Skip to main content

Terrorists and Hazmat: A Methodology to Identify Potential Routes

  • Conference paper
  • First Online:

Abstract

Malicious entities may use hazardous materials as a weapon by hijacking a vehicle and transporting it to a desired target. This work presents a methodology to identify possible hijacked vehicles’ routes to vulnerable targets, assuming that probabilities of interception by law enforcement agents depend on the investment in defense resources. The methodology to identify hijacked vehicles’ routes incorporates the dual objectives of minimizing probabilities of capture and maximizing consequences if law enforcement agencies attempt to intercept the vehicle before it reaches the target. Mathematical programming models are presented to find such routes as well as the allocation of defense investments on a network.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Note that leader and follower could also be defined the other way around and the analysis would be analogous.

References

  1. Jin, H., and Batta, R. (1997). Objectives derived from viewing hazmat shipments as a sequence of independent Bernoulli trials. Transportation Science, 31(3), 252–261.

    Article  Google Scholar 

  2. Brown, D. F., Hwang, S., O’Steen, J., Policastro, A. J., and Dunn, W. E. (2001). A Risk Assessment for National Transportation of Selected Hazardous Materials. 80th Annual Meeting of the Transportation Research Board, Transportation Research Board, Washington, D.C.

    Google Scholar 

  3. Chang, T.-S., Nozick, L. K., and Turnquist, M. A. (2005). ‘Multiobjective Path Finding in Stochastic Dynamic Networks, with Application to Routing Hazardous Materials Shipments.’ Transportation Science, 39(3), 383-399.

    Article  Google Scholar 

  4. CONAMA. (1994). Estudio de Impacto Ambiental Centro de Tratamiento de RSP Hidronor Chile. 1994, Comisión Nacional del Medio Ambiente (CONAMA), Santiago de Chile.

    Google Scholar 

  5. Crowther, K. G., and Haimes, Y. Y. (2005). ‘Application of the Inoperability Input-Output Model (IIM) for Systemic Risk Assessment and Management of Interdependent Infrastructures.’ Systems Engineering, 8(4), 323–341.

    Article  Google Scholar 

  6. Dames and More. (1994). Plan de Manejo de Residuos Sólidos Domiciliarios e Industriales (Tóxicos y Peligrosos); Diseño e Implementación de un Sistema de Control del Manejo de Residuos Sólidos Peligrosos en la Región Metropolitana, Santiago de Chile.

    Google Scholar 

  7. Gopalan, R., Kolluri, K. S., Batta, R. and Karwan, M. H. (1990). Modeling Equity of Risk in the Transportation of Hazardous Materials. Operations Research, Vol. 38, No. 6, 961–973. Nov.-Dec., 1990.

    Article  Google Scholar 

  8. Haimes, Y. Y. (2004). ‘Risk Modeling, Assessment, and Management of Terrorism.’ In: Risk Modeling, Assessment, and Management, I. John Wiley & Sons, ed., John Wiley & Sons, Inc, Hoboken, 684–716.

    Chapter  Google Scholar 

  9. Huang, B., Cheu, R. L., and Liew, Y. S. (2004a). GIS and genetic algorithms for HAZMAT route planning with security considerations. International Journal of Geographic Information Science, 18(8), 769–787.

    Article  Google Scholar 

  10. Huang, B., Cheu, R. L., and Liew, Y. S. (2004b). Incorporating Security in HAZMAT Route Planning Using GIS and AHP. In: 83rd Annual Meeting of the Transportation Research Board, Transportation Research Board, Washington, D.C.

    Google Scholar 

  11. INE. (1998). Anuario de Estadísticas Policiales. 1998, Instituto Nacional de Estadísticas: Departamento de Estadísticas Demográficas y Sociales, Santiago de Chile.

    Google Scholar 

  12. MTT. (1991). Encuesta Origen-Destino de Viajes del Gran Santiago, Comisión de Planificación de Inversiones en Infraestructura de Transporte (Ministerio de Transporte y Telecomunicaciones), Santiago de Chile.

    Google Scholar 

  13. Paté-Cornell, M. E. (1984). ‘Fault Trees vs. Event Trees in Reliability Analysis.’ Risk Analysis, 4(3), 177–186.

    Article  Google Scholar 

  14. . RSPA. (2001). ‘Hazmat Summary by State for Calendar Year.’ Research & Special Programs Administration (R.S.P.A), Office of Hazardous Materials Safety, The United States Department of Transportation’s Research and Special Programs Administration, 1993–2001.

    Google Scholar 

  15. Saccomanno, F. F., and Shortreed, J. H. (1993). ‘Hazmat Transport Risks: Societal and Individual Perspectives.’ Journal of Transportation Engineering, 119(2), 177–188.

    Article  Google Scholar 

  16. Schaible, S. (1976). ‘Fractional Programming. II, on Dinkelbach’s Algorithm.’ Management Science, 22(8), 868–873.

    Article  Google Scholar 

  17. Powell, R. (2007). Defending against terrorist attacks with limited resources. American Political Science Review 101(3) 527–541.

    Article  Google Scholar 

  18. Sherali, H. D., Brizendine, L. D., Glickman, T. S., and Subramanian, S. (1997). ‘Low Probability - High Consequence Considerations in Routing Hazardous Material Shipments.’ Transportation Science, 31(3), 238–251.

    Article  Google Scholar 

  19. Taboada, J., Matias, J. M., Saavedra, A., Ordonez, C., and Marinez-Alegria, R. (2006). ‘Neural Network Models for Assessing Road Suitability for Dangerous Goods Transport.’ Human and Ecological Risk Assessment, 12, 174–191.

    Article  Google Scholar 

  20. . USDOT. (2002 ). ‘Enhancing Security of Hazardous Materials’.

    Google Scholar 

  21. . Volpe Center. (2003). ‘Risk Assessment and Prioritization.’ <http://www.volpe.dot.gov/infosrc/ journal/2003/chap1.html> (July 14, 2006).

  22. Stackelberg, Von H. (1952) The Theory of Market Economy. Oxford University Press, Oxford.

    Google Scholar 

  23. Zhuang, J., and Bier, V. (2007) Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort. Operations Research, 55(5), pp. 976–991.

    Article  Google Scholar 

Download references

Acknowledgments

This chapter was partially funded by the Chilean National Fund for the Sciences and Technology FONDECYT Nº 1080189.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rodrigo A. Garrido .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this paper

Cite this paper

Garrido, R.A. (2010). Terrorists and Hazmat: A Methodology to Identify Potential Routes. In: Bell, M., Hosseinloo, S., Kanturska, U. (eds) Security and Environmental Sustainability of Multimodal Transport. NATO Science for Peace and Security Series C: Environmental Security. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-8563-4_9

Download citation

Publish with us

Policies and ethics