1 Introduction

Arce and Sandler (2005) define terrorism as the ‘premeditated use or threat of use of violence by individuals or sub-national groups to obtain political, religious, or ideological objectives through intimidation of a large audience usually beyond that of the immediate victims’. Because terrorists simulate randomness to generate fear and widespread panic, it is usually a daunting challenge for the targeted country’s government to design a strategy that optimally utilizes its counter-terrorism (CT) resources. Achieving this involves assessing the threat that various terror outfits pose in terms of their resources and inclination for conducting attacks.Footnote 1 Moreover, as shall be demonstrated, the importance of understanding the magnitude and nature of operational externalities generated by terror activities in framing the appropriate CT response cannot be overstated.

Consider a situation in which a terror outfit uses a particular route to transport terrorists and materials into a conflict zone. If another outfit begins to use the same route for infiltration and/or exfiltration, the chances of the route being discovered by the security forces may increase, resulting in negative operational externalities between the outfits through the resulting increase in the expected cost of operations. There are numerous other such factors which can give rise to negative operational externalities when more than one outfit is active in the same theatre of operations. Some examples are discussed below.

In June 2014, for instance, the Islamic State of Iraq and Syria (ISIS)Footnote 2 conducted a rapid invasion of large parts of northern Iraq including Mosul. The media attention afforded to al-Qaeda declined ever since, while the focus on ISIS rose. This made recruitment more difficult and therefore more costly, for al-Qaeda. Al-Qaeda responded by escalating its rivalry with ISIS. Al-Qaeda in the Islamic Maghreb (AQIM) affiliates like Ansar Dine stepped up attacks, joining a series of efforts to regain support from the more popular ISIS.Footnote 3

The predominantly Shiite outfit Hezbollah has, for decades, been one of the most intimate allies of the Gaza-based Palestinian Sunni group Hamas. However, their ties have suffered following the rebellion which began in March 2011 against the Syrian regime headed by President Bashar al-Assad, an Alawite Shia. The resultant overwhelmingly Sunni insurgency was supported by Hamas, while Hezbollah became deeply committed in fighting alongside Assad’s forces (Karam 2014). Since then, the total number of attacks conducted by these outfits more than doubled from a combined 34 in 2011 and 2012, to a combined 88 in 2013 and 2014.Footnote 4

Consider, conversely, the presence of a sleeper cell of a terror outfit in a city. Left to itself, the cell may be unable to conduct successful attacks given the level of security preparedness. However, if another terror outfit enters the fray and conducts attacks—successful or otherwise—the terror cell may be activated to conduct attacks of its own in the resultant conducive environment of confusion. This provides a characterization of positive operational externalities between terror outfits. There are many other circumstances in which a group can benefit due to the presence of another in the same region.

Scrutinize, for instance, the relationship between Boko Haram and its 2012 offshoot Ansaru, and AQIM. When Boko Haram initially metamorphosed into a jihadist outfit post 2009, its affiliation with AQIM and the core of al-Qaeda was largely dismissed as rhetoric by observers and analysts. The notion that inexperienced domestic insurgents from northeast Nigeria would receive backing from transnational jihadist outfits was admonished as wishful at best. In 2010, however, AQIM leader Droukdel announced that AQIM would provide weapons, support and training to Boko Haram. This Boko Haram—AQIM alliance is validated by public statements from both outfits. Moreover, Boko Haram’s suicide attack in 2011 targeting the United Nations office in Abuja, Nigeria, was tactically akin to bombings by AQIM (Aronson 2014).

The literature addressing the impact of externalities on the incidence of terrorism, and its implications on CT, is limited. Anderton and Carter (2006) demonstrate the applicability of microeconomic concepts and principles to the study of terrorism. They utilize game theory to characterize strategic interdependencies among terrorists and governments. Enders and Jindapon (2010) analyze the optimal network structure of centralized and decentralized terror outfits, and demonstrate the sub-optimality of decentralized decision-making resulting from its inability to internalize important network externalities.

A substantial part of the existing literature focuses on the externalities imposed on other countries, by the CT actions of one country against a common transnational terrorist threat. Arce and Sandler (2005) demonstrate the negative externalities imposed by a country’s defensive measures on other countries, by deflecting attacks towards them. On the contrary, proactive measures are shown to generate positive externalities for all other countries by degrading the capabilities of the terrorists. This is what causes the international co-ordination failure problem characterized by the oversupply of defensive measures and undersupply of offensive measures relative to the optimum, as also discussed in Sandler and Siqueira (2006). Faria et al. (2013) formulate a structure with temporal and spatial externalities to demonstrate that in steady state, intertemporal policy considerations outweigh concerns usually related to transnational CT policy. Siqueira and Sandler (2007) investigate the impact of domestic politics on the CT policy of two countries against a common terrorist threat. They demonstrate that the resulting delegation problem in which voters choose a policymaker with preferences different from their own, results in countries limiting the presumed oversupply of defensive CT measures. Similarly, Das and Roy Chowdhury (2014) apply a game-theoretic model to identify circumstances based on the impact of fear, which may render it logical to respond to increased terrorism with increased pre-emption.

The present paper is the first to provide a formal analysis of the implications of the presence of operational externalities on the interactions between terror outfits. As opposed to the aforementioned literature on international externalities, this paper focuses on the externalities imposed by the activities of one terror outfit, on those of another. The findings are compared with the “benchmark” case without externalities. The study then proceeds to analyze the counter-terrorism ramifications of the nature and magnitude of operational externalities, if present.

The analysis demonstrates that there is always scope for the effective employment of defensive CT, irrespective of whether or not operational externalities are present. This lends support to the “oversupply of defensive CT” hypothesis mentioned above. Moreover, confidence-building measures (CBM) are shown to be ineffective against resource-constrained outfits. In the presence of externalities, it is also demonstrated that the impact of offensive CT against a resource-abundant outfit is successful in reducing the total number of attacks of all outfits if and only if the magnitude of negative externalities on the other outfit is sufficiently high. This may explain the greater prudence with which countries, especially with strong democratic institutions, may employ offensive CT measures as compared to defensive measures.

The following section presents the basic model in the absence of operational externalities. The third section introduces externalities and analyzes the associated comparative statics. The fourth section addresses some aspects of counter-terrorism policy, both in the presence and absence of externalities. The salient findings of the paper and their implications are summarized in the fifth and concluding section.

2 Model

Suppose there are two independent terror outfitsFootnote 5 operating in a country. Let the utility function of the \( i{\text{th}} \) terror group, \( T_{i} \) (\( i = 1, 2) \) beFootnote 6

$$ U_{i} = X_{i} + \alpha_{i} v_{i} (A_{i} ),\quad v_{i}^{\prime } (A_{i} ) > 0,\quad v_{i}^{\prime \prime } (A_{i} ) \le 0,\quad \forall A_{i} \ge 0, $$
(1)

where \( X_{i} \) is its level of consumption of the numeraire good,Footnote 7\( \alpha_{i} v_{i} (A_{i} ) \) is the utility from conducting \( A_{i} \) terror strikes,Footnote 8 where \( \alpha_{i} \) (\( \ge 0 \)) is its intrinsic propensity for violence (this captures the fundamentalist aspect of terrorism, in terms of which some groups can be classified as more “hard-line” than others).

Suppose the cost to terror group \( i \) of conducting \( A_{i} \) terror strikes is \( \beta_{i} C_{i} (A_{i} ) \) where \( C_{i} (A_{i} ) \) is increasing and strictly convex in \( A_{i} \), and \( \beta_{i} ( > 0) \) is the cost-efficiency (or operational efficiency) parameter of terror outfit \( i \), such that lower (higher) \( \beta_{i} \) represents higher (lower) efficiency.Footnote 9 Then, if \( R_{i} \) is its initial resource endowment in terms of the numeraire good, then \( T_{i} \)’s budget constraint is:

$$ X_{i} + \beta_{i} C_{i} (A_{i} ) = R_{i} , $$
(2)

\( T_{i} \)’s optimization problem is to maximize its utility (1) subject to its budget constraint (2). Substituting \( X_{i} \) in (1) using (2), we can rewrite the utility maximization problem as:

$$ {\text{Max}}_{{A_{i} }} U_{i} = R_{i} - \beta_{i} C_{i} (A_{i} ) + \alpha_{i} v_{i} (A_{i} ). $$
(3)

If an interior optimum exists,Footnote 10 the first-order condition (FOC) is:

$$ - \,\beta_{i} C_{i}^{\prime } (A_{i}^{*} ) + \alpha_{i} v_{i}^{\prime } (A_{i}^{*} ) = 0. $$
(4)

The FOC represents the equality between the marginal benefit (\( \alpha_{i} v_{i}^{\prime } (A_{i}^{*} ) \)) and marginal cost (\( \beta_{i} C_{i}^{\prime } (A_{i}^{*} ) \)) of conducting an attack (to \( T_{i} \)) in equilibrium. From Eq. (4), the optimal number of terror strikes conducted by each outfit in interior equilibrium, can be obtained. Note that the optimal number of terror attacks conducted by each outfit is independent of the other’s attacks. Moreover, the second-order condition (SOC) for utility maximization is satisfied since at the optimal number of terror strikes (\( A_{i}^{*} \)), \( - \,\beta_{i} C_{i}^{\prime \prime } (A_{i}^{*} ) + \alpha_{i} v_{i}^{\prime \prime } (A_{i}^{*} ) < 0. \)

When an outfit is resource-constrained (i.e., the case of corner solution), the optimal number of attacks by this outfit can be solved from the budget constraint given by (2) by setting \( X_{i} = 0 \).Footnote 11

The following comparative static results as given in Proposition 1 are easy to derive.

Proposition 1

When an interior optimum exists, the optimal number of terror attacks that an outfit conducts varies directly with its intrinsic propensity for violence,\( \alpha_{i} \), varies inversely with its inefficiency,\( \beta_{i} \), and is independent of the initial resource endowment of the terror outfit,\( R_{i} \).

If a group’s members are inherently more (less) violent, then the group would tend to conduct more (less) attacks. An increase (decrease) in \( \alpha_{i} \), ceteris paribus, increases (decreases) the marginal benefit (\( \alpha_{i} v_{i}^{\prime } (A_{i}^{*} ) \)) from terror attacks, thereby increasing (decreasing) the optimal number of attacks. Also, if a terror outfit is less (more) efficient, its marginal cost of conducting a terror strike (\( = \beta_{i} C_{i}^{\prime } (A_{i}^{*} ) \)) is higher (lower). Hence, the less (more) efficient the outfit, the higher (lower) is its marginal cost. Consequently, the optimal number of terror strikes that the outfit conducts would be lower (higher). The interesting observation, in case of no resource constraint, is that the number of terror strikes conducted by an outfit does not depend on the size of its initial resource endowment. The impact of variations in \( R_{i} \) is captured completely by corresponding equivalent variations in \( X_{i} \).

In contrast, if a terror outfit is resource-constrained, the optimal level of terror attacks varies directly with its initial resource endowment, \( R_{i} \) but is independent of its intrinsic propensity for violence, \( \alpha_{i} \). Such a case arises when a group does not have sufficient resources initially to conduct as many terror strikes as it would want to (given its inherent propensity for violence and efficiency). In this situation the level of terror strikes optimally conducted by the outfit would depend not on its inherent propensity for violence, but positively on the level of resources initially at its disposal. However, \( \beta_{i} \) continues to play a similar role.

3 Operational externalities

In this section, we consider the existence of possible externalities in between the activities of the outfits. It is conceivable that the level of terror activity of one outfit has implications for the marginal cost of terror activities of the other outfit. Suppose the cost to terror group \( i( \ne j = 1,2) \) of conducting \( A_{i} \) terror strikes is \( \beta_{i} C_{i} (A_{i} ,A_{j} ) \), where \( C_{i} (A_{i} ,A_{j} ) \) is increasing and strictly convex in \( A_{i} \) (i.e.,\( \frac{{\partial C_{i} (A_{i} ,A_{j} )}}{{\partial A_{i} }} > 0 \) and \( \frac{{\partial^{2} C_{i} (A_{i} ,A_{j} )}}{{\partial A_{i}^{2} }} > 0 \)). The fact that \( A_{j} \) features as an argument in \( T_{i} \)’s cost function, captures the aspect of a terror outfit subjected to cost externalities due to the presence of another terror outfit in its theatre of operations. Therefore, existence of cost externalities implies that \( \frac{{\partial C_{i} (A_{i} ,A_{j} )}}{{\partial A_{j} }} \ne 0,\,i \ne j \). In the present paper our focus is on the operational externalities, that is, to see how the action of one outfit is related to the action of the other outfit. Therefore, cost interdependencies will induce operational externalities by means of affecting both the total cost and marginal cost of an outfit. For positive operational externality we assume \( \frac{{\partial C_{i} (A_{i} ,A_{j} )}}{{\partial A_{j} }} < 0 \) and \( \frac{{\partial^{2} C_{i} (A_{i} ,A_{j} )}}{{\partial A_{i} \partial A_{j} }} < 0 \), and negative operational externality requires \( \frac{{\partial C_{i} (A_{i} ,A_{j} )}}{{\partial A_{j} }} > 0 \) and \( \frac{{\partial^{2} C_{i} (A_{i} ,A_{j} )}}{{\partial A_{i} \partial A_{j} }} > 0 \).

With externalities, \( T_{i} \)’s budget constraint is:

$$ X_{i} + \beta_{i} C_{i} (A_{i} ,A_{j} ) = R_{i} . $$
(5)

Then \( T_{i} \)’s problem is to maximize its utility (1) subject to its budget constraint (5). Substituting \( X_{i} \) in (1) using (5), we can rewrite the utility maximization problem as:

$$ {\text{Max}}_{{A_{i} }} U_{i} = R_{i} - \beta_{i} C_{i} (A_{i} ,A_{j} ) + \alpha_{i} v_{i} (A_{i} ). $$
(6)

When an interior optimum exists,Footnote 12 the FOC is:

$$ - \,\beta_{i} \frac{{\partial C_{i} (A_{i} ,A_{j} )}}{{\partial A_{i} }} + \alpha_{i} v_{i}^{\prime } (A_{i} ) = 0. $$
(7)

The second-order condition (SOC) for maximization holds, since on differentiating the FOC with respect to \( A_{i} \), we get

$$ - \,\beta_{i} \frac{{\partial^{2} C_{i} (A_{i} ,A_{j} )}}{{\partial A_{i}^{2} }} + \alpha_{i} v_{i}^{\prime \prime } (A_{i} ) < 0. $$
(8)

From Eq. (7), the best-response (or reaction) function of each outfit \( i( \ne j = 1,2) \), \( A_{i} = A_{i} (A_{j} ) \), can be obtained. Also, along the reaction function,

$$ \frac{{{\text{d}}A_{i} }}{{{\text{d}}A_{j} }} = \beta_{i} \frac{{\frac{{\partial^{2} C_{i} }}{{\partial A_{i} \partial A_{j} }}}}{{\alpha_{i} v_{i}^{\prime \prime } - \beta_{i} \frac{{\partial^{2} C_{i} }}{{\partial A_{i}^{2} }}}}. $$
(9)

The SOC in Eq. (8) ensures that the denominator is negative. Therefore, the reaction functions are positively (negatively) sloped if and only if \( \frac{{\partial^{2} C_{i} }}{{\partial A_{i} \partial A_{j} }} < 0 \) (\( > 0 \)), i.e., if an outfits’s terror activities impose a positive (negative) or cost-reducing (cost-increasing) externality on the marginal cost of the other outfit’s terror activities. In this case, the numbers of attacks conducted by the outfits are strategic complements (substitutes). Further, the stability and uniqueness of the resultant equilibrium is guaranteed by assuming that the determinant of the Hessian matrix of second-order partial derivatives of the utility functions is positive,Footnote 13 i.e.,

$$ H \equiv \left( { - \,\beta_{i} \frac{{\partial^{2} C_{i} }}{{\partial A_{i}^{2} }} + \alpha_{i} v_{i}^{\prime \prime } } \right)\left( { - \,\beta_{j} \frac{{\partial^{2} C_{j} }}{{\partial A_{j}^{2} }} + \alpha_{j} v_{j}^{\prime \prime } } \right) - \beta_{i} \beta_{j} \frac{{\partial^{2} C_{i} }}{{\partial A_{i} \partial A_{j} }}\frac{{\partial^{2} C_{j} }}{{\partial A_{j} \partial A_{i} }} > 0. $$
(10)

When an outfit is resource-constrained, it uses all its resources to conduct attacks, its reaction function can be obtained from its budget constraint in Eq. (5) as:

$$ \beta_{i} C_{i} (A_{i} ,A_{j} ) = R_{i} . $$
(11)

Complete differentiation of (11) yields the slope as:

$$ \frac{{{\text{d}}A_{i} }}{{{\text{d}}A_{j} }} = - \,\frac{{\partial C_{i} /\partial A_{j} }}{{\partial C_{i} /\partial A_{i} }}. $$
(12)

This is positive or negative according as \( \frac{{\partial C_{i} }}{{\partial A_{j} }} \) is negative (which happens under positive externalities) or positive (which happens under negative externalities), respectively.

To ensure that the equilibrium is both stable and unique when both outfits are resource-constrained, we shall assume

$$ K \equiv \frac{{\partial C_{i} }}{{\partial A_{i} }}\frac{{\partial C_{j} }}{{\partial A_{j} }} - \frac{{\partial C_{i} }}{{\partial A_{j} }}\frac{{\partial C_{j} }}{{\partial A_{i} }} > 0 $$
(13)

From the above analysis, we arrive at the following lemma.

Lemma 1

The reaction function of an outfit remains positively sloped under positive externalities, and negatively sloped under negative externalities, even if it is resource-constrained.

From the solution to the optimization problem of any outfit \( i = 1,2 \), it can be checked [from (9) to (12)] that the absolute slope of its reaction function (\( | {\text{d}}A_{i} /{\text{d}}A_{j} | \)) is less if it is resource-constrained (see Appendix 1). Therefore, although externalities, if present, play a role even under resource-constraint, their ability to impact the level of terror activity is less.

It is important to mention, at this juncture that one could obtain similar reaction functions using a scenario of non-operational externalities. For example, higher terror activity levels of another outfit can lead to resentment in the ranks of the first. Alternatively, it could work as a morale booster. In such scenarios, even if there are no cost externalities, the outfits end up imposing externalities on each other via their ex-ante utilities. We discuss this issue further in Appendix 2. In the following two subsections we shall discuss comparative static effects under operational externalities.

3.1 Positive operational externalities (i.e., \( \frac{{\partial C_{i} (A_{i} ,A_{j} )}}{{\partial A_{j} }} < 0 \), \( \frac{{\partial^{2} C_{i} }}{{\partial A_{i} \partial A_{j} }} < 0 \))

As already demonstrated, the presence of positive cost externalities ensures that the best-response functions of the terror outfits are sloped positively (Fig. 1 is an illustration). Moreover, the SOCs and Eqs. (10) and (13) together ensure the uniqueness and stability of the equilibrium, as obtained by the intersection of the reaction curves.

Fig. 1
figure 1

Reaction functions under positive externalities

Proposition 2

Assume that neither outfit is resource-constrained. Then in the vicinity of the initial equilibrium the optimal number of terror attacks conducted by either outfit, and the total number of attacks:

  1. (i)

    vary positively with their intrinsic propensities for violence,\( \alpha_{1} \)and\( \alpha_{2} \);

  2. (ii)

    vary negatively with their inefficiencies, \( \beta_{1} \) and \( \beta_{2} \) ; and

  3. (iii)

    are independent of the initial resource endowments of the terror outfits,\( R_{1} \)and\( R_{2} \).

The formal proof of the proposition is given in Appendix 3. An increase (decrease) in \( \alpha_{i} \), ceteris paribus, raises (reduces) \( T_{i} \)’s marginal benefit from attacking (\( \alpha_{i} v_{i}^{\prime } (A_{i} ) \)) while leaving its marginal cost of attacking (\( \beta_{i} \frac{{\partial C_{i} (A_{i} ,A_{j} )}}{{\partial A_{i} }} \)) unchanged. Therefore, it optimally conducts more (less) attacks given any \( A_{j} \) [rightward (leftward) shift of \( A_{i} \)’s reaction function]. This, in turn, reduces (raises) \( T_{j} \)’s marginal cost of attacking (\( \beta_{j} \frac{{\partial C_{j} (A_{i} ,A_{j} )}}{{\partial A_{j} }} \)) while leaving its marginal benefit from attacking (\( \alpha_{j} v_{j}^{\prime } (A_{j} ) \)) unchanged. Therefore, \( T_{j} \) too optimally conducts more (less) attacks. Thus, the total number of attacks also increases (decreases).

An increase (decrease) in \( \beta_{i} \), ceteris paribus, leaves \( T_{i} \)’s marginal benefit from attacking unchanged while raising (reducing) its marginal cost of attacking. Therefore, it optimally conducts less (more) attacks given any \( A_{j} \) [leftward (rightward) shift of \( A_{i} \)’s reaction function]. This, in turn, raises (reduces) \( T_{j} \)’s marginal cost of attacking while leaving its marginal benefit from attacking unchanged. Therefore, \( T_{j} \) too optimally conducts less (more) attacks. Thus, the total number of attacks also decreases (increases).

Finally, an increase (decrease) in \( R_{i} \), ceteris paribus, leaves unaltered both \( T_{i} \)’s marginal benefit and the marginal cost of conducting attacks. Therefore, it has no impact on the optimal number of attacks. It does, however, result in an equivalent increase (decrease) in \( X_{i} \).

Given our assumptions, when both outfits are resource-constrained, under positive externalities reaction functions will continue to be positively sloped (although these will be less steep). Then it is easy to understand that for \( i = 1,2 \) in the vicinity of the initial equilibrium, \( A_{1}^{*} \), \( A_{2}^{*} \) and \( A_{1}^{*} + A_{2}^{*} \) all will vary positively with \( R_{i} \) and negatively with \( \beta_{i} \), but are independent of \( \alpha_{i} \). But if only \( T_{j} \) is resource-constrained, \( \alpha_{i} \) will impact positively. The reason is that an increase (decrease) in \( \alpha_{i} \), ceteris paribus, causes a rightward (leftward) shift of \( T_{i} \)’s reaction function. Therefore, it optimally conducts more (less) attacks. This, in turn, reduces (raises) \( T_{j} \)’s cost of attacking (\( \beta_{j} C_{j} (A_{i} ,A_{j} ) \)) while leaving its initial resource endowment (\( R_{j} \)) unchanged. Therefore, \( T_{j} \) too optimally conducts more (less) attacks. Thus, the total number of attacks also increases (decreases).

3.2 Negative operational externalities (i.e., \( \frac{{\partial C_{i} (A_{i} ,A_{j} )}}{{\partial A_{j} }} > 0 \), \( \frac{{\partial^{2} C_{i} }}{{\partial A_{i} \partial A_{j} }} > 0 \))

The presence of negative operational externalities ensures that the best-response functions of the terror outfits are sloped negatively (as illustrated in Fig. 2).

Fig. 2
figure 2

Reaction functions with negative externalities

Proposition 3

If neither outfit is resource-constrained, then in the vicinity of the initial equilibrium for\( i \ne j = 1,2 \):

  1. (i)

    An increase in\( \beta_{i} \)decreases\( A_{i}^{*} \), increases\( A_{j}^{*} \), but it decreases (increases)\( A_{1}^{*} + A_{2}^{*} \)if and only if\( \left| {\frac{{{\text{d}}A_{j} (A_{i} )}}{{{\text{d}}A_{i} }}} \right| < 1 ( > 1) \).

  2. (ii)

    An increase in\( \alpha_{i} \)increases\( A_{i}^{*} \), decreases\( A_{j}^{*} \), but it increases (decreases)\( A_{1}^{*} + A_{2}^{*} \)if and only if\( \left| {\frac{{dA_{j} \left( {A_{i} } \right)}}{{dA_{i} }}} \right| < 1 ( > 1) \).

  3. (iii)

    Changes in \( R_{i} \) have no impact on the optimal number of attacks.

Note that contrary to the case of positive externalities, under negative externalities the effect on \( A_{1}^{*} + A_{2}^{*} \) depends on whether the absolute slope of the corresponding reaction function is greater than or less than unity. Explanation of the results underlying Proposition 3 is not difficult. An increase (decrease) in \( \beta_{i} \), ceteris paribus, leaves \( T_{i} \)’s marginal benefit from attacking unchanged while raising (reducing) its marginal cost of attacking. Therefore, it optimally conducts less (more) attacks given any \( A_{j} \) [leftward (rightward) shift of \( A_{i} \)’s reaction function]. This, in turn, reduces (raises) \( T_{j} \)’s marginal cost of attacking while leaving its marginal benefit from attacking unchanged. Therefore, \( T_{j} \) optimally conducts more (less) attacks. If \( T_{j} \)’s optimal number of attacks (best-response) is sufficiently sensitive to \( T_{i} \)’s optimal decision,Footnote 14 then the rise (fall) in \( A_{j} \) dominates the fall (rise) in \( A_{i} \), and the total number of attacks therefore increases (decreases). Conversely, if \( T_{j} \)’s best response is sufficiently insensitive, the total number of attacks declines (increases). Similar explanation follows for an increase or decrease of \( \alpha_{i} \).

Results for the case of resource-constrained outfits can follow similarly because the reaction functions will still be downward sloping, The important difference from the above is that now \( R_{i} \) will impact on both \( A_{i} \) and \( A_{j} \). However, still the impact on \( (A_{i} + A_{j} ) \) will depend on the absolute slope of the respective reaction functions. When both the outfits are resource-constrained, \( \alpha_{i} \) has no role to play, but it becomes active if only \( T_{j} \) is resource-constrained.

To summarize the results of this section, note that in the absence of externalities the change of any of \( \alpha_{j} \), \( \beta_{j} \) and \( R_{j} \) has no effect on \( A_{i} \), but given externalities (positive or negative), \( A_{i} \) depend on \( \alpha_{j} \) and \( \beta_{j} \) but not on \( R_{j} \) (unless \( T_{j} \) becomes resource-constrained). Further, the direction of the effect on \( A_{i} \) of a change of \( \alpha_{i} \) or \( \beta_{i} \) is same irrespective of whether there are positive or negative externalities.

4 Counter-terrorism

We now turn our attention to the implications of the above discussion and results, for the counter-terrorism policy of the targeted country’s government. It must be noted, at the outset, that counter-terrorism measures seek to reduce the level of terror activity by impacting its determinants. A broad classification of CT measures is as follows:

  1. 1.

    defensive measures,

  2. 2.

    offensive measures, and

  3. 3.

    CBMs and others.

Defensive CT measures include “hardening” of potential targets,Footnote 15 deployment of governmental intelligence agencies against the outfit on a priority basis, covert tactical operations aimed at disrupting the operational capabilities of the terrorists and their handlers, etc. The construction of a double-row concertina wire fence about 700 m from the Line of Control (LoC) separating the Indian State of Jammu and Kashmir from Pakistan Occupied Kashmir (POK), called the Anti-Infiltration Obstacle System (AIOS), by the Indian Army during 2003–2005, is an example of such efforts. Such counter-terrorism efforts attempt to reduce the optimal number of terror strikes by rapidly increasing the terrorists’ (ex-post) operational inefficiency, \( \beta_{i} \). Even though such measures may sometimes occur behind enemy lines and involve an element of pre-emption, they are limited in size and scope, and aimed primarily at disrupting the terrorists’ operational efficiencies rather than degrading their aggregate resources. The “surgical strikes” conducted by the Indian Army on 29 September, 2016, against multiple terrorist launch pads in POK, to thwart the efforts of terrorists seeking to “carry out infiltration and conduct terrorist strikes inside Jammu and Kashmir and in various metros in other states”, provides an example of such cross-border defensive measures.Footnote 16

The targeted country’s government may alternatively take the more offensive approach of imposing financial and other sanctions, or even conducting strategic pre-emptive strikes to destroy the assets of terror outfits.Footnote 17 A case in point is that of the American airstrikes conducted in 2001 in the aftermath of the 9/11 attacks, to topple the Taliban regime in Afghanistan through the massive destruction of its resources and the elimination of its leadership. Such measures are mostly strategic in scope, as opposed to the tactical nature of most defensive measures. This would result in a rapid reduction of resources, \( R_{i} \), available with the terrorists. However, offensive measures may potentially alienate the larger civilian population in the area of operations and this, over a period of time, may make it easier for terror outfits to recruit and indoctrinate locals. This would be reflected in decreased ex-post operational inefficiencies, \( \beta_{i} \). Also, in the aftermath of any major military offensive, there is often a “terrorist backlash”Footnote 18 (increased number of attacks) due to increased intrinsic propensity of violence, \( \alpha_{i} \).

In December 2014, in the aftermath of the carnage carried out by NDFB(S) militants killing over 80 people, a major offensive was allegedly planned in Assam, Nagaland and Bhutan. The Assam State Government had also increased the reward amount on information regarding the whereabouts of the NDFB(S) top brass by four times to Rs. 20 lakh (Acharya 2014).

The government may also adopt the softer approach of winning the “hearts and minds” of the alienated population living in a terror-affected geographical area, to reduce the support for the terror outfit(s) operating in that area and/or to reduce the outfit’s motivation to maintain a very high level of terror activity. To this end, so-called CBMs may be undertaken. Religious institutions of learning may be nudged to accept greater state regulation and to modify their curriculum and academic discourse, in exchange for greater State support. Public spending on social and economic infrastructure may be enhanced, along with special economic assistance for the affected region. All such measures are targeted at reducing the intrinsic propensity of violence, \( \alpha_{i} \), of an outfit active in that area.

In January, 2007, for instance, President Arroyo of the Phillippines credited the success in countering Abu Sayyaf partly to larger developmental initiatives involving trade and investment, targeted at increasing the security sphere while inhibiting that of “terror and transnational crime”. She called on other countries combating terrorism to learn from the successful use of both “soft and hard power” in the Phillippines (Calica 2007).

The government’s CT approach towards an outfit is contingent upon the specifics of that outfit such as its intrinsic propensity for violence, its operational efficiency, and the resources available to it. Therefore, if the specifics of two outfits vary, then the government’s CT approach towards them may vary. In reality, a government’s CT strategy may involve a combination of different types of CT measures. For instance, governments often embark on and/or maintain “back-channel” negotiations with certain terror outfits, even as operations against those outfits continue on the ground. Moreover, the CT measures (as well as the CT strategy as a whole) chosen by the government to target an outfit may evolve over time, driven by changes in the outfit’s nature. For example, an outfit that previously was not resource-constrained, may begin to suffer from paucity of resources over a period of time due to a decline in its operational efficiency. This change would necessitate a corresponding evolution of the CT strategy employed against the outfit.

The choice of CT strategy also depends on the cost of each CT measure as well as the resources committed towards CT efforts. Finally, the overall nature of response to terrorist threats depends crucially on the nature of the government itself. Some governments, for instance, are more willing and/or able to commit to a sustained effort to counter terrorists than others. Therefore, although we often see a similarity in the immediate response of various governments after a major terrorist incident, discrepancy between the approaches of different regimes may creep in with the passage of time. Hence, the chosen CT strategy may vary based on the extent of the government’s bias towards immediate/short-term or ad hoc/piecemeal responses as opposed to a more sustained anti-terror campaign.

From the results presented in the second and third sections, it emerges that defensive measures can be effectively utilized against any terror outfit irrespective of the nature of externalities (if any) and the quantum of resources with the terrorists because under any scenario, as long as the equilibrium is stable, there is at least one outfit against which defensive measures can be used effectively to reduce the total number of terror attacks. This explains the universality of defensive measures. For instance, in the immediate aftermath of a terrorist event where the government is unaware or unsure about the perpetrator(s), a “safe” choice of an ad hoc CT strategy involves hardening of potential targets and increasing surveillance. It is another matter that given the extent of public outrage after a major terrorist event, the government may find it politically untenable to stick to defensive CT measures alone.

On the other hand, in the absence of externalities as well as in the presence of positive externalities or sufficiently weak negative externalities, offensive measures are effective if and only if the targeted outfit is resource-constrained. However, in the presence of sufficiently strong negative externalities the reduction in the targeted outfit’s attacks would be more than compensated by the increase in the other outfit’s attacks, due to a decline in its cost of operations. This would, therefore, result in an increase in the total number of attacks. Hence, defensive instead of offensive measures would be preferable in such cases. Further, although the application of offensive measures against resource-rich outfits generally leads to an increase in attacks due to a terrorist backlash in the absence of externalities, such measures can decrease the overall attacks in the presence of sufficiently strong negative externalities. Interestingly, in such cases, the higher the terrorist backlash by the targeted outfit, the greater the decline in the other outfit’s attacks due to higher operational costs. In the presence of externalities, therefore, a necessary and sufficient condition for offensive CT to be effective against an outfit that is resource-abundant is the presence of sufficiently strong negative externalities.

Finally, CBMs can be effectively utilized only if the targeted outfit is not resource-constrained, irrespective of whether externalities are present or not. In the vicinity of the interior equilibrium in the absence of externalities, the sensitivity of the outfit’s optimal number of attacks to the outfit’s inefficiency is greater or lesser than that to the outfit’s intrinsic propensity for violence according as the intrinsic propensity for violence is greater or lesser than the outfit’s inefficiency in interior equilibrium, since from Eq. (4):

$$ \left| {\frac{{\partial A_{i}^{*} }}{{\partial \beta_{i} }}} \right| = - \frac{{C_{i}^{\prime } }}{{\alpha_{i} v_{i}^{\prime \prime } - \beta_{i} C_{i}^{\prime \prime } }}{ \gtrless } - \frac{{v_{i}^{\prime } }}{{\alpha_{i} v_{i}^{\prime \prime } - \beta_{i} C_{i}^{\prime \prime } }} = \frac{{\partial A_{i}^{*} }}{{\partial \alpha_{i} }} \leftrightarrow \alpha_{i} { \gtrless }\beta_{i} . $$
(14)

Hence, the deployment of CBMs is optimal in the absence of externalities if and only if the targeted outfit is resource-rich and sufficiently inefficient. This is because the incentive of a resource-rich outfit to respond to CBMs is stronger (weaker), the lesser (greater) the impunity with which it can carry out terror attacks. Also, offensive measures against such an outfit would result in an increase in the number of attacks in the vicinity of the initial equilibrium via an increase in the outfit’s intrinsic propensity of violence, as mentioned earlier.

In the presence of externalities, although CBMs would result in the reduction of attacks by the targeted outfit, the other outfit will overcompensate by increasing its attacks by an even greater magnitude in the presence of sufficiently strong negative externalities. Here, defensive measures would be optimal. In all other situations in the presence of externalities, CBMs are effective in the vicinity of the initial equilibrium.

5 Conclusion

Given the limited literature investigating the role of externalities in CT, a simple formalization of operational externalities has been attempted in this paper. The insights, however, are compelling. The analysis demonstrates that the policy ramifications of CT measures are directionally the same both in the absence of externalities, and under positive externalities. It is, however, demonstrated that the magnitude of the impact in the latter regime is never less than that under the former. In fact, the direction of impact of CT measures is also the same under negative externalities unless the optimal response of one outfit is sufficiently sensitive to changes in the parameters of the other. The magnitude of the impact, however, would never exceed that in the absence of externalities. This is because the response of one outfit to a CT measure runs contrary to that of the other under negative externalities.

The universality of defensive CT measures is also explained by the structure, thus lending credence to the possibility of oversupply of defensive CT. It is also argued that CBMs are ineffective against resource-constrained outfits. Moreover, the possible limitations of offensive CT in the vicinity of the initial equilibrium have been demonstrated. Offensive measures can be effectively used against resource-constrained outfits both in the absence of externalities and under positive externalities. This result also holds under negative externalities if the magnitude of externalities is sufficiently low. Most interestingly, the phenomenon of terrorist backlash can render offensive CT effective even against resource-abundant outfits, in the presence of sufficiently strong negative externalities. Examples including Phillippines’ use of both “soft and hard power” against Abu Sayyaf, American airstrikes targeting the Taliban in 2001, and the surgical strikes conducted by the Indian Army against multiple terror launch pads in PoK in 2016 have been provided as evidence of the above findings.