In this section, we examine how to derive the optimal hiding strategy, i.e., the optimal allocation of the additional import volume across the bridges. We consider first the case of two bridges and then the general case of n bridges.
4.1. The Case of Two Bridges
We assume that our attacker (i.e., the nation or company wishing to bypass the embargo) may choose two nations/companies as bridges (either or both). We recall the notation established in
Section 3 and call the attacker
A and the two bridges
and
. The victim, i.e., the nation/company promoting the embargo, is
V.
The quantities imported by the two bridges prior to their use as bridges towards
A are
and
, respectively. The attacker needs to distribute its import need
between the two bridges. Since
, we can simplify the notation and consider the share of
as
, so that
, with
. Then, the quantities that
and
import from
V after including what they need to satisfy
A’s request are
Similarly, the probability of the attackers being exposed is a special case of Equation (
4):
We can now solve the optimal allocation problem embodied by Equation (
5).
By recalling the probability of a bridge being exposed, as described by Equation (
3), the overall probability of the attacker being exposed can be written as:
The attacker’s aim is to minimise
through a proper choice of the allocation weight
. We note that minimising
can be simplified through the following development:
In order to look for the minimum of the function appearing in the last term in Equation (
10), we zero its derivative. By defining the overloading ratio for the
i-th bridge as
,
, that derivative is
We are sure that the search for the extremal point by zeroing the first derivative leads us to a minimum, since the second derivative is positive:
By recalling Equations (
10) and (
11), we can conclude that minimizing
is tantamount to finding the roots of the following equation (zeroing the first derivative):
By dividing all terms by the positive term
, we obtain the final equation to be solved:
Equation (
14) has to be solved numerically. In order to obtain some further insight into this equation, we write it in the following form:
We now have to look for the value of
that solves Equation (
15). That value will give us the optimal distribution of load on the two candidate bridges. However, we will find out that Equation (
15) does not always allow for a solution. In order to prove this statement, we first prove the following Lemma 1.
Lemma 1. There exists an infinite number of couples for which the equation admits no solution for any value of
Proof of Lemma 1. We can easily observe that the function D is a growing function of and a decreasing function of .
In fact, the first-order derivatives are, respectively:
Since D is a growing function of , we can be sure that, for any , there exists a value such that for any and any . Since , we have infinite couples for which regardless of the value of .
Similarly, since D is a decreasing function of , we can be sure that, for any , there exists a value such that for any and any . Since , we have infinite couples for which regardless of the value of .
Those two results guarantee that there is an infinite number of couples for which , regardless of . □
Though Lemma 1 only provides us with a non-existence proof, we can find a necessary condition on the values of the import volumes and to obtain a solution for the optimal allocation problem.
Theorem 1. If the ratio of import volumes does not satisfy the inequality , the optimal allocation problem has no solution in
Proof. We can write the optimal allocation Equation (
15) in the following form
Since both exponentials in Equation (
18) are lower-bounded by zero and upper-bounded by one, the following inequality holds
If this inequality does not hold, the optimal allocation Equation (
18) cannot be satisfied. Since the two bounds are reciprocals of each other, the theorem statement easily follows. □
We can complete the framework by looking at what happens when the optimal allocation problem has no solution in . We can formulate the following theorem.
Theorem 2. When the optimal allocation problem has no solution for , the best hiding strategy is to allocate the whole import volume on the bridge with the larger import volume
Proof. If the probability of the attacker being exposed does not reach its minimum inside the interval
, then it either reaches a maximum inside that interval or is a monotonous function of
. In either case, the minimum must lie on either extreme of the interval, i.e., when either
or
. We must therefore look at the values taken by the probability of the attacker being exposed given by Equation (
9) when
.
We have, respectively,
and
The minimum (optimal) value of
is reached for
when
Hence, when (i.e., the bridge is the larger importer), the optimal strategy for the attacker is to allocate all the additional import volume on itself. □
Theorem 1 tells us that we obtain a non-trivial solution (i.e., different from either or ) only when the initial import volumes of the two bridges are not too imbalanced. Further, Theorem 2 tells us that, when the ratio of their import volumes exceeds those bounds (i.e., one bridge imports more than twice the volume of the other bridge), the optimal strategy for the attacker is to fully rely on the larger importer. A further consequence of Theorem 2 is that we can identify a threshold on the volume imported by the smaller importer for it to be able to be allocated some fraction of the import need of the attacker.
This threshold effect is evident if we plot the solution, i.e., the value of
that gives the optimal (i.e., minimum exposure probability) solution to the import allocation problem. We show the space of solutions in
Figure 4 when
. As expected, the attacker tends to apportion most of the load to the heavier importer. However, when the ratio of original import volumes is pretty imbalanced, we obtain
or
, which means that the attacker actually uses just one bridge (ther larger one). In
Figure 4, we observe that, for any value of
,
(i.e., all the excess load is on Bridge 2) as long as
stays above some threshold (i.e., the import
is small enough). For example, when
, we can read on
Figure 4 that all the excess import passes through Bridge 2 as long as
(i.e., as long as the plot in
Figure 4 stays in the dark area, corresponding to
) or, alternatively, as long as the ratio of imports of the two bridges is
. That means that Bridge 1 starts getting involved in the triangulation by the attacker when its original import is at least 76.9% of that of Bridge 2. We can then conclude that the bounds in Equation (
18) are both loose, and the range of imbalances giving nontrivial allocations is even narrower. In
Figure 5, we see how the optimal apportionment value
moves between its extremes. When
is very low (
is a heavy importer), the transition is very sharp, so the optimal solution is to rely on either importer but not on both. For all practical purposes, we can identify a threshold value for
that marks the passage from one importer to the other. When
grows (the importer
is not so heavy with respect to the additional burden asked for by the attacker), the transition is more gradual, so there is a region where both importers are to be used with various degrees of apportionment between them. In general, we can identify three intervals in the range of
(the same can be said for
), where the additional import to satisfy the attacker is respectively assigned to
only (interval
), to both
and
(interval
), and then to
only (interval
), as you can see in
Figure 6.
If we look at the first threshold marking the passage from interval
to
, we are searching for the value marking the passage from the heavy dark area to a lighter one in
Figure 4, i.e., for the special value
. By setting
in Equation (
15), we obtain
We recall that this is the import value of Bridge
for which it starts actually being employed as a bridge (Bridge
being the heavier importer of the two). We can also look at the value marking the passage from region
to
, i.e., when Bridge
receives all the additional volume (
) and becomes the heavier importer. We are now looking for
. By setting
in Equation (
15), we obtain
where we notice the perfect symmetry with respect to Equation (
23).
We can gain a quantitative understanding of the width of such intervals by looking at
Figure 7, where we have plotted both thresholds. We see that when the pre-transshipment import by the alternative bridge
is very high (hence,
is very low), the co-existence range for the two bridges is very narrow, and there is a sudden passage from the only bridge being
to being
(or vice versa). Instead, when
imports just a fraction of the additional load, the co-existence range (vertical distance between the two curves) widens, and the bridge
is involved in the transshipment even if it is not a heavy importer.
An alternative way to look at the share of transshipment between the two candidate importers is through the loading ratio
, i.e., the maximum loading ratio such that all the transshipment is still carried out through Bridge 2. We can recall Equation (
23) and manipulate it as follows by exploiting the definition of the overloading ratios
’s:
We can see the resulting plot in
Figure 8.
4.2. The Case of n Bridges
After considering the particular case of two bridges, which has provided us with some insights into the threshold effect associated with the optimal strategy, we now turn to the general case of n bridges.
We first recall the general terminology set in
Section 3. The impost volumes by the bridges before and after their involvement in the triangulation are
and
,
, respectively. Namely, the value
is the volume imported by candidate bridge
before triangulation, while
is the volume imported by the candidate bridge
after its involvement in the triangulation, when it also has to carry a share of the volume
required by the attacker. The
,
are the sharing factors, with the constraint
.
The probability of being exposed for the single bridge is given by Equation (
3), while that for the attacker is shown in Equation (
4).
Since the attacker wishes to minimise the probability of being exposed, but the constraint
has to be satisfied, the attacker has to solve a constrained minimization problem, for which it can use the Lagrange multiplier approach [
25]. The optimization problem would be
where two constraints appear, but it can be transformed by the Lagrange approach into the unconstrained problem
The minimization equation to solve is now the set
As to the first term in this equation, by applying the product rule, we have
The second term in Equation (
28) is instead simply
After inserting these results into Equation (
28), we obtain the system of equations
Since the terms
and
h do not depend on the specific bridge, the following identity must hold
This identity provides us with independent equations, each one involving a couple of bridges, which, together with the constraint equation , give us the solution for the import shares for the present state of import volumes described by the set of , .
The solutions depend, of course, on the ex ante status of imports, i.e., the set of
that we have just mentioned. The possible combinations of those values are infinite. However, we already know from the case of two bridges that some combinations do not lead to a repartition of the additional import, but rather concentrate the additional import into one bridge (or more, but less than
n, since we now have
n bridges rather than two). Actually, if we sort the ex ante imports in descending order (without loss of generality), we can hypothesize to have some
such that
for
. We can follow the same approach as for the case of two bridges. In fact, we can write Equation (
32) as follows
For any couple of bridges (and in particular for
and any
k), we can write
We can again note that the right-hand term is bounded, so that
Since by construction, we must have to obtain a non-zero solution for .
In order to obtain some insights into the way the import volume of the attacker is to be distributed among the bridges, we can hypothesize some regular distributions for the current import volumes s.
In particular, here, we consider a uniform distribution and a generalized Zipf distribution.
In the case of a uniform distribution, we assume that the generic import volume
is a random variable following a uniform distribution. Without loss of generality, we can also assume that
. In this case, we have no average difference among bridges. However, for each instantiation of the problem, the import volumes will not be equal. We can sort the import volumes of any realization of the random variables and use their order statistics, so as to obtain average results. We know that the expected values of the order statistics for a uniform distribution, when volumes exhibit an upper bound
b (the lower bound being zero), are given by the formula [
26]:
The existence of an upper bound is a safe assumption, since import volumes are anyway upper-bounded by the export capacity of the nation/organization from which the bridges are sourcing. If we recall the bound on the import ratios given by Equation (
35), we can derive the maximum number of bridges that can be allocated a non-zero fraction of the overall additional import volume through the following inequality
Under uniform distribution, roughly half of potential bridges will not be allocated any additional load, i.e., they will be excluded from the list of actual bridges that the attacker employs. However, the condition expressed by the inequality (
37) is a sufficient condition for a bridge not to be assigned a share of the import volume needed by the attacker. The actual bound is tighter (i.e., lower) than that. Since we are considering the case where the import volumes are random variables, we can resort to MonteCarlo simulation to estimate that bound. We expect the number of actual bridges (i.e., bridges supporting a share of the import volume
) to be a function both of the number
n of candidate bridges and the overall overloading factor
k defined by the following equation:
We can now run a MonteCarlo simulation, in which we generate 10,000 instances of groups of n potential bridges’ import volumes for selected values of the overall overloading factor. At each simulation run, we compute the number of actual bridges, i.e., the number of bridges that receive a non-zero allocation, and average them through the simulation runs to estimate the expected number of actual bridges.
In
Figure 9, where the overloading factor
k is shown as a parameter, we see that the fraction of candidate bridges that are actually employed does not depend on the number of candidate bridges (since we observe pretty linear trends) but grows with the overloading factor. As the needs of the attacker increase over the volume presently carried by the bridges, the attacker has to rely on more and more bridges.
We can examine the impact of the overloading factor in more depth in
Figure 10, where we observe that the growth of the number of actual bridges is sublinear.
As a volume distribution suitable for describing a realistic situation, we can also recall the generalized Zipf law, which assumes that the import volumes obey the following (deterministic) equation
Zipf law has been found to hold both for the goods exported by a single country and for the exports of a fixed good by all the countries in the world [
27]. Other examples of its application in macroeconomics are its use to model the Gross Domestic Product (GDP) [
28], the GDP per capita [
29], the market distribution [
30], and the distribution of telco customer [
31]. A final example in trade is given in [
32], where the Zipf law is used to describe the size of regional container ports.
Before providing some numerical results when imports follow the generalized Zipf law, we can see which bridges can actually be involved in the optimal apportionment of the additional import load. In fact, using Equation (
39), the following condition must hold (a necessary but not sufficient) to have
from which we have
, which is plotted in
Figure 11.