SlideShare a Scribd company logo
Operations Research for
Homeland Security
and Beyond!
Laura Albert McLay, PhD
Associate Professor
University of Wisconsin-Madison
Industrial and Systems Engineering
laura@engr.wisc.edu
@lauramclay
http://punkrockOR.com
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Executive summary
Security research investigates how to use scarce resources for
screening aviation passengers, cargo containers, etc., in low risk,
cost-constrained environments.
Better security is achieved by targeting scarce screening resources
at the “riskiest” passengers and doing less screening on most
passengers.
Research has informed policy at the TSA, technical analysis
underlying TSA Precheck implicitly focuses on risk targeting, which
is why it makes the air system safer, in low risk, cost-constrained
environments.
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Aviation security:
Past, present, and future
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
1938!!
One hijacking
encourages
copycats:
Hijackings are
contagious
Metal detectors and X-
ray machines go in
place
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
A brief history of passenger screening
• Dawn of time until 1970
• Not much!
• 1970
• Surveillance equipment, air marshals
• Feb 1972
• Armed guards to make people feel safe
• Screened by behavioral profile, metal
detector, and ID check
• Dec. 1972
• Metal detector / magnometer
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
A brief history of passenger screening
• 1996
• Checked baggage for high-risk
passengers screened for explosives
(run by airlines)
• Passenger-baggage matching rejected
• Motivated by Pan Am Flight 103 (1988)
and TWA Flight 800 (1996)
• Sept. 2001
• Times are a changin’
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Security is a moving target
Changes in passenger and baggage screening
• November 2001 – Aviation
Transportation and Security Act
• Created the TSA
• Required all checked baggage to be
screened for explosives, Dec. 2002
deadline
• December 2001
• Remove shoes
• 2002 +
• CAPPS II, Secure Flight, etc. for risk-
based screening
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Security is a moving target
Changes in passenger and baggage screening
• August 2006
• No more liquids after liquid
explosives used in a bomb attempt
• 2009 - 2010
• TSA starts using explosive trace
portals
• September 2012
• Less screening for seniors (75+) and
children (<12)
• December 2013
• TSA Precheck for reduced security
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Checked baggage security before 2001
• Early discrete optimization research dates back prior to
September 11, 2001
• Checked baggage for high-risk passengers screened for explosives
• Selectee and non-selectee screening
• Goal was how to optimally deploy and use limited baggage
screening devices
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Checked baggage security models
Flight segment = flight between takeoff and landing of an aircraft
A flight segment is:
• uncovered if 1+ bags on the flight has not been screened
• covered if all selectee bags on it have been screened
Baggage screening performance measures developed in
conjunction with the Federal Aviation Administration:
• Cover the most flights.
• Cover the most passengers on covered flights.
• Cover flights by fully utilizing the devices.
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Checked baggage security models
The Uncovered Flight Segment Problem (UFSP):
Find a subset of flights to screen such that we maximize the total
amount of covered flights subject to a screening capacity.
The Uncovered Passenger Segment Problem (UPSP):
Find a subset of flights to screen such that we maximize the total
amount of passengers of covered flights subject to a screening
capacity.
The Uncovered Baggage Segment Problem (UBSP):
Find a subset of flights to screen such that we maximize the total
amount of bags screened subject to a screening capacity.
Policy implications?
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Important questions
What if you have to
• Take transferring passengers into account?
• Distribute screening capacity to airports and screening stations?
• Distribute screening capacity to airports and screening stations in
discrete pieces?
• Consider weapons of mass destruction (WMD), not just
conventional attacks?
Discrete optimization can answer all of these questions!
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Checked baggage challenges in 2001
State of the art
• Existing explosive detection system devices from two manufacturers
• Old technology for screening passengers
Limitation
• Current technology is slow and not effective
• Not enough space for security and security lines in airports
• Infrastructure needed to screen baggage in-line
Ultimate goal
• Good screening devices
• Fast screening (< 10 minutes)
• Do all this in < 14 months!!
The solution was haphazard & piecemeal
• Explosive trace detection
• Uses mass spectroscopy or ion mobility spectroscopy
• Labor intensive when bag is swabbed
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Why are homeland security problems good
ISyE problems?
• Limited resources
• Passenger risk assessments
• Human screeners
• Tradeoffs among criteria (efficiency, security, cost)
• Note: TSA has a goal of <10 minutes waiting for screening
• System and goals are always changing
We will always have security challenges, and ISyE/DSOR tools
will always help us address some of these challenges.
Security often improved through deterrent effect, not
detection.
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
What about screening passengers?
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Risk-Based Passenger Screening
Passenger risk assessments have been used since 1996.
Most passengers are low-risk.
What is known: As risk increases, likelihood of a security threat
outcome increases.
Risk-based security: Captured in the Dynamic Aviation Risk
Management System (DARMS) paradigm.
Risk-based screening vs. Random screening
How do we do it?
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Risk-based Screening Framework
Know everyone’s risk before they enter security screening;
allocate security resources to match risk.
Final Assessments:
Was there a successful attack?
Was the system being tested?
How do match limited screening resources to passengers?
Assumptions:
Security resources are limited.
Screening procedures make errors
* False alarms, False clears.
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
How can passengers be assigned?
Ahead of time:
* Integer programming models1
In real-time:
* Markov Decision Processes2
* Control Theory models3
Based on the Sequential Stochastic Assignment Problem (SSAP)
Security resources allocated to a passenger match the retrospective
security resource allocation.
1 McLay, L.A., Jacobson, S.H., Kobza, J.E., 2006
2 McLay, L.A., Jacobson, S.H., Nikolaev, A.G., 2009
3 Lee, A.J., McLay, L.A., Jacobson, S.H., 2009
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Real-time simulation of optimal
policy
Time
Passenger
risk
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Risk Profiles of screening classes
Passenger riskLaura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Conditional distribution of
passenger risk assessment
values
Screening Procedure Reality
Three possible scenarios:
1. Right Screening
2. Under Screening
3. Over Screening
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
What if you get it wrong?
Will the system be more vulnerable?
Overestimating risk*: True risk level < estimated risk level
When risk is overestimated, high value security resources get
used on low risk passengers, which may leave fewer high value
security resources available for high risk passengers.
Underestimating risk: True risk level > estimated risk level
When risk is underestimated, high value security resources get
used on high risk passengers, which targets more closely the
high value security resources for high risk passengers
* tendency is to overestimate risk
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Key observations
Right Screening is ideal, but challenging to attain for all passengers.
Better security is achieved by targeting scarce screening resources
at the “riskiest” passengers and doing less screening on most
passengers.
TSA Precheck implicitly focuses on reducing screening for some to
target resources at “risky” passengers, which is why it makes the air
system safer, in low risk, cost-constrained environments.
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Gaming Strategies
Blocking
Overtaxing / decoys
Timing
Trial and Testing
All can disrupt the system in limited resource environments
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Bad intentions
We are trying to prevent attacks
Is the goal to identify non-threat passengers with banned
items or threat passengers with bad intentions (and no
banned items)?
Risk based security focuses on the latter
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Final thoughts
• Risk reduction, not risk elimination
• If you cannot find a needle in a haystack, make a smaller haystack
• Target limited resources at a small haystack
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Security systems
http://www.tsa.gov/about-tsa/layers-security
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
How to schedule Federal Air Marshalls
How to randomly staff checkpoints at an airport
In the news: we need DSOR
Queueing and scheduling
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
In the news!
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Live at 4 on WISC-TV, May 31, 2016
http://www.channel3000.com/news/Professor-talks-about-science-to-traveling-airport-lines/39814720
Thank you!
Laura Albert McLay, PhD
Associate Professor
University of Wisconsin-Madison
Industrial and Systems Engineering
laura@engr.wisc.edu
@lauramclay
http://punkrockOR.com
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Blog posts:
Aviation security, there and back again
Aviation security: is more really more?
References
Jacobson, S.H., McLay, L.A., Kobza, J.E., Bowman, J.M., 2005, “Modeling and Analyzing Multiple Station
Baggage Screening Security System Performance," Naval Research Logistics, 52(1), 30-45.
Jacobson, S.H., McLay, L.A., Virta, J.L., Kobza, J.E., 2005, “Integer Program Models for the Deployment
of Airport Baggage Screening Security Devices," Optimization and Engineering, 6(3), 339-359.
McLay, L.A., Jacobson, S.H., Kobza, J.E., 2006, “A Multilevel Passenger Screening Problem for Aviation
Security,” Naval Research Logistics, 53(3), 183-197.
McLay, L.A., Jacobson, S.H., Kobza, J.E., 2007, “Integer Programming Models and Analysis for a
Multilevel Passenger Screening Problem, “IIE Transactions, 39(1), 73-81.
Nikolaev, A.G., Jacobson, S.H., McLay, L.A., 2007, “A Sequential Stochastic Security System Design
Problem for Aviation Security,” Transportation Science, 41(2), 182-194.
McLay, L.A., Jacobson, S.H., Kobza, J.E., 2008, “The Tradeoff between Technology and Prescreening
Intelligence in Checked Baggage Screening for Aviation Security,” Journal of Transportation Security,
1(2), 107-126.
McLay, L.A., Jacobson, S.H., Nikolaev, A.G., 2009, “A Sequential Stochastic Passenger Screening Problem
for Aviation Security,” IIE Transactions, 41(6), 575-591 (2009 Outstanding IIE Publication Award).
Lee, A.J., McLay, L.A., Jacobson, S.H., 2009, “Designing Aviation Security Passenger Screening Systems
using Nonlinear Control,” SIAM Journal on Control and Optimization, 48(4), 2085-2105.
McLay, L.A., Lee, A.J., Jacobson, S.H., 2010, “Risk-Based Policies for Aviation Security Checkpoint
Screening,” Transportation Science, 44(3), 333-349.
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison

More Related Content

Viewers also liked

2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
Laura Albert
 
So you're thinking about graduate school in operations research, math, or eng...
So you're thinking about graduate school in operations research, math, or eng...So you're thinking about graduate school in operations research, math, or eng...
So you're thinking about graduate school in operations research, math, or eng...
Laura Albert
 
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
Laura Albert
 
Eng 101 research paper revised final
Eng 101 research paper revised finalEng 101 research paper revised final
Eng 101 research paper revised finalbekahpars
 
Delivering emergency medical services: research, application, and outreach
Delivering emergency medical services: research, application, and outreachDelivering emergency medical services: research, application, and outreach
Delivering emergency medical services: research, application, and outreach
Laura Albert
 
9 11 research paper
9 11 research paper9 11 research paper
9 11 research paperseanclark92
 
Big Data and Data Analytics in Homeland Security and Public Safety Market 201...
Big Data and Data Analytics in Homeland Security and Public Safety Market 201...Big Data and Data Analytics in Homeland Security and Public Safety Market 201...
Big Data and Data Analytics in Homeland Security and Public Safety Market 201...
Homeland Security Research Corp.
 
Big data architectures and the data lake
Big data architectures and the data lakeBig data architectures and the data lake
Big data architectures and the data lake
James Serra
 

Viewers also liked (8)

2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
 
So you're thinking about graduate school in operations research, math, or eng...
So you're thinking about graduate school in operations research, math, or eng...So you're thinking about graduate school in operations research, math, or eng...
So you're thinking about graduate school in operations research, math, or eng...
 
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
 
Eng 101 research paper revised final
Eng 101 research paper revised finalEng 101 research paper revised final
Eng 101 research paper revised final
 
Delivering emergency medical services: research, application, and outreach
Delivering emergency medical services: research, application, and outreachDelivering emergency medical services: research, application, and outreach
Delivering emergency medical services: research, application, and outreach
 
9 11 research paper
9 11 research paper9 11 research paper
9 11 research paper
 
Big Data and Data Analytics in Homeland Security and Public Safety Market 201...
Big Data and Data Analytics in Homeland Security and Public Safety Market 201...Big Data and Data Analytics in Homeland Security and Public Safety Market 201...
Big Data and Data Analytics in Homeland Security and Public Safety Market 201...
 
Big data architectures and the data lake
Big data architectures and the data lakeBig data architectures and the data lake
Big data architectures and the data lake
 

Similar to Operations Research for Homeland Security and Beyond!

Linking Safety Culture & Safety Performance In Marine Transportation
Linking Safety Culture & Safety Performance In Marine TransportationLinking Safety Culture & Safety Performance In Marine Transportation
Linking Safety Culture & Safety Performance In Marine Transportation
Stephanie Camay
 
AVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONAVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONPaul Mears Phd.
 
When Technology Meets Human Nature - The Smartphone & Driving
When Technology Meets Human Nature - The Smartphone & DrivingWhen Technology Meets Human Nature - The Smartphone & Driving
When Technology Meets Human Nature - The Smartphone & Driving
Clara Rispler קלרה ריספלר
 
Transportation Security Administration "Risk-Based Security Overview"
Transportation Security Administration "Risk-Based Security Overview"Transportation Security Administration "Risk-Based Security Overview"
Transportation Security Administration "Risk-Based Security Overview"
TSA
 
Airport security 2013 lee kair
Airport security 2013   lee kairAirport security 2013   lee kair
Airport security 2013 lee kairRussell Publishing
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
Nicholas Davis
 
Caveon Webinar Series: Preventing and Detecting Cheating, Lessons from CCSSO...
Caveon Webinar Series: Preventing and Detecting Cheating,  Lessons from CCSSO...Caveon Webinar Series: Preventing and Detecting Cheating,  Lessons from CCSSO...
Caveon Webinar Series: Preventing and Detecting Cheating, Lessons from CCSSO...
Caveon Test Security
 
Annotated bib
Annotated bibAnnotated bib
Annotated bibbekahpars
 
Annotated bib
Annotated bibAnnotated bib
Annotated bibbekahpars
 
Annotated bib revised final
Annotated bib revised finalAnnotated bib revised final
Annotated bib revised finalbekahpars
 
2015 Campus Safety Report
2015 Campus Safety Report2015 Campus Safety Report
2015 Campus Safety ReportMaaz Yasin
 
NASA Safety Case Approach for Automated Flight Authorization System
NASA Safety Case Approach for Automated Flight Authorization SystemNASA Safety Case Approach for Automated Flight Authorization System
NASA Safety Case Approach for Automated Flight Authorization System
Dr. Pankaj Dhussa
 
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 4
GE6075 PROFESSIONAL ETHICS IN ENGINEERINGUnit 4GE6075 PROFESSIONAL ETHICS IN ENGINEERINGUnit 4
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 4
RMK ENGINEERING COLLEGE, CHENNAI
 
Risk management and the release of microdata:
Risk management and the release of microdata:  Risk management and the release of microdata:
Risk management and the release of microdata:
Sonia Whiteley
 
New ALERT - Latent Safety Threats in Critical Care Transport
New ALERT - Latent Safety Threats in Critical Care TransportNew ALERT - Latent Safety Threats in Critical Care Transport
New ALERT - Latent Safety Threats in Critical Care Transport
INSPIRE_Network
 
07 bollingerfehr nea iaea_workshop
07 bollingerfehr nea iaea_workshop07 bollingerfehr nea iaea_workshop
07 bollingerfehr nea iaea_workshop
leann_mays
 
7 STEPS TO LEADERSHIP EXCELLENCE IN WORK SAFETY & HEALTH.
7 STEPS TO LEADERSHIP EXCELLENCE IN WORK SAFETY & HEALTH. 7 STEPS TO LEADERSHIP EXCELLENCE IN WORK SAFETY & HEALTH.
7 STEPS TO LEADERSHIP EXCELLENCE IN WORK SAFETY & HEALTH.
Abdul Shukor
 
Scott Pfeifer - Transportation Security Administration (TSA) in the USA
Scott Pfeifer - Transportation Security Administration (TSA) in the USAScott Pfeifer - Transportation Security Administration (TSA) in the USA
Scott Pfeifer - Transportation Security Administration (TSA) in the USAEuropean Registrars Conference
 

Similar to Operations Research for Homeland Security and Beyond! (20)

Academy
Academy Academy
Academy
 
403 3
403 3403 3
403 3
 
Linking Safety Culture & Safety Performance In Marine Transportation
Linking Safety Culture & Safety Performance In Marine TransportationLinking Safety Culture & Safety Performance In Marine Transportation
Linking Safety Culture & Safety Performance In Marine Transportation
 
AVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONAVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATION
 
When Technology Meets Human Nature - The Smartphone & Driving
When Technology Meets Human Nature - The Smartphone & DrivingWhen Technology Meets Human Nature - The Smartphone & Driving
When Technology Meets Human Nature - The Smartphone & Driving
 
Transportation Security Administration "Risk-Based Security Overview"
Transportation Security Administration "Risk-Based Security Overview"Transportation Security Administration "Risk-Based Security Overview"
Transportation Security Administration "Risk-Based Security Overview"
 
Airport security 2013 lee kair
Airport security 2013   lee kairAirport security 2013   lee kair
Airport security 2013 lee kair
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Caveon Webinar Series: Preventing and Detecting Cheating, Lessons from CCSSO...
Caveon Webinar Series: Preventing and Detecting Cheating,  Lessons from CCSSO...Caveon Webinar Series: Preventing and Detecting Cheating,  Lessons from CCSSO...
Caveon Webinar Series: Preventing and Detecting Cheating, Lessons from CCSSO...
 
Annotated bib
Annotated bibAnnotated bib
Annotated bib
 
Annotated bib
Annotated bibAnnotated bib
Annotated bib
 
Annotated bib revised final
Annotated bib revised finalAnnotated bib revised final
Annotated bib revised final
 
2015 Campus Safety Report
2015 Campus Safety Report2015 Campus Safety Report
2015 Campus Safety Report
 
NASA Safety Case Approach for Automated Flight Authorization System
NASA Safety Case Approach for Automated Flight Authorization SystemNASA Safety Case Approach for Automated Flight Authorization System
NASA Safety Case Approach for Automated Flight Authorization System
 
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 4
GE6075 PROFESSIONAL ETHICS IN ENGINEERINGUnit 4GE6075 PROFESSIONAL ETHICS IN ENGINEERINGUnit 4
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 4
 
Risk management and the release of microdata:
Risk management and the release of microdata:  Risk management and the release of microdata:
Risk management and the release of microdata:
 
New ALERT - Latent Safety Threats in Critical Care Transport
New ALERT - Latent Safety Threats in Critical Care TransportNew ALERT - Latent Safety Threats in Critical Care Transport
New ALERT - Latent Safety Threats in Critical Care Transport
 
07 bollingerfehr nea iaea_workshop
07 bollingerfehr nea iaea_workshop07 bollingerfehr nea iaea_workshop
07 bollingerfehr nea iaea_workshop
 
7 STEPS TO LEADERSHIP EXCELLENCE IN WORK SAFETY & HEALTH.
7 STEPS TO LEADERSHIP EXCELLENCE IN WORK SAFETY & HEALTH. 7 STEPS TO LEADERSHIP EXCELLENCE IN WORK SAFETY & HEALTH.
7 STEPS TO LEADERSHIP EXCELLENCE IN WORK SAFETY & HEALTH.
 
Scott Pfeifer - Transportation Security Administration (TSA) in the USA
Scott Pfeifer - Transportation Security Administration (TSA) in the USAScott Pfeifer - Transportation Security Administration (TSA) in the USA
Scott Pfeifer - Transportation Security Administration (TSA) in the USA
 

More from Laura Albert

Optimization with impact: my journey in public sector operations research
Optimization with impact: my journey in public sector operations research Optimization with impact: my journey in public sector operations research
Optimization with impact: my journey in public sector operations research
Laura Albert
 
Should a football team go for a one or two point conversion? A dynamic progra...
Should a football team go for a one or two point conversion? A dynamic progra...Should a football team go for a one or two point conversion? A dynamic progra...
Should a football team go for a one or two point conversion? A dynamic progra...
Laura Albert
 
On designing public sector systems in emergency medical services, disaster re...
On designing public sector systems in emergency medical services, disaster re...On designing public sector systems in emergency medical services, disaster re...
On designing public sector systems in emergency medical services, disaster re...
Laura Albert
 
Volleyball analytics: Modeling volleyball using Markov chains
Volleyball analytics: Modeling volleyball using Markov chainsVolleyball analytics: Modeling volleyball using Markov chains
Volleyball analytics: Modeling volleyball using Markov chains
Laura Albert
 
2018 INFORMS Government & Analytics Summit Overview
2018 INFORMS Government & Analytics Summit Overview2018 INFORMS Government & Analytics Summit Overview
2018 INFORMS Government & Analytics Summit Overview
Laura Albert
 
Designing emergency medical service systems to enhance community resilience
Designing emergency medical service systems to enhance community resilience Designing emergency medical service systems to enhance community resilience
Designing emergency medical service systems to enhance community resilience
Laura Albert
 
Modeling Service networks
Modeling Service networksModeling Service networks
Modeling Service networks
Laura Albert
 
Translating Engineering and Operations Analyses into Effective Homeland Secur...
Translating Engineering and Operations Analyses into Effective Homeland Secur...Translating Engineering and Operations Analyses into Effective Homeland Secur...
Translating Engineering and Operations Analyses into Effective Homeland Secur...
Laura Albert
 
Delivering emergency medical services:Research, theory, and application
Delivering emergency medical services:Research, theory, and applicationDelivering emergency medical services:Research, theory, and application
Delivering emergency medical services:Research, theory, and application
Laura Albert
 
Advanced analytics for supporting public policy, bracketology, and beyond!
Advanced analytics for supporting public policy, bracketology, and beyond!Advanced analytics for supporting public policy, bracketology, and beyond!
Advanced analytics for supporting public policy, bracketology, and beyond!
Laura Albert
 
Technical writing tips
Technical writing tipsTechnical writing tips
Technical writing tipsLaura Albert
 

More from Laura Albert (11)

Optimization with impact: my journey in public sector operations research
Optimization with impact: my journey in public sector operations research Optimization with impact: my journey in public sector operations research
Optimization with impact: my journey in public sector operations research
 
Should a football team go for a one or two point conversion? A dynamic progra...
Should a football team go for a one or two point conversion? A dynamic progra...Should a football team go for a one or two point conversion? A dynamic progra...
Should a football team go for a one or two point conversion? A dynamic progra...
 
On designing public sector systems in emergency medical services, disaster re...
On designing public sector systems in emergency medical services, disaster re...On designing public sector systems in emergency medical services, disaster re...
On designing public sector systems in emergency medical services, disaster re...
 
Volleyball analytics: Modeling volleyball using Markov chains
Volleyball analytics: Modeling volleyball using Markov chainsVolleyball analytics: Modeling volleyball using Markov chains
Volleyball analytics: Modeling volleyball using Markov chains
 
2018 INFORMS Government & Analytics Summit Overview
2018 INFORMS Government & Analytics Summit Overview2018 INFORMS Government & Analytics Summit Overview
2018 INFORMS Government & Analytics Summit Overview
 
Designing emergency medical service systems to enhance community resilience
Designing emergency medical service systems to enhance community resilience Designing emergency medical service systems to enhance community resilience
Designing emergency medical service systems to enhance community resilience
 
Modeling Service networks
Modeling Service networksModeling Service networks
Modeling Service networks
 
Translating Engineering and Operations Analyses into Effective Homeland Secur...
Translating Engineering and Operations Analyses into Effective Homeland Secur...Translating Engineering and Operations Analyses into Effective Homeland Secur...
Translating Engineering and Operations Analyses into Effective Homeland Secur...
 
Delivering emergency medical services:Research, theory, and application
Delivering emergency medical services:Research, theory, and applicationDelivering emergency medical services:Research, theory, and application
Delivering emergency medical services:Research, theory, and application
 
Advanced analytics for supporting public policy, bracketology, and beyond!
Advanced analytics for supporting public policy, bracketology, and beyond!Advanced analytics for supporting public policy, bracketology, and beyond!
Advanced analytics for supporting public policy, bracketology, and beyond!
 
Technical writing tips
Technical writing tipsTechnical writing tips
Technical writing tips
 

Recently uploaded

The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 

Recently uploaded (20)

The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 

Operations Research for Homeland Security and Beyond!

  • 1. Operations Research for Homeland Security and Beyond! Laura Albert McLay, PhD Associate Professor University of Wisconsin-Madison Industrial and Systems Engineering laura@engr.wisc.edu @lauramclay http://punkrockOR.com Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 2. Executive summary Security research investigates how to use scarce resources for screening aviation passengers, cargo containers, etc., in low risk, cost-constrained environments. Better security is achieved by targeting scarce screening resources at the “riskiest” passengers and doing less screening on most passengers. Research has informed policy at the TSA, technical analysis underlying TSA Precheck implicitly focuses on risk targeting, which is why it makes the air system safer, in low risk, cost-constrained environments. Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 3. Aviation security: Past, present, and future Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison 1938!!
  • 4. One hijacking encourages copycats: Hijackings are contagious Metal detectors and X- ray machines go in place Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 5. A brief history of passenger screening • Dawn of time until 1970 • Not much! • 1970 • Surveillance equipment, air marshals • Feb 1972 • Armed guards to make people feel safe • Screened by behavioral profile, metal detector, and ID check • Dec. 1972 • Metal detector / magnometer Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 6. A brief history of passenger screening • 1996 • Checked baggage for high-risk passengers screened for explosives (run by airlines) • Passenger-baggage matching rejected • Motivated by Pan Am Flight 103 (1988) and TWA Flight 800 (1996) • Sept. 2001 • Times are a changin’ Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 7. Security is a moving target Changes in passenger and baggage screening • November 2001 – Aviation Transportation and Security Act • Created the TSA • Required all checked baggage to be screened for explosives, Dec. 2002 deadline • December 2001 • Remove shoes • 2002 + • CAPPS II, Secure Flight, etc. for risk- based screening Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 8. Security is a moving target Changes in passenger and baggage screening • August 2006 • No more liquids after liquid explosives used in a bomb attempt • 2009 - 2010 • TSA starts using explosive trace portals • September 2012 • Less screening for seniors (75+) and children (<12) • December 2013 • TSA Precheck for reduced security Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 9. Checked baggage security before 2001 • Early discrete optimization research dates back prior to September 11, 2001 • Checked baggage for high-risk passengers screened for explosives • Selectee and non-selectee screening • Goal was how to optimally deploy and use limited baggage screening devices Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 10. Checked baggage security models Flight segment = flight between takeoff and landing of an aircraft A flight segment is: • uncovered if 1+ bags on the flight has not been screened • covered if all selectee bags on it have been screened Baggage screening performance measures developed in conjunction with the Federal Aviation Administration: • Cover the most flights. • Cover the most passengers on covered flights. • Cover flights by fully utilizing the devices. Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 11. Checked baggage security models The Uncovered Flight Segment Problem (UFSP): Find a subset of flights to screen such that we maximize the total amount of covered flights subject to a screening capacity. The Uncovered Passenger Segment Problem (UPSP): Find a subset of flights to screen such that we maximize the total amount of passengers of covered flights subject to a screening capacity. The Uncovered Baggage Segment Problem (UBSP): Find a subset of flights to screen such that we maximize the total amount of bags screened subject to a screening capacity. Policy implications? Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 12. Important questions What if you have to • Take transferring passengers into account? • Distribute screening capacity to airports and screening stations? • Distribute screening capacity to airports and screening stations in discrete pieces? • Consider weapons of mass destruction (WMD), not just conventional attacks? Discrete optimization can answer all of these questions! Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 13. Checked baggage challenges in 2001 State of the art • Existing explosive detection system devices from two manufacturers • Old technology for screening passengers Limitation • Current technology is slow and not effective • Not enough space for security and security lines in airports • Infrastructure needed to screen baggage in-line Ultimate goal • Good screening devices • Fast screening (< 10 minutes) • Do all this in < 14 months!!
  • 14. The solution was haphazard & piecemeal • Explosive trace detection • Uses mass spectroscopy or ion mobility spectroscopy • Labor intensive when bag is swabbed Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 15. Why are homeland security problems good ISyE problems? • Limited resources • Passenger risk assessments • Human screeners • Tradeoffs among criteria (efficiency, security, cost) • Note: TSA has a goal of <10 minutes waiting for screening • System and goals are always changing We will always have security challenges, and ISyE/DSOR tools will always help us address some of these challenges. Security often improved through deterrent effect, not detection. Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 16. What about screening passengers? Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 17. Risk-Based Passenger Screening Passenger risk assessments have been used since 1996. Most passengers are low-risk. What is known: As risk increases, likelihood of a security threat outcome increases. Risk-based security: Captured in the Dynamic Aviation Risk Management System (DARMS) paradigm. Risk-based screening vs. Random screening How do we do it? Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 18. Risk-based Screening Framework Know everyone’s risk before they enter security screening; allocate security resources to match risk. Final Assessments: Was there a successful attack? Was the system being tested? How do match limited screening resources to passengers? Assumptions: Security resources are limited. Screening procedures make errors * False alarms, False clears. Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 19. How can passengers be assigned? Ahead of time: * Integer programming models1 In real-time: * Markov Decision Processes2 * Control Theory models3 Based on the Sequential Stochastic Assignment Problem (SSAP) Security resources allocated to a passenger match the retrospective security resource allocation. 1 McLay, L.A., Jacobson, S.H., Kobza, J.E., 2006 2 McLay, L.A., Jacobson, S.H., Nikolaev, A.G., 2009 3 Lee, A.J., McLay, L.A., Jacobson, S.H., 2009 Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 20. Real-time simulation of optimal policy Time Passenger risk Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 21. Risk Profiles of screening classes Passenger riskLaura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison Conditional distribution of passenger risk assessment values
  • 22. Screening Procedure Reality Three possible scenarios: 1. Right Screening 2. Under Screening 3. Over Screening Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 23. What if you get it wrong? Will the system be more vulnerable? Overestimating risk*: True risk level < estimated risk level When risk is overestimated, high value security resources get used on low risk passengers, which may leave fewer high value security resources available for high risk passengers. Underestimating risk: True risk level > estimated risk level When risk is underestimated, high value security resources get used on high risk passengers, which targets more closely the high value security resources for high risk passengers * tendency is to overestimate risk Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 24. Key observations Right Screening is ideal, but challenging to attain for all passengers. Better security is achieved by targeting scarce screening resources at the “riskiest” passengers and doing less screening on most passengers. TSA Precheck implicitly focuses on reducing screening for some to target resources at “risky” passengers, which is why it makes the air system safer, in low risk, cost-constrained environments. Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 25. Gaming Strategies Blocking Overtaxing / decoys Timing Trial and Testing All can disrupt the system in limited resource environments Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 26. Bad intentions We are trying to prevent attacks Is the goal to identify non-threat passengers with banned items or threat passengers with bad intentions (and no banned items)? Risk based security focuses on the latter Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 27. Final thoughts • Risk reduction, not risk elimination • If you cannot find a needle in a haystack, make a smaller haystack • Target limited resources at a small haystack Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 28. Security systems http://www.tsa.gov/about-tsa/layers-security Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison How to schedule Federal Air Marshalls How to randomly staff checkpoints at an airport
  • 29. In the news: we need DSOR Queueing and scheduling Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
  • 30. In the news! Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison Live at 4 on WISC-TV, May 31, 2016 http://www.channel3000.com/news/Professor-talks-about-science-to-traveling-airport-lines/39814720
  • 31. Thank you! Laura Albert McLay, PhD Associate Professor University of Wisconsin-Madison Industrial and Systems Engineering laura@engr.wisc.edu @lauramclay http://punkrockOR.com Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison Blog posts: Aviation security, there and back again Aviation security: is more really more?
  • 32. References Jacobson, S.H., McLay, L.A., Kobza, J.E., Bowman, J.M., 2005, “Modeling and Analyzing Multiple Station Baggage Screening Security System Performance," Naval Research Logistics, 52(1), 30-45. Jacobson, S.H., McLay, L.A., Virta, J.L., Kobza, J.E., 2005, “Integer Program Models for the Deployment of Airport Baggage Screening Security Devices," Optimization and Engineering, 6(3), 339-359. McLay, L.A., Jacobson, S.H., Kobza, J.E., 2006, “A Multilevel Passenger Screening Problem for Aviation Security,” Naval Research Logistics, 53(3), 183-197. McLay, L.A., Jacobson, S.H., Kobza, J.E., 2007, “Integer Programming Models and Analysis for a Multilevel Passenger Screening Problem, “IIE Transactions, 39(1), 73-81. Nikolaev, A.G., Jacobson, S.H., McLay, L.A., 2007, “A Sequential Stochastic Security System Design Problem for Aviation Security,” Transportation Science, 41(2), 182-194. McLay, L.A., Jacobson, S.H., Kobza, J.E., 2008, “The Tradeoff between Technology and Prescreening Intelligence in Checked Baggage Screening for Aviation Security,” Journal of Transportation Security, 1(2), 107-126. McLay, L.A., Jacobson, S.H., Nikolaev, A.G., 2009, “A Sequential Stochastic Passenger Screening Problem for Aviation Security,” IIE Transactions, 41(6), 575-591 (2009 Outstanding IIE Publication Award). Lee, A.J., McLay, L.A., Jacobson, S.H., 2009, “Designing Aviation Security Passenger Screening Systems using Nonlinear Control,” SIAM Journal on Control and Optimization, 48(4), 2085-2105. McLay, L.A., Lee, A.J., Jacobson, S.H., 2010, “Risk-Based Policies for Aviation Security Checkpoint Screening,” Transportation Science, 44(3), 333-349. Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison