IDEAS home Printed from https://ideas.repec.org/a/inm/orinte/v40y2010i4p267-290.html
   My bibliography  Save this article

Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service

Author

Listed:
  • Manish Jain

    (Computer Science Department, University of Southern California, Los Angeles, California 90089)

  • Jason Tsai

    (Computer Science Department, University of Southern California, Los Angeles, California 90089)

  • James Pita

    (Computer Science Department, University of Southern California, Los Angeles, California 90089)

  • Christopher Kiekintveld

    (Computer Science Department, University of Southern California, Los Angeles, California 90089)

  • Shyamsunder Rathi

    (Computer Science Department, University of Southern California, Los Angeles, California 90089)

  • Milind Tambe

    (Computer Science Department, University of Southern California, Los Angeles, California 90089)

  • Fernando Ordóñez

    (Department of Industrial and Systems Engineering, University of Southern California, Los Angeles, California 90089; and Department of Industrial Engineering, University of Chile, 8330111 Santiago, Chile)

Abstract

The increasing threat of terrorism makes security at major locations of economic or political importance a major concern. Limited security resources prevent complete security coverage, allowing adversaries to observe and exploit patterns in patrolling or monitoring, and enabling them to plan attacks that avoid existing patrols. The use of randomized security policies that are more difficult for adversaries to predict and exploit can counter their surveillance capabilities. We describe two applications, ARMOR and IRIS, that assist security forces in randomizing their operations. These applications are based on fast algorithms for solving large instances of Bayesian Stackelberg games. Police at the Los Angeles International Airport deploy ARMOR to randomize the placement of checkpoints on roads entering the airport and the routes of canine unit patrols within the airport terminals. The Federal Air Marshal Service has deployed IRIS in a pilot program to randomize the schedules of air marshals on international flights. This paper examines the design choices, information, and evaluation criteria that were critical to developing these applications.

Suggested Citation

  • Manish Jain & Jason Tsai & James Pita & Christopher Kiekintveld & Shyamsunder Rathi & Milind Tambe & Fernando Ordóñez, 2010. "Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service," Interfaces, INFORMS, vol. 40(4), pages 267-290, August.
  • Handle: RePEc:inm:orinte:v:40:y:2010:i:4:p:267-290
    DOI: 10.1287/inte.1100.0505
    as

    Download full text from publisher

    File URL: http://dx.doi.org/10.1287/inte.1100.0505
    Download Restriction: no

    File URL: https://libkey.io/10.1287/inte.1100.0505?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Koller, Daphne & Milch, Brian, 2003. "Multi-agent influence diagrams for representing and solving games," Games and Economic Behavior, Elsevier, vol. 45(1), pages 181-221, October.
    2. R.J. Aumann & S. Hart (ed.), 2002. "Handbook of Game Theory with Economic Applications," Handbook of Game Theory with Economic Applications, Elsevier, edition 1, volume 3, number 3.
    3. Lazar Babu, Vellara L. & Batta, Rajan & Lin, Li, 2006. "Passenger grouping under constant threat probability in an airport security system," European Journal of Operational Research, Elsevier, vol. 168(2), pages 633-644, January.
    4. Martin J. Osborne & Ariel Rubinstein, 1994. "A Course in Game Theory," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262650401, December.
    5. Gerald Brown & Matthew Carlyle & Javier Salmerón & Kevin Wood, 2006. "Defending Critical Infrastructure," Interfaces, INFORMS, vol. 36(6), pages 530-544, December.
    6. Vicki M. Bier, 2007. "Choosing What to Protect," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 607-620, June.
    7. John C. Harsanyi & Reinhard Selten, 1972. "A Generalized Nash Solution for Two-Person Bargaining Games with Incomplete Information," Management Science, INFORMS, vol. 18(5-Part-2), pages 80-106, January.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Nishizaki, Ichiro & Hayashida, Tomohiro & Sekizaki, Shinya & Okabe, Junya, 2022. "Data envelopment analysis approaches for two-level production and distribution planning problems," European Journal of Operational Research, Elsevier, vol. 300(1), pages 255-268.
    2. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    3. Nicholas Scurich & Richard S. John, 2014. "Perceptions of Randomized Security Schedules," Risk Analysis, John Wiley & Sons, vol. 34(4), pages 765-770, April.
    4. Karwowski, Jan & Mańdziuk, Jacek, 2019. "A Monte Carlo Tree Search approach to finding efficient patrolling schemes on graphs," European Journal of Operational Research, Elsevier, vol. 277(1), pages 255-268.
    5. Gianfranco Gambarelli & Daniele Gervasio & Francesca Maggioni & Daniel Faccini, 2022. "A Stackelberg game for the Italian tax evasion problem," Computational Management Science, Springer, vol. 19(2), pages 295-307, June.
    6. Beck, Yasmine & Ljubić, Ivana & Schmidt, Martin, 2023. "A survey on bilevel optimization under uncertainty," European Journal of Operational Research, Elsevier, vol. 311(2), pages 401-426.
    7. Guzmán, Cristóbal & Riffo, Javiera & Telha, Claudio & Van Vyve, Mathieu, 2022. "A sequential Stackelberg game for dynamic inspection problems," European Journal of Operational Research, Elsevier, vol. 302(2), pages 727-739.
    8. Guzman, Cristobal & Riffo, Javiera & Telha, Claudio & Van Vyve, Mathieu, 2021. "A Sequential Stackelberg Game for Dynamic Inspection Problems," LIDAM Discussion Papers CORE 2021036, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
    9. Tomohiro Hayashida & Ichiro Nishizaki & Shinya Sekizaki & Junya Okabe, 2023. "Data Envelopment Analysis Approaches for Multiperiod Two-Level Production and Distribution Planning Problems," Mathematics, MDPI, vol. 11(21), pages 1-25, October.
    10. Casorrán, Carlos & Fortz, Bernard & Labbé, Martine & Ordóñez, Fernando, 2019. "A study of general and security Stackelberg game formulations," European Journal of Operational Research, Elsevier, vol. 278(3), pages 855-868.
    11. Chao Zhang & Shahrzad Gholami & Debarun Kar & Arunesh Sinha & Manish Jain & Ripple Goyal & Milind Tambe, 2016. "Keeping Pace with Criminals: An Extended Study of Designing Patrol Allocation against Adaptive Opportunistic Criminals," Games, MDPI, vol. 7(3), pages 1-27, June.
    12. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    13. Frederic Moisan & Cleotilde Gonzalez, 2017. "Security under Uncertainty : Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers," Post-Print hal-03188217, HAL.
    14. Hoong Chuin Lau & Zhi Yuan & Aldy Gunawan, 2016. "Patrol scheduling in urban rail network," Annals of Operations Research, Springer, vol. 239(1), pages 317-342, April.
    15. Tamara Stotz & Angela Bearth & Signe Maria Ghelfi & Michael Siegrist, 2020. "Evaluating the Perceived Efficacy of Randomized Security Measures at Airports," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1469-1480, July.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Bo An & Fernando Ordóñez & Milind Tambe & Eric Shieh & Rong Yang & Craig Baldwin & Joseph DiRenzo & Kathryn Moretti & Ben Maule & Garrett Meyer, 2013. "A Deployed Quantal Response-Based Patrol Planning System for the U.S. Coast Guard," Interfaces, INFORMS, vol. 43(5), pages 400-420, October.
    2. Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.
    3. José-Manuel Giménez-Gómez & António Osório & Josep E. Peris, 2015. "From Bargaining Solutions to Claims Rules: A Proportional Approach," Games, MDPI, vol. 6(1), pages 1-7, March.
    4. Ünsal Özdilek, 2020. "Land and building separation based on Shapley values," Palgrave Communications, Palgrave Macmillan, vol. 6(1), pages 1-13, December.
    5. de Clippel, Geoffroy & Pérez-Castrillo, David & Wettstein, David, 2012. "Egalitarian equivalence under asymmetric information," Games and Economic Behavior, Elsevier, vol. 75(1), pages 413-423.
    6. Gonzalez, Stéphane & Grabisch, Michel, 2016. "Multicoalitional solutions," Journal of Mathematical Economics, Elsevier, vol. 64(C), pages 1-10.
    7. Elges, Carsten, 2016. "Die Preissetzung in Unternehmenskooperationen: Erste spieltheoretische Überlegungen," Arbeitspapiere 162, University of Münster, Institute for Cooperatives.
    8. Insua, Insua Rios & Rios, Jesus & Banks, David, 2009. "Adversarial Risk Analysis," Journal of the American Statistical Association, American Statistical Association, vol. 104(486), pages 841-854.
    9. Guilhem Lecouteux, 2018. "Bayesian game theorists and non-Bayesian players," The European Journal of the History of Economic Thought, Taylor & Francis Journals, vol. 25(6), pages 1420-1454, November.
    10. Söllner, Matthias, 2008. "Menschliches Verhalten in elektronischen Märkten," Bayreuth Reports on Information Systems Management 34, University of Bayreuth, Chair of Information Systems Management.
    11. Johannes Treutlein, 2023. "Modeling evidential cooperation in large worlds," Papers 2307.04879, arXiv.org, revised Aug 2023.
    12. Stefano Moretti & Fioravante Patrone, 2008. "Transversality of the Shapley value," TOP: An Official Journal of the Spanish Society of Statistics and Operations Research, Springer;Sociedad de Estadística e Investigación Operativa, vol. 16(1), pages 1-41, July.
    13. Jyotishka Ray & Syam Menon & Vijay Mookerjee, 2020. "Bargaining over Data: When Does Making the Buyer More Informed Help?," Information Systems Research, INFORMS, vol. 31(1), pages 1-15, March.
    14. Lawrence C. Y. Choo, 2014. "Trading Participation Rights to the “Red Hat Puzzle”. An Experiment," Discussion Papers 1408, University of Exeter, Department of Economics.
    15. David Rios Insua & David Banks & Jesus Rios, 2016. "Modeling Opponents in Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 742-755, April.
    16. Steve Alpern & Alec Morton & Katerina Papadaki, 2011. "Patrolling Games," Operations Research, INFORMS, vol. 59(5), pages 1246-1257, October.
    17. Zhengqiu Zhu & Bin Chen & Genserik Reniers & Laobing Zhang & Sihang Qiu & Xiaogang Qiu, 2017. "Playing Chemical Plant Environmental Protection Games with Historical Monitoring Data," IJERPH, MDPI, vol. 14(10), pages 1-23, September.
    18. van Damme, E.E.C., 2000. "Non-cooperative Games," Discussion Paper 2000-96, Tilburg University, Center for Economic Research.
    19. Laobing Zhang & Genserik Reniers, 2016. "A Game‐Theoretical Model to Improve Process Plant Protection from Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 36(12), pages 2285-2297, December.
    20. Xiao Luo & Xuewen Qian & Yang Sun, 2021. "The algebraic geometry of perfect and sequential equilibrium: an extension," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 71(2), pages 579-601, March.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:orinte:v:40:y:2010:i:4:p:267-290. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.