Risk and Economic Analysis of Terrorism Events Detlof von Winterfeldt Professor of Public Policy and Management Director, Center for Risk and Economic.

Slides:



Advertisements
Similar presentations
Minnesota Port and Waterway Security Working Group Meeting April 12, 2012.
Advertisements

Department of Homeland Security Site Assistance Visit (SAV)
Transit Security: An Overview of Activities Since 9/11 Eva Lerner-Lam President Palisades Consulting Group, Inc. ITE 2003 Annual Meeting August 24-27,
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Terrorism Risk Analysis: An Overview and a Dirty Bomb Example R educing the Risks and Consequences of Terrorism CREATE Conference November 18, 2004 Detlof.
Threat/Vulnerability Assessments for Foods FDA Science Board Advisory Committee Meeting November 6, 2003 Robert E. Brackett, Ph.D. Director, Food Safety.
National Infrastructure Protection Plan
1 NGA Regional Bio-Terrorism Conference Boston, Massachusetts January 12-13, 2004.
Civilian Intelligence Organizations
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
DHS, National Cyber Security Division Overview
Fiscal Year 2008 Urban Areas Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Implications for Caribbean Capital Markets 25 May, 2011 Marlene Murray CFA Society of Trinidad and Tobago.
An Overview of Port Security Programs Jon D. Haveman, Howard J. Shatz, and Ernesto Vilchis Public Policy Institute of California and Princeton University.
Center for Risk and Economic Analysis of Terrorism Events (CREATE) First Annual Conference November 18, 2004 Randolph W. Hall, University of Southern California.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
1 Estimating the Cost and Benefits of Software Assurance Investments Thomas P. Frazier November 9, 2006.
RADM Ali S. Khan, MD, MPH Director, Office of Public Health Preparedness and Response Bridging the Gaps: Public Health and Radiation Emergency Preparedness.
CREATE OVERVIEW Detlof von Winterfeldt Professor of Industrial and Systems Engineering Professor of Public Policy and Management Center for Risk and Economic.
Objective Assess the impact of twenty-first century terrorist activity on American society.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Maritime Security Risk Analysis Model
1 DHS Bioterrorism Risk Assessment Background, Requirements, and Overview DHS Bioterrorism Risk Assessment Background, Requirements, and Overview Steve.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
October 27, 2005 Contra Costa Operational Area Homeland Security Strategic and Tactical Planning and Hazardous Materials Response Assessment Project Overview.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
CSC 386 – Computer Security Scott Heggen. Agenda Security Management.
Unscrambling the Department of Homeland Security Presented to: Alliance South Arthur L. Brown
BSAF-BIONET Meeting Robert J. Hashimoto, CBSP University of California, Berkeley October 2, 2009.
The National Resilience Development Act and the War on Terror Opening up the Third Front.
Association of Defense Communities June 23, 2015
Critical Infrastructure Protection: Program Overview
U.S. Department of the Interior U.S. Geological Survey U.S. Department of the Interior U.S. Geological Survey Natural Hazards Science – Reducing the World’s.
A Proposal to Develop a Regulatory Science Program under Carleton University’s Regulatory Governance Initiative Presentation to the fourth Special Session.
Homeland Security Grant Program 2015 Process Michelle Hanneken Illinois Emergency Management Agency.
1 st Seminar Session on Risk and Security Issues Center for Risk and Security The George Perkins Marsh Institute Conference Room May 13 th, 2005.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
Transportation Security: The Threat, The Challenges and Our Next Steps Eva Lerner-Lam Chair, ASCE Transportation Security Committee American Society of.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
Lecture 4. IS Planning & Acquisition To be covered: To be covered: – IS planning and its importance Cost-benefit analysis Cost-benefit analysis Funding.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
1 Figure 11-3: Risk Analysis Financially Sensible Protections  Risk analysis: Balance risks and countermeasture costs Enumeration of Assets  Assets:
Engineering | Architecture | Design-Build | Surveying | Planning | GeoSpatial Solutions November 16, 2015 THE AWWA J100 - WHAT IT IS, WHY IT IS BEING UPDATED,
Homeland Security and Emergency Management Discussion U.S. Department of Homeland Security  National Preparedness Directorate, FEMA Higher Education Conference.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
The Department of Early Education and Care 2013 Annual Legislative Report February 11, 2014.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
Homeland Security Grant Program Emergency Preparedness Conference – June 2009 NH Department of Safety John J. Barthelmes, Commissioner Earl M. Sweeney,
Subway Chemical Detection: A Proposed System Process for a Detect-to-Warn Capability to Save Lives CAPT Joselito Ignacio, MA, MPH, CIH, CSP, REHS Acting.
Modeling and Simulation of Critical Infrastructure Interdependencies H.S. Jason Min, Walter Beyeler, and Theresa Brown Sandia National Laboratories Critical.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
YE-XingYi Dalian Nationalities University,China The Problem and Policy of City’s Public Security Management in China.
SEC 470 OUTLET The learning interface/sec470outletdotcom.
Overview Briefing Threat and Hazard Identification and Risk Assessment (THIRA) Presidential Policy Directive 8 / PPD-8: National Preparedness May 2012.
Research Project Overview
U. S. Department of Homeland Security. Office for Civil Rights
Chemical Facilities Vulnerability Assessment
Foundations of Homeland Security & Emergency Management Law & Policy Post NPHS 1510.
Leveraging AI for Disaster Preparedness and Response
Ken Sochats/ Threat Potential Modeling
Office of Health, Safety and Security
Presentation transcript:

Risk and Economic Analysis of Terrorism Events Detlof von Winterfeldt Professor of Public Policy and Management Director, Center for Risk and Economic Analysis of Terrorism Events School of Policy, Planning, and Development University of Southern California Presentation at the Center for Systems and Software Engineering March 14, 2006

The Department of Homeland Security 22 agencies 180,000 employees $40 billion budget Major science and technology effort ($1 billion) University Programs ($70 million) Seven Centers

CREATE - Background USC was selected as the first DHS university center in a competition of 72 universities Started operations in March of 2004 Focus on risk and economic analysis $4 million per year for three years Five other centers have been awarded Integrated Network of Centers

CREATE Mission To develop advanced models and tools for the evaluation of the risks, costs and consequences of terrorism and to guide economically viable investments in homeland security

Other Mission Elements To educate the next generation of homeland security professionals in the areas of risk and economic analysis To reach out to a broad constituency concerned with risks and economic consequences of terrorism

Why Risk Analysis? “Risk based” prioritization of investments requested by the Secretary and Congress House Committee on HS, Subcommittee on Intelligence Analysis, Information Sharing, and Terrorism Risk Analysis Need to quantify risks and risk reduction due to countermeasures and recovery measures

Why Economic Analysis? Osama Bin Laden (2002): “(We need to) concentrate on striking the American economy with every possible means.” “ The young men (of the jihad) need to seek out the nodes of the American economy and strike the enemy’s nodes.” Small local terrorism attacks can have large regional and national economic impacts Need for a complete cost-benefit analysis of countermeasures

CREATE is a National Center USC U of Wisconsin, Madison NYU SDC/MIT

CREATE is an Interdisciplinary Center Social Science –Economics –Psychology –Political Science –Public Policy and Planning Engineering –Industrial and Systems Engineering –Electrical Engineering –Civil Engineering –Computer Science

CREATE Research Framework Threat Assessment Consequence Assessment Vulnerability Assessment Risk Assessment

CREATE Research Framework Threat Assessment Consequence Assessment Vulnerability Assessment Valuation of Direct Consequences Assessment of Indirect Econ. Consequences Cost-Benefit & Decision Analysis Risk Analysis Economic Assessment

CREATE Research Framework Threat Assessment Consequence Assessment Vulnerability Assessment Assessment of Indirect Econ. Consequences Response Recovery Prevention Protection Cost-Benefit & Decision Analysis Risk Assessment Economic Assessment Risk Management Assessment of Direct Econ. Consequences

CREATE Case Studies – Year 1

CREATE Case Studies – Year 2

MANPADS - Weapons US REDEYE USSR SA

Close Call

MANPADS Decision Tree 2

MANPADS Consequences Impacts of an Attack –Fatalities –Loss of Airplane(s) –Economic Impacts Impacts of Countermeasures –False alarms –Capital Costs –Operation and Maintenance Cost

MANPADS – User Interface

Tornado Diagram

MANPADS - Economics Shutdown of all airports –Lave: $1.5 billion/day –USC model: $1 billion/day 9/11 economic impacts (2 years) –Santos and Haimes: $28-80 billion –USC model: $ billion

Passenger Volume after 9/11

MANPADS - Conclusions MANPADS countermeasures can be cost-effective, if the probability of a multiple attack is greater than 0.50 in ten years and if economic costs are greater than $200 billion The economic consequences depend on policy and public responses to an attack Terrorists may shift to other weapons, if MANPADS countermeasures are installed Additional work –Value of information to continue MANPADS research –Dynamic decision model of shifting terrorist attack modes

Emerging Themes Adversarial risk is unlike natural risk –Adversaries seek our weakest links –Difficult to estimate probabilities of attack –Probabilities shift with our action –Screening attack modes and targets is easier A terrorist attack is a multistage project –Multiple intervention opportunities –Upstream interventions are best From risk analysis to risk management –Not all countermeasures are cost-effective –Prioritization of investments across threat areas is needed Multi-hazard emergency preparedness & response –Use DHS funds as leverage –Make sure the investment pays for itself by reducing other risks

The Main Challenge: How Secure is Secure Enough? We will never be completely secure The costs of increasing security increase dramatically when we get close to zero risk Increasing security may create other risks, inconveniences, and restrict civil liberties

Website: