Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?

In recent years, Customs and Border Protection has installed radiation sensors to screen cargo containers entering the United States. They are concerned that terrorists could use containers to smuggle radiological material into the country and carry out attacks with dirty bombs or a nuclear device. Recent studies have questioned the value of improving this screening system with new sensor technology. The cost of delays caused by frequent false alarms outweighs any reduction in the probability of an attack in an expected-cost analysis. We extend existing methodology in three ways to demonstrate how additional factors affect the value of screening investments. We examine the effect that screening has in discouraging terrorists. We model multiple levels of screening. Finally, we consider additional objectives beyond cost. We find that the conclusion about screening depends on key inputs to the probability model (reflecting uncertainties) and to the value function (reflecting the stakeholders' fundamental objectives).

[1]  George E Apostolakis,et al.  A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism , 2005, Risk analysis : an official publication of the Society for Risk Analysis.

[2]  H. Kunreuther,et al.  Interdependent Security , 2003 .

[3]  H. Kunreuther,et al.  IDS Models of Airline Security , 2005 .

[4]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[5]  Gregory S Parnell,et al.  Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[6]  Elisabeth Paté-Cornell,et al.  Fusion of Intelligence Information: A Bayesian Approach , 2002, Risk analysis : an official publication of the Society for Risk Analysis.

[7]  Fred S. Roberts,et al.  Sequential Decision Making Algorithms for Port of Entry Inspection: Overcoming Computational Challenges , 2007, 2007 IEEE Intelligence and Security Informatics.

[8]  Niyazi Onur Bakir A Decision Tree Model for Evaluating Countermeasures to Secure Cargo at United States Southwestern Ports of Entry , 2008, Decis. Anal..

[9]  Craig W. Kirkwood,et al.  Strategic decision making : multiobjective decision analysis with spreadsheets : instructor's manual , 1996 .

[10]  Ralph L. Keeney,et al.  Decisions with multiple objectives: preferences and value tradeoffs , 1976 .

[11]  Detlof von Winterfeldt,et al.  Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists? , 2006, Decis. Anal..

[12]  D von Winterfeldt,et al.  A Risk and Economic Analysis of Dirty Bomb Attacks on the Ports of Los Angeles and Long Beach , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[13]  C. Kirkwood Strategic Decision Making , 1996 .

[14]  James H Lambert,et al.  A Risk‐Based Approach to Setting Priorities in Protecting Bridges Against Terrorist Attacks , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[15]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[16]  R. L. Keeney,et al.  Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.

[17]  Seth D. Guikema,et al.  Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .

[18]  Jose Emmanuel Ramirez-Marquez,et al.  Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach , 2008, Reliab. Eng. Syst. Saf..

[19]  Michael Masters Committee on Homeland Security and Governmental Affairs , 2008 .

[20]  Vicki M. Bier,et al.  Methodology for identifying near-optimal interdiction strategies for a power transmission system , 2007, Reliab. Eng. Syst. Saf..

[21]  Vicki M. Bier,et al.  Game-Theoretic and Reliability Methods in Counterterrorism and Security , 2006 .

[22]  Alan L. Erera,et al.  Optimization Approaches for Efficient Container Security Operations at Transshipment Seaports , 2003 .

[23]  Ralph L Keeney,et al.  Modeling Values for Anti‐Terrorism Analysis , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[24]  Yacov Y Haimes,et al.  Risk Filtering, Ranking, and Management Framework Using Hierarchical Holographic Modeling , 2002, Risk analysis : an official publication of the Society for Risk Analysis.

[25]  T. Bedford,et al.  Probabilistic Risk Analysis: Foundations and Methods , 2001 .

[26]  L. Robin Keller,et al.  A Multiple-Objective Decision Analysis for Terrorism Protection: Potassium Iodide Distribution in Nuclear Incidents , 2006, Decis. Anal..

[27]  Vicki M. Bier,et al.  Subsidies in Interdependent Security With Heterogeneous Discount Rates , 2007 .

[28]  Robert T. Clemen,et al.  Making Hard Decisions with Decisiontools Suite , 2000 .