Quantitative Risk-Based Analysis for Military Counterterrorism Systems
Miller, Gregory A.
MetadataShow full item record
This paper presents a realistic and practical approach to quantitatively assess the risk-reduction capabilities of military counterterrorism systems in terms of damage cost and casualty figures. The comparison of alternatives is thereby based on absolute quantities rather than an aggregated utility or value provided by multicriteria decision analysis methods. The key elements of the approach are (1) the use of decision-attack event trees for modeling and analyzing scenarios, (2) a portfolio model approach for analyzing multiple threats, and (3) the quantitative probabilistic risk assessment matrix for communicating the results. Decision-attack event trees are especially appropriate for modeling and analyzing terrorist attacks where the sequence of events and outcomes are time-sensitive. The actions of the attackers and the defenders are modeled as decisions and the outcomes are modeled as probabilistic events. The quantitative probabilistic risk assessment matrix provides information about the range of the possible outcomes while retaining the simplicity of the classic safety risk assessment matrix based on Mil-Std-882D. It therefore provides a simple and reliable tool for comparing alternatives on the basis of risk including confidence levels rather than single point estimates. This additional valuable information requires minimal additional effort. The proposed approach is illustrated using a simplified but realistic model of a destroyer operating in inland restricted waters. The complex problem of choosing a robust counterterrorism protection system against multiple terrorist threats is analyzed by introducing a surrogate multi-threat portfolio. The associated risk profile provides a practical approach for assessing the robustness of different counterterrorism systems against plausible terrorist threats. The paper documents the analysis for a hypothetical case of three potential threats.
The article of record as published may be found at http://dx.doi.org/10.1002/sys
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Organizing police expeditionary capacities : insights into a wicked problem territory with mathematical modeling Lipowski, Miroslav (Monterey, California. Naval Postgraduate School, 2010-06);Population-centric operations force modern western democratic states to deploy both police and military capacities. Globalization and under-governed states have transformed traditional security threats; now external security ...
Ruppel, Scott R. (Monterey, California: Naval Postgraduate School, 2016-06);Human designed systems are growing in complexity, with increasing numbers of components and behavior combinations, resulting in more emergent and unintended behaviors evident in operations. This thesis explores various ...
Kaminski, Douglas L. (Monterey, California. Naval Postgraduate School, 2008-03);Improvised Explosive Device (IED) is used as a strategic weapon of choice and continues to be a threat both globally and domestically. One of the deadly devices in this arsenal is the Explosively Formed Projectile (EPF). ...