IDEAS home Printed from https://ideas.repec.org/a/eee/soceps/v47y2013i1p2-8.html
   My bibliography  Save this article

Staffing models for covert counterterrorism agencies

Author

Listed:
  • Kaplan, Edward H.

Abstract

This article presents staffing models for covert counterterrorism agencies such as the New York City Police Department, the US Federal Bureau of Investigation, Britain's Security Service or the Israeli Shin Bet. The models ask how many good guys are needed to catch the bad guys, and how should agents be deployed? Building upon the terror queue model of the detection and interdiction of terror plots by undercover agents, the staffing models developed respond to objectives such as: prevent a specified fraction of terror attacks, maximize the benefits-minus-costs of preventing attacks, staff in expectation that smart terrorists will attack with a rate that optimizes their outcomes, and allocate a fixed number of agents across groups to equalize detection rates, or prevent as many attacks as possible, or prevent as many attack casualties as possible. Numerical examples based on published data describing counterterrorism operations in the United States and Israel are provided throughout.

Suggested Citation

  • Kaplan, Edward H., 2013. "Staffing models for covert counterterrorism agencies," Socio-Economic Planning Sciences, Elsevier, vol. 47(1), pages 2-8.
  • Handle: RePEc:eee:soceps:v:47:y:2013:i:1:p:2-8
    DOI: 10.1016/j.seps.2012.09.006
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0038012112000547
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.seps.2012.09.006?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Golany, Boaz & Kaplan, Edward H. & Marmur, Abraham & Rothblum, Uriel G., 2009. "Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks," European Journal of Operational Research, Elsevier, vol. 192(1), pages 198-208, January.
    2. Jonathan Feinstein & Edward Kaplan, 2011. "Counterterror intelligence operations and terror attacks," Public Choice, Springer, vol. 149(3), pages 281-295, December.
    3. J. Michael Steele, 1989. "Models for Managing Secrets," Management Science, INFORMS, vol. 35(2), pages 240-248, February.
    4. Jonathan S. Feinstein & Edward H. Kaplan, 2010. "Analysis of a Strategic Terror Organization," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 281-302, April.
    5. Edward H. Kaplan & Moshe Kress & Roberto Szechtman, 2010. "Confronting Entrenched Insurgents," Operations Research, INFORMS, vol. 58(2), pages 329-341, April.
    6. O. Garnet & A. Mandelbaum & M. Reiman, 2002. "Designing a Call Center with Impatient Customers," Manufacturing & Service Operations Management, INFORMS, vol. 4(3), pages 208-227, October.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Abdulrahman ALRASSI, 2014. "Counterterrorism Efforts Of Saudi Arabia In Create Stability Of The World," SEA - Practical Application of Science, Romanian Foundation for Business Intelligence, Editorial Department, issue 5, pages 117-122, November.
    2. Alemayehu, Fikru K. & Kumbhakar, Subal C. & Landazuri Tveteraas, Sigbjørn, 2022. "Estimation of staff use efficiency: Evidence from the hospitality industry," Technological Forecasting and Social Change, Elsevier, vol. 178(C).
    3. Seidl, Andrea & Kaplan, Edward H. & Caulkins, Jonathan P. & Wrzaczek, Stefan & Feichtinger, Gustav, 2016. "Optimal control of a terror queue," European Journal of Operational Research, Elsevier, vol. 248(1), pages 246-256.
    4. Liu, Zhongyi & Liu, Jingchen & Zhai, Xin & Wang, Guanying, 2019. "Police staffing and workload assignment in law enforcement using multi-server queueing models," European Journal of Operational Research, Elsevier, vol. 276(2), pages 614-625.
    5. Stefan Wrzaczek & Edward H. Kaplan & Jonathan P. Caulkins & Andrea Seidl & Gustav Feichtinger, 2017. "Differential Terror Queue Games," Dynamic Games and Applications, Springer, vol. 7(4), pages 578-593, December.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ulrich Hendel, 2016. "‘Look like the innocent flower, but be the serpent under’t’: mimicking behaviour of growth-oriented terrorist organizations," Defence and Peace Economics, Taylor & Francis Journals, vol. 27(5), pages 665-687, September.
    2. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    3. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    4. Hendel, Ulrich, 2012. ""Look like the innocent flower, but be the serpent under't": Mimicking behaviour of growth-oriented terrorist organizations," Discussion Papers in Economics 13998, University of Munich, Department of Economics.
    5. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    6. Jonathan Feinstein & Edward Kaplan, 2011. "Counterterror intelligence operations and terror attacks," Public Choice, Springer, vol. 149(3), pages 281-295, December.
    7. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    8. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    9. Stefan Wrzaczek & Edward H. Kaplan & Jonathan P. Caulkins & Andrea Seidl & Gustav Feichtinger, 2017. "Differential Terror Queue Games," Dynamic Games and Applications, Springer, vol. 7(4), pages 578-593, December.
    10. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    11. De Munck, Thomas & Chevalier, Philippe & Tancrez, Jean-Sébastien, 2023. "Managing priorities on on-demand service platforms with waiting time differentiation," International Journal of Production Economics, Elsevier, vol. 266(C).
    12. Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
    13. Bolandifar, Ehsan & DeHoratius, Nicole & Olsen, Tava, 2023. "Modeling abandonment behavior among patients," European Journal of Operational Research, Elsevier, vol. 306(1), pages 243-254.
    14. Jetter, Michael, 2017. "The effect of media attention on terrorism," Journal of Public Economics, Elsevier, vol. 153(C), pages 32-48.
    15. David Simchi-Levi & Nikolaos Trichakis & Peter Yun Zhang, 2019. "Designing Response Supply Chain Against Bioattacks," Operations Research, INFORMS, vol. 67(5), pages 1246-1268, September.
    16. Niyirora, Jerome & Zhuang, Jun, 2017. "Fluid approximations and control of queues in emergency departments," European Journal of Operational Research, Elsevier, vol. 261(3), pages 1110-1124.
    17. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    18. Michael J. Armstrong, 2013. "The salvo combat model with area fire," Naval Research Logistics (NRL), John Wiley & Sons, vol. 60(8), pages 652-660, December.
    19. Marshall A. Geiger & Bret Johnson & Keith L. Jones & Abdullah Kumas, 2022. "Information Leakage Around SEC Comment Letters," Management Science, INFORMS, vol. 68(11), pages 8449-8463, November.
    20. B. Golany & N. Goldberg & U. Rothblum, 2015. "Allocating multiple defensive resources in a zero-sum game setting," Annals of Operations Research, Springer, vol. 225(1), pages 91-109, February.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:soceps:v:47:y:2013:i:1:p:2-8. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/seps .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.