Probabilistic Project Management for a Terrorist Planning a Dirty Bomb Attack on a Major US Port Workshop on Critical Infrastructure Protection June 5-7,

Slides:



Advertisements
Similar presentations
Chapter 7 Managing Risk.
Advertisements

Large Aircraft Survivability Initiative (LASI) Programmatic Overview Briefing for the: 4 th Triennial Aircraft Fire & Cabin Safety International Research.
Planning: Processes and Techniques
Structural Vulnerability, Risk Assessment and Land Use Issues for Transportation Infrastructure May 18, 2005 Shay K. Burrows, P.E. Senior Structural Engineer.
Terrorism Risk Analysis: An Overview and a Dirty Bomb Example R educing the Risks and Consequences of Terrorism CREATE Conference November 18, 2004 Detlof.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
1 Chapter 12 Value of Information. 2 Chapter 12, Value of information Learning Objectives: Probability and Perfect Information The Expected Value of Information.
“ Building Strong “ Delivering Integrated, Sustainable, Water Resources Solutions Probabilistic Scenario Analysis Institute for Water Resources 2010 Charles.
Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:
Elements of Decision Problems
Chapter 7: Managing Risk
1 Chapter 8 Subjective Probability. 2 Chapter 8, Subjective Probability Learning Objectives: Uncertainty and public policy Subjective probability-assessment.
Defending Complex System Against External Impacts Gregory Levitin (IEC, UESTC)
Making Simple Decisions Copyright, 1996 © Dale Carnegie & Associates, Inc. Chapter 16.
Risk Management and Strategy Prioritisation Intelligence Step 8 - Risk Management and Strategy Prioritisaiton Considering the risks associated with action.
CREATE OVERVIEW Detlof von Winterfeldt Professor of Industrial and Systems Engineering Professor of Public Policy and Management Center for Risk and Economic.
MAXWELL SECURITY AUTHORITY. THE THREAT: The TERROR PLOT of AL QAEDA.
Lecture 11 Reliability and Security in IT infrastructure.
Session 141 Vulnerability to a natural hazard can be defined as to the extent to which people will experience harm and property will be damaged from that.
8 Managing Risk Teaching Strategies
United States Coast Guard Port Security Assessment Program Evaluability Assessment LaKeshia Allen Alexandra Sommers May 2, 2005.
CAIRA is a quantitative vulnerability assessment tool for examining the physical security of energy systems (electrical, natural gas, steam and water)
Managing Risk. Objectives  To Describe Risk Management concepts and techniques  To calculate and analyze a project using Probability of completion 
Risk management process
Engineering Risk Assessments and Risk Communication Sarah Arulanandam, Hazard and Risk Group RWDI West Inc. DISCLOSURE OF MATERIAL ENVIRONMENTAL EXPOSURES:
International conference on Remote sensing,environment and transportation engineering, p.p , June 2011.
1 Emergency Management and Risk Analysis for Hazardous Materials Transport Shashi Nambisan Professor of Civil Engineering Dept of Civil & Environmental.
“ Building Strong “ Delivering Integrated, Sustainable, Water Resources Solutions 1 What is Engineering Risk and Reliability? Why We Use It? Robert C.
Making Simple Decisions
1 st Seminar Session on Risk and Security Issues Center for Risk and Security The George Perkins Marsh Institute Conference Room May 13 th, 2005.
AMERICA’S ARMY: THE STRENGTH OF THE NATION Mort Anvari 1 Cost Risk and Uncertainty Analysis MORS Special Meeting | September.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Tom Vander Beken – Anticipating.
MBA7020_01.ppt/June 13, 2005/Page 1 Georgia State University - Confidential MBA 7020 Business Analysis Foundations Introduction - Why Business Analysis.
Choice under uncertainty Assistant professor Bojan Georgievski PhD 1.
CHEVRON PIPE LINE COMPANY Risk Based Prioritization Process.
Statistical Decision Theory Bayes’ theorem: For discrete events For probability density functions.
Probabilistic Scenario Analysis Institute for Water Resources 2009 Charles Yoe, PhD
Probabilistic Scenario Analysis Institute for Water Resources 2009 Charles Yoe, PhD
Risk Management. 7–2 Where We Are Now 7–3 Risk Management Process Risk –Uncertain or chance events that planning can not overcome or control. Risk Management.
QUANTITATIVE TECHNIQUES
S ystems Analysis Laboratory Helsinki University of Technology 1 Decision Analysis Raimo P. Hämäläinen Systems Analysis Laboratory Helsinki University.
EBM --- Journal Reading Presenter :葉麗雯 Date : 2005/10/27.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
1 RAND October 30, 2003 Border Security Issues After 9/11 November 5, 2003.
Quality Improvement Tools for Intervention Determination Presenters: Kris Hartmann, MS Healthcare Analyst, Performance Improvement Projects Don Grostic,
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Chapter 8 Managing Project Risk.
Terrorism Risk Assessment and Management (TRAM) Methodology Overview Briefing June 6, 2008.
11.2 Identify Risks The process of determining which risks may affect the project and documenting their characteristics This is an iterative process as.
Figure 3: TSN Analysis Methodology
CIRAS FINAL CONFERENCE
Chapter 11: Project Risk Management
CHAPTER11 Project Risk Management
RISK ASSESSMENT TOOL PREVIEW
Why do the Effects of Natural Disasters Vary?
Monte Carlo Schedule Analysis
Estimation Maximum Likelihood Estimates Industrial Engineering
The Importance of Project Risk Management
Why do the Effects of Natural Disasters Vary?
Decision Making, Learning, Creativity and Entrepreneurship
TERRORIST PROTECTION PLANNING USING A RELATIVE RISK REDUCTION APPROACH
An adversarial risk analysis framework for cybersecurity
Pathway Risk Analysis: NAPPO RSPM 31 (2012)
Estimation Maximum Likelihood Estimates Industrial Engineering
Project Risk Management
Assessing organised crime: threat, anticipation and future
CCSSO National Conference on Student Assessment June 21, 2010
6 Chapter Training Evaluation.
Making Simple Decisions
Presentation transcript:

Probabilistic Project Management for a Terrorist Planning a Dirty Bomb Attack on a Major US Port Workshop on Critical Infrastructure Protection June 5-7, 2008 Center for Risk and Economic Analysis of Terrorism Events Richard John and Heather Rosoff University of Southern California

Why Study Terrorists Objectives and Values? Current methods for terrorism risk assessment focus on: Target Vulnerability Terrorist Capabilities and Resources Possible Attack Consequences Too many potential threats to defend against all possible attacks Potential waste of national resources to defend unlikely targets Leads to “over defense” of some targets and “under defense” of other targets Zero sum game: Resources expended on unlikely targets reduces resources available to defend more likely targets Cannot ignore probability of attack.

Terrorism vs. Technological and Natural Disaster Analyses Difficult to predict specific time and location of technological and natural disasters Yet, we attempt to characterize the probability of technological and natural disaster events Earthquakes – Seismic geological studies Hurricane – Oceanographic studies Industrial accident – Risk studies None of these studies predict a specific time or location of an event in advance of its occurrence

Proxy Value Modeling: General Approach Studying beliefs and motivations of terrorist leaders Beliefs: What do terrorist leaders believe about the likely outcomes of specific attacks? Motivations: What are the values and objectives of terrorist leaders? Using published writings by and about terrorist leaders to infer beliefs and motivations Interviewing those who understand terrorist leaders Intelligence experts People who understand and/or empathize with terrorist leaders

Proxy Value Modeling: Analytic Approach Identify terrorist leader as a rational decision maker (CEO) Conduct proxy value-focused thinking for terrorist leaders Means-ends diagrams Objectives hierarchy Construct a multi-attribute utility model for evaluating terrorist attacks using the proxy objectives hierarchy Construct event tree for attack scenario Use distributions to describe uncertainty about terrorist beliefs about attack outcomes (including terrorist uncertainties) Use distributions to describe uncertainty about terrorist risk attitude Use distributions to describe uncertainty about terrorist trade-offs among conflicting objectives Use a random utility model to relate relative desirability of an attack alternative to likelihood of terrorist leaders selecting a particular attack alternative

Choice about what attack to develop, attack capability, #1 #2 #4 #3 Intelligence Experts Writings Actions Speeches ANALYST Elicitation Decision analysis for the terrorist by proxy Values Options Beliefs Choice about what attack to develop, attack capability, and whether to strike.

Scales for each attribute = Prob Estimates (1) Attack Alternatives P1 P2 P3 Material acquisition No interdiction Execution (2) Decision Tree Analysts elicited the values and uncertainties for each attribute for each attack alternative. (3) Value Elicitation Scales for each attribute = Prob Estimates #1 #2 #3 #4 NINE attack alternatives: No attack (baseline) IED attack Dam failure MANPADS attack Port Nuc attack Explosion on mass transport Anthrax release Dirty bomb attack Smallpox attack

Material Acquisition? Failed Interdiction? Trigger Event Successful PM 1-PM PI 1-PI PS 1-PS Material Acquisition? Failed Attack Failure Success Interdiction? Trigger Event Successful P1 P2 P3 Material acquisition No interdiction Execution (2) Decision Tree

Preferred Terrorist Attack Al Qaeda Organizational Strength Maximize recruitment pop. support (sympathizers) funding Minimize “backlash” To Al Qaeda Operational Expenditures cost resources Impact on the United States Human causalities Economic impact Instill fear ST immediate damage LT ripple effects Preferred Terrorist Attack Analysts elicited the values and uncertainties for each attribute for each attack alternative. (3) Value Elicitation Scales for each attribute

Two outputs: Use project to define critical path and uncertainty over time/resource Step 1: Attack Duration Analysis Step 2: Elicit Critical Task Time & Resource Variability Step 3: PRODUCT Estimate of Total Attack Duration Task Time Attack Analysis Total Attack Duration Task Resources

Tasks piece together to produce an overall success probability Two outputs: Probability of success – decomposed tasks to assess vulnerability affecting success probability Tasks piece together to produce an overall success probability Each critical task’s success varies by resources & time to completion

10K Project

Table of all uncertain tasks on critical path with substantial uncertainty 10K Project Travel into the U.S. Uncertainty

Results of Project – distribution over time…density and cumulative Distribution for Dirty Bomb Attack Successful/Finish Values in 10^ -3 1 2 3 4 5 6 7 8 9 Mean=6/14/2008 2/17/2008 5/16/2008 8/13/2008 11/10/2008 2/7/2009 @RISK Student Version For Academic Use Only 5% 90% 4/5/2008 9/9/2008 10K Project

10K Project Probability table of all tasks relevant to interdiction)

10K Project Distributions over time and resources for tasks Time

10K Project Time distribution: Obtaining a job at selected facility hosting RAD material

10K Project Log odds of task success, Where: p = success probability 1-p = detection probability (1) Log odds of success: Log (p/1-p) = bt(time) + br(resource) + cconstant (2) Calculate bt, br, & intercept: (p/1-p) = e b(time) + b(resource) + c (3) Calculate: P (probability of task success) = e b(time) + b(resource) + c 1+e b(time) + b(resource) + c

10K Project Density distribution Cumulative distribution

Spent Fuel Project

Spent Fuel Project Project table of tasks with durations

Spent Fuel Project Task: Establish point of contact for confirming dirty bomb & suicide bomber transport status

Spent Fuel Project Poisson Explanation Poisson and exponential determination of task success, Where: (1) Calculate lambda: -LN ( Probability of task success/ Base time) (2) Calculate probability of detection: 1 – e (-lambda*time distribution) (3) Calculate probability of success: 1 – probability of event

Spent Fuel Project Spent fuel rod project results

Spent Fuel Project

Spent fuel rod risk model vulnerable tasks Spent Fuel Project

Spent Fuel Project

Task plot: Information gathering on the port in Istanbul, Turkey Spent Fuel Project Task plot: Information gathering on the port in Istanbul, Turkey Weibull(95% = 108, 50% = 67, min = 30) X <= 39.8 5.0% X <= 108.0 95.0% 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 20 30 40 50 60 70 80 90 100 110 120 130 Values x 10^-2 @RISK Student Version For Academic Use Only

Spent Fuel Project Risk Model Results

Probabilistic Project Management for a Terrorist Planning a Dirty Bomb Attack on a Major US Port Workshop on Critical Infrastructure Protection June 5-7, 2008 Center for Risk and Economic Analysis of Terrorism Events Richard John and Heather Rosoff University of Southern California