National Center for Risk and Economic Analysis of Terrorism Events University of Southern California Los Angeles, California Modeling Terrorist Beliefs and Motivations October 2010 to September 2011 Richard John University of Southern California richardj@usc.edu & Heather Rosoff University of Southern California rosoff@usc.edu "This research was supported by the United States Department of Homeland Security through the National Center for Risk and Economic Analysis of Terrorism Events (CREATE) under Cooperative Agreement 2007-ST-061-RE0001. However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the United States Department of Homeland Security or the University of Southern California." Cooperative Agreement No. 2010-ST-061-RE0001 Department of Homeland Security December 31, 2011 ABOUT CREATE The National Center for Risk and Economic Analysis of Terrorism Events (CREATE) was the first university-based Center of Excellence (COE) funded by University Programs of the Science and Technology (S&T) Directorate of the Department of Homeland Security (DHS). CREATE started operations in March of 2004. This annual report covers the seventh year of CREATE funding from October 2010 to September 2011, the first year under Cooperative Agreement 2010-ST-061-RE0001 from DHS. While the text of this report focuses on the seventh year, all data tables, publications, lists of participants, students, and presentations and events are cumulative from the inception of CREATE. CREATE’s research mission is to develop advanced models and tools for risk assessment, economic assessment, and risk management to counter terrorism. CREATE accomplishes this mission through an integrated program of research, education, and outreach, spanning the disciplines of economics, psychology, political science, industrial and systems engineering and information science. CREATE develops models, analytical tools, methodologies and software, and tests these tools in case analyses, representing critical homeland security investment and policy decisions. Due to the cross-cutting nature of research in risk, economics, and risk management, CREATE serves the need of many client agencies at the DHS, including the Transportation Security Agency, Customs and Border Protection, Immigration and Customs Enforcement, FEMA and the US Coast Guard. In addition, CREATE has developed relationships with clients in the Offices of National Protection and Programs, Intelligence and Analysis, General Council, Health Affairs, and Domestic Nuclear Detection. Using a mix of fundamental and applied research, CREATE faculty and students take both the long-term view of how to reduce terrorism risk through fundamental research and the medium-term view of how to improve the cost-effectiveness of counter-terrorism policies and investments through applied research. Please visit www.create.usc.edu for more information. Page 2 of 9 Modeling Terrorist Beliefs and Motivations Richard John and Heather Rosoff, University of Southern California richardj@usc.edu, rosoff@usc.edu 1. 2. 3. 3.1. 3.2. 4. Modeling Terrorist Beliefs and Motivations Overview ........................................................................................3 Research Accomplishments ..................................................................................................................................3 Research Products .................................................................................................................................................8 Publications ......................................................................................................................................................8 Presentations – Conferences .............................................................................................................................8 Education and Outreach Products .........................................................................................................................8 1. Modeling Terrorist Beliefs and Motivations Overview The objective of this research is to further develop our pioneering approach to adversary threat assessment through the construction of random utility models of terrorist preferences. This work builds on previous research efforts (Rosoff, 2009; Rosoff & John, 2009) that have used decision analysis models and elicitation methods to: (1) construct of a value tree for a terrorist leader or organization using value focused thinking (VFT), (2) construct a random multi-attribute utility model (RMAUM) capturing tradeoffs among conflicting objectives and single-attribute utility functions representing risk attitudes of terrorist leaders, (3) construct probability distributions capturing key uncertainties for terrorist leaders (e.g., attack success) and uncertainties in the utility function parameters provided by adversary experts. Understanding the objectives and motivations that drive terrorist group behavior is critical. Current methods for terrorism risk assessment focus on target vulnerability, terrorist capability and resources, and attack consequence. What many researchers have yet to consider is the influence of terrorist group values and beliefs in deciphering the root cause of their militant behavior. This understanding has the potential to contribute to probabilistic estimates of terrorist threats. During Year 7 we further developed the adversary preference modeling (APM) methodology by (1) assessing how anti-terrorism resource allocations impact terrorist preferences for different attack strategies and estimated relative likelihoods of various attack strategies, and (3) continuing to validate the APM through a case study with political/social/advocacy groups with an action oriented agenda that is driven by specific motives, values, and objectives. To address the first question, we used the APM methodology to model evolving decision making of the adversary and to capture adversary attack strategy preferences. Using this approach, we assume that the attacker’s probability distributions over attack strategies (modes, targets, and timing) are conditional on the countermeasures selected by the defender. Four anti-terrorist resources were considered – (1) installation of city wide closed circuit television cameras (CCTV), (2) enhanced police presence near targets of concern, (3) enhanced border security, including both technological and human barriers, and (4) widespread installation and monitoring of detectors (biological, chemical, radiological and explosive) in urban areas of concern. Each anti-terrorist resource was evaluated in terms of its impact upon proxy terrorist’s attribute definitions, probability estimates and ultimately, estimates for the likelihood of various attack strategies. To address the second question, we opted to test the validity of our APM methodology through the development of a model for a domestic political action group – Sea Shepherd Conservation Society (Sea Shepherd). Research progress and accomplishments made throughout Year 7 are described in the subsequent section. 2. Research Accomplishments Adversary Modeling Using the APM Methodology Page 3 of 9 With respect to our adaptive adversary model using the APM methodology, we demonstrate that preferences and relative likelihoods are altered depending upon the anti-terrorism resource under consideration and the proxy terrorist’s perceived risk posed by that resource. For example, Figure 1 is a series of boxplots comparing attacker utility distributions for No Countermeasure versus each of the countermeasures. The analysis shows that none of the countermeasures impact the proxy terrorist leader’s attack preferences. Under all conditions, the attack type with the highest expected utility is ‘no attack’. In fact, we also found that the countermeasures have a slight effect of increasing the likelihood of ‘no attack’. Adversary Utilitiy distributions, contingent on NO Countermeasures 0.9 0.8 0.7 0.6 Utility 0.5 0.4 0.3 0.2 0.1 0.0 95% 75% Mean 25% 5% Adversary Utility Distributions Contingent on CCTV Countermeasure Adversary Utility Distributions Contingent on Police Countermeasure 0.9 0.8 0.8 0.7 0.7 0.6 0.6 0.5 0.5 Utility Utility 0.9 0.4 0.4 0.3 0.3 0.2 0.2 0.1 0.1 0.0 0.0 95% 95% 75% 75% Mean Mean 25% 25% 5% 5% Page 4 of 9 Adversary Utility Distributions Contingent on Border Security Countermeasures Adversary Utility Distributions Contingent on Detector Countermeasures 0.9 0.8 0.8 0.7 0.7 0.6 0.6 0.5 0.5 Utility Utility 0.9 0.4 0.4 0.3 0.3 0.2 0.2 0.1 0.1 0.0 0.0 95% 95% 75% 75% Mean Mean 25% 25% 5% 5% Figure 1: Proxy Expected Utilities for No Countermeasure vs Countermeasures Figure 2 illustrates the proxy’s likelihood estimates for each attack type conditional on no additional antiterror countermeasures. This figure shows that given the probability of the most preferred attack, the ‘no attack’ option, dominates all other alternatives (.985) it is not surprising that countermeasure effects were not found following countermeasure implementation. Figure 3 illustrates the proxy’s likelihood estimates for each attack type assuming that one of the attack options will be selected by a terrorist leader (that is, we excluded the ‘no attack’ alternative). Results indicate that the most preferred attack alternative was the IED attack on gas stations in U.S. cities. 1 0.985 Probability of Attack 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.013 0.001 0.001 0.001 0 0 No Attack IED attacks on gas Anthrax release in Dirty bomb attack Sarin gas attack on Pneumonic plague stations in US large US oil on a major US a subway system release in US train cities refineries seaport in a large US city stations Figure 2: Proxy Relative Likelihood of Attack for No Countermeasure and Conditional on No Additional Countermeasures Page 5 of 9 1 Probability of Attack 0.9 0.811 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.1 0.082 0.007 0 0 IED attacks on gas stations in US cities Anthrax release in Dirty bomb attack on Sarin gas attack on a large US oil refineries a major US seaport subway system in a large US city Pneumonic plague release in US train stations Figure 3: Proxy Relative Likelihood of Attack with ‘No Attack’ Eliminated and Conditional on No Additional Countermeasures Interestingly, while countermeasure resources alter attribute scales and uncertainties and attack probability estimates, attack strategies preferences could remain unaffected depending on the values assigned to attribute weights and attribute utility functions capturing attitudes toward risk for each alternative. Through the exploration of different anti-terrorism resources’ impact on proxy terrorist preferences, insight is gained as to the extent to which government actions might influence terrorist decision making. APM Model Validation During Year 7 we began building a model based on what could be identified about the Sea Shepherd online and from second-hand sources. We also began interviewing Sea Shepherd stakeholders to evaluate the accuracy and validity of the originally constructed second-hand model, and hence determining whether the APM modeling approach could be validated. With respect to the construction of the second-hand model, basic research (online resources and literature) led to the development of a first set of objectives. Sea Shepherd’s goal is to “to end the destruction of habitat and slaughter of wildlife in the world's oceans in order to conserve and protect ecosystems and species.”1 Given this fundamental objective, five strategic objectives were identified: (1) Shape New Policy, (2) Enforce Environmental Law, (3) Increase Organizational Capacity, (4) Minimize Operation Costs and (5) Shape Public Opinion. In addition, Sea Shepherd campaign alternatives, scales and metrics for the attributes, estimates of attitudes toward risk, and trade-offs among various objectives were identified (more details available upon request). Figure 4 is a graphic depiction of a preliminary objectives hierarchy for the Sea Shepherd. 1 http://www.seashepherd.org/who-we-are/ Page 6 of 9 Figure 4. Sea Shepherd Objectives Hierarchy Ultimately, from this working model proxy utility distributions have been derived and are presented in Figure 5. The range for attack options is from 0, being the worst possible attack, to 1.0, being the best possible attack. Saving the Whales in the Antarctic Ocean clearly has the highest expected utility - .38. The remainder of the attack alternatives are still attractive, yet less so, and cluster in the range of having utilities from .16 to .20. This is true for all the alternatives except for Defending Sharks/Turtles in Galapagos (utility = .11). Page 7 of 9 Expected Utility 0.50 0.45 0.40 0.35 0.30 0.25 0.20 0.15 0.10 0.05 0.00 0.38 0.20 0.19 0.18 0.16 0.16 0.11 Figure 5. Proxy Expected Utility for Sea Shepherd The information included herein is a preliminary report of progress to date. All material is still under development for the second hand model. In addition, interviews have been conducted and/or scheduled for the second phase of the project (validation component) in Year 8. 3. Research Products 3.1. Publications John, R. and Rosoff, H. (April 2011). Modeling Effects of Counterterrorism Initiatives for Reducing Adversary Threats to Transportation Systems, Journal of Homeland Security, Retrieved from http://www.homelandsecurity.org/journal/Default.aspx?t=355&AspxAutoDetectCookieSupport=1 3.2. Presentations – Conferences John, R. S. & Rosoff, H. (June 2011). Value focused modeling for an adaptive adversary. Research paper presented at the 4th Annual Workshop on Human Behavior and Security (SHB-2011), Pittsburgh, Pa., CMU, June 17-18, 2011. John, R. and Rosoff, H. (April 2011). Modeling Effects of Counterterrorism Initiatives on Reducing Adversary Threats to Transportation Systems. Invited paper presented at the DHS Fifth Annual University Network Summit. Session Chair: Heather Rosoff. John, R. and Rosoff, H. (December 2010). Modeling the Dynamic Bidirectional Influence of Attack Threat and Countermeasure Decisionmaking. Invited paper presented at the Society for Risk Analysis Annual Meeting, Salt Lake City, Utah. Session Chair: Heather Rosoff. 4. Education and Outreach Products Education and Outreach Initiatives (Please detail below) # of Postdoctoral Researchers # of students supported (funded by CREATE) # 1 2 Funded by CREATE Heather Rosoff, Postdoctoral Researcher. University of Southern California (USC) School of Policy, Planning and Development. Gin Chen, Doctoral Student in Psychology. USC’s Department of Psychology. Page 8 of 9 Jason Jacobsen, Master of Public Administration Candidate. USC’s School of Policy, Planning and Development. Page 9 of 9