Criminal Network Formation and Optimal Detection Policy: The Role of - - PowerPoint PPT Presentation

criminal network formation and optimal detection policy
SMART_READER_LITE
LIVE PREVIEW

Criminal Network Formation and Optimal Detection Policy: The Role of - - PowerPoint PPT Presentation

Criminal Network Formation and Optimal Detection Policy: The Role of Cascade of Detection Liuchun Deng 1 and Yufeng Sun 2 Johns Hopkins University Chinese University of Hong Kong Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 1 /


slide-1
SLIDE 1

Criminal Network Formation and Optimal Detection Policy: The Role of Cascade of Detection

Liuchun Deng1 and Yufeng Sun2

Johns Hopkins University Chinese University of Hong Kong

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 1 / 30

slide-2
SLIDE 2

Motivation

Criminal networks are widely observed Mafia Terrorist networks Corruption networks

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 2 / 30

slide-3
SLIDE 3

Research Question

What is the optimal detection policy in the presence of endogenous network formation among criminals? How does the cascade of detection affect criminal network formation and social welfare?

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 3 / 30

slide-4
SLIDE 4

Preview of the Results

We consider two dimensions of detection policy

Allocation of detection resource Degree of cascade

Higher degree of cascade of detection may backfire Optimal budget allocation is highly asymmetric among ex ante identical agents

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 4 / 30

slide-5
SLIDE 5

Time Line

Our timing structure follows Baccara and Bar-Issac (2008)

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 5 / 30

slide-6
SLIDE 6

Model

1

Set of players: N = {1, 2, ..., n}

2

Probability of player i being directly detected: βi ∈ [0, 1]

3

The government allocates a fixed detection budget B ∈ R+

n

  • i=1

βi ≤ B

4

Players are ranked such that β1 ≤ β2 ≤ ... ≤ βn

5

β ≡ (β1, β2, ..., βn)

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 6 / 30

slide-7
SLIDE 7

Link formation

G: set of n-by-n (0, 1)-matrices with zeros on the diagonal Gi: set of n-by-1 (0, 1)-vectors with i-th element to be zero gi ∈ Gi: linking decision by player i g ∈ G: A collection of linking choices by all players G: set of n-by-n symmetric (0, 1)-matrices with zeros on the diagonal Link formation requires bilateral agreement. For any g ∈ G, g induces a criminal network g(g) ∈ G such that g(g) = min(g, g′) No explicit linking cost

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 7 / 30

slide-8
SLIDE 8

Degree of Cascade

Distance dij between player i and j is the length of the shortest path connecting i and j Probability of player i not being detected pi(g; β, d) = Πj∈N,dij≤d(1 − βj) with

d = 0 → no cascade of detection d = 1 → limited cascade of detection d = n → full cascade of detection

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 8 / 30

slide-9
SLIDE 9

Degree of Cascade: Example

p1(g;β β β, 0) = 1 − β1 p1(g;β β β, 1) = Π4

i=1(1 − βi)

p1(g;β β β, 6) = Π6

i=1(1 − βi)

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 9 / 30

slide-10
SLIDE 10

Strategic Complementarity

Given g ∈ G, player i chooses effort level xi ∈ R+ Player i’s payoff πi(x, g; β, λ, d) = pi(g; β, d) ·  xi − 1 2x2

i + λ n

  • j=1

gijxixj   where λ ∈ (0,

1 n−1) and x ≡ (x1, x2, ..., xn)

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 10 / 30

slide-11
SLIDE 11

Strategy and Strategy Profile

X: set of all mappings from G to R+ Player i’s strategy is a pair of a linking choice gi ∈ Gi and an effort mapping xi(·) ∈ X Given a strategy profile (x(·), g), player i’s payoff Πi(x(·), g) ≡ πi(x(g(g)), g(g))

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 11 / 30

slide-12
SLIDE 12

Equilibrium Definition I

Definition

A Nash equilibrium is a strategy profile (x∗(·), g∗) such that Πi(x∗(·), g∗) ≥ Πi(xi(·), x∗

−i(·), gi, g∗ −i), ∀i ∈ N, xi(·) ∈ X, gi ∈ Gi.

Definition

A subgame-perfect Nash equilibrium is a strategy profile (x∗(·), g∗) such that a Nash equilibrium is played for every subgame.

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 12 / 30

slide-13
SLIDE 13

Equilibrium Definition II

Definition (Hiller, 2014)

A pairwise stable Nash equilibrium is a strategy profile (x∗(·), g∗) such that

1

(x∗(·), g∗) is a subgame-perfect Nash equilibrium

2

There is no profitable bilateral deviation at the stage of link

  • formation. For any (i, j)-pair such that g(g∗)ij = 0 (i = j),

Πi(x∗(·), g∗ ⊕ (i, j) ⊕ (j, i)) > Πi(x∗(·), g∗) implies Πj(x∗(·), g∗ ⊕ (i, j) ⊕ (j, i)) < Πj(x∗(·), g∗).

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 13 / 30

slide-14
SLIDE 14

Obtainability

Definition (Jackson and van den Nouweland, 2005)

A network g′ ∈ G is obtainable from g ∈ G via deviations by a nonempty S ⊂ N if

1

gij = 0 and g′

ij = 1 implies i, j ∈ S;

2

gij = 1 and g′

ij = 0 implies {i, j} ∩ S = ∅.

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 14 / 30

slide-15
SLIDE 15

Obtainability: Example

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 15 / 30

slide-16
SLIDE 16

Equilibrium Definition III

Definition (Jackson and van den Nouweland, 2005)

A subgame-perfect Nash equilibrium (x∗(·), g∗) is strongly stable if for any nonempty S ⊂ N, h ∈ G that is obtainable from g(g∗) via deviations by S, and i ∈ S such that πi(x∗(h), h) > πi(x∗(g(g∗)), g(g∗)), there exists j ∈ S such that πj(x∗(h), h) < Πj(x∗(g(g∗)), g(g∗)).

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 16 / 30

slide-17
SLIDE 17

Equilibrium Characterization

Lemma (Ballester, et al., 2006)

Given a criminal network g ∈ G, if λ ∈ (0, 1/(n − 1)), there exists a unique interior Nash equilibrium for the stage game at the second

  • period. In particular,

x(g) = (I − λg)−1 · 1, where I is an n-dimensional identity matrix and 1 is a 1-by-n vector with all elements equal to one. Moreover, player i’s equilibrium payoff is given by pi(g)x2

i (g)/2.

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 17 / 30

slide-18
SLIDE 18

Equilibrium Characterization: No Cascade

Proposition

If there is no cascade of detection (d = 0), there exists a generically unique pairwise stable Nash equilibrium in which agents form a complete network.

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 18 / 30

slide-19
SLIDE 19

Equilibrium Characterization: Full Cascade

Lemma

Under full cascade of detection (d = n), each component of the criminal network is complete in a pairwise stable Nash equilibrium.

Lemma

In any strongly stable Nash equilibrium, the equilibrium partition of agents “preserves” the order of detection probability

  • {1, ..., n1}, {n1 + 1, ..., n1 + n2}, ...{

k−1

  • i=1

ni + 1, ...,

k

  • i=1

ni}

  • where n ≡ k

i=1 ni and agents are labeled such that β1 ≤ ... ≤ βn.

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 19 / 30

slide-20
SLIDE 20

Equilibrium Characterization: Full Cascade

Proposition

There exists a generically unique strongly stable Nash equilibrium with the equilibrium partition {{1, 2, ..., n0}, {n0 + 1}, {n0 + 2}, ..., {n}} and n0 = max

  • arg max

k∈N πk

  • ,

where πk is the individual payoff of a complete component formed by the first k agents, πk = 1 2

  • 1

1 − (k − 1)λ 2 Πk

i=1(1 − βi).

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 20 / 30

slide-21
SLIDE 21

Equilibrium Characterization: Full Cascade

A numerical example: n = 10; βk = k/20; λ = 0.08

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 21 / 30

slide-22
SLIDE 22

Equilibrium Characterization: Partial Cascade

Proposition

Those players who are isolated in the strongly stable Nash equilibrium under full cascade of detection remain isolated in any pairwise stable Nash equilibrium under partial cascade of detection.

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 22 / 30

slide-23
SLIDE 23

Detection Policy: Full Cascade

The government’s decision problem min

β∈Rn

+: n i=1 βi≤B

n

  • i=1

 xi(β, λ) − 1 2x2

i (β, λ) + λ n

  • j=1

gij(β, λ)xi(β, λ)xj(β, λ)   Equivalently, min

β∈Rn

+: n i=1 βi≤B n0(β) Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 23 / 30

slide-24
SLIDE 24

Detection Policy: Full Cascade

Proposition

Under full cascade of detection, the government can keep each agent isolated in the strongly stable Nash equilibrium if and only if B > B1 ≡ n − 1 −

n

  • k=2

1 − (k − 1)λ 1 − (k − 2)λ 2 , and the optimal allocation of the detection budget is given by β1 = 0 and βk = 1 − 1 − (k − 1)λ 1 − (k − 2)λ 2 + B − B1 n − 1 , k = 2, 3, ..., n.

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 24 / 30

slide-25
SLIDE 25

Detection Policy: Full Cascade

Corollary

Under full cascade of detection, the government can keep the size of the largest component of the criminal network in the strongly stable Nash equilibrium to be S ∈ {2, 3, ..., n − 1} if and only if B > BS ≡ n − S −

n

  • k=S+1

1 − (k − 1)λ 1 − (k − 2)λ 2 , and the optimal allocation of the detection budget is given by βk = 0 for k ≤ S and βk = 1 − 1 − (k − 1)λ 1 − (k − 2)λ 2 + B − BS n − S , k = S + 1, S + 2, ..., n.

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 25 / 30

slide-26
SLIDE 26

Relation to the Literature

Crime organizations and detection policy

Ballester, Calvo-Armengol, and Zenou (2006): “key-player” policy Garoupa (2007): severe law enforcement could backfire Baccara and Bar-Isaac (2008): optimal information structure

Network games with local complementarities

Baetz (2014): one-sided link formation Hiller (2014): two-sided link formation Belhaj, Bervoets, and Deroian (2014): efficient network structures

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 26 / 30

slide-27
SLIDE 27

Extension: Degree of Cascade

Proposition

Those players who are isolated in the strongly stable Nash equilibrium under full cascade of detection (d = n) remain isolated in any strongly stable Nash equilibrium under positive degree of cascade (d ∈ {1, 2, ..., n}).

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 27 / 30

slide-28
SLIDE 28

Extension: Outside Option

Proposition

Let Bn = 0. If the detection budget B ∈ [Bℓ+1, Bℓ)a for ℓ ∈ {1, 2, ..., n − 1}, the government can incentivize all agents to opt

  • ut if and only if 1−(B−Bℓ+1)

2(1−ℓλ)2

< π0 with the allocation of the detection budget given by βk = 0 for k ≤ ℓ, βℓ+1 = B − Bℓ+1, and βk = 1 −

  • 1−(k−1)λ

1−(k−2)λ

2 for k > ℓ + 1.

aRecall that BS ≡ n − S − n k=S+1

  • 1−(k−1)λ

1−(k−2)λ

2 for S ∈ {1, 2, ..., n − 1}.

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 28 / 30

slide-29
SLIDE 29

Conclusion

Higher degree of cascade of detection may backfire. Higher degree of cascade of detection could yield a denser criminal network. Optimal budget allocation is highly asymmetric among ex ante identical agents. The results continue to hold under general degree of cascade of detection and introduction of outside option.

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 29 / 30

slide-30
SLIDE 30

Thank you!

Thank you!

Deng & Sun (JHU & CUHK) Criminal Network 2/27/2016 30 / 30