IDEAS home Printed from https://ideas.repec.org/a/spr/annopr/v187y2011i1p65-8710.1007-s10479-010-0717-y.html
   My bibliography  Save this article

Detecting nuclear materials smuggling: using radiography to improve container inspection policies

Author

Listed:
  • Gary Gaukler
  • Chenhua Li
  • Rory Cannaday
  • Sunil Chirayath
  • Yu Ding

Abstract

This paper proposes a layered container inspection system for detecting illicit nuclear materials using radiography information. We argue that the current inspection system, relying heavily on the Automated Targeting System (ATS) and passive radiation detectors, is inherently incapable of reliably detecting shielded radioactive materials, especially highly enriched uranium (HEU). This motivates the development of a new inspection system, which is designed to address a fundamental flaw of the ATS-based system, allowing for improved defense against sophisticated adversaries. In the proposed inspection system, all cargo containers go through x-ray imaging equipment first. From the x-ray image, a hardness measure of the container is computed. This hardness measure characterizes how likely it is that shielded HEU, if it does exist in the container, will not be detected in a subsequent passive detection step. Depending on the value of the hardness, the lower-hardness containers are sent to passive detection and the high-hardness containers are sent directly to active detection. This paper explores the trade-off between the detection probability of the new inspection system and the expected sojourn time a container spends in the system. The solution details and decision-making tools for using such a system are provided. Comparisons are made between the proposed system and the current ATS-based nuclear inspection system. Copyright US Government 2011

Suggested Citation

  • Gary Gaukler & Chenhua Li & Rory Cannaday & Sunil Chirayath & Yu Ding, 2011. "Detecting nuclear materials smuggling: using radiography to improve container inspection policies," Annals of Operations Research, Springer, vol. 187(1), pages 65-87, July.
  • Handle: RePEc:spr:annopr:v:187:y:2011:i:1:p:65-87:10.1007/s10479-010-0717-y
    DOI: 10.1007/s10479-010-0717-y
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1007/s10479-010-0717-y
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s10479-010-0717-y?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. John E. Kobza & Sheldon H. Jacobson, 1996. "Addressing the Dependency Problem in Access Security System Architecture Design," Risk Analysis, John Wiley & Sons, vol. 16(6), pages 801-812, December.
    2. Lawrence M. Wein & Alex H. Wilkins & Manas Baveja & Stephen E. Flynn, 2006. "Preventing the Importation of Illicit Nuclear Materials in Shipping Containers," Risk Analysis, John Wiley & Sons, vol. 26(5), pages 1377-1393, October.
    3. Moffitt L. Joe & Stranlund John K. & Field Barry C., 2005. "Inspections to Avert Terrorism: Robustness Under Severe Uncertainty," Journal of Homeland Security and Emergency Management, De Gruyter, vol. 2(3), pages 1-19, September.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Chenhua Li & Gary M. Gaukler & Yu Ding, 2013. "Using container inspection history to improve interdiction logistics for illicit nuclear materials," Naval Research Logistics (NRL), John Wiley & Sons, vol. 60(6), pages 433-448, September.
    2. Gary M. Gaukler & Chenhua Li & Yu Ding & Sunil S. Chirayath, 2012. "Detecting Nuclear Materials Smuggling: Performance Evaluation of Container Inspection Policies," Risk Analysis, John Wiley & Sons, vol. 32(3), pages 531-554, March.
    3. Samrat Chatterjee & Daniel E. Salazar & Isaac Maya, 2014. "A Systems Approach for Evaluating the Effectiveness of Radiological and Nuclear Detection Architectures in Urban Areas," Systems Engineering, John Wiley & Sons, vol. 17(2), pages 157-165, June.
    4. McLay, Laura A. & Dreiding, Rebecca, 2012. "Multilevel, threshold-based policies for cargo container security screening systems," European Journal of Operational Research, Elsevier, vol. 220(2), pages 522-529.
    5. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    6. Dreiding, Rebecca A. & McLay, Laura A., 2013. "An integrated model for screening cargo containers," European Journal of Operational Research, Elsevier, vol. 230(1), pages 181-189.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Laura McLay & Jamie Lloyd & Emily Niman, 2011. "Interdicting nuclear material on cargo containers using knapsack problem models," Annals of Operations Research, Springer, vol. 187(1), pages 185-205, July.
    2. Vicki Bier & Naraphorn Haphuriwat, 2011. "Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks," Annals of Operations Research, Springer, vol. 187(1), pages 137-158, July.
    3. Gary M. Gaukler & Chenhua Li & Yu Ding & Sunil S. Chirayath, 2012. "Detecting Nuclear Materials Smuggling: Performance Evaluation of Container Inspection Policies," Risk Analysis, John Wiley & Sons, vol. 32(3), pages 531-554, March.
    4. Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.
    5. David Anderson, 2021. "Optimising multi-layered security screening," Journal of Transportation Security, Springer, vol. 14(3), pages 249-273, December.
    6. John K. Stranlund & Barry C. Field, 2006. "On the Production of Homeland Security Under True Uncertainty," Working Papers 2006-5, University of Massachusetts Amherst, Department of Resource Economics.
    7. P. Daniel Wright & Matthew J. Liberatore & Robert L. Nydick, 2006. "A Survey of Operations Research Models and Applications in Homeland Security," Interfaces, INFORMS, vol. 36(6), pages 514-529, December.
    8. David Madigan & Sushil Mittal & Fred Roberts, 2011. "Efficient sequential decision‐making algorithms for container inspection operations," Naval Research Logistics (NRL), John Wiley & Sons, vol. 58(7), pages 637-654, October.
    9. Henry H. Willis & Tom LaTourrette, 2008. "Using Probabilistic Terrorism Risk Modeling for Regulatory Benefit‐Cost Analysis: Application to the Western Hemisphere Travel Initiative in the Land Environment," Risk Analysis, John Wiley & Sons, vol. 28(2), pages 325-339, April.
    10. Niyazi Bakır, 2011. "A Stackelberg game model for resource allocation in cargo container security," Annals of Operations Research, Springer, vol. 187(1), pages 5-22, July.
    11. Michael P. Atkinson & Lawrence M. Wein, 2008. "TECHNICAL NOTE---Spatial Queueing Analysis of an Interdiction System to Protect Cities from a Nuclear Terrorist Attack," Operations Research, INFORMS, vol. 56(1), pages 247-254, February.
    12. Wieck, Christine & Rudloff, Bettina, 2007. "The Bioterrorism Act of the USA and international food trade: evaluating WTO conformity and effects on bilateral imports," German Journal of Agricultural Economics, Humboldt-Universitaet zu Berlin, Department for Agricultural Economics, vol. 56(03), pages 1-14.
    13. Ben-Haim, Yakov, 2021. "Feedback for energy conservation: An info-gap approach," Energy, Elsevier, vol. 223(C).
    14. Yakov Ben‐Haim, 2011. "Interpreting Null Results from Measurements with Uncertain Correlations: An Info‐Gap Approach," Risk Analysis, John Wiley & Sons, vol. 31(1), pages 78-85, January.
    15. Nedialko Dimitrov & Dennis Michalopoulos & David Morton & Michael Nehme & Feng Pan & Elmira Popova & Erich Schneider & Gregory Thoreson, 2011. "Network deployment of radiation detectors with physics-based detection probability calculations," Annals of Operations Research, Springer, vol. 187(1), pages 207-228, July.
    16. Yada Zhu & Mingyu Li & Christina Young & Minge Xie & Elsayed Elsayed, 2011. "Impact of measurement error on container inspection policies at port-of-entry," Annals of Operations Research, Springer, vol. 187(1), pages 23-43, July.
    17. Stranlund, John K. & Ben-Haim, Yakov, 2006. "Price-Based vs. Quantity-Based Environmental Regulation under Knightian Uncertainty: An Info-Gap Robust Satisficing Perspective," Working Paper Series 14528, University of Massachusetts, Amherst, Department of Resource Economics.
    18. L. Joe Moffitt & John K. Stranlund & Craig D. Osteen, 2009. "Securing the Border from Invasives: Robust Inspections Under Severe Uncertainty," Working Papers 2009-6, University of Massachusetts Amherst, Department of Resource Economics.
    19. Nagurney, Anna & Shukla, Shivani & Nagurney, Ladimer S. & Saberi, Sara, 2018. "A game theory model for freight service provision security investments for high-value cargo," Economics of Transportation, Elsevier, vol. 16(C), pages 21-28.
    20. Alexander G. Nikolaev & Sheldon H. Jacobson & Laura A. McLay, 2007. "A Sequential Stochastic Security System Design Problem for Aviation Security," Transportation Science, INFORMS, vol. 41(2), pages 182-194, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:annopr:v:187:y:2011:i:1:p:65-87:10.1007/s10479-010-0717-y. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.