Terror Queues
نویسنده
چکیده
This article presents the first models developed specifically for understanding the infiltration and interdiction of ongoing terror plots by undercover intelligence agents, and does so via novel application of ideas from queueing theory and Markov population processes. The resulting “terror queue” models predict the number of undetected terror threats in an area from agent activity/utilization data, and also estimate the rate with which such threats can be detected and interdicted. The models treat terror plots as customers and intelligence agents as servers. Agents spend all of their time either detecting and infiltrating new terror plots (in which case they are “available”), or interdicting already detected terror plots (in which case they are “busy”). Initially we examine a Markov model assuming that intelligence agents, while unable to detect all plots, never err by falsely detecting fake plots. While this model can be solved numerically, a simpler Ornstein-Uhlenbeck diffusion approximation yields some results in closed form while providing nearly identical numerical performance. The transient behavior of the terror queue model is discussed briefly along with a sample sensitivity analysis to study how model predictions compare to simulated results when using estimated versus known terror plot arrival rates. The diffusion model is then extended to allow for the false detection of fake plots. Such false detection is a real feature of counterterror intelligence given that intelligence agents or informants can make mistakes, as well as the proclivity of terrorists to deliberately broadcast false information. The false detection model is illustrated using suicide bombing data from Israel.
منابع مشابه
SOME GENERALIZATIONS OF WEAK CONVERGENCE RESULTS ON MULTIPLE CHANNEL QUEUES IN HEAVY TRAFFIC.
This paper extends certain results of Iglehart and Whitt on multiple channel queues to the case where the inter-arrival times and service times are not necessarily identically distributed. It is shown that the weak convergence results in this case are exactly the same as those obtained by Iglehart and Whitt
متن کاملTerror management theory: Theoretical concepts, experimental research and Critics
Terror management theory (Greenberg, Pyszczynski & Solomon, 1986) considers the desire for survival as the underlying motivation for human behavior. Given his cognitive capacity and ability to think abstractly about the future, man realizes that his death is inevitable, which causes Paralysing terror. Man has developed certain psychological structures to protect himself from this terror. A cult...
متن کاملLongest Path in Networks of Queues in the Steady-State
Due to the importance of longest path analysis in networks of queues, we develop an analytical method for computing the steady-state distribution function of longest path in acyclic networks of queues. We assume the network consists of a number of queuing systems and each one has either one or infinite servers. The distribution function of service time is assumed to be exponential or Erlang. Fu...
متن کاملDo burns increase the severity of terror injuries?
The use of explosives and suicide bombings has become more frequent since October 2000. This change in the nature of terror attacks has marked a new era in the Israeli-Palestinian conflict. We previously reported that the incidence of thermal injuries has since risen. However, the rise in the incidence of burns among victims of terror was proportionate to the rise in the incidence of burns amon...
متن کاملThe Invention of Modern State Terrorism during the French Revolution
This essay discusses three aspects of the Terror (September 1793–July 1794): (1) The Institutions of the Terror: The Committee of General Security, the Committee of Public Safety, and the Revolutionary Tribunal; (2) the Theory of Terror: The unity and indivisibility of the people, the category of enemy of the people, and the concept of Revolution as a state of war against aristocratic/foreign c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Operations Research
دوره 58 شماره
صفحات -
تاریخ انتشار 2010