Home Options and Challenges of a Resilience-Based, Network-Focused Port Security Grant Program
Article
Licensed
Unlicensed Requires Authentication

Options and Challenges of a Resilience-Based, Network-Focused Port Security Grant Program

  • Eric Taquechel EMAIL logo
Published/Copyright: September 24, 2013

Abstract

The Federal Emergency Management Agency’s Port Security Grant Program (PSGP) allocates federal funding to maritime critical infrastructure and key resources (MCIKR) to reduce terrorist attack risk. The PSGP currently emphasizes protecting against attacks, before they happen. However, for the last several years the trend in critical infrastructure risk analysis has been resilience. Resilience often includes examining how a system can restore after a disruption, as opposed to only examining how to prevent disruptions. Accordingly, PSGP policy has evolved to emphasize resilience but with no clear guidance on how to implement a resilience-based approach. This paper therefore discusses considerations to help PSGP stakeholders. First it explains why MCIKR should be modeled as components of supply chains. It then explains why the current mathematical theory underpinning the PSGP is insufficient for a resilience-based, network-focused PSGP. This paper then explores risk-based and network interdiction theories and modeling options that could be leveraged to support allocation of PSGP grants in order to influence supply chain resilience. It proposes a conceptual solution that leverages principles from both approaches, and offers definitions of quantifiable resilience. This proposed solution allows the quantification of deterrence effects of resilience-based grant allocations. Finally, it offers specific recommendations for PSGP stakeholders.


Corresponding author: Eric Taquechel, 427 Commercial St, Boston, MA 02109, USA, e-mail:

Enclosure 1: Process to Derive Resilience Equations for Proposed Synthesized Model

Prescribing Post-Attack Performance

We must first establish baseline resilience values for supply chain networks, since we want to measure changes in resilience based on hypothetical PSGP resilience investments (allocations). We document desired supply chain network performance, whether it be the aggregate throughput of petrochemical product of each node, or some derivative metric such as aggregate of node profit from moving product.3 We can treat this desired supply chain performance as a consequence so as to maintain conceptual ties to the legacy PSGP risk approach. If the network fails, there will be a consequence, or lack of performance, so we show it as Conl(max), the maximum consequence of a lth supply chain network. Alderson et al. (2011, op. cit.) leverage a similar principle: they aggregate metrics such as commuter time for all bridge and road pathways into a transportation network metric, and minimize that aggregated metric as their objective function.

Network Expected Consequence

We then leverage the concept of expected network performance or output, and we compare that metric to desired performance Conl(max), to assess network resilience. The expected network performance can be rewritten as expected consequence, or lost throughput, after a network disruption. This expected consequence would be the maximum consequence (loss of all throughput) modified by the probability that throughput would be lost. This probability would be the likelihood of node failure to restore productivity. This departs conceptually from Alderson et al.’s model by introducing the probability of a failure, which differs from the binary fail/do not fail approach.

To explain further, each node has an organic probability of failing to restore productivity after an attack on the maritime infrastructure supplier nodes. This probability is a function of excess capacity raw product stored on site. We model this organic “failure susceptibility” as an exponential function of allocation to ensure excess capacity at a node:

In Equation 5, represents existing allocation to ensure excess capacity, as compared to is elimination cost, the maximum amount of allocation necessary to ensure that node stores enough excess capacity to restore desired productivity after an attack, without help from other nodes.4

Each node also has an inherited susceptibility of failure to restore productivity. These susceptibilities are not shown explicitly in the proposed approach. Instead, they are implicitly reflected by upstream node degree gi. Intuitively it makes sense to use degree, or the number of links to other nodes, as a proxy for node interdependency and thus as a proxy for inherited failure susceptibility. The more highly connected a node is, the more interdependent it is with its customers. This means a higher potential for cascading failure because many customers would potentially suffer from one node’s failure. Thus, those downstream customers have higher inherited failure susceptibility than they would have if the upstream node had less connectivity, or lower degree.

We show how degree is generally applied to lth network expected consequence Conl(exp) where represents node maximum consequence:

This equation in expanded form accounts for nuances of supplier node failure susceptibility. We model supplier node failure susceptibility as a function of: (1) organic failure susceptibility or lack of raw product on site, (2) the probability of failure to rebuild after an attack, and (3) the probability that maritime infrastructure will fail to leverage redundant suppliers such as other ports. We show this:

The expansion of Equation 6 to account for Equation 7 will be shown in Equation 9.

Node failure susceptibility and maximum consequence data can be entered into MBRA. Since we have related network performance to consequence, more specifically expected consequence which reflects probabilistic modification of maximum consequence, we have now shown convergence between (1) the concepts of risk from network science and PRA, and (2) the concept of performance from OR/engineering. We can now convert expected consequence to conditional risk, so that the proposed approach will include a risk-based metric, not just a consequence-based metric.

Network Conditional Risk

We use the concept of “conditional risk” and exclude attacker intent probabilities, so as to leave room for adding in intelligent adversary considerations later. For now we show what a conditional network risk equation would look like:

This shows that conditional risk is expected consequence if there is a successful attack, but conditional upon two probabilities. The first is the probability that the attacker has the capability CapS to attack a supplier node. The second is the vulnerability Vs, or probability that a supplier node will fail upon attack and thus precipitate a cascading failure throughout the network. Equation 8 is closer to risk in the traditional sense of Equation 1. Capability and supplier node vulnerability data can be entered into MBRA. Equation 8 can now be expanded, leveraging Equations 6 and 7, to show organic and inherited failure susceptibilities of all nodes:

Port Conditional Risk

We would first disburse PSGP resilience funding amongst ports to be consistent with the current approach. Thus we have to first aggregate conditional risk to all supply chains in each port, in order to create a port risk value. An equation for port risk is:

In this approach, port risk only reflects the specific consequence of economic loss caused by an attack on a supply chain’s maritime infrastructure. This is slightly different than the current PSGP approach of compiling population, economic effects, infrastructure risk, and military presence as four separate consequence metrics.

We want to write Equation 10 to reflect the nuances of Equation 9. First, we isolate terms that contain rebuilding funding This actually simplifies the substitution of Equation 9 into Equation 10.

The expanded versions of terms A, B, C, D and E are available from the author. Notice that the superscripts l and m have been added to the allocation and elimination terms; this is to distinguish allocation to the lth network from the allocation to the mth network.

Port Organic Resilience

We must convert our port conditional risk metrics to resilience metrics if we are going to allocate PSGP resilience funding to different ports. We do this by simply subtracting conditional port risk from maximum port performance. Maximum port performance Conport(max) is simply the sum of desired maximum performance of each supply chain network that originates at a maritime infrastructure in that port. For our example:

Then, port organic resilience can be shown as a percentage, which represents the potential to restore performance after an attack. Leveraging Equation 12, we now have:

We now have an equation to support the first proposed definition of quantifiable resilience. We then sum organic resilience metrics for all ports in competition for funding, and show port resilience ratios The ratio is the percentage of aggregate port resilience that each port “owns”:

We then allocate PSGP resilience funding in a simple fashion, inversely proportional to port organic resilience ratios. The higher the ratio, the less PSGP funding that port receives. For example, if there is only $2 million available, one port’s resilience ratio is 55% of aggregate port resilience, and the other port’s ratio is 45%, then the former receives $900,000, and the latter receives $1,100,000. This approach avoids the need for a formal optimization of limited PSGP funding.5

Intelligent Adversary Considerations

Before we allocate funds to competing ports based on port organic resilience, we can consider how existing allocations influence the ports’ relative attractiveness to adversaries. At this point, we can incorporate intelligent adversary considerations, a principle espoused by the OR community.

We have only used conditional risk thus far. To incorporate intelligent adversary concerns, we now leverage the concept of intent ratios to represent unconditional port risk. This also gives us the opportunity to represent port organic resilience as a function of unconditional risk. A decision maker may prefer to characterize a port’s resilience based on not only its organic potential to rebuild its infrastructure after an attack, but also based on the extent to which such potential might deter a prospective attacker and change their intent.

We convert port conditional risk equations to expected utility equations to facilitate the calculation of intent ratios. Utility represents the gain an attacker could achieve from executing a specific attack option, and expected utility is that potential gain modified by the probability of successful attack. For simplicity in this proposal, we simply take Equation 11 and claim that attacker expected utility is the same as port conditional risk:

We do the same for other ports in competition for PSGP resilience funding. Then, we create a ratio of expected utility from attacking one port, to the aggregate expected utility of all attacker options. The ratio of expected utilities is a proxy for attacker intent (Taquechel and Lewis 2012). For port 1, the resulting intent ratio is shown:

We repeat this for other ports. We then combine each intent ratio with the expected utility for the respective attacker option, and claim that represents unconditional port risk. For port 1, unconditional risk is shown:

We now have the option to characterize port organic resilience as a function of unconditional risk:

We can thus allocate PSGP resilience funding amongst ports inversely proportional to organic resilience based on unconditional port risk, as an alternative to using Equations 13 and 14.

Supply Chain Network Organic Resilience

Once we have made a decision on how to allocate PSGP funding amongst ports, then each port must allocate their portion amongst their constituent supply chains. In practice, this would be a competition between maritime infrastructures in each port. This would be similar to the current PSGP approach, but the data supporting that competition would be resilience-based in the proposed approach.

We evaluate each supply chain network conditional risk and resulting organic resilience (before PSGP allocations are simulated) as baseline metrics. We leverage Equation 8 to do this and define the organic resilience of our lth supply chain network:

We have now created an equation to support the second definition of quantifiable resilience proposed earlier. A large value of this equation will mean the lth network is highly resilient, or there is a large difference between desired performance and conditional risk. In other words, there is a low potential for expected consequence if the network is attacked, meaning a high potential to restore network performance.

We can also consider individual supply chain network attractiveness to a potential attacker, as we did with port attractiveness. This allows us to write Equation 19 as a function of supply chain unconditional risk instead of conditional risk. We apply the same intelligent adversary technique. Attacker expected utility from attacking an lth supply chain network is the same as conditional risk, so Equation 8 is modified:

We can repeat this for the other supply chains in the port under consideration. Then, we develop intent ratios for each supply chain, which are ratios of expected utility from attacking one supply chain to aggregate expected utility from all attacker options:

We finally apply this intent value to supply chain conditional risk to get unconditional risk, and can express network organic resilience as a function of unconditional risk if desired. We developed “port resilience ratios” per Equation 14 to govern how funding is disbursed amongst ports, but in this case MBRA can simulate a more formal optimization of funding amongst supply chain MCIKR.

Optimizing Allocation of PSGP Resilience Funding to Individual MCIKR

MBRA leverages an iterative algorithm, similar to simulated annealing randomization,6 to optimize funding allocation and achieve an objective function. This iterative algorithm leverages the concept of emergence.

Emergence means that the model moves user-specified proportions of available budget between network nodes at random, to try and achieve the objective function. The objective function in the present approach is to maximize resilience. The model continues this until moving money from any nodes to any other nodes in the network will maximize resilience no further. Thus, achievement of the objective function emerges, representing an equilibrium of optimal allocations.

The unconstrained objective function for this proposal would be to maximize port resilience, leveraging Equation 13. However, a constrained objective function reflects a limited PSGP resilience budget, which is more realistic.

The constrained objective function for maximizing port resilience can be shown:

This objective function means that MBRA allocates PSGP rebuilding funding back and forth between the maritime infrastructures of the two supply chains in our notional port. It does this until port resilience is maximized within the constraint of the resilience budget Budgetreb, specifically earmarked for rebuilding the maritime infrastructure after an attack. That means that when the simulation reaches equilibrium, there is an optimal funding amount allocated to the maritime infrastructure in the lth supply chain, and an optimal funding amount allocated to the maritime infrastructure in the mth supply chain. This results in enhanced port resilience, which we explain later.

The organic resilience term in Equation 22 can leverage either conditional or unconditional network risk. A decision-maker may need to decide whether we want to optimize PSGP allocation to different maritime infrastructure based on (1) that port’s relative attractiveness to other ports (resilience based on unconditional risk), or (2) excluding that factor thereby leveraging conditional risk. One consideration that may influence this decision is that we arguably invest in resilience to influence the attacker’s expected utility and intent, thus deterring an attacker. Therefore intent is the dependent variable and should be excluded from the unconstrained objective function. However, if we use unconditional risk as a basis for the resilience term in Equation 22, we are simultaneously manipulating the dependent variable and the independent variables, thereby biasing results. In that case we should use conditional risk as the basis for the resilience term.

This optimization approach is similar to what network interdiction or DAD models do: optimize performance subject to constraints. However, this approach optimizes resilience, which is treated as a function of probabilistic risk, whereas DAD models generally optimize just consequence, such as flow.

Resulting Changes in Resilience

MBRA displays the resulting network resilience once the optimization concludes. This is enhanced network resilience, shown:

is network conditional risk after an optimal allocation and can be shown in expanded form:

represents the optimal resilience allocation to the maritime supplier node (S) in the lth network after the MBRA simulation reaches equilibrium. We then repeat Equation 24 for other networks in our port. We compare each network’s enhanced resilience to its organic resilience to see the impact of optimal PSGP resilience allocations. Also, we determine port conditional risk after optimal allocation, shown:

We finally calculate enhanced port resilience given optimal allocation:

Comparing Results

We now have data to compare port and network resilience values both before and after optimal allocations. These may be valuable metrics to justify where PSGP funds are allocated.

Suboptimal Allocation of PSGP Funds, Return on Investment

Decision makers may alternatively want to know how suboptimal allocation of PSGP funding would influence network and port resilience. MBRA includes a “manual allocation” option for use after the optimization simulation concludes. Suboptimal allocation may yield different changes in resilience. Also, MBRA can show return on investment at individual nodes: the extent to which allocation at each node influences overall network resilience, divided by that allocation.

Intelligent Adversary Considerations After Resilience Allocation

We now consider intelligent adversary factors for our enhanced resilience calculations, just as we considered them for organic resilience. We determine post-resilience allocation attacker intent, to attack a port or more specifically to attack networks within a port. Then, by comparing (1) the intent to attack a specific network or port before allocation, to (2) the intent after allocation, we can quantify deterrence. We leverage the same techniques used for organic resilience intelligent adversary calculations.

Quantifying Deterrence Effects of Resilience Allocations

Taquechel and Lewis (2012, op. cit.) proposed a method to quantify deterrence effects of infrastructure security allocations. They focused on deterrent effects of allocations to decrease target vulnerability. These allocations reduced probability of attack success if an attack was attempted. Reduced probability of attack success would quantifiably deter an attacker or reflect the deterrence effectiveness of a particular allocation. Taquechel and Lewis proposed the following equation:

This equation reflects the change from (1) attacker intent before deterrence allocations Ipre to (2) attacker intent after deterrence allocations Ipost. The potential resilience allocations could change attacker expected utility for the current approach. If the consequences change because we have invested to rebuild infrastructures and restore productivity after an attack, this may lower an attacker’s expected utility, measurably change intent, and thus measurably deter.

We thus substitute the intent ratios from Equations 16 and 21 into Equation 27 to quantify the deterrence effects of proposed PSGP resilience allocations upon port or supply chain resilience. We have deterred an attacker from attacking a certain port or supply chain if the output of Equation 27 is positive; if the output is negative, we have actually incentivized the attacker to attack that port or supply chain.

The deterrence quantification equation and its results are means to an end as discussed in Taquechel and Lewis (2012, op. cit.). We recommend applying new intent values after resilience allocations are simulated, to get new unconditional risk values, and then compare to pre-allocation risk values to see changes. This approach would implicitly account for quantification of deterrence, as the exact deterrence measurement Equation 27 is not applied to the conditional risk values, but new intent values are applied instead. Importantly, this deterrence quantification technique is applicable to any deliberately caused hazard, whether it is terrorism, sabotage, theft, or any act where an intelligent agent develops intent to do harm.

  1. 1

    This may be the maximum possible pre-disruption network performance level, or some decremented performance level, as supply chain stakeholders see fit. We use maximum pre-disruption network performance levels in our examples. Determining an appropriate functional form for decremented network performance is beyond the scope of this research, but our resilience equations may accommodate such a functional form.

  2. 2

    The US Coast Guard has a formal VV&A program, but a department-wide program has not been implemented.

  3. 3

    This metric may represent the elusive “precise mathematical formulation” of a function, one goal of forward engineering approaches per Alderson (2008).

  4. 4

    If the allocation equals the elimination cost then in theory failure susceptibility has been minimized.

  5. 5

    We assume funding is limited in the sense that there would not be enough funding to rebuild all MCIKR in all ports competing for PSGP funding, such that all MCIKR could achieve their desired post-attack productivity levels.

  6. 6

    Simulated annealing is a technique used to find a proxy for a global optimum value in a search space. It does not produce a true optimum but is often considered “good enough.” The parallel from metallurgic science is that annealing is a process of heating and cooling metals to see if their atomic structure will change and reach a lower energy state to make the metal more stable.

References

Alderson, David L. (2008) “Catching the Network Science Bug: Insight and Opportunity for the Operations Researcher,” Operations Research, 56:1047–1065. Accessed February 26, 2013. DOI 10.1287/opre.1080.0606Search in Google Scholar

Alderson, David L., Gerald G. Brown, W. M. Carlyle and R. Kevin Wood (2011) “Solving Defender-Attacker-Defender Models for Infrastructure Defense.” In: Proceedings of the 12th INFORMS Computing Society Conference: Research, Computing, and Homeland Defense, pp. 28–49. Accessed February 26, 2013. DOI 10.1287/ics.2011.004710.1287/ics.2011.0047Search in Google Scholar

Brown, Gerald G. and Louis A. Cox (2011) “How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts,” Risk Analysis, 31:196–204.10.1111/j.1539-6924.2010.01492.xSearch in Google Scholar

Cate, Fred H., James X. Dempsey and Ira S. Rubinstein (2012) “Systematic Government Access to Private-Sector Data.” International Data Privacy Law, September 17, 2012. Available at: http://idpl.oxfordjournals.org/content/early/2012/09/17/idpl.ips027.full.pdf+html (accessed July 15, 2013), DOI 10.1093/idpl/ips027.10.1093/idpl/ips027Search in Google Scholar

Collado, Ricardo A. and David Papp. (2012) “Network interdiction – models, applications, unexplored directions.” Rutcor Research Report. Available at: http://rutcor.rutgers.edu/pub/rrr/reports2012/04_2012.pdf (accessed July 15, 2013).Search in Google Scholar

Committee on Network Science for Future Army Applications, National Research Council. (2005) Network Science. Available at: http://www.nap.edu/catalog.php?record_id=11516#description (accessed July 15, 2013).Search in Google Scholar

Cox, Louis A. (2008) “Some Limitations of ‘Risk = Threat × Vulnerability × Consequence’ for Risk Analysis of Terrorist Attacks,” Risk Analysis, 28:1749–1761.10.1111/j.1539-6924.2008.01142.xSearch in Google Scholar

Downs, Brady C. (2007) “The Maritime Security Risk Analysis Model.” Coast Guard Proceedings 64: 36-39. Available at: http://www.uscg.mil/proceedings/archive/2007/Vol64_No1_Spr2007.pdf (accessed July 15, 2013).Search in Google Scholar

Gass, Saul I. and Arjang A. Assad (2011). “History of Operations Research.” In: (J. Geunes, ed.) INFORMS TutORials in Operations Research. vol 8, pp. 1–14. Available at: http://s12.middlebury.edu/MATH0318A/History%20of%20OR.pdf.Search in Google Scholar

Government Accountability Office. (2011) “Port Security Grant Program: Risk Model, Grant Management, and Effectiveness Measures Could Be Strengthened.” GAO pp. 12–47. Available at: http://www.gao.gov/products/GAO-12-47 (accessed July 15, 2013).Search in Google Scholar

Kahan, Jerome H., Andrew C. Allen and Justin K. George (2009) “An Operational Framework for Resilience,” Journal of Homeland Security and Emergency Management, 6(1), Article 83: 1–47. DOI: 10.2202/1547-7355.1675 (accessed February 26, 2013).10.2202/1547-7355.1675Search in Google Scholar

Lewis, Ted (2006) Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. New Jersey: Wiley.10.1002/0471789542Search in Google Scholar

Lewis, Ted (2009) Network Science: Theory and Application. New Jersey: Wiley.Search in Google Scholar

Lewis, Ted (2011) Bak’s Sand Pile. Williams, CA: AgilePress.Search in Google Scholar

Mileti, Dennis A. (1999) Disasters by Design: A Reassessment of Natural Hazards in the United States. Washington, DC: Joseph Henry Press.Search in Google Scholar

National Research Council (NRC). (2010) Review of the Department of Homeland Security’s Approach to Risk Analysis. Washington, DC: National Research Council Press.Search in Google Scholar

Society for Risk Analysis Annual Meeting. (2011). Sessions Schedule and Abstracts. Available at: http://birenheide.com/sra/2011AM/program/singlesession.php3?sessid=M4-H (accessed July 15, 2013).Search in Google Scholar

Snyder, Lawrence V., Maria P. Scaparra, Mark S. Daskin and Richard L. Church (2006) “Planning for Disruptions in Supply Chain Networks.” In: (Michael P. Johnson, Bryan Norman, and Nicola Secomandi, eds.) Tutorials in Operations Research: Models, Methods, and Applications for Innovative Decision Making. pp. 234–257. Presented at Institute for Operations Research and Management Science (INFORMS) annual meeting, November 5–8, 2006. DOI 10.1287/educ.1063.0025 (accessed February 26, 2013).Search in Google Scholar

Taquechel, Eric F. and Ted G. Lewis (2012) “How to Quantify Deterrence and Reduce Critical Infrastructure Risk.” Homeland Security Affairs 8(12): 1–28. Available at: http://www.hsaj.org/?article=8.1.12. (accessed February 26, 2013).Search in Google Scholar

U. S. Department of Homeland Security. (2007) Strategy to Enhance International Supply Chain Security, 2007. Available at: http://www.dhs.gov/xlibrary/assets/plcy-internationalsupplychainsecuritystrategy.pdf (accessed July 15, 2013).Search in Google Scholar

U. S. Department of Homeland Security. (2009) National Infrastructure Protection Plan, 2009. Available at: http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf (accessed July 15, 2013).Search in Google Scholar

U. S. Department of Homeland Security. (2010) DHS Risk Lexicon. Available at: http://www.dhs.gov/xlibrary/assets/dhs-risk-lexicon-2010.pdf (accessed July 15, 2013).Search in Google Scholar

U. S. Department of Homeland Security. (2013) FY 2013 Port Security Grant Program Funding Opportunity Announcement. Available at: http://www.fema.gov/media-library-data/20130726-1916-25045-9099/fy13_psgp_foa_final.pdf (accessed July 15, 2013).Search in Google Scholar

Vugrin, Eric D., Drake E. Warren, Mark A. Ehlen, and R. Chris Camphouse (2010) “A Framework for Assessing the Resilience of Infrastructure and Economic Systems.” In: (Kasthurirangan Gopalakrishnan and Srinivas Peeta, eds.) Sustainable and Resilient Critical Infrastructure Systems: Simulation, Modeling, and Intelligent Engineering. New York: Springer, pp. 77–116.10.1007/978-3-642-11405-2_3Search in Google Scholar

World Economic Forum. (2013) Building Resilience in Supply Chains. Available at: http://www3.weforum.org/docs/WEF_RRN_MO_BuildingResilienceSupplyChains_Report_2013.pdf (accessed July 15, 2013).Search in Google Scholar

Published Online: 2013-09-24
Published in Print: 2013-10-01

©2013 by Walter de Gruyter Berlin Boston

Downloaded on 11.10.2025 from https://www.degruyterbrill.com/document/doi/10.1515/jhsem-2013-0018/html
Scroll to top button