Multi-Game Modeling for Counter-Smuggling

被引:3
|
作者
Bakker, Craig [1 ]
Webster, Jennifer B. [1 ]
Nowak, Kathleen E. [1 ]
Chatterjee, Samrat [1 ]
Perkins, Casey J. [1 ]
Brigantic, Robert [1 ]
机构
[1] Pacific Northwest Natl Lab, POB 999,MSIN K7-20,MSIN K7-20 Richland W, Richland, WA 99352 USA
关键词
Game Theory; Counter-Terrorism; Port Security; Counter-Smuggling; Deterrence; TERRORIST ATTACKS; SYSTEM; DETERRENCE; DESIGN; COST;
D O I
10.1016/j.ress.2020.106958
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
International trade provides an avenue for terrorists to smuggle illicit materials into a target country. Policymakers need models and decision support tools that are both reliable and germane to inform their responses to this. Game theoretic approaches have been used in the analysis of counterterrorism strategies, but the models involved have often been small and abstracted. To address this need, we have developed a multi-game model to account for both security-related and economic aspects of counter-smuggling interdiction efforts. We use different games to represent different types of interactions, and these games are then coupled to each other to form an integrated model. In this paper, we demonstrate the model's capabilities on a representative system of ports (both foreign and domestic), trade routes, and commodities. We specifically investigate the impacts of changes in screening policies at domestic ports, detection device capabilities, shipping subsidies, and worldwide corruption levels. In these studies, we find that economic factors play a large role in the interdiction task and provide correspondingly important tools for deterrence.
引用
收藏
页数:30
相关论文
共 50 条
  • [41] Features of counter-trafficking in counterfeit goods, the smuggling of alcohol and tobacco at the present stage
    Aleksandrovna, Kuznetsova Irina
    [J]. LEGAL SCIENCE AND PRACTICE-BULLETIN OF NIZHNIY NOVGOROD ACADEMY OF THE MINISTRY IF THE INTERIOR OF RUSSIA, 2016, 35 (03): : 162 - 168
  • [42] Multi End-hopping Modeling and Optimization Using Cooperative Game
    Xiong, Xinli
    Yang, Lin
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 470 - 474
  • [43] Modeling costly learning and counter-learning in a defender-attacker game with private defender information
    Xu, Jie
    Zhuang, Jun
    [J]. ANNALS OF OPERATIONS RESEARCH, 2016, 236 (01) : 271 - 289
  • [44] Modeling costly learning and counter-learning in a defender-attacker game with private defender information
    Jie Xu
    Jun Zhuang
    [J]. Annals of Operations Research, 2016, 236 : 271 - 289
  • [45] THE MODELING GAME
    HENDERSON, LW
    [J]. BLOOD PURIFICATION, 1991, 9 (5-6) : 241 - 245
  • [46] The Stackelberg differential game for counter-terrorism
    Megahed A.E.-M.A.
    [J]. Quality & Quantity, 2019, 53 (1) : 207 - 220
  • [47] Voting as a Counter-Strategy in the Blame Game
    DeScioli, Peter
    Bokemper, Scott
    [J]. PSYCHOLOGICAL INQUIRY, 2014, 25 (02) : 206 - 214
  • [48] The Trump era and counter migrant smuggling: a new geopolitical order on the US-Mexico borders?
    Kouloglou, Nikolas
    [J]. CANADIAN JOURNAL AMERICAN AND CARIBBEAN STUDIES, 2023, 48 (02): : 215 - 235
  • [49] Blowtooth: a provocative pervasive game for smuggling virtual drugs through real airport security
    Ben Kirman
    Conor Linehan
    Shaun Lawson
    [J]. Personal and Ubiquitous Computing, 2012, 16 : 767 - 775
  • [50] Modeling Complex Behavior of Multi-projectile Counter UAV 12 Gauge Ammunition
    Ameloot C.
    Robbe C.
    Papy A.
    Hendrick P.
    [J]. Human Factors and Mechanical Engineering for Defense and Safety, 2022, 6 (1)