SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
A special colloquium on
homeland security and ISyE
“Developing Usable Metrics for Venue Security”
Dr. Paul Kantor
Honorary Associate, Industrial and Systems Engineering, University of Wisconsin-Madison
Distinguished Professor Emeritus, Rutgers University School of Communication and Information
Research Director at the Command, Control, and Interoperability Center for Advanced Data
Analysis (CCICADA) at Rutgers
“Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001”
Dr. Laura Albert McLay
Associate Professor, Industrial and Systems Engineering, University of Wisconsin-Madison
Screening Commercial Aviation Passengers in
the Aftermath of September 11, 2001
Laura Albert McLay, PhD
Associate Professor
University of Wisconsin-Madison
Industrial and Systems Engineering
laura@engr.wisc.edu
@lauramclay
http://punkrockOR.wordpress.com/
Collaborators: Sheldon Jacobson, Alex Nikolaev, Adrian Lee, John Kobza
Jacobson’s research on aviation security has been supported
in part by the US National Science Foundation (CMMI-0900226)
Executive summary
Better security is achieved by targeting scarce screening resources at
the “riskiest” passengers and doing less screening on most passengers.
Underscreening / Overscreening occur given the uncertainty
associated with risk assessment and limited security resources
available.
Right Screening is ideal, but challenging to attain for all passengers.
TSA Precheck implicitly focuses on underscreening, which is why it
makes the air system safer, in low risk, cost-constrained environments.
Passenger screening:
Past, present, and future
One hijacking
encourages
copycats:
Hijackings are
contagious
Metal detectors and
X-ray machines go in
place
A brief history of passenger screening
• Dawn of time until 1970
• Not much!
• 1970
• Surveillance equipment, air marshals
• Feb 1972
• Armed guards to make people feel safe
• FAA adopted emergency rules to screen passengers
by at least one method including behavioral profile,
metal detector, and ID check
• Dec. 1972
• Metal detector / magnometer
• 1996
• Checked baggage for high-risk passengers screened
for explosives (run by airlines) – CAPPS
• Positive passenger baggage matching rejected
• Sept. 2001
• Times are a changin’
Security is a moving target
Changes in passenger and baggage screening
• November 2001 – Aviation
Transportation and Security Act
• Created the TSA
• Required all checked baggage to be
screened for explosives, Dec. 2002
deadline
• Driven by availably technology
• December 2001
• Remove shoes
• 2002 +
• CAPPS II, Secure Flight, etc. for risk-
based screening
Security is a moving target
Changes in passenger and baggage screening
• August 2006
• No more liquids after liquid
explosives used in a bomb attempt
• February 2010
• Random use of explosive trace
detection for carry on baggage in
response to Christmas bombing
attempt
• September 2012
• Less screening for seniors (75+) and
children (<12)
• December 2013
• TSA Precheck for reduced security
Why are homeland security problems good
ISyE problems?
• Limited resources
• Passenger risk assessments
• Tradeoffs among criteria (efficiency, security, cost)
• Note: TSA has a goal of <10 minutes waiting for screening
• System and goals are always changing
We will always have security challenges, and ISyE tools will
always help us address some of these challenges.
Security often improved through deterrent effect, not
detection.
Framework
• Passengers/bags screened by series of devices grouped in
classes
• System response a function of device responses
• Passengers check-in sequentially
• Passengers assigned to one of M classes upon check-in
Screening Assessments
Passenger risk assessments have been used since 1996.
What is known: As risk increases, likelihood of a security threat
outcome increases.
Most passengers are low-risk.
Risk-based security: Captured in the Dynamic Aviation Risk
Management System (DARMS) paradigm.
11
Retrospective Security & Resource Allocation
Know everyone’s risk before they enter security screening; allocate
security resources to match risk.
Assumptions:
Security resources are limited.
Screening procedures make errors
* False alarms, False clears.
Security resources allocated to a passenger match the retrospective
security resource allocation.
Multilevel Passenger Screening Problem (MPSP)* uses integer programming to
maximize the security of the system, subject to
1) security resource constraints / limitations,
2) performance limitations of these resources,
3) security devices / procedures may be assigned to multiple security classes.
* McLay, L.A., Jacobson, S.H., Kobza, J.E., 2006
Screening Procedure Reality
Screening decisions must be made in real-time.
* Control Theory models1
* Markov Decision Processes2
Based on the Sequential Stochastic Assignment Problem (SSAP).
1 Lee, A.J., McLay, L.A., Jacobson, S.H., 2009
2 McLay, L.A., Jacobson, S.H., Nikolaev, A.G., 2009
Each passenger has a risk profile
* Used to determine the security resources allocated to their
screening.
Three possible scenarios:
Right Screening
Under Screening
Over Screening
Real-time simulation of optimal
policy
Time
Passenger
risk
Conditional distribution of passenger risk assessment
values
Passenger risk
Over / Under Screening
Security resources allocated to a passenger do not match the
retrospective security resource allocation
Under  too few resources are allocated to that passenger
Over  too many resources are allocated to that passenger
Consequences: security resources not utilized correctly.
Will the system be more vulnerable?
Over/under-estimating risk
Overestimating risk*: True risk level () < estimated risk level (’).
Understimating risk: True risk level () > estimated risk level (’).
* The tendency is to overestimate risk 16
Discussion
17
When risk is overestimated, high value security resources get
used on low risk passengers, which may leave fewer high value
security resources available for high risk passengers.
When risk is underestimated, high value security resources get
used on high risk passengers, which targets more closely the
high value security resources for high risk passengers
Resource matching
Sensitivity analysis with respect to perceived risk in the system
Overestimate risk
True risk level <
estimated risk level.
Underestimate risk
True risk level >
estimated risk level.
Estimated risk level 𝜇′
Key Observations
In low risk environments, overestimating risk leads to a greater
mismatch between security resources and passenger risk.
In low risk environments, underestimating risk leads to lower levels
of underscreening and (for M small) lower levels of overscreening,
compared to overestimating risk.
* Better resource matching
* TSA PreCheck
* Giving TSA Officers the (limited) flexibility to assign
passengers to PreCheck lanes is an indirect way to mimic
underestimating risk
19
Gaming Strategies
Blocking
Overtaxing / decoys
Timing
Trial and Testing
All can disrupt the system in limited resource environments
20
Bad intentions
We are trying to prevent attacks
Is the goal to identify non-threat passengers with banned
items or threat passengers with bad intentions (and no
banned items)?
Risk based security focuses on the latter
21
Security systems
http://www.tsa.gov/about-tsa/layers-security
Thank you!
Laura Albert McLay, PhD
Associate Professor
University of Wisconsin-Madison
Industrial and Systems Engineering
laura@engr.wisc.edu
@lauramclay
http://punkrockOR.wordpress.com/
Blog posts:
• Aviation security, there and back
again
• Aviation security: is more really
more?
23
24
References
Jacobson, S.H., McLay, L.A., Kobza, J.E., Bowman, J.M., 2005, “Modeling and Analyzing Multiple
Station Baggage Screening Security System Performance," Naval Research Logistics, 52(1), 30-
45.
Jacobson, S.H., McLay, L.A., Virta, J.L., Kobza, J.E., 2005, “Integer Program Models for the
Deployment of Airport Baggage Screening Security Devices," Optimization and Engineering,
6(3), 339-359.
McLay, L.A., Jacobson, S.H., Kobza, J.E., 2006, “A Multilevel Passenger Screening Problem for
Aviation Security,” Naval Research Logistics, 53(3), 183-197.
McLay, L.A., Jacobson, S.H., Kobza, J.E., 2007, “Integer Programming Models and Analysis for a
Multilevel Passenger Screening Problem, “IIE Transactions, 39(1), 73-81.
Nikolaev, A.G., Jacobson, S.H., McLay, L.A., 2007, “A Sequential Stochastic Security System
Design Problem for Aviation Security,” Transportation Science, 41(2), 182-194.
McLay, L.A., Jacobson, S.H., Kobza, J.E., 2008, “The Tradeoff between Technology and
Prescreening Intelligence in Checked Baggage Screening for Aviation Security,” Journal of
Transportation Security, 1(2), 107-126.
McLay, L.A., Jacobson, S.H., Nikolaev, A.G., 2009, “A Sequential Stochastic Passenger Screening
Problem for Aviation Security,” IIE Transactions, 41(6), 575-591 (2009 Outstanding IIE
Publication Award).
Lee, A.J., McLay, L.A., Jacobson, S.H., 2009, “Designing Aviation Security Passenger Screening
Systems using Nonlinear Control,” SIAM Journal on Control and Optimization, 48(4), 2085-
2105.
McLay, L.A., Lee, A.J., Jacobson, S.H., 2010, “Risk-Based Policies for Aviation Security Checkpoint
Screening,” Transportation Science, 44(3), 333-349.

Weitere ähnliche Inhalte

Andere mochten auch

Ctf online idsecconf2012 walkthrough
Ctf online idsecconf2012 walkthroughCtf online idsecconf2012 walkthrough
Ctf online idsecconf2012 walkthroughidsecconf
 
engineering systems: critical infrastructure and logistics
engineering systems: critical infrastructure and logisticsengineering systems: critical infrastructure and logistics
engineering systems: critical infrastructure and logisticsLaura Albert
 
Usable security it isn't secure if people can't use it mwux 2 jun2012
Usable security   it isn't secure if people can't use it mwux 2 jun2012Usable security   it isn't secure if people can't use it mwux 2 jun2012
Usable security it isn't secure if people can't use it mwux 2 jun2012Darren Kall
 
(Un)usable Security
(Un)usable Security(Un)usable Security
(Un)usable SecurityStefan
 
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...Laura Albert
 
So you're thinking about graduate school in operations research, math, or eng...
So you're thinking about graduate school in operations research, math, or eng...So you're thinking about graduate school in operations research, math, or eng...
So you're thinking about graduate school in operations research, math, or eng...Laura Albert
 
Delivering emergency medical services: research, application, and outreach
Delivering emergency medical services: research, application, and outreachDelivering emergency medical services: research, application, and outreach
Delivering emergency medical services: research, application, and outreachLaura Albert
 
Bracketology talk at the Crossroads of ideas
Bracketology talk at the Crossroads of ideasBracketology talk at the Crossroads of ideas
Bracketology talk at the Crossroads of ideasLaura Albert
 

Andere mochten auch (9)

Ctf online idsecconf2012 walkthrough
Ctf online idsecconf2012 walkthroughCtf online idsecconf2012 walkthrough
Ctf online idsecconf2012 walkthrough
 
engineering systems: critical infrastructure and logistics
engineering systems: critical infrastructure and logisticsengineering systems: critical infrastructure and logistics
engineering systems: critical infrastructure and logistics
 
Usable security it isn't secure if people can't use it mwux 2 jun2012
Usable security   it isn't secure if people can't use it mwux 2 jun2012Usable security   it isn't secure if people can't use it mwux 2 jun2012
Usable security it isn't secure if people can't use it mwux 2 jun2012
 
(Un)usable Security
(Un)usable Security(Un)usable Security
(Un)usable Security
 
Usable security
Usable securityUsable security
Usable security
 
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
 
So you're thinking about graduate school in operations research, math, or eng...
So you're thinking about graduate school in operations research, math, or eng...So you're thinking about graduate school in operations research, math, or eng...
So you're thinking about graduate school in operations research, math, or eng...
 
Delivering emergency medical services: research, application, and outreach
Delivering emergency medical services: research, application, and outreachDelivering emergency medical services: research, application, and outreach
Delivering emergency medical services: research, application, and outreach
 
Bracketology talk at the Crossroads of ideas
Bracketology talk at the Crossroads of ideasBracketology talk at the Crossroads of ideas
Bracketology talk at the Crossroads of ideas
 

Ähnlich wie Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001

Linking Safety Culture & Safety Performance In Marine Transportation
Linking Safety Culture & Safety Performance In Marine TransportationLinking Safety Culture & Safety Performance In Marine Transportation
Linking Safety Culture & Safety Performance In Marine TransportationStephanie Camay
 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanMichael Roytman
 
NASA Safety Case Approach for Automated Flight Authorization System
NASA Safety Case Approach for Automated Flight Authorization SystemNASA Safety Case Approach for Automated Flight Authorization System
NASA Safety Case Approach for Automated Flight Authorization SystemDr. Pankaj Dhussa
 
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...Rihab Rahman
 
Chicago Security Meetup 08/2016
Chicago Security Meetup 08/2016Chicago Security Meetup 08/2016
Chicago Security Meetup 08/2016Michael Roytman
 
Don t go_that_way__risk_aware_decision_making_for_autonomous_vehicles
Don t go_that_way__risk_aware_decision_making_for_autonomous_vehiclesDon t go_that_way__risk_aware_decision_making_for_autonomous_vehicles
Don t go_that_way__risk_aware_decision_making_for_autonomous_vehiclesKasra Mokhtari
 
ISSA Journal September 2008Article Title Article Author.docx
ISSA Journal  September 2008Article Title  Article Author.docxISSA Journal  September 2008Article Title  Article Author.docx
ISSA Journal September 2008Article Title Article Author.docxbagotjesusa
 
Published irisrecognitionpaper
Published irisrecognitionpaperPublished irisrecognitionpaper
Published irisrecognitionpaperDr-mahmoud Algamel
 
Published irisrecognitionpaper
Published irisrecognitionpaperPublished irisrecognitionpaper
Published irisrecognitionpaperDr-mahmoud Algamel
 
Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
Lightweight Cybersecurity Risk Assessment Tools for CyberinfrastructureLightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructurejbasney
 
Product assurance
Product assurance Product assurance
Product assurance PriyankaKg4
 
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...IJCSES Journal
 
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...Bikram Kumar Sinha
 
Dezfuli.homayoon
Dezfuli.homayoonDezfuli.homayoon
Dezfuli.homayoonNASAPMC
 
Access control
Access controlAccess control
Access controlarj_presenter
 
Ethics IV.pptx
Ethics IV.pptxEthics IV.pptx
Ethics IV.pptxdharma raja`
 
Achimowicz pociagdogwiazd
Achimowicz pociagdogwiazdAchimowicz pociagdogwiazd
Achimowicz pociagdogwiazdJerzy Achimowicz
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Kinetic Potential
 
Annotated bib
Annotated bibAnnotated bib
Annotated bibbekahpars
 

Ähnlich wie Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001 (20)

Linking Safety Culture & Safety Performance In Marine Transportation
Linking Safety Culture & Safety Performance In Marine TransportationLinking Safety Culture & Safety Performance In Marine Transportation
Linking Safety Culture & Safety Performance In Marine Transportation
 
Academy
Academy Academy
Academy
 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
 
NASA Safety Case Approach for Automated Flight Authorization System
NASA Safety Case Approach for Automated Flight Authorization SystemNASA Safety Case Approach for Automated Flight Authorization System
NASA Safety Case Approach for Automated Flight Authorization System
 
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
 
Chicago Security Meetup 08/2016
Chicago Security Meetup 08/2016Chicago Security Meetup 08/2016
Chicago Security Meetup 08/2016
 
Don t go_that_way__risk_aware_decision_making_for_autonomous_vehicles
Don t go_that_way__risk_aware_decision_making_for_autonomous_vehiclesDon t go_that_way__risk_aware_decision_making_for_autonomous_vehicles
Don t go_that_way__risk_aware_decision_making_for_autonomous_vehicles
 
ISSA Journal September 2008Article Title Article Author.docx
ISSA Journal  September 2008Article Title  Article Author.docxISSA Journal  September 2008Article Title  Article Author.docx
ISSA Journal September 2008Article Title Article Author.docx
 
Published irisrecognitionpaper
Published irisrecognitionpaperPublished irisrecognitionpaper
Published irisrecognitionpaper
 
Published irisrecognitionpaper
Published irisrecognitionpaperPublished irisrecognitionpaper
Published irisrecognitionpaper
 
Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
Lightweight Cybersecurity Risk Assessment Tools for CyberinfrastructureLightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
 
Product assurance
Product assurance Product assurance
Product assurance
 
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
 
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...
 
Dezfuli.homayoon
Dezfuli.homayoonDezfuli.homayoon
Dezfuli.homayoon
 
Access control
Access controlAccess control
Access control
 
Ethics IV.pptx
Ethics IV.pptxEthics IV.pptx
Ethics IV.pptx
 
Achimowicz pociagdogwiazd
Achimowicz pociagdogwiazdAchimowicz pociagdogwiazd
Achimowicz pociagdogwiazd
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
Annotated bib
Annotated bibAnnotated bib
Annotated bib
 

Mehr von Laura Albert

Optimization with impact: my journey in public sector operations research
Optimization with impact: my journey in public sector operations research Optimization with impact: my journey in public sector operations research
Optimization with impact: my journey in public sector operations research Laura Albert
 
Should a football team go for a one or two point conversion? A dynamic progra...
Should a football team go for a one or two point conversion? A dynamic progra...Should a football team go for a one or two point conversion? A dynamic progra...
Should a football team go for a one or two point conversion? A dynamic progra...Laura Albert
 
On designing public sector systems in emergency medical services, disaster re...
On designing public sector systems in emergency medical services, disaster re...On designing public sector systems in emergency medical services, disaster re...
On designing public sector systems in emergency medical services, disaster re...Laura Albert
 
Volleyball analytics: Modeling volleyball using Markov chains
Volleyball analytics: Modeling volleyball using Markov chainsVolleyball analytics: Modeling volleyball using Markov chains
Volleyball analytics: Modeling volleyball using Markov chainsLaura Albert
 
2018 INFORMS Government & Analytics Summit Overview
2018 INFORMS Government & Analytics Summit Overview2018 INFORMS Government & Analytics Summit Overview
2018 INFORMS Government & Analytics Summit OverviewLaura Albert
 
Designing emergency medical service systems to enhance community resilience
Designing emergency medical service systems to enhance community resilience Designing emergency medical service systems to enhance community resilience
Designing emergency medical service systems to enhance community resilience Laura Albert
 
Modeling Service networks
Modeling Service networksModeling Service networks
Modeling Service networksLaura Albert
 
Translating Engineering and Operations Analyses into Effective Homeland Secur...
Translating Engineering and Operations Analyses into Effective Homeland Secur...Translating Engineering and Operations Analyses into Effective Homeland Secur...
Translating Engineering and Operations Analyses into Effective Homeland Secur...Laura Albert
 
Delivering emergency medical services:Research, theory, and application
Delivering emergency medical services:Research, theory, and applicationDelivering emergency medical services:Research, theory, and application
Delivering emergency medical services:Research, theory, and applicationLaura Albert
 
Advanced analytics for supporting public policy, bracketology, and beyond!
Advanced analytics for supporting public policy, bracketology, and beyond!Advanced analytics for supporting public policy, bracketology, and beyond!
Advanced analytics for supporting public policy, bracketology, and beyond!Laura Albert
 
Technical writing tips
Technical writing tipsTechnical writing tips
Technical writing tipsLaura Albert
 

Mehr von Laura Albert (11)

Optimization with impact: my journey in public sector operations research
Optimization with impact: my journey in public sector operations research Optimization with impact: my journey in public sector operations research
Optimization with impact: my journey in public sector operations research
 
Should a football team go for a one or two point conversion? A dynamic progra...
Should a football team go for a one or two point conversion? A dynamic progra...Should a football team go for a one or two point conversion? A dynamic progra...
Should a football team go for a one or two point conversion? A dynamic progra...
 
On designing public sector systems in emergency medical services, disaster re...
On designing public sector systems in emergency medical services, disaster re...On designing public sector systems in emergency medical services, disaster re...
On designing public sector systems in emergency medical services, disaster re...
 
Volleyball analytics: Modeling volleyball using Markov chains
Volleyball analytics: Modeling volleyball using Markov chainsVolleyball analytics: Modeling volleyball using Markov chains
Volleyball analytics: Modeling volleyball using Markov chains
 
2018 INFORMS Government & Analytics Summit Overview
2018 INFORMS Government & Analytics Summit Overview2018 INFORMS Government & Analytics Summit Overview
2018 INFORMS Government & Analytics Summit Overview
 
Designing emergency medical service systems to enhance community resilience
Designing emergency medical service systems to enhance community resilience Designing emergency medical service systems to enhance community resilience
Designing emergency medical service systems to enhance community resilience
 
Modeling Service networks
Modeling Service networksModeling Service networks
Modeling Service networks
 
Translating Engineering and Operations Analyses into Effective Homeland Secur...
Translating Engineering and Operations Analyses into Effective Homeland Secur...Translating Engineering and Operations Analyses into Effective Homeland Secur...
Translating Engineering and Operations Analyses into Effective Homeland Secur...
 
Delivering emergency medical services:Research, theory, and application
Delivering emergency medical services:Research, theory, and applicationDelivering emergency medical services:Research, theory, and application
Delivering emergency medical services:Research, theory, and application
 
Advanced analytics for supporting public policy, bracketology, and beyond!
Advanced analytics for supporting public policy, bracketology, and beyond!Advanced analytics for supporting public policy, bracketology, and beyond!
Advanced analytics for supporting public policy, bracketology, and beyond!
 
Technical writing tips
Technical writing tipsTechnical writing tips
Technical writing tips
 

KĂźrzlich hochgeladen

Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingNetHelix
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPirithiRaju
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensorsonawaneprad
 
User Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationUser Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationColumbia Weather Systems
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxNandakishor Bhaurao Deshmukh
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Pests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPirithiRaju
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPirithiRaju
 
User Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationUser Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationColumbia Weather Systems
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxpriyankatabhane
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxMurugaveni B
 
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)riyaescorts54
 
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In DubaiDubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubaikojalkojal131
 
Volatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -IVolatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -INandakishor Bhaurao Deshmukh
 
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...Universidade Federal de Sergipe - UFS
 
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...Universidade Federal de Sergipe - UFS
 
Four Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.pptFour Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.pptJoemSTuliba
 

KĂźrzlich hochgeladen (20)

Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort ServiceHot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensor
 
User Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationUser Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather Station
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Pests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdf
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
 
User Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationUser Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather Station
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
 
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
 
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In DubaiDubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
 
Volatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -IVolatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -I
 
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
 
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
 
Four Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.pptFour Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.ppt
 

Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001

  • 1. A special colloquium on homeland security and ISyE “Developing Usable Metrics for Venue Security” Dr. Paul Kantor Honorary Associate, Industrial and Systems Engineering, University of Wisconsin-Madison Distinguished Professor Emeritus, Rutgers University School of Communication and Information Research Director at the Command, Control, and Interoperability Center for Advanced Data Analysis (CCICADA) at Rutgers “Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001” Dr. Laura Albert McLay Associate Professor, Industrial and Systems Engineering, University of Wisconsin-Madison
  • 2. Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001 Laura Albert McLay, PhD Associate Professor University of Wisconsin-Madison Industrial and Systems Engineering laura@engr.wisc.edu @lauramclay http://punkrockOR.wordpress.com/ Collaborators: Sheldon Jacobson, Alex Nikolaev, Adrian Lee, John Kobza Jacobson’s research on aviation security has been supported in part by the US National Science Foundation (CMMI-0900226)
  • 3. Executive summary Better security is achieved by targeting scarce screening resources at the “riskiest” passengers and doing less screening on most passengers. Underscreening / Overscreening occur given the uncertainty associated with risk assessment and limited security resources available. Right Screening is ideal, but challenging to attain for all passengers. TSA Precheck implicitly focuses on underscreening, which is why it makes the air system safer, in low risk, cost-constrained environments.
  • 6. A brief history of passenger screening • Dawn of time until 1970 • Not much! • 1970 • Surveillance equipment, air marshals • Feb 1972 • Armed guards to make people feel safe • FAA adopted emergency rules to screen passengers by at least one method including behavioral profile, metal detector, and ID check • Dec. 1972 • Metal detector / magnometer • 1996 • Checked baggage for high-risk passengers screened for explosives (run by airlines) – CAPPS • Positive passenger baggage matching rejected • Sept. 2001 • Times are a changin’
  • 7. Security is a moving target Changes in passenger and baggage screening • November 2001 – Aviation Transportation and Security Act • Created the TSA • Required all checked baggage to be screened for explosives, Dec. 2002 deadline • Driven by availably technology • December 2001 • Remove shoes • 2002 + • CAPPS II, Secure Flight, etc. for risk- based screening
  • 8. Security is a moving target Changes in passenger and baggage screening • August 2006 • No more liquids after liquid explosives used in a bomb attempt • February 2010 • Random use of explosive trace detection for carry on baggage in response to Christmas bombing attempt • September 2012 • Less screening for seniors (75+) and children (<12) • December 2013 • TSA Precheck for reduced security
  • 9. Why are homeland security problems good ISyE problems? • Limited resources • Passenger risk assessments • Tradeoffs among criteria (efficiency, security, cost) • Note: TSA has a goal of <10 minutes waiting for screening • System and goals are always changing We will always have security challenges, and ISyE tools will always help us address some of these challenges. Security often improved through deterrent effect, not detection.
  • 10. Framework • Passengers/bags screened by series of devices grouped in classes • System response a function of device responses • Passengers check-in sequentially • Passengers assigned to one of M classes upon check-in
  • 11. Screening Assessments Passenger risk assessments have been used since 1996. What is known: As risk increases, likelihood of a security threat outcome increases. Most passengers are low-risk. Risk-based security: Captured in the Dynamic Aviation Risk Management System (DARMS) paradigm. 11
  • 12. Retrospective Security & Resource Allocation Know everyone’s risk before they enter security screening; allocate security resources to match risk. Assumptions: Security resources are limited. Screening procedures make errors * False alarms, False clears. Security resources allocated to a passenger match the retrospective security resource allocation. Multilevel Passenger Screening Problem (MPSP)* uses integer programming to maximize the security of the system, subject to 1) security resource constraints / limitations, 2) performance limitations of these resources, 3) security devices / procedures may be assigned to multiple security classes. * McLay, L.A., Jacobson, S.H., Kobza, J.E., 2006
  • 13. Screening Procedure Reality Screening decisions must be made in real-time. * Control Theory models1 * Markov Decision Processes2 Based on the Sequential Stochastic Assignment Problem (SSAP). 1 Lee, A.J., McLay, L.A., Jacobson, S.H., 2009 2 McLay, L.A., Jacobson, S.H., Nikolaev, A.G., 2009 Each passenger has a risk profile * Used to determine the security resources allocated to their screening. Three possible scenarios: Right Screening Under Screening Over Screening
  • 14. Real-time simulation of optimal policy Time Passenger risk
  • 15. Conditional distribution of passenger risk assessment values Passenger risk
  • 16. Over / Under Screening Security resources allocated to a passenger do not match the retrospective security resource allocation Under  too few resources are allocated to that passenger Over  too many resources are allocated to that passenger Consequences: security resources not utilized correctly. Will the system be more vulnerable? Over/under-estimating risk Overestimating risk*: True risk level () < estimated risk level (’). Understimating risk: True risk level () > estimated risk level (’). * The tendency is to overestimate risk 16
  • 17. Discussion 17 When risk is overestimated, high value security resources get used on low risk passengers, which may leave fewer high value security resources available for high risk passengers. When risk is underestimated, high value security resources get used on high risk passengers, which targets more closely the high value security resources for high risk passengers
  • 18. Resource matching Sensitivity analysis with respect to perceived risk in the system Overestimate risk True risk level < estimated risk level. Underestimate risk True risk level > estimated risk level. Estimated risk level 𝜇′
  • 19. Key Observations In low risk environments, overestimating risk leads to a greater mismatch between security resources and passenger risk. In low risk environments, underestimating risk leads to lower levels of underscreening and (for M small) lower levels of overscreening, compared to overestimating risk. * Better resource matching * TSA PreCheck * Giving TSA Officers the (limited) flexibility to assign passengers to PreCheck lanes is an indirect way to mimic underestimating risk 19
  • 20. Gaming Strategies Blocking Overtaxing / decoys Timing Trial and Testing All can disrupt the system in limited resource environments 20
  • 21. Bad intentions We are trying to prevent attacks Is the goal to identify non-threat passengers with banned items or threat passengers with bad intentions (and no banned items)? Risk based security focuses on the latter 21
  • 23. Thank you! Laura Albert McLay, PhD Associate Professor University of Wisconsin-Madison Industrial and Systems Engineering laura@engr.wisc.edu @lauramclay http://punkrockOR.wordpress.com/ Blog posts: • Aviation security, there and back again • Aviation security: is more really more? 23
  • 24. 24 References Jacobson, S.H., McLay, L.A., Kobza, J.E., Bowman, J.M., 2005, “Modeling and Analyzing Multiple Station Baggage Screening Security System Performance," Naval Research Logistics, 52(1), 30- 45. Jacobson, S.H., McLay, L.A., Virta, J.L., Kobza, J.E., 2005, “Integer Program Models for the Deployment of Airport Baggage Screening Security Devices," Optimization and Engineering, 6(3), 339-359. McLay, L.A., Jacobson, S.H., Kobza, J.E., 2006, “A Multilevel Passenger Screening Problem for Aviation Security,” Naval Research Logistics, 53(3), 183-197. McLay, L.A., Jacobson, S.H., Kobza, J.E., 2007, “Integer Programming Models and Analysis for a Multilevel Passenger Screening Problem, “IIE Transactions, 39(1), 73-81. Nikolaev, A.G., Jacobson, S.H., McLay, L.A., 2007, “A Sequential Stochastic Security System Design Problem for Aviation Security,” Transportation Science, 41(2), 182-194. McLay, L.A., Jacobson, S.H., Kobza, J.E., 2008, “The Tradeoff between Technology and Prescreening Intelligence in Checked Baggage Screening for Aviation Security,” Journal of Transportation Security, 1(2), 107-126. McLay, L.A., Jacobson, S.H., Nikolaev, A.G., 2009, “A Sequential Stochastic Passenger Screening Problem for Aviation Security,” IIE Transactions, 41(6), 575-591 (2009 Outstanding IIE Publication Award). Lee, A.J., McLay, L.A., Jacobson, S.H., 2009, “Designing Aviation Security Passenger Screening Systems using Nonlinear Control,” SIAM Journal on Control and Optimization, 48(4), 2085- 2105. McLay, L.A., Lee, A.J., Jacobson, S.H., 2010, “Risk-Based Policies for Aviation Security Checkpoint Screening,” Transportation Science, 44(3), 333-349.