Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-gvh9x Total loading time: 0 Render date: 2024-07-24T10:02:26.413Z Has data issue: false hasContentIssue false

5 - IRIS – A Tool for Strategic Security Allocation in Transportation Networks

from PART II - DEPLOYED APPLICATIONS

Published online by Cambridge University Press:  05 January 2012

Get access

Summary

Introduction

Transportation networks such as buses, trains, and airplanes carry millions of people per day and from to their destinations, making them a prime target for terrorists and extremely difficult for law enforcement agencies to protect. In 2001, the 9/11 attack on the World Trade Center in New York City with commercial airliners resulted in $27.2 billion of direct short term costs (Looney 2002) as well as a government-reported 2,974 lives lost. The 2004 Madrid commuter train bombings resulted in 191 lives lost, 1755 people wounded, and an estimated cost of 212 million Euros (Blanco et al., 2007). Finally, in the 2005 London subway and bus bombings, 52 innocent lives were lost, 700 others were injured, and the estimated economic cost was 2 billion pounds (Thornton, 2005).

In addition to preboarding security checkpoints patrols aboard the vehicles are another key defensive measure used by many organizations in these domains (Billante, 2003; Kenney, 1989). In all these networks, there are hundreds or thousands of vehicles to protect, making it difficult to create patrol schedules. Furthermore, since motivated aggressors will attempt to observe law-enforcement patterns and try to exploit the schedule, law-enforcement organizations have embraced the use of randomization in their scheduling practices. Also, in all these networks, it is not possible to simply assign law-enforcement personnel to vehicles in isolation, without considering the route the vehicle takes as well as departure and arrival times.

Type
Chapter
Information
Security and Game Theory
Algorithms, Deployed Systems, Lessons Learned
, pp. 88 - 106
Publisher: Cambridge University Press
Print publication year: 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

,FederalAir Marshal Service. http://en.wikipedia.org/wiki/Federal_Air_Marshal_Service, 2008.
,TSA: Federal Air Marshals. http://www.tsa.gov/lawenforcement/programs/fams.shtm, 2008.
R., Avenhaus, B., von Stengel, and S., Zamir. Inspection games. In R. J., Aumann and S., Hart, editors, Handbook of Game Theory, volume 3, chapter 51, pages 1947–1987. North-Holland, Amsterdam, 2002.Google Scholar
N., Billante. The Beat Goes On: Policing for Crime Prevention. http://www.cis.org.au/ IssueAnalysis/ia38/ia38.htm, 2003.
M., Blanco, A., Valino, J., Heijs, T., Baumert, and J. G., Gomez. The Economic Cost of March 11: Measuring the direct economic cost of the terrorist attack on March 11, 2004 in Madrid. Terrorism and Political Violence, 19(4):489–509, 2007.Google Scholar
G., Brown, M., Carlyle, J., Salmeron, and K., Wood. Defending Critical Infrastructure. Interfaces, 36(6):530–544, 2006.Google Scholar
L., Chen and P., Pu. Survey of preference elicitation methods. Technical report, Ecole Politechnique Federale de Lausanne, 2004.
V., Conitzer and T., Sandholm. Computing the optimal strategy to commit to. In ACM Conference on Electronic Commerce, 2006.Google Scholar
D., Kenney. Police and Policing: Contemporary Issues. Praeger, 1989.Google Scholar
C., Kiekintveld, M., Jain, J., Tsai, J., Pita, M., Tambe, and F., Ordonez. Computing Optimal Randomized Resource Allocations for Massive Security Games. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009.Google Scholar
R., Looney. Economic Costs to the United States Stemming From the 9/11 Attacks. Strategic Insights, 1(6), August 2002.Google Scholar
P., Paruchuri, J. P., Pearce, J., Marecki, M., Tambe, F., Ordonez, and S., Kraus. Playing games with security: An efficient exact algorithm for Bayesian Stackelberg games. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2008.Google Scholar
P., Paruchuri, J. P., Pearce, M., Tambe, F., Ordonez, and S., Kraus. An Efficient Heuristic Approach for Security Against Multiple Adversaries. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2007.Google Scholar
J., Pita, M., Jain, C., Western, C., Portway, M., Tambe, F., Ordonez, S., Kraus, and P., Parachuri. Depoloyed ARMOR protection: The application of a game-theoretic model for security at the Los Angeles International Airport. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS) (Industry Track), 2008.Google Scholar
S., Ruan, C., Meirina, F., Yu, K. R., Pattipati, and R. L., Popp. Patrolling in a Stochastic Environment. In 10th Intl. Command and Control Research and Tech. Symp., 2005.Google Scholar
T., Sandholm, A., Gilpin, and V., Conitzer. Mixed-integer programming methods for finding Nash equilibria. In National Conference on Artificial Intelligence (AAAI), 2005.Google Scholar
P., Thornton. London Bombings: Economic cost of attacks estimated at 2bn, July 2005.
H., von Stackelberg. Marktform und Gleichgewicht. Springer, Vienna, 1934.Google Scholar
B., von Stengel and S., Zamir. Leadership with commitment to mixed strategies. Technical Report London School of Economics-Centre for Discrete and Applicable Mathematics (LSE-CDAM)-2004-01, CDAM Research Report, 2004.
W. A., Wagenaar. Generation of Random Sequences by Human Subjects: A Critical Survey of Literature. 1972.Google Scholar
H., Willis, A., Morral, T., Kelly, and J., Medby. Estimating Terrorism Risk. RAND Corporation, 2005.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×