“…Such best-shot and weakest-link complementarities arise in a number of environments. See for example the literature on group contests, for example, Baik (2008), Baik, Kim, and Na (2001), Barbieri, Malueg, and Topolyan (2014), Chowdhury, Lee, and Sheremeta (2013); Chowdhury, Lee, and Topolyan (2016), Katz, Nitzan, and Rosenberg (1990), Kolmar and Rommeswinkel (2013), Lee (2012), and Topolyan (2014). a terrorist "spectacular," we focus on the case in which the defender's objective is to successfully defend all the networks and the attacker's objective is to successfully attack at least one network of targets.…”