Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model

The tragic events of 9/11 and the concerns about the potential for a terrorist or hostile state attack with weapons of mass destruction have led to an increased emphasis on risk analysis for homeland security. Uncertain hazards (natural and engineering) have been successfully analyzed using probabilistic risk analysis (PRA). Unlike uncertain hazards, terrorists and hostile states are intelligent adversaries who can observe our vulnerabilities and dynamically adapt their plans and actions to achieve their objectives. This article compares uncertain hazard risk analysis with intelligent adversary risk analysis, describes the intelligent adversary risk analysis challenges, and presents a probabilistic defender–attacker–defender model to evaluate the baseline risk and the potential risk reduction provided by defender investments. The model includes defender decisions prior to an attack; attacker decisions during the attack; defender actions after an attack; and the uncertainties of attack implementation, detection, and consequences. The risk management model is demonstrated with an illustrative bioterrorism problem with notional data.

[1]  Thomas A. Johnson,et al.  Homeland Security Presidential Directive-1 , 2007 .

[2]  Ralph L Keeney,et al.  Modeling Values for Anti‐Terrorism Analysis , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[3]  Seth D. Guikema,et al.  Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .

[4]  Yacov Y Haimes,et al.  Strategic Alternative Responses to Risks of Terrorism , 2003, Risk analysis : an official publication of the Society for Risk Analysis.

[5]  Uriel G. Rothblum,et al.  Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks , 2009, Eur. J. Oper. Res..

[6]  L. Reiter,et al.  Procedural and submittal guidance for the individual plant examination of external events (IPEEE) for severe accident vulnerabilities , 1991 .

[7]  Karl A. Western,et al.  National Institute of Allergy and Infectious Diseases (NIAID): An Overview , 2008 .

[8]  Sarit Kraus,et al.  Robust Solutions in Stackelberg Games : Addressing Boundedly Rational Human Preference Models , 2008 .

[9]  D von Winterfeldt,et al.  A Risk and Economic Analysis of Dirty Bomb Attacks on the Ports of Los Angeles and Long Beach , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[10]  M. Miller Agency , 2010 .

[11]  George W. Bush,et al.  Homeland Security Presidential Directive/HSPD-18: Medical Countermeasures against Weapons of Mass Destruction , 2007 .

[12]  Dimitris Bertsimas,et al.  Robust game theory , 2006, Math. Program..

[13]  Ernest J. Henley,et al.  Probabilistic risk assessment : reliability engineering, design, and analysis , 1992 .

[14]  U. Desselberger,et al.  Emerging and re-emerging infectious diseases. , 2000, The Journal of infection.

[15]  Craig W. Kirkwood,et al.  Strategic decision making : multiobjective decision analysis with spreadsheets : instructor's manual , 1996 .

[16]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[17]  J. Patrick Fitch,et al.  National Biodefense Analysis and Countermeasures Center , 2011 .

[18]  Y. Haimes Risk Modeling, Assessment, and Management: Haimes/Risk Modeling, Assessment 2e , 2005 .

[19]  G. W. Parry,et al.  Trial application of a technique for human error analysis (ATHEANA) , 1996 .

[20]  Michelle Meadows,et al.  Project Bioshield: protecting Americans from terrorism. , 2004, FDA consumer.

[21]  S. Straus Risk Analysis in Engineering and Economics , 2004 .

[22]  Contract Nrc,et al.  A SURVEY OF RISK ASSESSMENT METHODS FROM THE NUCLEAR, CHEMICAL, AND AEROSPACE INDUSTRIES FOR APPLICABILITY TO THE PRIVATIZED VITRIFICATION OF HANFORD TANK WASTES , 1998 .

[23]  Shin Ta Liu,et al.  Risk Modeling, Assessment, and Management , 1999, Technometrics.

[24]  Roger Anderson,et al.  Homeland Security , 2004, Gov. Inf. Q..

[25]  J. Wreathall,et al.  Knowledge-base for the new human reliability analysis method, A Technique for Human Error Analysis (ATHEANA) , 1996 .

[26]  Dana A. Shea,et al.  The BioWatch Program: Detection of Bioterrorism , 2003 .

[27]  W E Vesely,et al.  Fault Tree Handbook , 1987 .

[28]  Richard E. Rosenthal,et al.  Optimization Tradecraft: Hard-Won Insights from Real-World Decision Support , 2008, Interfaces.

[29]  Robin,et al.  World at Risk: The Report of the Commission on the Prevention of WMD Proliferation and Terrorism , 2008 .

[30]  Henry H. Willis Guiding Resource Allocations Based on Terrorism Risk , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[31]  A Iwamoto,et al.  Emerging and Re-emerging Infectious Diseases , 2003, National Institute of Allergy and Infectious Diseases, NIH.

[32]  C. Kirkwood Strategic Decision Making , 1996 .