Hostname: page-component-cd9895bd7-gvvz8 Total loading time: 0 Render date: 2024-12-27T10:05:42.613Z Has data issue: false hasContentIssue false

Is There a Trade-off between Security and Liberty? Executive Bias, Privacy Protections, and Terrorism Prevention

Published online by Cambridge University Press:  22 February 2011

TIBERIU DRAGU*
Affiliation:
University of Illinois at Urbana–Champaign
*
Tiberiu Dragu is Assistant Professor, Department of Political Science, University of Illinois at Urbana–Champaign, 605 E. Springfield Avenue, Champaign, IL 61820 (tdragu@illinois.edu).

Abstract

I develop a game-theoretic model of an interaction between an antiterrorist agency and a terrorist organization to analyze how the probability of a terrorist attack varies when the level of privacy protections changes. I derive two implications. First, privacy and security from terrorism need not be in conflict: when accounting for strategic interactions, reducing privacy protections does not necessarily increase security from terrorism. Second, and more important, the antiterrorist agency will always want less privacy. The very agency whose expertise affords it disproportionate influence on policy making will prefer a reduction in privacy protections even when that reduction harms security from terrorism. The analysis has implications for understanding the relationship between government powers and civil liberties in the context of terrorism prevention and times of emergencies more generally.

Type
Research Article
Copyright
Copyright © American Political Science Association 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

REFERENCES

Ackerman, Bruce. 2004. “The Emergency Constitution.” Yale Law Journal 113: 1029–91.Google Scholar
Ackerman, Bruce. 2006. Before the Next Attack: Preserving Civil Liberties in the Age of Terrorism. New Haven, CT: Yale University Press.Google Scholar
Alexander, Yonah. 2006. Counterterrorism Strategies: Successes and Failures of Six Nations. Washington, DC: Potomac Books.Google Scholar
Becker, Garry. 1968. “Crime and Punishment: An Economic Approach.” Journal of Political Economy 76: 169217.Google Scholar
Bianco, William, Ordeshook, Peter, and Tsebelis, George. 1990. “Crime and Punishment: Are One-shot, Two Person Games Enough?American Political Science Review 84: 569–86.Google Scholar
Breton, Albert, and Wintrobe, Ronald. 1982. The Logic of Bureaucratic Control. Cambridge: Cambridge University Press.Google Scholar
Bueno de Mesquita, Ethan. 2005. “The Quality of Terror.” American Journal of Political Science 49 (3): 515–30.Google Scholar
Bueno de Mesquita, Ethan. 2007. “Politics and the Suboptimal Provision of Counterterror.” International Organization 61 (1): 936.Google Scholar
Bueno de Mesquita, Ethan, and Dickson, Eric. 2007. “The Propaganda of the Deed: Terrorism, Counterterrorism, and Mobilization.” American Journal of Political Science 51 (2): 364–81.CrossRefGoogle Scholar
Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction. 2005. “Report of the Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction.” Washington, DC: Government Printing Office.Google Scholar
Cox, Gary. 1994. “A Note on Crime and Punishment.” Public Choice 78: 115–24.Google Scholar
Dershowitz, Alan. 2002. Why Terrorism Works. New Haven, CT: Yale University Press.Google Scholar
Donohue, Laura. 2008. The Cost of Counterterrorism: Power, Politics, and Liberty. Cambridge: Cambridge University Press.Google Scholar
Downs, Anthony. 1967. Inside Bureaucracy, A Rand Corporation Research Study. Boston: Little, Brown.Google Scholar
Ferejohn, John, and Pasquino, Pasquale. 2004. “The Law of the Exception: A Typology of Emergency Powers.” International Journal of Constitutional Law 2 (2): 210–39.Google Scholar
Garicano, Luis, and Posner, Richard. 2005. “Intelligence Failure: An Organizational Economic Perspective.” Journal of Economic Perspectives 19 (4): 151–70.Google Scholar
Gould, Eric, and Stecklov, Guy. 2009. “Terror and the Costs of Crime.” Journal of Public Economics 93: 1175–88.Google Scholar
Gross, Oren, and Aoláin, FionnualaN.. 2006. Law in Times of Crisis: Emergency Powers in Theory and Practice. Cambridge: Cambridge University Press.Google Scholar
Gunaratna, Rohan. 2004. “The Post-Madrid Face of Al Qaeda.” Washington Quarterly 27: 91100Google Scholar
Hardin, Russell. 2004. “Civil Liberties in the Era of Mass Terrorism.” Journal of Ethics 8 (1): 7795.CrossRefGoogle Scholar
Hewitt, Steve. 2008. The British War on Terror. London: Continuum.Google Scholar
Heymann, Philip B. 2003. Terrorism, Freedom, and Security. Cambridge, MA: MIT Press.Google Scholar
Hirshleifer, Jack, and Rasmussen, Eric. 1992. “Are Equilibrium Strategies Unaffected by Incentives?Journal of Theoretical Politics 4: 353–67.Google Scholar
Holmes, Stephen. 1995. Passions and Constraint: On the Theory of Liberal Democracy. Chicago: University of Chicago Press.Google Scholar
Holmes, Stephen. 2007. The Matadors Cape: America's Reckless Response to Terror. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Holmstrom, Bengt, and Milgrom, Paul. 1991. “Multitask Principal–agent Analyses: Incentive Contracts, Asset Ownership, and Job Design.” Journal of Law, Economics, and Organization 7 (Special Issue): 2452.Google Scholar
Home Department. 2004. “Counter-terrorism Powers: Reconciling Security and Liberty in an Open Society: A Discussion Paper.” www.statewatch.org/news/2004/feb/uk-CT-discussion-paper.pdf (accessed January 6, 2010).Google Scholar
Jacobson, Michael. 2006. “The West at War: U.S. and European Counterterrorism Efforts, Post–September 11.” Washington, DC: Washington Institute for Near East Policy.Google Scholar
Justice Department. 2004. “Prepared Remarks of Attorney General John Ashcroft Regarding the Indictment of HAMAS” www.justice.gov/archive/ag/speeches/2004 (accessed January 6, 2011).Google Scholar
Kydd, Andrew, and Walter, Barbara. 2006. “The Strategies of Terrorism.” International Security 31 (1): 4979.Google Scholar
Manin, Bernard. 2008. “The Emergency Paradigm and the New Terrorism.” In Les Usages de la Sparation des Pouvoirs—The Uses of the Separation of Powers, eds. Baume, Sandrine and Fontana, Biancamaria. Paris: Michel Houdiard, 135–71.Google Scholar
Milgrom, Paul, and Roberts, John. 1990. “Bargaining Costs, Influence Costs and the Organization of Economic Activity.” In Perspectives on Positive Political Economy, eds. Alt, James E. and Shepsle, Kenneth A.. Cambridge: Cambridge University Press, 5789.Google Scholar
Milgrom, Paul, and Roberts, John. 1988. “An Economic Approach to Influence Activities and Organizational Responses.” American Journal of Sociology 94 (2): 154–79.Google Scholar
Milgrom, Paul, and Roberts, John. 1992. Economics, Organization and Management. Englewood Cliffs, NJ: Prentice Hall.Google Scholar
Moe, Terry. 1984. “The New Economics of Organization.” American Journal of Political Science 283 (4): 739–77.Google Scholar
National Commission on Terrorist Attacks upon the United States. 2004. “The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States.” Washington, DC: Government Printing Office.Google Scholar
Niskanen, William. 1971. Bureaucracy and Representative Government. Chicago: Aldine-Atherton.Google Scholar
Pfeffer, Jeffery 1993. Managing With Power: Politics and Influence in Organizations. Cambridge, MA: Harvard Business Press.Google Scholar
Posner, Eric A., and Vermeule, Adrian. 2007. Terror in the Balance: Security, Liberty, and the Courts. New York: Oxford University Press.Google Scholar
Posner, Richard. 2005. Preventing Surprise Attacks. New York: Rowman and Littlefield.Google Scholar
Posner, Richard. 2006a. Not a Suicide Pact: The Constitution in a Time of National Emergency. Oxford: Oxford University Press.Google Scholar
Posner, Richard. 2006b. Uncertain Shield: The U.S. Intelligence System in the Throes of Reform. New York: Rowman and Littlefield.Google Scholar
Posner, Richard A. 2006c. “The Reorganized U.S. Intelligence System after One Year.” AEI Outlook Series. www.aei.org/outlook/24213 (accessed January 6, 2011).Google Scholar
Powell, Robert. 2007a. “Defending against Terrorist Attacks with Limited Resources.” American Political Science Review 101 (3): 527–41.CrossRefGoogle Scholar
Powell, Robert. 2007b. “Allocating Defensive Resources with Private Information about Vulnerability.” American Political Science Review 100 (4): 799809.Google Scholar
Przeworski, Adam. 2003. States and Markets: A Primer in Political Economy. Cambridge: Cambridge University Press.Google Scholar
Ramraj, Victor, Hor, Michael and Roach, Kent, eds. 2005. Global Anti-terrorism Law and Policy. Cambridge: Cambridge University Press.Google Scholar
Regan, Priscilla M. 1995. Legislating Privacy: Technology, Social Values, and Public Policy. Chapel Hill: University of North Carolina Press.Google Scholar
Rehnquist, William H. 1998. All the Laws But One: Civil Liberties in Wartime. New York: Knopf.Google Scholar
Rosendorff, Peter, and Sandler, Todd. 2004. “Too Much of a Good Thing? The Proactive Response Dilemma.” Journal of Conflict Resolution 48 (5): 657–71.Google Scholar
Rourke, Francis. 1984. Bureaucracy, Politics, and Public Policy. Boston: Little, Brown.Google Scholar
Schmid, Alex P. 1993. “Western Responses to Terrorism.” In Terrorism and Political Violence, eds. Schmid, Alex P. and Crelinsten, Ronald D.. London: Frank Cass, 1525.Google Scholar
Siqueira, Keith, and Sandler, Todd. 2006. “Terrorists vs the Security Agency: Strategic Interaction, Support, and Sponsorship.” Journal of Conflict Resolution 50 (6): 878–98.Google Scholar
Solove, Daniel. 2008. Understanding Privacy. Cambridge, MA: Harvard University Press.Google Scholar
Treverton, Gregory. 2008. Reorganizing U.S. Domestic Intelligence: Assessing the Options. Santa Monica, CA: RAND.Google Scholar
Tsebelis, George. 1989. “The Abuse of Probability in Political Analysis: The Robinson Crusoe Fallacy.” American Political Science Review 83: 7791.Google Scholar
Tsebelis, George. 1990. “Penalty Has No Impact on Crime: A Game Theoretic Analysis.” Rationality and Society 2: 255–86.Google Scholar
Waldron, Jeremy. 2003. “Security and Liberty: The Image of Balance.” Journal of Political Philosophy 11 (2): 191.CrossRefGoogle Scholar
Walker, Clive. 1992. The Prevention of Terrorism in British Law. 2nd ed. New York: Manchester University Press.Google Scholar
White, Jonathan R. 2003. Terrorism: 2002 Update. 4th ed. Belmont, CA: Wadsworth.Google Scholar
Wilson, James Q. 1989. Bureaucracy: What Government Agencies Do and Why They Do It. New York: Basic Books.Google Scholar
Zegart, Amy. 2007. Spying Blind: The CIA, the FBI, and the Origins of 9/11. Princeton, NJ: Princeton University Press.Google Scholar
Submit a response

Comments

No Comments have been published for this article.