Operations Research for Homeland Security and Beyond! Laura Albert McLay's talk on aviation security at the University of Wisconsin-Madison's 50th anniversary reunion for ISYE.
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001Laura Albert
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001. Slides from a presentation at the the University of Wisconsin-Madison on September 11, 2015.
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001Laura Albert
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001. Slides from a presentation at the the University of Wisconsin-Madison on September 11, 2015.
Delivering emergency medical services: research, application, and outreachLaura Albert
Laura McLay's slides from the German Operations Research Society Conference for the presentation entitled "Delivering emergency medical services: research application, and outreach"
Big data architectures and the data lakeJames Serra
With so many new technologies it can get confusing on the best approach to building a big data architecture. The data lake is a great new concept, usually built in Hadoop, but what exactly is it and how does it fit in? In this presentation I'll discuss the four most common patterns in big data production implementations, the top-down vs bottoms-up approach to analytics, and how you can use a data lake and a RDBMS data warehouse together. We will go into detail on the characteristics of a data lake and its benefits, and how you still need to perform the same data governance tasks in a data lake as you do in a data warehouse. Come to this presentation to make sure your data lake does not turn into a data swamp!
The Transportation Security Administration, an agency of the U.S. Department of Homeland Security, was created in the aftermath of 9/11 to oversee security for all transportation systems. This presentation, updated October 2015, provides information on risk-based passenger security. For more information, visit www.tsa.gov.
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
This presentation is a summary, for the students of the IS 365/765 course I teach, at the University of Wisconsin-Madison, providing a 104 slide reminder of the most important topics in Information Security, which we covered throughout the semester. Today is the last day of course material. We have 4 days of student team presentations, to follow.
Caveon Webinar Series: Preventing and Detecting Cheating, Lessons from CCSSO...Caveon Test Security
Discover security lessons learned from the program sessions and face-to-face meetings with state assessment and national organization staff at the June 2013 National Conference on Student Assessment in National Harbor, Maryland. Caveon Leaders John Fremer and Steve Addicott summarize the test security ideas and strategies that they drew from the conference. Among the points covered are the recommendations included in the new TILSA Test Security Guidebook which was released at the conference.
Delivering emergency medical services: research, application, and outreachLaura Albert
Laura McLay's slides from the German Operations Research Society Conference for the presentation entitled "Delivering emergency medical services: research application, and outreach"
Big data architectures and the data lakeJames Serra
With so many new technologies it can get confusing on the best approach to building a big data architecture. The data lake is a great new concept, usually built in Hadoop, but what exactly is it and how does it fit in? In this presentation I'll discuss the four most common patterns in big data production implementations, the top-down vs bottoms-up approach to analytics, and how you can use a data lake and a RDBMS data warehouse together. We will go into detail on the characteristics of a data lake and its benefits, and how you still need to perform the same data governance tasks in a data lake as you do in a data warehouse. Come to this presentation to make sure your data lake does not turn into a data swamp!
The Transportation Security Administration, an agency of the U.S. Department of Homeland Security, was created in the aftermath of 9/11 to oversee security for all transportation systems. This presentation, updated October 2015, provides information on risk-based passenger security. For more information, visit www.tsa.gov.
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
This presentation is a summary, for the students of the IS 365/765 course I teach, at the University of Wisconsin-Madison, providing a 104 slide reminder of the most important topics in Information Security, which we covered throughout the semester. Today is the last day of course material. We have 4 days of student team presentations, to follow.
Caveon Webinar Series: Preventing and Detecting Cheating, Lessons from CCSSO...Caveon Test Security
Discover security lessons learned from the program sessions and face-to-face meetings with state assessment and national organization staff at the June 2013 National Conference on Student Assessment in National Harbor, Maryland. Caveon Leaders John Fremer and Steve Addicott summarize the test security ideas and strategies that they drew from the conference. Among the points covered are the recommendations included in the new TILSA Test Security Guidebook which was released at the conference.
Safety and Risk – Assessment of Safety and Risk – Risk Benefit Analysis and Reducing Risk - Respect for Authority – Collective Bargaining – Confidentiality – Conflicts of Interest – Occupational Crime – Professional Rights – Employee Rights – Intellectual Property Rights (IPR) – Discrimination
Risk management and the release of microdata: Sonia Whiteley
Effective management of microdata acknowledges that there is no ‘single fix’ that will adequately address all of the potential risks associated with releasing unit record information. It is also the case that different methods used to maximise data security have different risks and all data confidentialisation methods limit the usefulness of the underlying data [1]. We have developed an approach to data management and release that takes a
balanced view of potential re-identification or disclosure threats and prioritises data utility while actively addressing more probable risk scenarios.
This balanced approach to risk management will be discussed in relation to the Australian Early Development Census (AEDC) which is conducted every three years to measure children’s development as then enter their first year of formal schooling. AEDC data is collected through a teacher-completed, online checklist that measures five areas of early childhood development. Issues relating to risk and the research community, data management risk mitigation strategies, microdata access modalities and the implications of sharing the risk between academics and the data custodians will be explored.
7 STEPS TO LEADERSHIP EXCELLENCE IN WORK SAFETY & HEALTH. Abdul Shukor
Knowledge sharing session with Mr. CHRISTOPH MUELLER, CEO of Malaysia Airlines on 11th AUGUST 2015. In efforts to further enhance the performance of the airlines' workforce viz-a-viz Occupational health, safety and ergonomics, steps are proposed and considered. Excellent session throughout. Thanks to the CEO and the management of Malaysia Airlines for this invitation.
Optimization with impact: my journey in public sector operations research Laura Albert
eynote talk at the Advances in Data Science & Operations Research Virtual Conference, presented by Universidad Galileo in collaboration with INFORMSttt. It's the first INFORMS conference made for Latino America that brings together the scientific community from the areas of operations research, business intelligence, and data science.
Designing emergency medical service systems to enhance community resilience Laura Albert
Emergency response to patients with medical needs after a disaster is a critical aspect of public safety and community resilience. An effective response to emergency medical patients can be achieved by designing a system that
- Allocates limited resources such as ambulances in resource-constrained settings,
- Leverages data and triage information to inform the design of response districts, and
- Sheds light on how these decisions change after a disaster.
In this talk, Dr. Laura Albert will discuss how analytical methods can be used to design emergency response systems and provide guidance into how to design data-driven emergency response systems. She will discuss how system design decisions must change after weather disasters when the system is congested and critical infrastructure is impaired.
A lecture on location models for public sector operations research. Topics include facility location, coverage models, the p-median model, the p-center model, integer programming.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
Operations Research for Homeland Security and Beyond!
1. Operations Research for
Homeland Security
and Beyond!
Laura Albert McLay, PhD
Associate Professor
University of Wisconsin-Madison
Industrial and Systems Engineering
laura@engr.wisc.edu
@lauramclay
http://punkrockOR.com
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
2. Executive summary
Security research investigates how to use scarce resources for
screening aviation passengers, cargo containers, etc., in low risk,
cost-constrained environments.
Better security is achieved by targeting scarce screening resources
at the “riskiest” passengers and doing less screening on most
passengers.
Research has informed policy at the TSA, technical analysis
underlying TSA Precheck implicitly focuses on risk targeting, which
is why it makes the air system safer, in low risk, cost-constrained
environments.
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
5. A brief history of passenger screening
• Dawn of time until 1970
• Not much!
• 1970
• Surveillance equipment, air marshals
• Feb 1972
• Armed guards to make people feel safe
• Screened by behavioral profile, metal
detector, and ID check
• Dec. 1972
• Metal detector / magnometer
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
6. A brief history of passenger screening
• 1996
• Checked baggage for high-risk
passengers screened for explosives
(run by airlines)
• Passenger-baggage matching rejected
• Motivated by Pan Am Flight 103 (1988)
and TWA Flight 800 (1996)
• Sept. 2001
• Times are a changin’
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
7. Security is a moving target
Changes in passenger and baggage screening
• November 2001 – Aviation
Transportation and Security Act
• Created the TSA
• Required all checked baggage to be
screened for explosives, Dec. 2002
deadline
• December 2001
• Remove shoes
• 2002 +
• CAPPS II, Secure Flight, etc. for risk-
based screening
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
8. Security is a moving target
Changes in passenger and baggage screening
• August 2006
• No more liquids after liquid
explosives used in a bomb attempt
• 2009 - 2010
• TSA starts using explosive trace
portals
• September 2012
• Less screening for seniors (75+) and
children (<12)
• December 2013
• TSA Precheck for reduced security
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
9. Checked baggage security before 2001
• Early discrete optimization research dates back prior to
September 11, 2001
• Checked baggage for high-risk passengers screened for explosives
• Selectee and non-selectee screening
• Goal was how to optimally deploy and use limited baggage
screening devices
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
10. Checked baggage security models
Flight segment = flight between takeoff and landing of an aircraft
A flight segment is:
• uncovered if 1+ bags on the flight has not been screened
• covered if all selectee bags on it have been screened
Baggage screening performance measures developed in
conjunction with the Federal Aviation Administration:
• Cover the most flights.
• Cover the most passengers on covered flights.
• Cover flights by fully utilizing the devices.
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
11. Checked baggage security models
The Uncovered Flight Segment Problem (UFSP):
Find a subset of flights to screen such that we maximize the total
amount of covered flights subject to a screening capacity.
The Uncovered Passenger Segment Problem (UPSP):
Find a subset of flights to screen such that we maximize the total
amount of passengers of covered flights subject to a screening
capacity.
The Uncovered Baggage Segment Problem (UBSP):
Find a subset of flights to screen such that we maximize the total
amount of bags screened subject to a screening capacity.
Policy implications?
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
12. Important questions
What if you have to
• Take transferring passengers into account?
• Distribute screening capacity to airports and screening stations?
• Distribute screening capacity to airports and screening stations in
discrete pieces?
• Consider weapons of mass destruction (WMD), not just
conventional attacks?
Discrete optimization can answer all of these questions!
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
13. Checked baggage challenges in 2001
State of the art
• Existing explosive detection system devices from two manufacturers
• Old technology for screening passengers
Limitation
• Current technology is slow and not effective
• Not enough space for security and security lines in airports
• Infrastructure needed to screen baggage in-line
Ultimate goal
• Good screening devices
• Fast screening (< 10 minutes)
• Do all this in < 14 months!!
14. The solution was haphazard & piecemeal
• Explosive trace detection
• Uses mass spectroscopy or ion mobility spectroscopy
• Labor intensive when bag is swabbed
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
15. Why are homeland security problems good
ISyE problems?
• Limited resources
• Passenger risk assessments
• Human screeners
• Tradeoffs among criteria (efficiency, security, cost)
• Note: TSA has a goal of <10 minutes waiting for screening
• System and goals are always changing
We will always have security challenges, and ISyE/DSOR tools
will always help us address some of these challenges.
Security often improved through deterrent effect, not
detection.
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
16. What about screening passengers?
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
17. Risk-Based Passenger Screening
Passenger risk assessments have been used since 1996.
Most passengers are low-risk.
What is known: As risk increases, likelihood of a security threat
outcome increases.
Risk-based security: Captured in the Dynamic Aviation Risk
Management System (DARMS) paradigm.
Risk-based screening vs. Random screening
How do we do it?
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
18. Risk-based Screening Framework
Know everyone’s risk before they enter security screening;
allocate security resources to match risk.
Final Assessments:
Was there a successful attack?
Was the system being tested?
How do match limited screening resources to passengers?
Assumptions:
Security resources are limited.
Screening procedures make errors
* False alarms, False clears.
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
19. How can passengers be assigned?
Ahead of time:
* Integer programming models1
In real-time:
* Markov Decision Processes2
* Control Theory models3
Based on the Sequential Stochastic Assignment Problem (SSAP)
Security resources allocated to a passenger match the retrospective
security resource allocation.
1 McLay, L.A., Jacobson, S.H., Kobza, J.E., 2006
2 McLay, L.A., Jacobson, S.H., Nikolaev, A.G., 2009
3 Lee, A.J., McLay, L.A., Jacobson, S.H., 2009
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
20. Real-time simulation of optimal
policy
Time
Passenger
risk
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
21. Risk Profiles of screening classes
Passenger riskLaura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Conditional distribution of
passenger risk assessment
values
22. Screening Procedure Reality
Three possible scenarios:
1. Right Screening
2. Under Screening
3. Over Screening
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
23. What if you get it wrong?
Will the system be more vulnerable?
Overestimating risk*: True risk level < estimated risk level
When risk is overestimated, high value security resources get
used on low risk passengers, which may leave fewer high value
security resources available for high risk passengers.
Underestimating risk: True risk level > estimated risk level
When risk is underestimated, high value security resources get
used on high risk passengers, which targets more closely the
high value security resources for high risk passengers
* tendency is to overestimate risk
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
24. Key observations
Right Screening is ideal, but challenging to attain for all passengers.
Better security is achieved by targeting scarce screening resources
at the “riskiest” passengers and doing less screening on most
passengers.
TSA Precheck implicitly focuses on reducing screening for some to
target resources at “risky” passengers, which is why it makes the air
system safer, in low risk, cost-constrained environments.
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
25. Gaming Strategies
Blocking
Overtaxing / decoys
Timing
Trial and Testing
All can disrupt the system in limited resource environments
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
26. Bad intentions
We are trying to prevent attacks
Is the goal to identify non-threat passengers with banned
items or threat passengers with bad intentions (and no
banned items)?
Risk based security focuses on the latter
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
27. Final thoughts
• Risk reduction, not risk elimination
• If you cannot find a needle in a haystack, make a smaller haystack
• Target limited resources at a small haystack
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
29. In the news: we need DSOR
Queueing and scheduling
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
30. In the news!
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Live at 4 on WISC-TV, May 31, 2016
http://www.channel3000.com/news/Professor-talks-about-science-to-traveling-airport-lines/39814720
31. Thank you!
Laura Albert McLay, PhD
Associate Professor
University of Wisconsin-Madison
Industrial and Systems Engineering
laura@engr.wisc.edu
@lauramclay
http://punkrockOR.com
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison
Blog posts:
Aviation security, there and back again
Aviation security: is more really more?
32. References
Jacobson, S.H., McLay, L.A., Kobza, J.E., Bowman, J.M., 2005, “Modeling and Analyzing Multiple Station
Baggage Screening Security System Performance," Naval Research Logistics, 52(1), 30-45.
Jacobson, S.H., McLay, L.A., Virta, J.L., Kobza, J.E., 2005, “Integer Program Models for the Deployment
of Airport Baggage Screening Security Devices," Optimization and Engineering, 6(3), 339-359.
McLay, L.A., Jacobson, S.H., Kobza, J.E., 2006, “A Multilevel Passenger Screening Problem for Aviation
Security,” Naval Research Logistics, 53(3), 183-197.
McLay, L.A., Jacobson, S.H., Kobza, J.E., 2007, “Integer Programming Models and Analysis for a
Multilevel Passenger Screening Problem, “IIE Transactions, 39(1), 73-81.
Nikolaev, A.G., Jacobson, S.H., McLay, L.A., 2007, “A Sequential Stochastic Security System Design
Problem for Aviation Security,” Transportation Science, 41(2), 182-194.
McLay, L.A., Jacobson, S.H., Kobza, J.E., 2008, “The Tradeoff between Technology and Prescreening
Intelligence in Checked Baggage Screening for Aviation Security,” Journal of Transportation Security,
1(2), 107-126.
McLay, L.A., Jacobson, S.H., Nikolaev, A.G., 2009, “A Sequential Stochastic Passenger Screening Problem
for Aviation Security,” IIE Transactions, 41(6), 575-591 (2009 Outstanding IIE Publication Award).
Lee, A.J., McLay, L.A., Jacobson, S.H., 2009, “Designing Aviation Security Passenger Screening Systems
using Nonlinear Control,” SIAM Journal on Control and Optimization, 48(4), 2085-2105.
McLay, L.A., Lee, A.J., Jacobson, S.H., 2010, “Risk-Based Policies for Aviation Security Checkpoint
Screening,” Transportation Science, 44(3), 333-349.
Laura Albert McLay, June 4 2016 ISYE 50th Anniversation Reunion @ UW-Madison