Title: Analysis and Synthesis of Loss Estimation
1  LERA Project   QUANTITATIVE ASSESSMENT OF
TERRORIST RISKS Â
Dmitry REZNIKOV Senior research fellow
Institute for Machine Sciences, RAS Â Â
Technical workshop May 31 June 2, 2006
2- BASIS PRINCIPLES IN ADDRESSING TERRORIST RISKS
- 1. Emergencies triggered by terrorist attacks
develop according to laws analogous to the
development of ordinary emergencies caused by
manmade or natural disasters ? - (1) They may be analyzed through methods
and models applied for addressing classical
problems in the risk theory. - (2) Terrorist threat should be included in
the set of threat scenarios of natural/manmade
catastrophes. - (3) Focus on the initiation stage of the
emergency triggered by a terrorist attack - 3. Intentional attacks are aimed at the most
vulnerable and critical element ? Structure of
losses is substantially modified (substantial
secondary and cascade losses). - 4. Terrorists can choose the moment and place of
an attack (to exploit systems
weaknesses) ? Game theory must become an
important part of PRA - 5. Terrorist can adapt to changes ? Dynamic
approach is needed
3Federal State Program Safety of Population and
Industrial Facilities Taking into Account Risks
of Natural and Manmade Catastrophes (1992-2000)
Federal Special-Purpose Program Reduction of
Risks and Mitigation of Consequences of Natural
and Manmade Emergencies in the Russian
Federation (2000-2005)
4INCREASE OF THE NUMBER OF TERRORIST ATTACKS IN
RUSSIA Â Â
5 TYPES OF MODERN TERRORISM Traditional terrorism
implies physical elimination (murder, abduction)
of political figures of state and social
structures as well as ordinary people in order to
achieve certain social, economic, and political
goals  Technological terrorism is represented by
actions aimed against infrastructure targets
critical to national security or committed by
means of especially dangerous technologies,
devices, and materials. Â Intellectual terrorism
is a type of terrorism in which the initial
impact factors might be specially inserted into
regulatory or technical documents, or introduced
into and design engineering elements when new
technological facilities are created or into
operation of the existing ones.
6(No Transcript)
7- CHALLENGES IN ADDRESSING TERRORIST RISKS
- Â Â Â Â Â High level of uncertainties related to
human behavior and intentions - Â Â Â Â Â Lack of relevant statistics
- Â Â Â Â Â Information is classified
- Â Â Â Â Â Dynamic nature of terrorist threat
(terrorists can adapt to current conditions and
learn from previous experience) - METHODS FOR ADDRESSING TERRORIST RISKS
- Â Â Â Â Â Probabalistic approaches (incl. Bayesian
updating procedures) - Â Â Â Â Â Possibilistic models
- Â Â Â Â Â Fuzzy sets
- Â Â Â Â Â Game theory (for addressing conflicts
between intelligent and rational decision-makers
measures and countermeasures) - Â
8(No Transcript)
9- ADVANTAGES OF THE MODEL
-  Ø provides an approach for comparing and
aggregating terrorist risks. - Â Â Â Â Â Â Â Â Â Â formalized procedure for risk
assessment - Â Â Â Â Â Â Â Â Â Â basis for rational resource
allocation. -  Ø    provides a approaches to managing
terrorist risk through - Â Â Â Â Â Â Â Â Â Â reducing threats
- Â Â Â Â Â Â Â Â Â Â reducing vulnerabilities
towards terrorist threats - Â Â Â Â Â Â Â Â Â Â reducing losses from
terrorist impacts (organizing defense
barriers, rational resources allocation ) - Â
- provides a basis for more sophisticated models
10- DRAWBACKS OF THE MODEL
- Â Â Â Â It considers threat of attack of single
type - Â Â Â Â It does not address the issue of intensity
of terrorist attacks - Â Â Â Â Simplified representation of vulnerability
(either successful attack with damage or no
success with no damage). - Â Â Â Â Uncertain parameters (consequences in
particular) are presented not by probability
distributions but by point estimates (expected
values) - Static picture of terrorist risk (does not allow
to address dynamic properties of terrorist
threats and vulnerabilities)
11(No Transcript)
12(No Transcript)
13(No Transcript)
14(No Transcript)
15(No Transcript)
16The architecture of the TRA module
17(No Transcript)
18NUMERICAL EXAMPLECash-flow diagram (all values
in millions of rubles)
19CHALLENGES 1.Dynamic analysis of terrorist risks
- There is a need to update the model for each time
period - Â Â Â Â Â changes of the structure of the system
- Â Â Â Â Â changes in the spectrum and intensities of
terrorist threats - Â Â Â Â Â new statistics and intelligence that
should be incorporated into the model - Â
- This could be done through Bayesian updating
procedures. - Â
- 2. To expand time window of the assessment
- Need to
- Â Â Â Â Â move beyond traditional static
vulnerability assessments towards dynamic
vulnerability assessment - Â Â Â Â Â consider long-term losses,
tangible/intangible, reversible/irreversible
losses - Â
- This could be done through development of dynamic
vulnerability assessment models