Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Multi-Game Modeling for Counter-Smuggling

Journal Article · · Reliability Engineering and System Safety
International trade provides an avenue for terrorists to smuggle illicit materials into a target country. Policymakers need models and decision support tools that are both reliable and germane to inform their responses to this. Game theoretic approaches have been used in the analysis of counterterrorism strategies, but the models involved have often been small and abstracted. To address this need, we have developed a multi-game model to account for both security-related and economic aspects of counter-smuggling interdiction efforts. Additionally, we use different games to represent different types of interactions, and these games are then coupled to each other to form an integrated model. In this paper, we demonstrate the model's capabilities on a representative system of ports (both foreign and domestic), trade routes, and commodities. We specifically investigate the impacts of changes in screening policies at domestic ports, detection device capabilities, shipping subsidies, and worldwide corruption levels. In these studies, we find that economic factors play a large role in the interdiction task and provide correspondingly important tools for deterrence.
Research Organization:
Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)
Sponsoring Organization:
USDHS Domestic Nuclear Detection Office; USDOE
Grant/Contract Number:
AC05-76RL01830
OSTI ID:
1755154
Report Number(s):
PNNL-SA--139977
Journal Information:
Reliability Engineering and System Safety, Journal Name: Reliability Engineering and System Safety Vol. 200; ISSN 0951-8320
Publisher:
ElsevierCopyright Statement
Country of Publication:
United States
Language:
English

References (40)

Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks journal November 2009
Modeling costly learning and counter-learning in a defender-attacker game with private defender information journal September 2014
Terror and Counterterror Operations: Differential Game with Cyclical Nash Solution journal April 2008
Container transportation as an interdependent security problem journal August 2010
Modeling secrecy and deception in a multiple-period attacker–defender signaling game journal June 2010
Defending against multiple different attackers journal June 2011
Balancing congestion and security in the presence of strategic applicants with private information journal July 2011
On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness journal October 2015
A strategic analysis of the war against transnational terrorism journal January 2011
Protection of simple series and parallel systems with components of different values journal March 2005
Preventive strike vs. false targets and protection in defense strategy journal August 2011
Defending against Terrorist Attacks with Limited Resources journal July 2007
Terrorist Signalling and the Value of Intelligence journal September 2007
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings journal November 2011
Subsidizing to disrupt a terrorism supply chain—a four-player game journal July 2014
Terror Support and Recruitment journal January 2005
The path solver: a nommonotone stabilization scheme for mixed complementarity problems journal January 1995
Applying the design structure matrix to system decomposition and integration problems: a review and new directions journal January 2001
The design structure system: A method for managing the design of complex systems journal January 1981
Collective Action and Transnational Terrorism journal June 2003
Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker journal July 2007
The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two-stage Game: COUNTERTERRORISM MEASURES journal August 2009
Preventing the Importation of Illicit Nuclear Materials in Shipping Containers journal October 2006
How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts: How PRA Can Mislead Terrorism Risk Analysts journal September 2010
Terrorism Risks and Cost-Benefit Analysis of Aviation Security: Terrorism Risks and Cost-Benefit Analysis of Aviation Security journal October 2012
Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker: Cost of Equity in Homeland Security Resource Allocation journal December 2012
Global terrorism: deterrence versus pre-emption journal November 2006
Hypergame Theory: A Model for Conflict, Misperception, and Deception journal August 2015
In Search of the Armington Elasticity journal March 2018
Too Much of a Good Thing?: The Proactive Response Dilemma journal October 2004
IDS Models of Airline Security journal April 2005
Suicide Bombings and Targeted Killings in (Counter-) Terror Games journal October 2007
The Scale of Terrorist Attacks as a Signal of Resources journal September 1994
Terrorism & Game Theory journal September 2003
Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile? journal June 2010
Governments' and Terrorists' Defense and Attack in a T -Period Game journal March 2011
Securing the Containerized Supply Chain: Analysis of Government Incentives for Private Investment journal February 2010
Interdicting a Nuclear-Weapons Project journal August 2009
Two-Person Zero-Sum Games for Network Interdiction journal April 1995
Stochastic Network Interdiction journal April 1998

Similar Records

Detector Requirements to Curb Nuclear Smuggling
Conference · Tue Nov 13 23:00:00 EST 2001 · OSTI ID:15002887

Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation
Conference · Tue Jun 08 00:00:00 EDT 2010 · OSTI ID:1004508

Wild atom: Nuclear terrorism
Technical Report · Wed Dec 30 23:00:00 EST 1998 · OSTI ID:362189