A Markov model of terrorist behavior within the aviation security environment

Methods to improve deterrence in aviation security screening systems provide added value in their operation and performance. A mathematical tool is introduced to optimally allocate security resources, design effective deterrence procedures, and identify where emphasis should be placed to achieve the most effective deterrence. A continuous-time Markov chain is used to model terrorist behavior within the aviation security environment. The resulting nine-state Markov chain model addresses three levels of behavior, three levels of expertise, and three levels of inactivity. Optimization is used to identify parameter values that minimize terrorist activity. The focus application for this approach is aviation security, though the modeling methodology introduced can be used in any area of security or law enforcement.

[1]  E. Langer The illusion of control. , 1975 .

[2]  Masahiro Inuiguchi,et al.  A Shapley function on a class of cooperative fuzzy games , 2001, Eur. J. Oper. Res..

[3]  Richard C. Larson,et al.  Problems in Modeling and Measuring Recidivism , 1971 .

[4]  James J. Solberg,et al.  Operations Research: Principles and Practice. , 1977 .

[5]  Licun Xue,et al.  Stable agreements in infinitely repeated games , 2002, Math. Soc. Sci..

[6]  Alona E. Evans Aircraft Hijacking: What is Being Done , 1973, American Journal of International Law.

[7]  Robert Chauncey Certainty, Severity, and Skyjacking , 1975 .

[8]  Julian Stander,et al.  MARKOV CHAIN ANALYSIS AND SPECIALIZATION IN CRIMINAL CAREERS , 1989 .

[9]  Roy A. Carr-Hill,et al.  Crime: Accident or Disease: An Exploration Using Probability Models for the Generation of Macro-Criminological Data , 1971 .

[10]  Max Abrahms,et al.  What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy , 2008, International Security.

[11]  William S. Cohen,et al.  Annual report to the President and the Congress on the State Energy Conservation Program for Calendar Year 1984 , 1985 .

[12]  Siu Fai Leung,et al.  Dynamic Deterrence Theory , 1995 .

[13]  Max Abrahms,et al.  What Terrorists Really Want , 2008 .

[14]  Walter Enders,et al.  Patterns of Transnational Terrorism, 1970–1999: Alternative Time-Series Estimates , 2002, Transnational Terrorism.

[15]  Bowman H. Miller,et al.  Profile of a terrorist , 1977 .

[16]  A. Tversky,et al.  Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .

[17]  Julie L Virta,et al.  Analyzing the cost of screening selectee and non-selectee baggage. , 2003, Risk analysis : an official publication of the Society for Risk Analysis.

[18]  Leticia J Pacheco Designing for effective deterrence: A Markovian approach to modeling and analyzing terrorist behavior within the aviation security environment , 2004 .

[19]  M.A.P. Willmer On the Estimation of the Number of Persons Entering and Leaving Crime Annually , 1971 .

[20]  Max Abrahms,et al.  Are Terrorists Really Rational? The Palestinian Example , 2004 .

[21]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[22]  R. Wagner,et al.  Deterrence and Bargaining , 1982 .

[23]  Paul K. Huth Major Power Intervention in International Crises, 1918-1988 , 1998 .