Skip to main content
Top
Published in: Journal of Transportation Security 2/2011

01-06-2011

A Markov model of terrorist behavior within the aviation security environment

Authors: Leticia J. Pacheco, John E. Kobza, Sheldon H. Jacobson, Rajat Gupta

Published in: Journal of Transportation Security | Issue 2/2011

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Methods to improve deterrence in aviation security screening systems provide added value in their operation and performance. A mathematical tool is introduced to optimally allocate security resources, design effective deterrence procedures, and identify where emphasis should be placed to achieve the most effective deterrence. A continuous-time Markov chain is used to model terrorist behavior within the aviation security environment. The resulting nine-state Markov chain model addresses three levels of behavior, three levels of expertise, and three levels of inactivity. Optimization is used to identify parameter values that minimize terrorist activity. The focus application for this approach is aviation security, though the modeling methodology introduced can be used in any area of security or law enforcement.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abrahms M (2004) Are terrorists really rational? The Palestinian example. Orbis 48(3):533–549CrossRef Abrahms M (2004) Are terrorists really rational? The Palestinian example. Orbis 48(3):533–549CrossRef
go back to reference Barnett A, Lofaso AJ (1986) On the optimal allocation of prison space. TIMS Stud Manage Sci 22:245–268 Barnett A, Lofaso AJ (1986) On the optimal allocation of prison space. TIMS Stud Manage Sci 22:245–268
go back to reference Blumstein A, Larson RC (1971) Problems in modeling and measuring recidivism. J Res Crime Delinq 8(2):124–132CrossRef Blumstein A, Larson RC (1971) Problems in modeling and measuring recidivism. J Res Crime Delinq 8(2):124–132CrossRef
go back to reference Bonczar TP, Snell TL (2003) Capital Punishment, 2002. Bureau of Justice Statistics Bulletin, United States Department of Justice, Office of Justice Programs, NCJ 201848 Bonczar TP, Snell TL (2003) Capital Punishment, 2002. Bureau of Justice Statistics Bulletin, United States Department of Justice, Office of Justice Programs, NCJ 201848
go back to reference Carr-Hill RA, Payne CD (1971) Crime: accident or disease: an exploration using probability models for the generation of macro-criminological data. J Res Crime Delinq 8(2):133–155CrossRef Carr-Hill RA, Payne CD (1971) Crime: accident or disease: an exploration using probability models for the generation of macro-criminological data. J Res Crime Delinq 8(2):133–155CrossRef
go back to reference Chauncey R (1975) Deterrence certainty, severity, and skyjacking. Criminology 12(4):447–473CrossRef Chauncey R (1975) Deterrence certainty, severity, and skyjacking. Criminology 12(4):447–473CrossRef
go back to reference Cooper HHA (1977) What is a terrorist: a psychological perspective. Leg Med Q 1(1):16–32 Cooper HHA (1977) What is a terrorist: a psychological perspective. Leg Med Q 1(1):16–32
go back to reference Enders W, Sandler T (2002) Patterns of transnational terrorism, 1970–1999: alternative time-series estimates. Int Stud Q 46:145–165CrossRef Enders W, Sandler T (2002) Patterns of transnational terrorism, 1970–1999: alternative time-series estimates. Int Stud Q 46:145–165CrossRef
go back to reference Evans AE (1973) Aircraft hijacking: what is being done. Am J Int Law 67:641–671CrossRef Evans AE (1973) Aircraft hijacking: what is being done. Am J Int Law 67:641–671CrossRef
go back to reference Gibeaut J (2002) Prosecuting Moussaoui. ABA Journal, July, pp 36–43 Gibeaut J (2002) Prosecuting Moussaoui. ABA Journal, July, pp 36–43
go back to reference Hayes SF (2003) Osama’s best friend: the further connections between al Qaeda and Saddam. Wkly Stand 9(8):12–14 Hayes SF (2003) Osama’s best friend: the further connections between al Qaeda and Saddam. Wkly Stand 9(8):12–14
go back to reference Huth PK (1998) Major power intervention in international crises, 1918–1988. J Confl Resolut 42(6):744–770CrossRef Huth PK (1998) Major power intervention in international crises, 1918–1988. J Confl Resolut 42(6):744–770CrossRef
go back to reference Kahneman D, Tversky A (1979) Prospect theory: an analysis of decision under risk. Econometrica 47(2):263–292CrossRef Kahneman D, Tversky A (1979) Prospect theory: an analysis of decision under risk. Econometrica 47(2):263–292CrossRef
go back to reference Langer EJ (1975) The illusion of control. J Pers Soc Psychol 32(2):311–328CrossRef Langer EJ (1975) The illusion of control. J Pers Soc Psychol 32(2):311–328CrossRef
go back to reference Mead KM (2001) Deployment and Use of Security Technology. Before the Committee on Transportation and Infrastructure Subcommittee on Aviation United States House of Representatives, U.S. Department of Transportation, CC-2002-007 Mead KM (2001) Deployment and Use of Security Technology. Before the Committee on Transportation and Infrastructure Subcommittee on Aviation United States House of Representatives, U.S. Department of Transportation, CC-2002-007
go back to reference Mead KM (2002) Challenges facing TSA in implementing the aviation and transportation security act. Before the Committee on Transportation and Infrastructure Subcommittee on Aviation United states House of Representatives, U.S. Department of Transportation, CC-2002-008 Mead KM (2002) Challenges facing TSA in implementing the aviation and transportation security act. Before the Committee on Transportation and Infrastructure Subcommittee on Aviation United states House of Representatives, U.S. Department of Transportation, CC-2002-008
go back to reference Newman GR, Clarke RV (2008) Policing terrorism: an executive’s guide. National Criminal Justice Reference Service Newman GR, Clarke RV (2008) Policing terrorism: an executive’s guide. National Criminal Justice Reference Service
go back to reference Overland MA (1988) New approach to mideast terrorism. Congr Q Editor Res Rep 2(8):430–437 Overland MA (1988) New approach to mideast terrorism. Congr Q Editor Res Rep 2(8):430–437
go back to reference Pacheco LJ (2004) Designing for effective deterrence: a Markovian approach to modeling and analyzing terrorist behavior within the aviation security environment. Ph.D. Thesis, Industrial Engineering Department, Texas Tech University, Lubbock, TX Pacheco LJ (2004) Designing for effective deterrence: a Markovian approach to modeling and analyzing terrorist behavior within the aviation security environment. Ph.D. Thesis, Industrial Engineering Department, Texas Tech University, Lubbock, TX
go back to reference Ravindran A, Phillips DT, Solberg JJ (1987) Operations research principles and practice. Wiley, New York Ravindran A, Phillips DT, Solberg JJ (1987) Operations research principles and practice. Wiley, New York
go back to reference Rousseau DL (2002) Motivations for choice the salience of relative gains in international politics. J Confl Resolut 46(3):394–426CrossRef Rousseau DL (2002) Motivations for choice the salience of relative gains in international politics. J Confl Resolut 46(3):394–426CrossRef
go back to reference Rumsfeld DH (2003) Annual report to the President and to the Congress. U.S. Department of Defense Rumsfeld DH (2003) Annual report to the President and to the Congress. U.S. Department of Defense
go back to reference Russell CA, Miller BH (1977) Profile of a terrorist. Mil Rev 58:21–34 Russell CA, Miller BH (1977) Profile of a terrorist. Mil Rev 58:21–34
go back to reference Stander J, Farrington DP, Hill G, Altham PME (1989) Markov chain analysis and specialization in criminal careers. Br J Criminol 29(4):317–335 Stander J, Farrington DP, Hill G, Altham PME (1989) Markov chain analysis and specialization in criminal careers. Br J Criminol 29(4):317–335
go back to reference Tsurumi M, Tanino T, Inuiguchi M (2001) A shapley function on a class of cooperative fuzzy games. Eur J Oper Res 129:596–618CrossRef Tsurumi M, Tanino T, Inuiguchi M (2001) A shapley function on a class of cooperative fuzzy games. Eur J Oper Res 129:596–618CrossRef
go back to reference U.S. Department of Defense. Selected Manpower Statistics, Fiscal Year 1997, Washington Headquarters Services, Directorate for Information Operations and Reports, Washington, DC: Government Printing Office, DIOR/MO1-97 U.S. Department of Defense. Selected Manpower Statistics, Fiscal Year 1997, Washington Headquarters Services, Directorate for Information Operations and Reports, Washington, DC: Government Printing Office, DIOR/MO1-97
go back to reference U.S. Department of Defense. Selected Manpower Statistics, Fiscal Year 2002, Washington Headquarters Services, Directorate for Information Operations and Reports. Washington, DC: Government Printing Office, DIOR/MO1-02 U.S. Department of Defense. Selected Manpower Statistics, Fiscal Year 2002, Washington Headquarters Services, Directorate for Information Operations and Reports. Washington, DC: Government Printing Office, DIOR/MO1-02
go back to reference U.S. Department of Justice, Federal Bureau of Investigation (1999) Terrorism in the United States 1999. GPO, Washington, pp 1–68 U.S. Department of Justice, Federal Bureau of Investigation (1999) Terrorism in the United States 1999. GPO, Washington, pp 1–68
go back to reference U.S. Department of Transportation (2002) Bureau of Transportation Statistics pocket guide to transportation. GPO, Washington, pp 1–38 U.S. Department of Transportation (2002) Bureau of Transportation Statistics pocket guide to transportation. GPO, Washington, pp 1–38
go back to reference Virta JE, Jacobson SH, Kobza JE (2003) Analyzing the cost of screening selectee and non-selectee baggage. Risk Anal 23(5):897–908CrossRef Virta JE, Jacobson SH, Kobza JE (2003) Analyzing the cost of screening selectee and non-selectee baggage. Risk Anal 23(5):897–908CrossRef
go back to reference Wagner RH (1982) Deterrence and bargaining. J Confl Resolut 26(2):329–358CrossRef Wagner RH (1982) Deterrence and bargaining. J Confl Resolut 26(2):329–358CrossRef
go back to reference Willmer MAP (1971) On the estimation of the number of persons entering and leaving crime annually. J Res Crime Delinq 8(2):175–181CrossRef Willmer MAP (1971) On the estimation of the number of persons entering and leaving crime annually. J Res Crime Delinq 8(2):175–181CrossRef
go back to reference Woo G (2003) Evolution of terrorism risk modelling. J Reinsur 10(3):1–9 Woo G (2003) Evolution of terrorism risk modelling. J Reinsur 10(3):1–9
go back to reference Xue L (2002) Stable agreements in infinitely repeated games. Math Soc Sci 43:165–176CrossRef Xue L (2002) Stable agreements in infinitely repeated games. Math Soc Sci 43:165–176CrossRef
Metadata
Title
A Markov model of terrorist behavior within the aviation security environment
Authors
Leticia J. Pacheco
John E. Kobza
Sheldon H. Jacobson
Rajat Gupta
Publication date
01-06-2011
Publisher
Springer US
Published in
Journal of Transportation Security / Issue 2/2011
Print ISSN: 1938-7741
Electronic ISSN: 1938-775X
DOI
https://doi.org/10.1007/s12198-011-0061-8

Other articles of this Issue 2/2011

Journal of Transportation Security 2/2011 Go to the issue