Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists?

نویسندگان

  • Detlof von Winterfeldt
  • Terrence M. O'Sullivan
چکیده

T paper describes a decision tree analysis to assess the cost-effectiveness of MANPADS (Man-Portable Air Defense Systems) countermeasures. These countermeasures are electronic devices that can be installed on commercial airplanes to detect and deflect surface-to-air missiles (SAMs) fired by terrorists. The model considers a terrorist attempt to shoot down a commercial airplane with a heat-seeking SAM, and it evaluates the decision to install countermeasures, taking into account alternative modes of attack, probabilities of success, and consequences to the economy. All model variables were fully parameterized, using reasonable ranges based on open-source literature. Not surprisingly, the probability of an attack, the consequences of an attack to the economy, and the cost of countermeasures are the most important parameters. Surprisingly, some of the hotly disputed parameters, such as the probability of an airplane surviving a successful hit or the probability of a false alarm, have very little impact on the results. The analysis suggests that MANPADS countermeasures installed on planes can be cost-effective if the probability of such an attack is large (greater than about 0.40 in ten years), the economic losses are large (greater than about $75 billion), and the countermeasures are relatively inexpensive (smaller than about $15 billion). An economic analysis conducted as part of this analysis showed that the economic impacts can be as large as $250 billion, thus making countermeasures a possibly cost-effective option. More research is needed to determine the real costs of MANPADS countermeasures and how terrorists may shift their tactics, once countermeasures are installed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Session Codes

not available at this time. 2 Applying Crime Mapping and Analysis Techniques to Forecast Insurgent Attacks in Iraq Joseph Mlakar, Operations Research Analyst, United States Marine Corps, 3300 Russell Road, Quantico VA 22554, United States of America, [email protected] We begin by finding series of attacks that are linked to the same insurgent or insurgent group. Each series is analyzed spa...

متن کامل

Strategic Insights, Volume Iv, Issue 2 (february 2005)

The terrorist attacks of September 11, 2001 illustrated in graphic terms the vulnerability of the United States to asymmetrical attack. The relative ease with which the nineteen Al Qaeda terrorists hijacked four airplanes and used them as deadly ballistic missiles was inconceivable to the citizens of the world’s only remaining superpower. In an instant, it became painfully clear that despite it...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

Secure Wireless Collection and Distribution of Commercial Airplane Onboard Data

The introduction of wireless communication capabilities supporting transfer of sensor data and information on board commercial airplanes as well as between airplanes and supporting ground systems has the potential to significantly improve the safety and efficiency of air travel. The benefits, however, come at the cost of information security vulnerabilities introduced by data networks. Regulato...

متن کامل

Networking of Tracking Radars of Two Different SAM Weapons to Protect the Missile in Intensive Jamming Environment

Many countries including India use the Russian made SAM-3 (Pechora) surface-to-air missile (SAM) weapon systems to protect their strategic and tactical infrastructure. The mathematical computations done in this paper, conclusively proves that SA-125 low-blow tracking radar of Pechora is vulnerable to jamming. A project was undertaken to overcome the jamming vulnerability of Pechora aiming to de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Decision Analysis

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2006