Towards a Computational Unified Homeland Security Strategy: An

Towards a Computational Unified Homeland Security Strategy: An

Towards A Computational Unified Homeland Security Strategy: An Asset Vulnerability Model by Richard White M.S. CS, Old Dominion University, 1990 B.S. History, Southern Illinois University at Edwardsville, 1983 A dissertation submitted to the Graduate Faculty of the University of Colorado at Colorado Springs in partial fulfillment of the requirement for the degree of Doctor of Philosophy Department of Computer Science 2013 © Copyright by Richard White 2013 All Rights Reserved ii This dissertation for Doctor of Philosophy Degree by Richard White has been approved for the Department of Computer Science By ______________________________________ Dr. C. Edward Chow, Chair ______________________________________ Dr. Terrance Boult, Co-Chair ______________________________________ Dr. Xiaobo Zhou ______________________________________ Dr. Scott Trimboli ______________________________________ Dr. Stan Supinski ___________________ Date White, Richard (Ph.D. in Engineering, Focus in Security) Towards a Computational Unified Homeland Security Strategy: An Asset Vulnerability Model Dissertation directed by Professors C. Edward Chow and Terrance Boult The attacks of September 11, 2001, exposed the vulnerability of critical infrastructure to precipitating domestic catastrophic attack. In the intervening decade, the Department of Homeland Security (DHS) has struggled to develop a coherent infrastructure protection program but has been unable to formulate a risk measure capable of guiding strategic investment decisions. Most risk formulations use a threat-driven approach which suffers from a dearth of data incapable of supporting robust statistical analysis. This research examines prevailing challenges to propose criteria for developing an adequate strategic risk formulation. Key insights include 1) the viability of an asset- driven approach, 2) reducing threat prediction to threat localization, 3) eschewing complexity for transparency and repeatability, 4) addressing the five phases of emergency management, and 5) capturing the national impact of consequences. Accordingly, an Asset Vulnerability Model (AVM) is proposed based on these criteria. AVM provides baseline analysis, cost-benefit analysis, and decision support tools compatible with the DHS Risk Management Framework to 1) convey current risk levels, 2) evaluate alternative protection measures, 3) demonstrate risk reduction across multiple assets, and 4) measure and track improvements over time. AVM capabilities are unique among twenty-two models compared. AVM risk formulation is predicated on Θ, an attacker’s probability of failure, derived from earlier work in game theory that found a coordinated iv defense more efficient than an uncoordinated one. This suggests that all means of domestic catastrophic attack should be protected collectively, both critical infrastructure and chemical, biological, radiological, and nuclear stockpiles. This research proposes a national policy framework supporting AVM extension to collectively defend all assets that may precipitate domestic catastrophic attack. This research concludes by using AVM to evaluate seven alternative risk reduction strategies: 1) Least Cost, 2) Least Protected, 3) Region Protection, 4) Sector Protection, 5) Highest DTheta (protective gain), 6) Highest Consequence, and 7) Random Protection. AVM simulations indicate that the Highest Consequence strategy is most effective across varying probabilities of attack, attacker perceptions, and different attack models. These simulations demonstrate the computational power of AVM, and how, with an appropriate supporting policy structure, AVM can objectively guide the nation towards a unified homeland security strategy. v In great appreciation for the patience, guidance, and understanding of my Advisory Committee, family, and friends. This wouldn’t have been possible without your support. Table of Contents CHAPTER I. INTRODUCTION ............................................................................................ 1 1.1 Motivation and Problem Description .................................................... 1 1.2 Objectives and Scope ............................................................................ 3 1.3 Outline of Dissertation ......................................................................... 4 II. DOMESTIC CATASTROPHIC ATTACK ...................................................... 8 2.1 An Unprecedented Threat .................................................................... 8 2.2 Critical Infrastructure Vulnerability .................................................... 9 2.3 The WMD Threat ............................................................................... 13 2.4 The CI Threat ..................................................................................... 16 2.5 WMD Protection ................................................................................ 30 2.6 CI Protection ...................................................................................... 38 2.7 Assessing Protection Efforts .............................................................. 42 2.8 Risk Analysis ..................................................................................... 47 2.9 Risk Management .............................................................................. 49 2.11 Summary .......................................................................................... 56 2.12 Contributions.................................................................................... 56 III. AN ASSET VULNERABILITY MODEL ..................................................... 58 3.1 Overview ............................................................................................ 58 vii 3.2 Design Criteria ................................................................................... 59 3.3 AVM Description............................................................................... 70 3.4 AVM Instantiation ............................................................................. 82 3.5 AVM Sensitivity Analysis ................................................................. 91 3.6 Model Comparisons ........................................................................... 97 3.7 Summary .......................................................................................... 100 3.8 Contributions.................................................................................... 101 IV. AVM IMPLEMENTATION ........................................................................ 104 4.1 Overview .......................................................................................... 104 4.2 Strategy Coordination ...................................................................... 105 4.3 AVM/RMF ....................................................................................... 112 4.4 Analyzing Investment Strategies ..................................................... 115 4.5 Summary .......................................................................................... 144 4.6 Contributions.................................................................................... 145 V. CONTRIBUTIONS AND FUTURE WORK ............................................... 146 5.1 Research Contributions .................................................................... 146 5.2 Future Research ............................................................................... 148 5.3. Conclusion ...................................................................................... 150 REFERENCES ............................................................................................................... 152 APPENDICES A. GLOSSARY ................................................................................................. 161 B. CI PROTECTION MODELS ....................................................................... 166 B.1 BIRR................................................................................................ 166 viii B.2 BMI ................................................................................................. 168 B.3 CAPRA............................................................................................ 171 B.4 CARVER2 ....................................................................................... 172 B.5 CIMS ............................................................................................... 173 B.6 CIPDSS ........................................................................................... 175 B.7 CIPMA ............................................................................................ 176 B.8 CommAspen .................................................................................... 178 B.9 COUNTERACT .............................................................................. 181 B.10 DECRIS ......................................................................................... 183 B.11 EURACOM ................................................................................... 184 B.12 FAIT .............................................................................................. 185 B.13 MIN ............................................................................................... 187 B.14 MDM ............................................................................................. 188 B.15 N-ABLE ........................................................................................ 189 B.16 NEMO ..........................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    241 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us