have
incentives to shift their effort away from activities that may be not only more valuable to the public, but also more difficult to measure than activities where performance is easier to gauge (Holmstrom and Milgrom 1991; Milgrom and Roberts 1990). The combination of criminal-investigation and security intelligence functions in the same agency can create such perverse incentives (Garicano and Posner 2005; Posner 2006b). For example, scholars and political pundits have noted the FBI’s incentive to focus on criminal investigations at the expense of national security intelligence.13 Related evidence suggests that when police are mobilized to deal with a terrorist threat, the police allocate some of these resources to fight ordinary crime. For example, Gould and Stecklov (2009) show that increased police presence on streets in the aftermath of a terrorist attack leads to a higher arrest rate for (nonterrorism-related) public crimes, such as trespassing. Moreover, the bureaucratic literature suggests that it is difficult for an established agency to change its organizational culture and refocus its priorities (Wilson 1989). As a result, the preferences of the enforcement agencies and the public for what (valuable) activities ought to be pursued are not necessarily in sync when the public suddenly wants an increased focus on a new threat. Many scholars have highlighted this issue in the context of terrorism prevention (Garicano and Posner 2005; Hewitt 2008; Zegart 2007). For example, Richard Posner (2006c) points out the difficulties of changing the FBI’s traditional law enforcement culture: “No one will deny that the FBI has a distinctive culture too—–and it happens to be one inimical to intelligence gathering . . . FBI agents don’t like being asked to chase down clues . . . because 99 out of 100 (probably even a higher percentage) turn out to lead nowhere. That is not what they are accustomed to when they conduct criminal investigations. The agents think that they have better things to do with their time.” Likewise, Steven Hewitt (2008) notes the challenges of refocusing the MI6 from fighting IRA terrorism to fighting AlQaeda: “Careers have been established and resources have been pumped into countering the IRA. Suddenly shifting to concentrate on a new target was not an easy matter. There was a familiarity that came with battling Irish republicanism for more than a century. The same cannot be said for international terrorism.” Because of the agency problems discussed previously, the antiterrorist agency’s (opportunity) cost for terrorism prevention is generally higher than that of the public. Given these differences, suppose that the public’s utility (evaluated at the equilibrium actions) is
10 For example, see Jerry Markon, “FBI, ATF Battle for Control of Cases,” Washington Post, 10 May, 2008. 11 Garicano and Posner (2005) and Posner (2005, 2006b) offer excellent theoretical discussions of the dysfunctional incentives and agency problems endemic to intelligence activities. Also, the National The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (2005), Commission on Terrorist Attacks upon the United States (2004), and Treverton (2008) extensively document bureaucratic inefficiencies in collecting, analyzing, and sharing counterterrorism intelligence. 12 Dana Priest and William M. Arkin, “A Hidden World, Growing beyond Control,” Washington Post, 19 July, 2010.
EUS∗ (p) = Ul (0) − π(e∗ (p), a∗ (p))l − cS (e∗ (p), p) + BS (p),
(15)
13 For example, Richard Posner, “Our Domestic Intelligence Crisis,” Washington Post, 21 December, 2005; William E. Odom, “Why the FBI Can’t Be Reformed,” Washington Post, 29 June, 2005; and Patricia Hurtado, “FBI Uses Triage to Shift from Terror to Madoff, Subprime Probes,” Bloomberg News, 22 December, 2008.
73
Trade-off between Security and Liberty
where cS (·) represents the public’s (opportunity) cost for terrorism prevention14 and BS (p) represents the social benefits associated with privacy protections.15 If we compare Equation (10) with Equation (15), we can see that the public’s and the agency’s optimal levels of privacy protections differ. Because privacy protections have social benefits, there are situations in which diminished privacy (in the context of terrorism prevention) is not in the public’s interest. Moreover, when e∗ (p) increases in p, the preference divergence (over the level of privacy protections) increases. This is the case because changes in the level of privacy protections that work through changing the agency’s equilibrium action have (negative) effects on the public’s utility.16
OTHER APPLICATIONS Within the context of terrorism prevention, the analysis applies to civil liberties other than privacy. For example, liberal democracies have imposed new restrictions or tightened existing restrictions on (terrorism-related) radical speech.17 The rationale for these policies is to criminalize what almost everyone believes to be a root cause of terrorism: hate speech that asserts that killing is morally justified to further a religious, political, or ethnic cause.18 In other words, the indoctrination resulting from terrorist speech helps transform radicalized individuals into active terrorists and thus provokes terrorist violence. For example, in the UK, the Terrorism Act of 2006 introduced a number of new offenses, including “direct or indirect encouragement or other inducement” of terrorism. The game-theoretic analysis suggests that restricting radical (terrorism-related) speech might not achieve the intended security benefits, even though enforcement agencies prefer such restrictions. The simplest way to analyze the effect of restricting (terrorismrelated) speech in the context of the previous game is to assume that the level of radical (terrorism-related) speech, f (r), depends on the level of (legal) restrictions on radical speech, r, in the following way: more restrictions decrease the level of terrorist speech. In turn, the level of terrorist speech affects potential terrorists’ preference for terrorist occurrence, i.e., t (f (r)); thus, more restrictions on terrorist speech decrease the potential terrorists’ preference for terrorism occurrence. 14 To formalize the argument that the public’s (opportunity) cost is lower than the agency’s, I assume that cS (e, p) < cl (e, p) and ∂cS (e,p) < ∂cl (e,p) for the same level of e. A specific implementation ∂e ∂e is cS (e, p) = αcl (e, p) where α ∈ (0, 1); that is, the public’s cost is a fraction of the agency’s cost. 15 To formalize the argument that privacy protections have social S (p) benefits, I assume that ∂B∂p > 0. 16 Because the public has a lower marginal cost than the agency, the agency’s and the public’s optimal level of e are not the same. Therefore, changes in p that work through changing e∗ (p) have a nonzero first-order effect on EUS∗ (p). That is, if we compute ∂EU∂pS (p) , then the ∗
∗
∗
∗
(p)) l − ∂cS (e∂e(p),p) ) > 0 when e∗ (p) > 0. term ∂e∂p(p) (− ∂π(e (p),a ∂e Richard Bernstein, “What Is Free Speech, and What Is Terrorism?’,” New York Times, 14 August, 2005. 18 Bruce Fein, “Tackling a Root Cause of Terrorism,” Washington Post, 20 December, 2004. 17
74
February 2011
Given these changes, the game-theoretic analysis and the results are exactly the same as presented previously: the probability of a terrorist attack can increase if we put more restrictions on terrorist speech, and the enforcement agencies prefer more restrictions on radical speech even if such restrictions harm security from terrorism. The same logic applies to imposing restrictions on freedom of association in order to deter terrorist activity, such as laws prohibiting material support for terrorism and terrorist organizations. For example, sections of the Patriot Act increased penalties and expanded the definition of material support for terrorism to include providing expert advice and assistance.19 The analysis applies to preventing other crimes that may share similarities with terrorism, such as, for example, hate crime or organized crime. In fact, the gametheoretic results can be obtained in a more general model of harm prevention. Suppose we are interested in achieving a social objective O(e, a) (a level of security from a certain harm). The level of the desired social outcome increases if governmental agencies increase their level of intelligence effort e aimed at detecting crime planning activity and decreases if the criminal organizations increase their level of crime planning activities a.20 The enforcement agency’s utility function, Ul (O(e, a), p), increases in O(·), and the criminal organization’s utility function, Uc (O(e, a), p), decreases in O(·). If we can manipulate a variable p that negatively affects the criminals’ incentives,21 then we obtain the results from the previous analysis: (1) the equilibrium outcome, O(e∗ (p), a∗ (p)), can increase or decrease with such a change in p; and (2) the enforcement agency prefers changing p even when it harms O(e∗ (p), a∗ (p)).
DISCUSSION AND CONCLUSIONS The dominant paradigm that shapes how we think about antiterrorism policies posits a fundamental trade-off between civil liberties and security from terrorism. In this framework, reducing privacy protections is necessary to reduce terrorism. This paradigm presumes that reducing privacy is effective in reducing terrorism, and the only remaining question is whether privacy interests outweigh security gains. Yet, starting the debate on these grounds tilts the balance in favor of security measures from the outset and places the burden of proof on opponents of privacy-reducing policies who must show high social benefits of maintaining privacy protections. Simultaneously, the assumption that
19 The initial laws proscribing material support for terrorism were enacted in 1994 and 1996, and amended by the Patriot Act in 2001. 20 As in the previous analysis, I assume that the intelligence effort aimed at detecting crime planning activity is more effective if the criminal organization increases the magnitude of its activities, i.e., ∂2 O(e,a) ∂e∂a
21
< 0. That is, for example, if we reduce p, then the criminal organiza-
tion’s incentive for criminal activities decreases, i.e., 0.
∂2 Uc (O(e,a),p) ∂a∂p
>
American Political Science Review
reduced privacy increases security from terrorism advantages the executive, who can rhetorically couch antiterrorism measures in terms of patriotism. Because no one wants to be considered responsible for the failure to stop a future attack, especially given the possible use of nuclear or biological weapons, privacy-reducing policies pass through legislature with little or no opposition in the aftermath of a terrorist attack. The analysis presented in this article shows that reducing privacy does not necessarily increase security from terrorism. Accounting for strategic interactions reveals that there could be situations in which decreasing privacy reduces security from terrorism. This possibility questions the policy rationale for reducing privacy protections on its own terms. At minimum, the analysis suggests that, before discussing how to balance privacy protections and security from terrorism, scholars and practitioners need to analyze whether the reduction in civil liberties achieves the intended security benefit and, perhaps, whether such a benefit can be achieved in a way that does not infringe on civil liberties.22 Moreover, reducing privacy protections renders it difficult to assess whether such measures actually worked to prevent terrorist attacks. The absence of a terrorist attack does not logically imply effective measures. At minimum, reliable data on the number of foiled terrorist plots would be necessary. However, because executive agencies have an interest in exaggerating their successes, accurate statistics on the number of prevented attacks might not be forthcoming. And even with such reliable information, it would be folly to conclude that reduced privacy protections actually foiled the plots. To analyze the causal relationship between privacy protections and the likelihood of a terrorist attack would require a comparison of two worlds, one with reduced privacy and one without. Of course, such a comparison is extremely difficult; at any point in time, a country has or has not reduced privacy. And even if somehow we have reliable cross-country observational data on foiled terrorist plots, this comparison would pose further difficulties because countries alter a score of policies in the aftermath of terrorist attacks, not just the level of privacy protections. For example, liberal societies have adopted various terror prevention policies: counterterrorism budgets have been increased, the counterterrorism bureaucracy has been reorganized, and new antiterrorist agencies have been created, to name but a few policy changes enacted simultaneously with changes in privacy protections. The empirical difficulty of assessing whether reducing privacy is effective in preventing large-scale terrorist attacks serves the policy interests of executive
22 Note that the model allows comparative statics on how reducing the agency’s cost (while keeping privacy fixed) affects the equilibrium probability of a terrorist attack. This comparative statics result is unambiguous: reducing the agency’s cost reduces the equilibrium probability of a terrorist attack. Consequently, policies that reduce the agency’s cost (without reducing privacy protections) might be better than policies that sacrifice civil liberties, if the public’s objective is security from terrorism.
Vol. 105, No. 1
officials: if a terrorist attack is absent, then they can argue that privacy-reducing measures are effective, and if a terrorist attack occurs, then they can argue that their surveillance powers were not sufficient to prevent the attack and ask for new powers. In this context, a game-theoretic analysis has further relevance because it facilitates analyzing how the probability of a terrorist attack varies when the level of privacy protections changes, keeping everything else constant. More important, the analysis shows that the executive agencies in charge of terrorism prevention prefer to reduce privacy protections even when such a reduction reduces security from terrorism. The presence of this strategic bias, currently absent from public debate, raises three crucial matters. First, it suggests that it may not be desirable to allow those executive officials responsible for terrorism prevention to also craft antiterrorism legislation. Exacerbating the problem, situations of emergency, such as the aftermath of a terrorist attack, afford executive agencies opportunities to draft measures and pass policies that were not attainable in normal times. For example, Congress rejected the inclusion of roving wiretaps in the 1996 Anti-terrorism and Effective Penalty Act; however, the roving wiretaps were included in the 2001 Patriot Act. Similarly, the FBI introduced delayed notice search warrants into antidrug bills and also attached them to a bankruptcy bill before 9/11, but Congress rejected these efforts (Donohue 2008). In striking contrast, the 2001 Patriot Act legalized the use of delayed notice search warrants. Second, the assumption underlying emergency measures is that once the threat passes, civil liberties restrictions will be undone. However, the executive’s strategic bias creates an institutional interest to maintain them on the books after the perceived threat diminishes. Anecdotal evidence supports this implication. For example, in the UK, the Terrorist Act of 1974 was enacted as a temporary measure in response to the IRA bombing campaigns of the early 1970s.23 The act was rewritten in 1976 and 1984, and then again in 1989, but always as emergency “temporary” powers (Walker 1992). The Terrorism Prevention Act of 2000 made them permanent. Finally, legal scholars often argue that there should be a high level of judicial deference to the executive on matters of security policy in times of emergency. Judge Richard Posner (2006a) asserts that judges should give the executive branch considerable deference when it comes to assessing the security measures it proposes. Likewise, Eric Posner and Adrian Vermeule (2007) write, “The executive branch, not Congress or the judicial branch, should make the tradeoff between security and liberty.” However, the result here shows that enforcement agencies have incentive to push for decreased privacy protections even when such a shift diminishes security from terrorism. The presence of this strategic bias suggests that judges should perhaps 23 The act was introduced by Roy Jenkins, then home secretary, as a severe and emergency reaction to a Birmingham pub bomb (Walker 1992).
75
Trade-off between Security and Liberty
February 2011
be less deferential to the expertise of the executive on terrorism matters.
de dp
APPENDIX Proof of Proposition 2. The unique pure strategy equilibrium (e∗ , a∗ ) is the solution to the following system of equations: ∂cl (e, p) ∂π(e, a) l − =0 (16) − ∂e ∂e ∂π(e, a) ∂ct (a, p) t − = 0. (17) ∂a ∂a The Inada conditions on the cost functions ensure that the equilibrium actions are interior. Because both Equations (16) and (17) are continuous in p, the antiterrorist agency’s and the terrorist organization’s best response functions are continuous in p, and we can apply the implicit function theorem to see how the equilibrium actions vary with an increase in p. The dependence of (e∗ (p), a∗ (p)) on p is found by totally differentiating Equations (16) and (17) with respect to p, which yields the following system of equations: −
∂2 π(e, a) da ∂2 π(e, a) de − l l 2 ∂e dp ∂e∂a dp −
∂2 cl (e, p) ∂2 cl (e, p) de − =0 2 ∂e dp ∂e∂p
(18)
−
∂2 ct (a, p) da ∂2 ct (a, p) − = 0. 2 ∂a dp ∂a∂p
(19)
We can write the above system of equation in matrix form: ⎞ ⎛ 2 ∂ π(e, a) ∂2 cl (e, p) ∂2 π(e, a) − − − l l ⎟ ⎜ ∂e2 ∂e2 ∂e∂a ⎟ ⎜ ⎠ ⎝ ∂2 π(e, a) ∂2 π(e, a) ∂2 ct (a, p) − t t ∂e2 ∂a2 ∂a2 ⎛ de ⎞ ⎛ ∂2 c (e, p) ⎞ l ⎟ ⎜ dp ⎟ ⎜ ∂e∂p ⎟ ⎜ ⎟ (20) ×⎜ ⎟. ⎝ da ⎠ = ⎜ 2 ⎝ ∂ ct (a, p) ⎠ dp ∂a∂p 2 π(e,a)
Denote M = − ∂ t (a,p) ∂a2
∂e2
l −
∂2 cl (e,p) ∂e2
and N =
∂2 π(e,a) t ∂a2
−
. The determinant of the above coefficient matrix is 2
π(e,a) 2 ] l t > 0. Thus, we can nonsingular because MN + [ ∂ ∂e∂a de da and dp explicitly invert the coefficient matrix and solve for dp to obtain ⎛ de ⎞
⎜ dp ⎟ ⎜ ⎟= ⎝ da ⎠ dp
MN +
1 2
∂ π(e, a) ∂e∂a
⎛ ⎜ ×⎜ ⎝
N
∂2 π(e, a) t − ∂e∂a
2 l t
⎞ ⎛ ∂2 c (e, p) ⎞ ∂2 π(e, a) l l ⎟ ⎜ ⎟ ∂e∂p ∂e∂a ⎟ ⎟×⎜ . ⎜ ⎠ ⎝ ∂2 c (a, p) ⎟ ⎠ t M ∂a∂p (21)
76
∂2 ct (a, p) ∂2 π(e, a) ∂2 ct (a, p) ∂2 π(e, a) + l t − 2 2 ∂a ∂a ∂a∂p ∂e∂a . = 2 ∂2 π(e, a) ∂2 ct (a, p) ∂2 cl (e, p) ∂2 π(e, a) ∂2 π(e, a) − + t − l − l t ∂a2 ∂a2 ∂e2 ∂e2 ∂e∂a ∂2 cl (e, p) ∂e∂p
(22) The denominator is positive. The numerator is positive if 2 ∂2 cl (e,p) ∂e∂p
0, (2 − 3p)t l < 0, which implies that p ∗ > 2/3. Also, the second-order condition is −3t l + 2p − 3p 2 < 0 for p > 2/3. Therefore, p ∗ is a maximum. Applying the implicit function theorem to Equation (29) gives ∂p ∗ 2 − 3p . =− ∂(t l ) −3t l + 2p − 3p 2
(30)
Both the numerator and the denominator are negative ∂p ∗ ∂p ∗ for p > 2/3, which implies that ∂ < 0 and ∂ < 0, as t l claimed.
REFERENCES Ackerman, Bruce. 2004. “The Emergency Constitution.” Yale Law Journal 113: 1029–91. Ackerman, Bruce. 2006. Before the Next Attack: Preserving Civil Liberties in the Age of Terrorism. New Haven, CT: Yale University Press. Alexander, Yonah. 2006. Counterterrorism Strategies: Successes and Failures of Six Nations. Washington, DC: Potomac Books. Becker, Garry. 1968. “Crime and Punishment: An Economic Approach.” Journal of Political Economy 76: 169–217. Bianco, William, Peter Ordeshook, and George Tsebelis. 1990. “Crime and Punishment: Are One-shot, Two Person Games Enough?” American Political Science Review 84: 569–86. Breton, Albert, and Ronald Wintrobe. 1982. The Logic of Bureaucratic Control. Cambridge: Cambridge University Press. Bueno de Mesquita, Ethan. 2005. “The Quality of Terror.” American Journal of Political Science 49 (3): 515–30. Bueno de Mesquita, Ethan. 2007. “Politics and the Suboptimal Provision of Counterterror.” International Organization 61 (1): 9–36. Bueno de Mesquita, Ethan, and Eric Dickson. 2007.” The Propaganda of the Deed: Terrorism, Counterterrorism, and Mobilization.” American Journal of Political Science 51 (2): 364–81. Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction. 2005. “Report of the Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction.” Washington, DC: Government Printing Office. Cox, Gary. 1994. “A Note on Crime and Punishment.” Public Choice 78: 115–24. Dershowitz, Alan. 2002. Why Terrorism Works. New Haven, CT: Yale University Press. Donohue, Laura. 2008. The Cost of Counterterrorism: Power, Politics, and Liberty. Cambridge: Cambridge University Press. Downs, Anthony. 1967. Inside Bureaucracy, A Rand Corporation Research Study. Boston: Little, Brown. Ferejohn, John, and Pasquale Pasquino. 2004. “The Law of the Exception: A Typology of Emergency Powers.” International Journal of Constitutional Law 2 (2): 210–39. Garicano, Luis, and Richard Posner. 2005. “Intelligence Failure: An Organizational Economic Perspective.” Journal of Economic Perspectives 19 (4): 151–70. Gould, Eric, and Guy Stecklov. 2009. “Terror and the Costs of Crime.” Journal of Public Economics 93: 1175–88.
´ 2006. Law in Times of Crisis: Gross, Oren, and Fionnuala N. Aolain. Emergency Powers in Theory and Practice. Cambridge: Cambridge University Press. Gunaratna, Rohan. 2004. “The Post-Madrid Face of Al Qaeda.” Washington Quarterly 27: 91–100 Hardin, Russell. 2004. “Civil Liberties in the Era of Mass Terrorism.” Journal of Ethics 8 (1): 77–95. Hewitt, Steve. 2008. The British War on Terror. London: Continuum. Heymann, Philip B. 2003. Terrorism, Freedom, and Security. Cambridge, MA: MIT Press. Hirshleifer, Jack, and Eric Rasmussen. 1992. “Are Equilibrium Strategies Unaffected by Incentives?” Journal of Theoretical Politics 4: 353–67. Holmes, Stephen. 1995. Passions and Constraint: On the Theory of Liberal Democracy. Chicago: University of Chicago Press. Holmes, Stephen. 2007. The Matadors Cape: America’s Reckless Response to Terror. Cambridge: Cambridge University Press. Holmstrom, Bengt, and Paul Milgrom. 1991. “Multitask Principal– agent Analyses: Incentive Contracts, Asset Ownership, and Job Design.” Journal of Law, Economics, and Organization 7 (Special Issue): 24–52. Home Department. 2004. “Counter-terrorism Powers: Reconciling Security and Liberty in an Open Society: A Discussion Paper.” www.statewatch.org/news/2004/feb/uk-CTdiscussion-paper.pdf (accessed January 6, 2010). Jacobson, Michael. 2006. “The West at War: U.S. and European Counterterrorism Efforts, Post–September 11.” Washington, DC: Washington Institute for Near East Policy. Justice Department. 2004. “Prepared Remarks of Attorney General John Ashcroft Regarding the Indictment of HAMAS” www. justice.gov/archive/ag/speeches/2004 (accessed January 6, 2011). Kydd, Andrew, and Barbara Walter. 2006. “The Strategies of Terrorism.” International Security 31 (1): 49–79. Manin, Bernard. 2008. “The Emergency Paradigm and the New Terrorism.” In Les Usages de la Sparation des Pouvoirs—The Uses of the Separation of Powers, eds. Sandrine Baume and Biancamaria Fontana. Paris: Michel Houdiard, 135–71. Milgrom, Paul, and John Roberts. 1990. “Bargaining Costs, Influence Costs and the Organization of Economic Activity.” In Perspectives on Positive Political Economy, eds. James E. Alt and Kenneth A. Shepsle. Cambridge: Cambridge University Press, 57–89. Milgrom, Paul, and John Roberts. 1988. “An Economic Approach to Influence Activities and Organizational Responses.” American Journal of Sociology 94 (2): 154–79. Milgrom, Paul, and John Roberts. 1992. Economics, Organization and Management. Englewood Cliffs, NJ: Prentice Hall. Moe, Terry. 1984. “The New Economics of Organization.” American Journal of Political Science 283 (4): 739–77. National Commission on Terrorist Attacks upon the United States. 2004. “The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States.” Washington, DC: Government Printing Office. Niskanen, William. 1971. Bureaucracy and Representative Government. Chicago: Aldine-Atherton. Pfeffer, Jeffery 1993. Managing With Power: Politics and Influence in Organizations. Cambridge, MA: Harvard Business Press. Posner, Eric A., and Adrian Vermeule. 2007. Terror in the Balance: Security, Liberty, and the Courts. New York: Oxford University Press. Posner, Richard. 2005. Preventing Surprise Attacks. New York: Rowman and Littlefield. Posner, Richard. 2006a. Not a Suicide Pact: The Constitution in a Time of National Emergency. Oxford: Oxford University Press. Posner, Richard. 2006b. Uncertain Shield: The U.S. Intelligence System in the Throes of Reform. New York: Rowman and Littlefield. Posner, Richard A. 2006c. “The Reorganized U.S. Intelligence System after One Year.” AEI Outlook Series. www.aei.org/outlook/24213 (accessed January 6, 2011). Powell, Robert. 2007a. “Defending against Terrorist Attacks with Limited Resources.” American Political Science Review 101 (3): 527–41. Powell, Robert. 2007b. “Allocating Defensive Resources with Private Information about Vulnerability.” American Political Science Review 100 (4): 799–809.
77
Trade-off between Security and Liberty Przeworski, Adam. 2003. States and Markets: A Primer in Political Economy. Cambridge: Cambridge University Press. Ramraj, Victor, Michael Hor and Kent Roach, eds. 2005. Global Anti-terrorism Law and Policy. Cambridge: Cambridge University Press. Regan, Priscilla M. 1995. Legislating Privacy: Technology, Social Values, and Public Policy. Chapel Hill: University of North Carolina Press. Rehnquist, William H. 1998. All the Laws But One: Civil Liberties in Wartime. New York: Knopf. Rosendorff, Peter, and Todd Sandler. 2004. “Too Much of a Good Thing? The Proactive Response Dilemma.” Journal of Conflict Resolution 48 (5): 657–71. Rourke, Francis. 1984. Bureaucracy, Politics, and Public Policy. Boston: Little, Brown. Schmid, Alex P. 1993. “Western Responses to Terrorism.” In Terrorism and Political Violence, eds. Alex P. Schmid and Ronald D. Crelinsten. London: Frank Cass, 15–25. Siqueira, Keith, and Todd Sandler. 2006.” Terrorists vs the Security Agency: Strategic Interaction, Support, and Sponsorship.” Journal of Conflict Resolution 50 (6): 878–98.
78
February 2011 Solove, Daniel. 2008. Understanding Privacy. Cambridge, MA: Harvard University Press. Treverton, Gregory. 2008. Reorganizing U.S. Domestic Intelligence: Assessing the Options. Santa Monica, CA: RAND. Tsebelis, George. 1989. “The Abuse of Probability in Political Analysis: The Robinson Crusoe Fallacy.” American Political Science Review 83: 77–91. Tsebelis, George. 1990. “Penalty Has No Impact on Crime: A Game Theoretic Analysis.” Rationality and Society 2: 255– 86. Waldron, Jeremy. 2003. “Security and Liberty: The Image of Balance.” Journal of Political Philosophy 11 (2): 191. Walker, Clive. 1992. The Prevention of Terrorism in British Law. 2nd ed. New York: Manchester University Press. White, Jonathan R. 2003. Terrorism: 2002 Update. 4th ed. Belmont, CA: Wadsworth. Wilson, James Q. 1989. Bureaucracy: What Government Agencies Do and Why They Do It. New York: Basic Books. Zegart, Amy. 2007. Spying Blind: The CIA, the FBI, and the Origins of 9/11. Princeton, NJ: Princeton University Press.