Quantitative risk-based analysis for military counterterrorism systems

This paper presents a realistic and practical approach to quantitatively assess the risk-reduction capabilities of military counterterrorism systems in terms of damage cost and casualty figures. The comparison of alternatives is thereby based on absolute quantities rather than an aggregated utility or value provided by multicriteria decision analysis methods. The key elements of the approach are (1) the use of decision-attack event trees for modeling and analyzing scenarios, (2) a portfolio model approach for analyzing multiple threats, and (3) the quantitative probabilistic risk assessment matrix for communicating the results. Decision-attack event trees are especially appropriate for modeling and analyzing terrorist attacks where the sequence of events and outcomes are time-sensitive. The actions of the attackers and the defenders are modeled as decisions and the outcomes are modeled as probabilistic events. The quantitative probabilistic risk assessment matrix provides information about the range of the possible outcomes while retaining the simplicity of the classic safety risk assessment matrix based on Mil-Std-882D. It therefore provides a simple and reliable tool for comparing alternatives on the basis of risk including confidence levels rather than single point estimates. This additional valuable information requires minimal additional effort. The proposed approach is illustrated using a simplified but realistic model of a destroyer operating in inland restricted waters. The complex problem of choosing a robust counterterrorism protection system against multiple terrorist threats is analyzed by introducing a surrogate multi-threat portfolio. The associated risk profile provides a practical approach for assessing the robustness of different counterterrorism systems against plausible terrorist threats. The paper documents the analysis for a hypothetical case of three potential threats. © 2007 Wiley Periodicals, Inc. Syst Eng 10: 273–289, 2007 This is a US Government work, and, as such, is in the public domain in the United States of America.

[1]  P. O'Connor,et al.  Practical Reliability Engineering , 1981 .

[2]  Seth D. Guikema,et al.  Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .

[3]  A. Tversky,et al.  Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .

[4]  S. Kaplan,et al.  On The Quantitative Definition of Risk , 1981 .

[5]  A. Narayanan Probability and statistics in engineering and management science , 1972 .

[6]  R. Lempert,et al.  Shaping the Next One Hundred Years: New Methods for Quantitative Long-Term Policy Analysis , 2003 .

[7]  Norman J. McCormick,et al.  Reliability and risk analysis : methods and nuclear power applications , 1981 .

[8]  Alyson G. Wilson,et al.  Statistical methods in counterterrorism : game theory, modeling, syndromic surveillance, and biometric authentication , 2006 .

[9]  D. Vose Risk Analysis: A Quantitative Guide , 2000 .

[10]  Raphael F. Perl,et al.  Terrorist Attack on USS Cole: Background and Issues for Congress [Updated January 30, 2001] , 2001 .

[11]  G. Hazelrigg Systems Engineering: An Approach to Information-Based Design , 1996 .

[12]  Edouard Kujawski,et al.  Incorporating psychological influences in probabilistic cost analysis , 2004, Syst. Eng..

[13]  Y. Haimes Risk Modeling, Assessment, and Management: Haimes/Risk Modeling, Assessment 2e , 2005 .

[14]  M. Elisabeth Paté-Cornell,et al.  Uncertainties in risk analysis: Six levels of treatment , 1996 .

[15]  Hj Roux A discussion of fire risk assessment , 1982 .

[16]  A. Tversky,et al.  Advances in prospect theory: Cumulative representation of uncertainty , 1992 .

[17]  G. Woo Quantitative Terrorism Risk Assessment , 2002 .

[18]  Edouard Kujawski,et al.  Selection of technical risk responses for efficient contingencies , 2002 .

[19]  J. E. Russo,et al.  Decision traps : ten barriers to brilliant decision-making and how to overcome them , 1989 .

[20]  H. Martz Bayesian reliability analysis , 1982 .

[21]  Daniel Cobian Sea Javelin: An Analysis of Naval Force Protection Alternatives , 2002 .

[22]  Yossi Sheffi,et al.  The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage , 2005 .

[23]  Yacov Y. Haimes,et al.  Risk modeling, assessment, and management , 1998 .

[24]  Timothy J. Bailey US/UK Sensor-To-Shooter Multinational C4 Interoperability Study Force-On-Force Effectiveness Methodology , 2000 .

[25]  Richard S. John,et al.  Assessment of Cost Uncertainties for Large Technology Projects: A Methodology and an Application , 2002, Interfaces.

[26]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[27]  Jen Tang,et al.  Distribution of Aggregate Utility Using Stochastic Elements of Additive Multiattribute Utility Models , 2000, Decis. Sci..

[28]  Vicki M. Bier,et al.  Game-Theoretic and Reliability Methods in Counterterrorism and Security , 2006 .

[29]  M. Elisabeth Paté-Cornell Conditional Uncertainty Analysis and Implications for Decision Making: The Case of WIPP , 1999, Risk analysis : an official publication of the Society for Risk Analysis.

[30]  M. Elisabeth Paté-Cornell,et al.  Fault Trees vs. Event Trees in Reliability Analysis , 1984 .

[31]  G. Ackerman Modeling Terrorists , 2006, IEEE Spectrum.

[32]  S. Kaplan On The Method of Discrete Probability Distributions in Risk and Reliability Calculations–Application to Seismic Risk Assessment , 1981 .

[33]  John C. Chicken The risk ranking technique in decision making , 1989 .

[34]  Bruce Schneier,et al.  Toward a secure system engineering methodolgy , 1998, NSPW '98.

[35]  Mark E. Johnson,et al.  Risk Analysis of Terrorist Attacks , 1987 .

[36]  Baruch Fischhoff,et al.  Judgment under uncertainty: Facts versus fears: Understanding perceived risk , 1982 .

[37]  Gregory S. Parnell,et al.  Mission Oriented Risk and Design Analysis of Critical Information Systems , 2005 .

[38]  Andrew P. Sage,et al.  Introduction to systems engineering , 2000 .

[39]  Ronald D. Fricker,et al.  Game Theory in an Age of Terrorism: How Can Statisticians Contribute? , 2006 .