TECHNICAL PAPERS
Dec 1, 2005

Terrorism Scenario Identification by Superposition of Infrastructure Networks

Publication: Journal of Infrastructure Systems
Volume 11, Issue 4

Abstract

There is an emerging need for analysis of the risks of terrorism to the nation’s critical infrastructures, for which two aspects are relevant here. First, the process of risk assessment requires the identification and characterization of multiple terrorism scenarios. Second, infrastructure systems and terrorist organizations can be characterized as mathematical networks. This paper illuminates a relationship between superpositioned network models and the scenarios of risk to interdependent infrastructure systems as follows. An initial set of terrorism scenarios is identified based on interviews with domain experts. Direct, prima facie interactions of the scenarios and network components are identified across the superposition of networks. Indirect interactions of scenarios and network components are generated through modeling of various linkages across network components. Higher-order interactions correspond to multiple network components being associated with a terrorism scenario. The relationship of the terrorism scenarios with the superpositioned networks is thus studied by a combination of several interaction types (1) direct and indirect and (2) singular and higher order. Frequency analyses of the interactions among scenarios and the networks are developed to support refinement of the network models and the identified scenarios. An example with terrorism risks to oil pipeline and railway infrastructure is developed.

Get full access to this article

View all available purchase options and get full access to this article.

Acknowledgment

This paper was supported in part by the National Science Foundation Grant No: NSFSES-0322146 “Risk Based Methodological Framework for Scenario Tracking and Intelligence Collection and Analysis for Terrorism.” The writers appreciate the comments and suggestions of several anonymous reviewers and Benjamin Schulte and the editorial assistance of Grace Zisk.

References

Amin, M., ed. (2002). “Toward secure and resilient interdependent infrastructures.” J. Infrastruct. Syst., 8(3), 67–75.
Arquilla, J., and Ronfeldt, D., eds. (2001). “Networks and netwars: The future of terror, crime, and militancy.” Rand Rep. Rand Corporation, Santa Monica, Calif.
Ayyub, B. M. (2001). Elicitation of expert opinions for uncertainty and risks, CRC, Boca Raton, Fla.
Barabási., A. L. (2002). Linked: The new science of networks, Perseus, Cambridge, Mass.
Buckley, F., and Lewinter, M. (2002). A friendly introduction to graph theory, Pearson Education Inc., Old Tappan, N.J.
Dombroski, M. J., and Carley, K. M. (2002). “NETEST: Estimating a terrorist network’s structure.” Proc., CASOS Conf., Computational and Mathematical Organization Theory, 8, Carnegie Mellon Univ., Pittsburgh, Penn., 235–241.
Emerson, S. (2003). American Jihad: The terrorists living among us, Free Press, New York.
Ezell, C., Farr, J., and Wiese, I. (2000). “Infrastructure risk analysis of municipal water distribution system.” J. Infrastruct. Syst., 6(3), 118–122.
Farley, J. D. (2003). “Breaking Al Qaeda cells: A mathematical analysis of counterterrorism operations (A guide for risk assessment and decision making).” Stud. Confl. Terror., 26(6), 399–411.
Fellman, P. V., and Wright, R. (2003). “Modeling terrorist networks—Complex systems at the mid-range.” Proc., Complexity, Ethics and Creativity Conf., London School of Economics and Political Science, London, England.
Gips, M. A. (2004). “Shared intelligence makes everyone smarter.”Security Management, 48(1), 52–60.
Grohoski, D. C. (1996). “Vulnerabilities of U.S. strategic ports to acts of sabotage.” Rep. of the Naval War College, Newport, R.I.
Haimes, Y., and Jiang, P. (2001) “Leontief-based model of risk in complex interconnected infrastructures.” J. Infrastruct. Syst., 7(1), 1–12.
Haimes, Y., Matalas, N., Lambert, J., Jackson, B., and Fellows, J. (1998). “Reducing vulnerability of water supply systems to attack.” J. Infrastruct. Syst., 4(4), 164–177.
Haimes, Y. Y., Tarvainen, K., Shima, T., and Thadathil, J. (1990). Hierarchical multiobjective analysis of large-scale systems, Hemisphere, New York.
Hall, S. (1989). Handbook of systems engineering, Pergamon, New York.
Heaney, J., Peterka, J., and Wright, L. (2000). “Research needs for engineering aspects of natural disasters.” J. Infrastruct. Syst., 6(1), 4–14.
Hecker, E., Irwin, W., Cottrell, D., and Bruzewicz, A. (2000). “Strategies for improving response and recovery in the future.” Nat. Hazards Rev., 1(3), 161–170.
Horowitz, B. M., and Davis, S. (2004). “Integration of risk and link analysis techniques for the preemption of terrorist attacks.” MS thesis, Center for Risk Management of Engineering Systems and Department of Systems and Information Engineering, University of Virginia, Charlottesville, Va.
Kaplan, S., and Garrick, B. J. (1981). “On the quantitative definition of risk.” Risk Anal., 1(1), 10–27.
Koller, G. (2000). Risk modeling for determining value and decision making, Chapman and Hall and CRC, Boca Raton, Fla.
Krebs, V. E. (2002). “Mapping networks of terrorist cells.” Connections, 24(3), 43–52.
Lambert, J., Haimes, Y., Li, D., Schooff, R., and Tulsiani, V. (2001). “Identification, ranking, and management of risks in a major system acquisition.” Reliab. Eng. Syst. Saf., 72(3), 315–325.
Lambert, J., and Patterson, C. (2002). “Prioritization of schedule dependencies in hurricane recovery of transportation agency.” J. Infrastruct. Syst., 8(3), 103–111.
Lambert, J. H., Schulte, B. L., and Sarda, P., and (2005). “Tracking the complexity of interactions between risk incidents and engineering systems.” J. Syst. Eng., 8(3), 262–277.
Lesser, I. O, Hoffman, B., Arquilla, J., Ronfeldt, D., and Zanini, M. (1999). Countering the new terrorism, Rand Corporation, Santa Monica, Calif.
Marburger, A., and Westfechtel, B. (2002). “Graph-based reengineering of telecommunication systems.” Proc., Graph Transformation, 1st Int. Conf. (ICGT), Lecture Notes in Computer Science, 2505, 270–285.
Ownbey, P. J., Schaumburg, F. D., and Klingeman, P. C. (1988). “Ensuring the security of public water supplies.” J. Am. Water Works Assoc., 80(2), 30–40.
Pattison, P., and Wasserman, S. (1999). “Logit models and logistic regressions for social networks: II, Multivariate relations.” Br. J. Math. Stat. Psychol., 52(2), 169–193.
Peterson, K. (1990). Water security, The security newsletter of the water utility industry, HydroSEC, Herndon, Va.
Sarda, P. (2004). “Process control for tracking knowledge acquisition about risk scenarios and their affected systems.” MS thesis, Center for Risk Management of Engineering Systems and Department of Systems and Information Engineering, University of Virginia, Charlottesville, Va.
Sharit, J. (2000). “A modeling framework for exposing risks in complex systems.” Risk Anal., 20(4), 469–482.
Shooman, L. (2002). Reliability of computer systems and networks, Wiley, New York.
Silvers, B., Epstein, B., eds., and Wilcock, C., Jr. (2002). Striking terror: America’s new war, New York Review of Books, New York.
Skvoretz, J. (1996). “An algorithm to generate connected graphs.” Curr. Res. in Soc. Psychol., 1(5), 43–49.
Snijders, T. A. B. (1998). “Methodological issues in studying effects of networks in organizations.” Comput. Math. Org. Theory, 4(2), 205–215.
Watts, D. J. (2003). Six degrees: The science of a connected age, Norton, New York.
Wei, B. (1991). “A unified approach to failure mode, effects and criticality analysis.” Proc., Annual Reliability and Maintainability Symp., IEEE Reliability Society, New York.

Information & Authors

Information

Published In

Go to Journal of Infrastructure Systems
Journal of Infrastructure Systems
Volume 11Issue 4December 2005
Pages: 211 - 220

History

Received: Jun 12, 2003
Accepted: Jul 12, 2004
Published online: Dec 1, 2005
Published in print: Dec 2005

Permissions

Request permissions for this article.

Authors

Affiliations

James H. Lambert, M.ASCE [email protected]
Center Associate Director and Research Associate Professor, Center for Risk Management of Engineering Systems, Dept. of Systems and Information Engineering, P.O. Box 400747, 112 Olsson Hall, Univ. of Virginia, Charlottesville, VA 22903. E-mail: [email protected]
Priya Sarda
Graduate Student, Dept. of Systems and Information Engineering, 112 Olsson Hall, Univ. of Virginia, Charlottesville, VA 22903.

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share