IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v11y2015icp3-11.html
   My bibliography  Save this article

WikiLeaks and the risks to critical foreign dependencies

Author

Listed:
  • Arce, Daniel G.

Abstract

During its “Cablegate” campaign, the WikiLeaks website released a U.S. Department of State list of world-wide assets vital to the United States created under the Critical Foreign Dependencies Initiative (CFDI). This paper evaluates the entries in the CFDI list relative to various definitions of critical infrastructure pertaining to homeland security, and past patterns of terrorism attacks on categories within the CFDI as recorded by the Global Terrorism Database (GTD) over the past 40 years. It is found that what the United States identifies as critical international infrastructure differs significantly from what is defined as the national critical infrastructure. Moreover, the geospatial distribution of foreign infrastructure identified as critical by the United States differs substantially from the past patterns of terrorist attacks on similar entities. Finally, examining the GTD for the years subsequent to the WikiLeaks release reveals that there is little evidence to substantiate that WikiLeaks provided a “to-do” list for terrorists intending to attack critical infrastructure assets as was claimed by some U.S. government officials.

Suggested Citation

  • Arce, Daniel G., 2015. "WikiLeaks and the risks to critical foreign dependencies," International Journal of Critical Infrastructure Protection, Elsevier, vol. 11(C), pages 3-11.
  • Handle: RePEc:eee:ijocip:v:11:y:2015:i:c:p:3-11
    DOI: 10.1016/j.ijcip.2015.07.004
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548215000451
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2015.07.004?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Patrick T. Brandt & Todd Sandler, 2010. "What Do Transnational Terrorists Target? Has It Changed? Are We Safer?," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 214-236, April.
    2. R. Coats & Gökhan Karahan & Robert Tollison, 2006. "Terrorism and pork-barrel spending," Public Choice, Springer, vol. 128(1), pages 275-287, July.
    3. Gabriel J. Michael, 2015. "Who's Afraid of WikiLeaks? Missed Opportunities in Political Science Research," Review of Policy Research, Policy Studies Organization, vol. 32(2), pages 175-199, March.
    4. Michael Spagat, 2011. "Mainstreaming An Outlier: The Quest To Corroborate The Second Lancet Survey Of Mortality In Iraq," Defence and Peace Economics, Taylor & Francis Journals, vol. 22(3), pages 299-316.
    5. Arce M., Daniel G. & Sandler, Todd, 2001. "Transnational public goods: strategies and institutions," European Journal of Political Economy, Elsevier, vol. 17(3), pages 493-516, September.
    6. Daniel G. Arce & Dan Kovenock & Brian Roberson, 2012. "Weakest‐link attacker‐defender games with multiple attack technologies," Naval Research Logistics (NRL), John Wiley & Sons, vol. 59(6), pages 457-469, September.
    7. Hamid Mohtadi & Antu Panini Murshid, 2009. "Risk Analysis of Chemical, Biological, or Radionuclear Threats: Implications for Food Security," Risk Analysis, John Wiley & Sons, vol. 29(9), pages 1317-1335, September.
    8. Andrew M. Linke & Frank D. W. Witmer & John O'Loughlin, 2012. "Space-Time Granger Analysis of the War in Iraq: A Study of Coalition and Insurgent Action-Reaction," International Interactions, Taylor & Francis Journals, vol. 38(4), pages 402-425, September.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Renaud Bellais & Martial Foucault & Jean-Michel Oudot, 2014. "Économie de la défense," Université Paris1 Panthéon-Sorbonne (Post-Print and Working Papers) hal-01052607, HAL.
    2. Subhasish M. Chowdhury & Iryna Topolyan, 2013. "The Attack-and-Defence Group Contests," University of East Anglia Applied and Financial Economics Working Paper Series 049, School of Economics, University of East Anglia, Norwich, UK..
    3. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    4. Alejandro Caparrós & Michael Finus, 2020. "Public good agreements under the weakest‐link technology," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 22(3), pages 555-582, June.
    5. Laffont, Jean-Jacques & Martimort, David, 2005. "The design of transnational public good mechanisms for developing countries," Journal of Public Economics, Elsevier, vol. 89(2-3), pages 159-196, February.
    6. Brandt, Patrick T. & George, Justin & Sandler, Todd, 2016. "Why concessions should not be made to terrorist kidnappers," European Journal of Political Economy, Elsevier, vol. 44(C), pages 41-52.
    7. Haider, Murtaza & Anwar, Amar, 2014. "Impact of terrorism on FDI flows to Pakistan," MPRA Paper 57165, University Library of Munich, Germany.
    8. Peter Egger & Martin Gassebner, 2015. "International terrorism as a trade impediment?," Oxford Economic Papers, Oxford University Press, vol. 67(1), pages 42-62.
    9. Britta Hoyer & Kris De Jaegher, 2023. "Network disruption and the common-enemy effect," International Journal of Game Theory, Springer;Game Theory Society, vol. 52(1), pages 117-155, March.
    10. Konrad, Kai A. & Morath, Florian, 2023. "How to preempt attacks in multi-front conflict with limited resources," European Journal of Operational Research, Elsevier, vol. 305(1), pages 493-500.
    11. Abel Brodeur, 2018. "The Effect of Terrorism on Employment and Consumer Sentiment: Evidence from Successful and Failed Terror Attacks," American Economic Journal: Applied Economics, American Economic Association, vol. 10(4), pages 246-282, October.
    12. Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What have we learned? Assessing the effectiveness of counterterrorism strategies in Pakistan," Economic Modelling, Elsevier, vol. 64(C), pages 487-495.
    13. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    14. Finus, Michael & Pintassilgo, Pedro, 2013. "The role of uncertainty and learning for the success of international climate agreements," Journal of Public Economics, Elsevier, vol. 103(C), pages 29-43.
    15. Guillaume Cheikbossian, 2016. "The political economy of (De)centralization with complementary public goods," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 47(2), pages 315-348, August.
    16. Patz, Ronny, 2017. "Bureaucratic politics and the prevention of leaks in the European Commission," SocArXiv f59z4, Center for Open Science.
    17. Cornes, Richard & Hartley, Roger, 2007. "Weak links, good shots and other public good games: Building on BBV," Journal of Public Economics, Elsevier, vol. 91(9), pages 1684-1707, September.
    18. Jacques Fontanel, 2010. "Un concept élargi de la sécurité économique," Post-Print hal-02043679, HAL.
    19. Barbieri, Stefano, 2017. "Voluntary public good provision with private information using order statistics," Economics Letters, Elsevier, vol. 150(C), pages 63-66.
    20. Rafael Hortala-Vallve & Aniol Llorente-Saguer, 2015. "An Experiment on Non-Zero Sum Colonel Blotto Games," Working Papers 779, Queen Mary University of London, School of Economics and Finance.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:11:y:2015:i:c:p:3-11. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.