To Aviation Security by Susan Elizabeth Martonosi

Total Page:16

File Type:pdf, Size:1020Kb

To Aviation Security by Susan Elizabeth Martonosi An Operations Research Approach to Aviation Security by Susan Elizabeth Martonosi B.S., Cornell University, 1999 Submitted to the Sloan School of Management in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Operations Research at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY September 2005 ( Massachusetts Institute of Technology 2005. All rights reserved. Author ................................ _is- Sloan School......... of Management......- 7> 11 Augut) 2005 Certified by ............ ................................................... Arnold I. Barnett George Eastman Professor of Management Science Thesis Supervisor Acceptedby.... James B. Orlin MASSACHUSETTS INSTITUTE ' Edward Pennell Brooks Professor of Operations Research OF TECHNOLOGY Co-Director, MIT Operations Research Center SEP 1 4 2005 LIBRARIES .~. 'f An Operations Research Approach to Aviation Security by Susan Elizabeth Martonosi Submitted to the Sloan School of Management on 11 August 2005, in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Operations Research Abstract Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore first whether securing aviation deserves priority over other potential targets. We compare the historical risk of aviation terrorism to that posed by other forms of terrorism and conclude that the focus on aviation might be warranted. Secondly, we address the usefulness of passenger pre-screening systems to select poten- tially high-risk passengers for additional scrutiny. We model the probability that a terrorist boards an aircraft with weapons, incorporating deterrence effects and potential loopholes. We find that despite the emphasis on the pre-screening system, of greater importance is the effectiveness of the underlying screening process. Moreover, the existence of certain loopholes could occasionally decrease the overall chance of a successful terrorist attack. Next, we discuss whether proposed explosives detection policies for cargo, airmail and checked luggage carried on passenger aircraft are cost-effective. We define a threshold time such that if an attempted attack is likely to occur before this time, it is cost-effective to implement the policy, otherwise not. We find that although these three policies protect against similar types of attacks, their cost-effectiveness varies considerably. Lastly, we explore whether dynamically assigning security screeners at various airport se- curity checkpoints can yield major gains in efficiency. We use approximate dynamic program- ming methods to determine when security screeners should be switched between checkpoints in an airport to accommodate stochastic queue imbalances. We compare the performance of such dynamic allocations to that of pre-scheduled allocations. We find that unless the stochasticity in the system is significant, dynamically reallocating servers might reduce only marginally the average waiting time. Without knowing certain parameter values or understanding terrorist behavior, it can be difficult to draw concrete conclusions about aviation security policies. Nevertheless, these mathematical models can guide policy-makers in adopting security measures, by helping to identify parameters most crucial to the effectivenessof aviation security policies, and helping to analyze how varying key parameters or assumptions can affect strategic planning. 3 Thesis Supervisor: Arnold I. Barnett Title: George Eastman Professor of Management Science 4 Acknowledgments This thesis is the product not just of my own work but also that of many who have helped me along the way. First, I am indebted to my thesis advisor, Arnold Barnett, for the wisdom and patience he has exhibited with me. His constant reminders to think simply when modeling a problem helped me out of many ruts, and I hope to remember this wise rule throughout my career. A. talented writer and orator, he offered many useful suggestions and criticisms on the writing and presentation of this thesis, and this instruction will serve me well into the future. I also admire his commitment to problems of social importance. It was indeed this commitment that led me to work with him, and his emphasis on selecting methodology to suit the problem rather than the reverse has inspired me to continue in this domain. Professors Cynthia Barnhart and Amedeo Odoni, who served on my thesis committee, have offered support and guidance since well before the official formation of the committee. In particular, their suggestions helped to clarify the focus of the problem posed in Chapter 5 and provided fruitful directions of exploration. Their kindness and encouragement throughout my time here will remain a lasting memory for me. I am grateful for the generous support of the Alfred P. Sloan Foundation, via the MIT Global Airline Industry Program, who funded this work. Anthony Ventresca of Massport was also of great assistance in sharing data and expertise that were invaluable to the research in Chapter 5. The Operations Research Center has become a second home to me, thanks to the efforts of the co-directors (Jim Orlin and John Tsitsiklis) and the administrative staff (Paulette Mosley, Laura Rose, Veronica Mignot and Andrew Carvalho) to make it a welcoming environment in which to work:. I thank my fellow students for conversations, camaraderie, friendship, and, most of all, karaoke. A special thanks to those in my incoming class with whom I completed my coursework and studied for the qualifying exams. I learned so much by working with you. Outside of the ORC, I wish to thank Rambax MIT for being my African oasis here in Boston, and my students in Koundara, Guinea for inspiring me with their determination. Lastly, none of this would have been possible without the encouragement, unshakable confidence, and love of my family and God. It is the latter of these gifts for which I am most grateful. 5 6 Contents 1 Introduction 15 2 The Relative Risk of Aviation Terrorism 21 2.1 A relative risk factor. ............ 22 2.2 Terrorism against Americans, 1968-2001 . 23 2.2.1 Definition of terrorism. 23 2.2.2 Classification of terrorist attacks . .23 2.3 Fraction of time spent in aviation ............ 24 2.3.1 Estimation based on passenger enplanements . 25 2.3.2 Estimation based on time-use studies ...... 26 2.4 Death risk per hour. 26 2.5 Using the past to predict the future ........... .27 3 How Effective Might Passenger Profiling Be? 29 3.1 System and parameter description ............ .31 3 1 3.2 Opposing viewpoints ............ ...... 34 3.2.1 The "right answer" to security?. ,.. ... ... o 34 3.2.2 A carnival game? . 35 3.3 A general model . ... 36 3.3.1 How terrorists might probe the system ..... ... 36 3.3.2 Modeling the probability of a successful attack 37 3.3.3 Updating conditional probabilities of selection . 39 3.4 Analysis techniques. 42 3.5 Interpreting the model . 44 3.5.1 Effects of screening effectiveness parameters on attack success .... 44 3.5.2 Deterrence effects. 49 3.5.3 Role of random screening ......................... 54 3.6 Conclusions and policy implications. 55 4 Securing Cargo Holds of Passenger Aircraft: A Cost-Benefit Perspective 57 4.1 Three security measures. 58 4.1.1 Positive Passenger-Bag Match. 58 4.1.2 Moratorium on larger Postal Service airmail packages ......... 59 7 .. 60 4.1.3 A hypothetical policy on cargo .......... ... ..... 4.2 A cost-benefit model .................... ... ..... 60 4.2.1 Parameters and constants . ... ..... .. 61 4.2.2 Model based on cost per flight ........... ... ..... .. 62 4.2.3 A renewal model .................. ... ..... .. 62 4.2.4 Interpretation .............. ... ..... .. 64 4.3 Parameter Estimation. ... ..... .. 66 4.3.1 The cost of attack .................. ... ..... .. 66 4.3.2 Policy costs. ... ..... .. 67 4.3.3 Backup security effectiveness ............ ... ..... .. 69 4.3.4 Backup security costs ................ ... ..... .. 71 4.4 Comparing the cost-effectiveness of cargo-hold measures ... ..... .. 71 4.5 Diversion of threats ..................... ... ..... .. 76 4.6 Conclusion . ......................... ... ..... .. 78 5 Dynamic Security Screener Allocation 79 5.1 Problem description . .......... 80 5.2 Literature review. .......... 81 5.3 Problem formulations . .......... 85 5.3.1 Deterministic fluid model ............... .......... 89 5.3.2 Deterministic disruptions to passenger entry pattern .......... 95 5.3.3 Stochastic disruptions to passenger entry pattern .......... 97 5.3.4 Randomized entry rates ............... .......... 98 5.3.5 Stochastic service times .......... 99 5.4 Approximate dynamic programming solution techniques . .......... 99 5.4.1 Aggregated state space with limited lookahead . .......... 100 5.4.2 Approximating expected values ........... .......... 101 5.5 Data .............................. .......... 103 5.6 Results. ............................ .......... 106 5.6.1 Deterministic entries and services .......... .......... 106 5.6.2 Deterministically disrupted entries ......... .......... 110 5.6.3 Stochastically disrupted entries ........... .......... 112 5.6.4 Randomized entry rates ............... .......... 115 5.6.5 Stochastic service times ............... .......... 116 5.6.6 General observations. .......... 117 5.6.7 Sensitivity analysis .................. .......... 123 5.7 Model limitations. .......... 127 5.8 Are dynamic
Recommended publications
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Information of Service Men and Women Death While on Operations
    Army Secretariat Army Headquarters IDL 24 Blenheim Building Marlborough Lines Andover Hampshire, SP11 8HJ United Kingdom Ref: Army Sec/06/06/09633/75948 E-mail: [email protected] Website: www.army.mod.uk xxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxx 23 November 2015 Dear xxxxxxxxxx,, Thank you for your email of 1 November requesting the following information: - A list of deaths of servicemen/women of the British Army while on 'Op Banner' (Northern Ireland), where the death was due to terrorism or otherwise. I would, ideally, like the information in a spreadsheet. With the following information, ‘Service Number, Rank, First Names, Last Name, Unit, Age, Date of Death, Place of Death, and how died. - A list of deaths of servicemen/women of the British Army while on recent operations in Iraq. I would, ideally, like the information in a spreadsheet. With the following information, ‘Service Number, Rank, First Names, Last Name, Unit, Age, Date of Death, Place of Death, and how died. - A list of deaths of servicemen/women of the British Army while on recent operations in Afghanistan. I would, ideally, like the information in a spreadsheet. With the following information, ‘Service Number, Rank, First Names, Last Name, Unit, Age, Date of Death, Place of Death, and how died. I am treating your correspondence as a request for information under the Freedom of Information Act 2000. A search for the information has now been completed within the Ministry of Defence, and I can confirm that all information in scope of your request is held. The information you have requested for a list of deaths of servicemen and women in Northern Ireland on Op Banner is available in the attached spreadsheet.
    [Show full text]
  • Dealing with the Legacy of Conflict in Northern Ireland Through Engagement and Dialogue
    Glencree Journal 2021 Dealing with the Legacy of Conflict in Northern Ireland through Engagement and Dialogue Glencree Centre for Peace and Reconciliation in association with Irish Centre for Human Rights at NUI Galway and Ulster University. ISBN: 978–1-903727–05–8 March 2021 © 2021 – Glencree Centre for Peace & Reconciliation The Glencree Centre for Peace & Reconciliation Glencree, Co. Wicklow, A98 D635 Republic of Ireland The views and opinions expressed in this document do not necessarily reflect those of the European Commission or the Special EU Programmes Body (SEUPB). The views and opinions expressed in this document do not necessarily reflect those of the Glencree Centre for Peace & Reconciliation. Reproduction of all or part of this document may be authorised only with written consent of the source. A project supported by the European Union’s PEACE IV Programme, managed by the Special EU Programmes Body (SEUPB). The Glencree Centre for Peace and Reconciliation is a company limited by guarantee in the Republic of Ireland. Company No. 50088. Registered Charity No. CHY5943. Charities Regulatory Authority (CRA) No. 20009823. The Glencree Centre for Peace & Reconciliation Established in 1974 in response to the conflict in Northern Ireland, the Glencree Centre for Peace & Reconciliation works with individuals and groups to transform conflict, promote reconciliation, encourage healthy relationships and build sustainable peace. Under the Patronage of the President of Ireland, Michael D Higgins. e: [email protected] t: + 353 1 2829711 Connect with us www.glencree.ie Acknowledgments This Journal project was made possible by the European Union’s Peace IV Programme Body, (SEUPB), without whose support the publication of this Journal would not have been possible.
    [Show full text]
  • Best Practices in Safety and Security to Safeguard Tourism Against Terrorism
    Asia-Pacific Economic Cooperation APEC Working Group (TWG02/2003) BEST PRACTICES IN SAFETY AND SECURITY TO SAFEGUARD TOURISM AGAINST TERRORISM A Tourism Crisis Leadership Guide APEC Tourism Working Group (TWG) October 2004 A Project Study submitted by MALAYSIA TSA 15-00014 - 000454 Report prepared by: Dr Michael Heah CORPORATE COACH SDN BHD 41 Medan Athinahapan 2 Taman Tun Dr Ismail 60000 Kuala Lumpur For: Copyright© 2004 APEC Secretariat APEC Secretariat 35 Heng Mui Keng Terrace Singapore 119616 Tel: (65) 6775 6012 Fax: (65) 6775 6013 E-mail: [email protected] Website: www.apec.org APEC Publication. Number: APEC#204-T0-03.1 ISBN 981-05-2146-4 ii TSA 15-00014 - 000455 KEYNOTE (i) one of the most powerful forces for change in the world today: THE TRAVEL AND TOURISM INDUSTRY (ii) New Driver for Tourism Growth and Change : SAFETY AND SECURITY W "Terrorism is a direct challenge to APEC's goals of free, open and prosperous economies and an affront to the fundamental values that APEC members share. We are united in our determination to end the threat that terrorism poses to our shared goals and committed to accelerate our progress towards the anti-terror goals and programs set forth ..." (APEC Leaders' Statement on Fighting Terrorism and Promoting Growth, Mexico, 2002 )) W "All Member States must make greater efforts to exchange information about best practices that have proven effective, and lessons that have been learned in the fight against terrorism, so that a global standard of excellence can be set"- Kofi Annan. TSA 15-00014 - 000456 SETTING THE PERSPECTIVE Contributing To A Safer APEC For Tourism Growth Never before has safety and security become such a critical factor for the successful growth of tourism (as well as the world economy) than it is today.
    [Show full text]
  • Technology Against Terrorism: Structuring Security (January 1992)
    Technology Against Terrorism: Structuring Security January 1992 OTA-ISC-511 NTIS order #PB92-152529 Recommended Citation: U.S. Congress, Office of Technology Assessment, Technology Against Terrorism: Structur- ing Security, OTA-ISC-511 (Washington, DC: U.S. Government Printing Office, January 1992). FOr sale by the U.S. Government Printing Office Superintendent of Documents, Mail Stop SS0p. Washington, D.C. 20402-9328 ISBN 0-16 -036061-7 Foreword Terrorism is not a new phenomenon, but it has become more prominent during the past two decades. Terrorist attacks have included not only political assassinations, but also large-scale attacks, often aimed at third parties, causing massive casualties. Two well-known examples are car bombings, employing hundreds of kilograms of high explosives, and attacks on commercial aircraft around the world. The U.S. Government and the American public became acutely aware of terrorism after the bombing of Pan American Flight 103 over Lockerbie, Scotland in December 1988. The recent war in the Persian Gulf heightened fears of renewed terrorist attacks on U.S. targets, both overseas and at home. In 1989, because of growing concern over terrorist threats, several Senate Committees requested that OTA study the role of technology in fighting terrorism and the Federal effort in promoting related research and development. The requesting Committees were: Govern- mental Affairs; Foreign Relations (Subcommittee on Terrorism, Narcotics, and International Operations); and Commerce, Science, and Transportation, together with its Subcommittee on Aviation. The Senate Select Committee on Intelligence also endorsed the study. This report is the second and final one in response to these requests. The frost was transmitted to Congress in a classified version in September 1990.
    [Show full text]
  • Horizon 2020-Funded Security Research Projects with Dual-Use Potential: an Overview (2014-2018)
    Horizon 2020-funded security research projects with dual-use potential: An overview (2014-2018) G. Bordin, M. Hristova and E. Luque-Perez 2020 1 EUR 30210 EN This publication is a Science for Policy report by the Joint Research Centre (JRC), the European Commission’s science and knowledge service. It aims to provide evidence-based scientific support to the European policymaking process. The scientific output expressed does not imply a policy position of the European Commission. Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use that might be made of this publication. For information on the methodology and quality underlying the data used in this publication for which the source is neither Eurostat nor other Commission services, users should contact the referenced source. The designations employed and the presentation of material on the maps do not imply the expression of any opinion whatsoever on the part of the European Union concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. Contact information Name: Guy Bordin, Mayya Hristova and Encarnación Luque-Perez Address: Rue du Champ de Mars 21, 1049 Brussels, Belgium Email: [email protected]; [email protected]; [email protected] EU Science Hub https://ec.europa.eu/jrc JRC120636 EUR 30210 EN PDF ISBN 978-92-76-18810-0 ISSN 1831-9424 doi:10.2760/599783 Luxembourg: Publications Office of the European Union © European Union, 2020 The reuse policy of the European Commission is implemented by the Commission Decision 2011/833/EU of 12 December 2011 on the reuse of Commission documents (OJ L 330, 14.12.2011, p.
    [Show full text]
  • Using Behavioral Indicators to Help Detect Potential Violent Acts a Review of the Science Base
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND Purchase this document TERRORISM AND HOMELAND SECURITY Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Defense Research Institute View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for re- search quality and objectivity. Using Behavioral Indicators to Help Detect Potential Violent Acts A Review of the Science Base Paul K.
    [Show full text]
  • Counter Terrorism Ied/Bomb & Active Shooter Procedures
    COUNTER TERRORISM IED/BOMB & ACTIVE SHOOTER PROCEDURES Orlando Wilson. Risks Inc. Orlando Wilson Risks Incorporated COUNTER TERROISM IED/BOMB & ACTIVE SHOOTER RESPONSE PROCEDURES Risks Incorporated is a progressive, European - owned and managed specialist Security Company that has proven itself many times on international operations. We have compiled this document to help those at risk from the threat of improvises explosive device (IED) and bomb incidents. The information in this document is simple and proven and will help the reader to compile an effective operation plan to deal with IED/Bomb incidents. Risks Incorporated's clients can be assured they are getting the best training and services available from experienced professionals! I personally have over 28 years experience working in the international security industry, what we teach is based on reality, not what someone with no real operational experience thinks would work in a hostile situation. I am a published author and have been interviewed by numerous international TV and media outlets ranging from the New York Times to Soldier of Fortune Magazine on topics ranging from kidnapping, organized crime to maritime piracy. Orlando Wilson Risks Incorporated Copyright © Orlando Wilson, Risks Incorporated 2004 Risks Incorporated E-mail: [email protected] Website: www.risks-incorporated.com Orlando Wilson Risks Incorporated Dealing With Bombs & Improvised Explosive Device Incidents My personal experience dealing with terrorist bomb/improvised explosive devices (IEDs) incidents started in 1989 while serving in the British Army with 4 Platoon, B-Coy, 1-WFR for 22 months in Northern Ireland; since then bomb/IED awareness has always been a part of my security procedures and planning.
    [Show full text]
  • UNGOVERNED TERRITORIES Understanding and Reducing Terrorism Risks
    THE ARTS This PDF document was made available from www.rand.org as CHILD POLICY a public service of the RAND Corporation. CIVIL JUSTICE EDUCATION Jump down to document ENERGY AND ENVIRONMENT 6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit research NATIONAL SECURITY organization providing objective analysis and POPULATION AND AGING PUBLIC SAFETY effective solutions that address the challenges facing SCIENCE AND TECHNOLOGY the public and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND Support RAND INFRASTRUCTURE Purchase this document WORKFORCE AND WORKPLACE Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Project AIR FORCE View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND monographs undergo rigorous peer review to ensure high standards for research quality and objectivity. UNGOVERNED TERRITORIES Understanding and Reducing Terrorism Risks Angel Rabasa • Steven Boraz • Peter Chalk • Kim Cragin • Theodore W. Karasik Jennifer D. P. Moroney • Kevin A. O’Brien • John E. Peters Prepared for the United States Air Force Approved for public release, distribution unlimited PROJECT AIR FORCE The research described in this report was sponsored by the United States Air Force under Contract F49642-01-C-0003.
    [Show full text]
  • Country Reports on Terrorism 2019
    Country Reports on Terrorism 2019 BUREAU OF COUNTERTERRORISM Country Reports on Terrorism 2019 is submitted in compliance with Title 22 of the United States Code, Section 2656f (the “Act”), which requires the Department of State to provide to Congress a full and complete annual report on terrorism for those countries and groups meeting the criteria of the Act. Table of Contents Foreword Glossary For More Information Chapter 1-Country Reports on Terrorism Africa East Asia and the Pacific Europe The Middle East and North Africa South and Central Asia Western Hemisphere Chapter 2-State Sponsors of Terrorism Chapter 3-The Global Challenge of Chemical, Biological, Radiological, or Nuclear Terrorism Chapter 4-Terrorist Safe Havens (Update to 7120 Report) Chapter 5-Foreign Terrorist Organizations Chapter 6-Legislative Requirements and Key Terms Appendix B-Terrorism Deaths, Injuries, and Kidnappings of U.S. Citizens 1 2019 Country Reports on Terrorism Foreword In 2019, the United States and our partners made major strides to defeat and degrade international terrorist organizations. Along with the Global Coalition to Defeat ISIS, in March, the United States completed the destruction of the so-called “caliphate” in Iraq and Syria. In October, the United States launched a military operation that resulted in the death of Abu Bakr al-Baghdadi, the self-proclaimed “caliph” of ISIS. As part of the maximum pressure campaign against the Iranian regime – the world’s worst state sponsor of terrorism – the United States and our partners imposed new sanctions on Tehran and its proxies. In April, the United States designated Iran’s Islamic Revolutionary Guard Corps (IRGC), including its Qods Force, as a Foreign Terrorist Organization (FTO) – the first time such a designation has been applied to part of another government.
    [Show full text]
  • Implementing Security Improvement Options at Los Angeles International Airport
    INFRASTRUCTURE, SAFETY, AND ENVIRONMENT THE ARTS This PDF document was made available from www.rand.org as a public CHILD POLICY service of the RAND Corporation. CIVIL JUSTICE EDUCATION Jump down to document ENERGY AND ENVIRONMENT 6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit research NATIONAL SECURITY POPULATION AND AGING organization providing objective analysis and effective PUBLIC SAFETY solutions that address the challenges facing the public SCIENCE AND TECHNOLOGY and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Infrastructure, Safety, and Environment View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. This product is part of the RAND Corporation documented briefing series. RAND documented briefings are based on research briefed to a client, sponsor, or targeted au- dience and provide additional information on a specific topic. Although documented briefings have been peer reviewed, they are not expected to be comprehensive and may present preliminary findings. Implementing Security Improvement Options at Los Angeles International Airport Donald Stevens, Thomas Hamilton, Marvin Schaffer, Diana Dunham-Scott, Jamison Jo Medby, Edward W. Chan, John Gibson, Mel Eisman, Richard Mesic, Charles T.
    [Show full text]
  • Ideology and Cultural Landscape in Nothern Ireland Deborah J
    Louisiana State University LSU Digital Commons LSU Doctoral Dissertations Graduate School 2004 "Walking the Queen's highway": ideology and cultural landscape in Nothern Ireland Deborah J. Miller Louisiana State University and Agricultural and Mechanical College Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_dissertations Part of the Social and Behavioral Sciences Commons Recommended Citation Miller, Deborah J., ""Walking the Queen's highway": ideology and cultural landscape in Nothern Ireland" (2004). LSU Doctoral Dissertations. 1453. https://digitalcommons.lsu.edu/gradschool_dissertations/1453 This Dissertation is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Doctoral Dissertations by an authorized graduate school editor of LSU Digital Commons. For more information, please [email protected]. “WALKING THE QUEEN’S HIGHWAY”: IDEOLOGY AND CULTURAL LANDSCAPE IN NORTHERN IRELAND A Dissertation Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Doctor of Philosophy in The Department of Geography and Anthropology by Deborah J. Miller B.A., University of Toledo, 1994 M.A., University of Toledo, 1996 May 2004 But thus shall ye deal with them; ye shall destroy their altars and break down their images and cut down their groves and burn their graven images with fire. Deuteronomy 7:5 ii ACKNOWLEDGEMENTS I would like to express gratitude to my advisors and graduate committee members, particularly Miles Richardson, who willingly took charge as my dissertation committee chair at the very last moment. I thankfully received funding for my travel and Ph.D.
    [Show full text]