IDEAS home Printed from https://ideas.repec.org/a/spr/annopr/v187y2011i1p65-8710.1007-s10479-010-0717-y.html
   My bibliography  Save this article

Detecting nuclear materials smuggling: using radiography to improve container inspection policies

Author

Listed:
  • Gary Gaukler
  • Chenhua Li
  • Rory Cannaday
  • Sunil Chirayath
  • Yu Ding

Abstract

This paper proposes a layered container inspection system for detecting illicit nuclear materials using radiography information. We argue that the current inspection system, relying heavily on the Automated Targeting System (ATS) and passive radiation detectors, is inherently incapable of reliably detecting shielded radioactive materials, especially highly enriched uranium (HEU). This motivates the development of a new inspection system, which is designed to address a fundamental flaw of the ATS-based system, allowing for improved defense against sophisticated adversaries. In the proposed inspection system, all cargo containers go through x-ray imaging equipment first. From the x-ray image, a hardness measure of the container is computed. This hardness measure characterizes how likely it is that shielded HEU, if it does exist in the container, will not be detected in a subsequent passive detection step. Depending on the value of the hardness, the lower-hardness containers are sent to passive detection and the high-hardness containers are sent directly to active detection. This paper explores the trade-off between the detection probability of the new inspection system and the expected sojourn time a container spends in the system. The solution details and decision-making tools for using such a system are provided. Comparisons are made between the proposed system and the current ATS-based nuclear inspection system. Copyright US Government 2011

Suggested Citation

  • Gary Gaukler & Chenhua Li & Rory Cannaday & Sunil Chirayath & Yu Ding, 2011. "Detecting nuclear materials smuggling: using radiography to improve container inspection policies," Annals of Operations Research, Springer, vol. 187(1), pages 65-87, July.
  • Handle: RePEc:spr:annopr:v:187:y:2011:i:1:p:65-87:10.1007/s10479-010-0717-y
    DOI: 10.1007/s10479-010-0717-y
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1007/s10479-010-0717-y
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s10479-010-0717-y?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Moffitt L. Joe & Stranlund John K. & Field Barry C., 2005. "Inspections to Avert Terrorism: Robustness Under Severe Uncertainty," Journal of Homeland Security and Emergency Management, De Gruyter, vol. 2(3), pages 1-19, September.
    2. John E. Kobza & Sheldon H. Jacobson, 1996. "Addressing the Dependency Problem in Access Security System Architecture Design," Risk Analysis, John Wiley & Sons, vol. 16(6), pages 801-812, December.
    3. Lawrence M. Wein & Alex H. Wilkins & Manas Baveja & Stephen E. Flynn, 2006. "Preventing the Importation of Illicit Nuclear Materials in Shipping Containers," Risk Analysis, John Wiley & Sons, vol. 26(5), pages 1377-1393, October.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Chenhua Li & Gary M. Gaukler & Yu Ding, 2013. "Using container inspection history to improve interdiction logistics for illicit nuclear materials," Naval Research Logistics (NRL), John Wiley & Sons, vol. 60(6), pages 433-448, September.
    2. Gary M. Gaukler & Chenhua Li & Yu Ding & Sunil S. Chirayath, 2012. "Detecting Nuclear Materials Smuggling: Performance Evaluation of Container Inspection Policies," Risk Analysis, John Wiley & Sons, vol. 32(3), pages 531-554, March.
    3. Samrat Chatterjee & Daniel E. Salazar & Isaac Maya, 2014. "A Systems Approach for Evaluating the Effectiveness of Radiological and Nuclear Detection Architectures in Urban Areas," Systems Engineering, John Wiley & Sons, vol. 17(2), pages 157-165, June.
    4. McLay, Laura A. & Dreiding, Rebecca, 2012. "Multilevel, threshold-based policies for cargo container security screening systems," European Journal of Operational Research, Elsevier, vol. 220(2), pages 522-529.
    5. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    6. Dreiding, Rebecca A. & McLay, Laura A., 2013. "An integrated model for screening cargo containers," European Journal of Operational Research, Elsevier, vol. 230(1), pages 181-189.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Laura McLay & Jamie Lloyd & Emily Niman, 2011. "Interdicting nuclear material on cargo containers using knapsack problem models," Annals of Operations Research, Springer, vol. 187(1), pages 185-205, July.
    2. Gary M. Gaukler & Chenhua Li & Yu Ding & Sunil S. Chirayath, 2012. "Detecting Nuclear Materials Smuggling: Performance Evaluation of Container Inspection Policies," Risk Analysis, John Wiley & Sons, vol. 32(3), pages 531-554, March.
    3. Vicki Bier & Naraphorn Haphuriwat, 2011. "Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks," Annals of Operations Research, Springer, vol. 187(1), pages 137-158, July.
    4. David Anderson, 2021. "Optimising multi-layered security screening," Journal of Transportation Security, Springer, vol. 14(3), pages 249-273, December.
    5. P. Daniel Wright & Matthew J. Liberatore & Robert L. Nydick, 2006. "A Survey of Operations Research Models and Applications in Homeland Security," Interfaces, INFORMS, vol. 36(6), pages 514-529, December.
    6. Michael P. Atkinson & Lawrence M. Wein, 2008. "TECHNICAL NOTE---Spatial Queueing Analysis of an Interdiction System to Protect Cities from a Nuclear Terrorist Attack," Operations Research, INFORMS, vol. 56(1), pages 247-254, February.
    7. Ben-Haim, Yakov, 2021. "Feedback for energy conservation: An info-gap approach," Energy, Elsevier, vol. 223(C).
    8. Yakov Ben‐Haim, 2011. "Interpreting Null Results from Measurements with Uncertain Correlations: An Info‐Gap Approach," Risk Analysis, John Wiley & Sons, vol. 31(1), pages 78-85, January.
    9. Nedialko Dimitrov & Dennis Michalopoulos & David Morton & Michael Nehme & Feng Pan & Elmira Popova & Erich Schneider & Gregory Thoreson, 2011. "Network deployment of radiation detectors with physics-based detection probability calculations," Annals of Operations Research, Springer, vol. 187(1), pages 207-228, July.
    10. Stranlund, John K. & Ben-Haim, Yakov, 2006. "Price-Based vs. Quantity-Based Environmental Regulation under Knightian Uncertainty: An Info-Gap Robust Satisficing Perspective," Working Paper Series 14528, University of Massachusetts, Amherst, Department of Resource Economics.
    11. L. Joe Moffitt & John K. Stranlund & Craig D. Osteen, 2009. "Securing the Border from Invasives: Robust Inspections Under Severe Uncertainty," Working Papers 2009-6, University of Massachusetts Amherst, Department of Resource Economics.
    12. Nagurney, Anna & Shukla, Shivani & Nagurney, Ladimer S. & Saberi, Sara, 2018. "A game theory model for freight service provision security investments for high-value cargo," Economics of Transportation, Elsevier, vol. 16(C), pages 21-28.
    13. Alexander G. Nikolaev & Sheldon H. Jacobson & Laura A. McLay, 2007. "A Sequential Stochastic Security System Design Problem for Aviation Security," Transportation Science, INFORMS, vol. 41(2), pages 182-194, May.
    14. Michael P. Atkinson & Zheng Cao & Lawrence M. Wein, 2008. "Optimal Stopping Analysis of a Radiation Detection System to Protect Cities from a Nuclear Terrorist Attack," Risk Analysis, John Wiley & Sons, vol. 28(2), pages 353-371, April.
    15. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    16. Alexander Gutfraind, 2023. "Risk-reducing design and operations toolkit: 90 strategies for managing risk and uncertainty in decision problems," Papers 2309.03133, arXiv.org.
    17. J. S. Busby & B. Green & D. Hutchison, 2017. "Analysis of Affordance, Time, and Adaptation in the Assessment of Industrial Control System Cybersecurity Risk," Risk Analysis, John Wiley & Sons, vol. 37(7), pages 1298-1314, July.
    18. Xiaofeng Nie & Rajan Batta & Colin G. Drury & Li Lin, 2009. "The Impact of Joint Responses of Devices in an Airport Security System," Risk Analysis, John Wiley & Sons, vol. 29(2), pages 298-311, February.
    19. Lawrence M. Wein, 2009. "OR Forum---Homeland Security: From Mathematical Models to Policy Implementation: The 2008 Philip McCord Morse Lecture," Operations Research, INFORMS, vol. 57(4), pages 801-811, August.
    20. Nie, Xiaofeng, 2019. "The impact of conditional dependence on checked baggage screening," European Journal of Operational Research, Elsevier, vol. 278(3), pages 883-893.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:annopr:v:187:y:2011:i:1:p:65-87:10.1007/s10479-010-0717-y. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.