25,079 research outputs found

    Finding a needle in a haystack: toward a psychologically informed method for aviation security screening

    Get PDF
    Current aviation security systems identify behavioral indicators of deception to assess risks to flights, but they lack a strong psychological basis or empirical validation. We present a new method that tests the veracity of passenger accounts. In an in vivo double-blind randomized-control trial conducted in international airports, security agents detected 66% of deceptive passengers using the veracity test method compared with less than 5% using behavioral indicator recognition. As well as revealing advantages of veracity testing over behavioral indicator identification, the study provides the highest levels to date of deception detection in a realistic setting where the known base rate of deceptive individuals is low

    Designing and Operating Safe and Secure Transit Systems: Assessing Current Practices in the United States and Abroad, MTI Report 04-05

    Get PDF
    Public transit systems around the world have for decades served as a principal venue for terrorist acts. Today, transit security is widely viewed as an important public policy issue and is a high priority at most large transit systems and at smaller systems operating in large metropolitan areas. Research on transit security in the United States has mushroomed since 9/11; this study is part of that new wave of research. This study contributes to our understanding of transit security by (1) reviewing and synthesizing nearly all previously published research on transit terrorism; (2) conducting detailed case studies of transit systems in London, Madrid, New York, Paris, Tokyo, and Washington, D.C.; (3) interviewing federal officials here in the United States responsible for overseeing transit security and transit industry representatives both here and abroad to learn about efforts to coordinate and finance transit security planning; and (4) surveying 113 of the largest transit operators in the United States. Our major findings include: (1) the threat of transit terrorism is probably not universal—most major attacks in the developed world have been on the largest systems in the largest cities; (2) this asymmetry of risk does not square with fiscal politics that seek to spread security funding among many jurisdictions; (3) transit managers are struggling to balance the costs and (uncertain) benefits of increased security against the costs and (certain) benefits of attracting passengers; (4) coordination and cooperation between security and transit agencies is improving, but far from complete; (5) enlisting passengers in surveillance has benefits, but fearful passengers may stop using public transit; (6) the role of crime prevention through environmental design in security planning is waxing; and (7) given the uncertain effectiveness of antitransit terrorism efforts, the most tangible benefits of increased attention to and spending on transit security may be a reduction in transit-related person and property crimes

    Human-Agent Decision-making: Combining Theory and Practice

    Full text link
    Extensive work has been conducted both in game theory and logic to model strategic interaction. An important question is whether we can use these theories to design agents for interacting with people? On the one hand, they provide a formal design specification for agent strategies. On the other hand, people do not necessarily adhere to playing in accordance with these strategies, and their behavior is affected by a multitude of social and psychological factors. In this paper we will consider the question of whether strategies implied by theories of strategic behavior can be used by automated agents that interact proficiently with people. We will focus on automated agents that we built that need to interact with people in two negotiation settings: bargaining and deliberation. For bargaining we will study game-theory based equilibrium agents and for argumentation we will discuss logic-based argumentation theory. We will also consider security games and persuasion games and will discuss the benefits of using equilibrium based agents.Comment: In Proceedings TARK 2015, arXiv:1606.0729

    Applying Online: Technological Innovation for Income Support Programs in Four States

    Get PDF
    A study examining the development, implementation, and best practices for online applications for public benefits programs in California, Georgia, Pennsylvania, and Washington based on interviews with state agencies and community-based organizations

    Rail Passenger Selective Screening Summit, MTI S-09-01

    Get PDF
    This publication is an edited transcript of the Rail Passenger Selective Screening Summit, which was co-sponsored by MTI and the American Public Transportation Association (APTA) in Chicago, Illinois on June 18, 2009, during APTA´s annual Rail Conference. The workshop was moderated by Brian Michael Jenkins, director, Mineta Transportation Institute\u27s National Transportation Security Center of Excellence (NTSCOE). Speakers included Bruce R. Butterworth, co-author, Selective Screening of Rail Passengers; Greg Hull, president, American Public Transportation Association (APTA); Paul MacMillan, chief of police, Massachusetts Bay Transportation Authority, Transit Police Department; Ron Masciana, deputy chief, Metropolitan Transit Authority (MTA), New York; Jesus Ojeda, security coordinator, Southern California Regional Rail Authority; Ed Phillips, operations deputy, Office of Security, Amtrak; and John P. Sammon, assistant administrator, Transportation Sector Network Management, Transportation Security Administration (TSA

    An analysis of depot level repairables carcass management and position controls under the Advanced Traceability and Control (ATAC) program

    Get PDF
    Repairables are components andor sub assemblies which can be repaired if they become unserviceable. Repairables are typically high cost, long procurement leadtime items. Because of these characteristics, significant economies can be achieved by repairing these items rather than discarding them when they become unserviceable. Historically, these carcasses have been difficult to manage because, when they broke, maintenance personnel were primarily concerned with replacing them with ready-for-issue units; what happened to the carcass was of little concern. Defense Management Review Decision (DMRD) 901's objective to reduce supply system costs includes an initiative to achieve savings by retaining retrograde carcasses returned from the fleet at the first turn-in point rather than shipping them immediately to the repair depot or designated storage site. This thesis analyzes the operation of the ATAC Program to determine a 'ship or hold' decision for returned carcasses. A thorough study of ATAC's background, current management controls and operating procedures, and results from previous studies were combined with on-site hub observations to show how and why the ATAC system works. Because of ATAC, the DMRD 901 initiative to retain carcasses at their first turn-in point is not cost effective except for those items experiencing rapid phase-out or numerous upgrades. Detailed indicators to measure and monitor ATAC cost and performance effectiveness need to be implemented.http://archive.org/details/annalysisofdepot1094527594Lieutenant Commander, United States NavyLieutenant, United States NavyApproved for public release; distribution is unlimited

    Governance of Dual-Use Technologies: Theory and Practice

    Get PDF
    The term dual-use characterizes technologies that can have both military and civilian applications. What is the state of current efforts to control the spread of these powerful technologies—nuclear, biological, cyber—that can simultaneously advance social and economic well-being and also be harnessed for hostile purposes? What have previous efforts to govern, for example, nuclear and biological weapons taught us about the potential for the control of these dual-use technologies? What are the implications for governance when the range of actors who could cause harm with these technologies include not just national governments but also non-state actors like terrorists? These are some of the questions addressed by Governance of Dual-Use Technologies: Theory and Practice, the new publication released today by the Global Nuclear Future Initiative of the American Academy of Arts and Sciences. The publication's editor is Elisa D. Harris, Senior Research Scholar, Center for International Security Studies, University of Maryland School of Public Affairs. Governance of Dual-Use Technologies examines the similarities and differences between the strategies used for the control of nuclear technologies and those proposed for biotechnology and information technology. The publication makes clear the challenges concomitant with dual-use governance. For example, general agreement exists internationally on the need to restrict access to technologies enabling the development of nuclear weapons. However, no similar consensus exists in the bio and information technology domains. The publication also explores the limitations of military measures like deterrence, defense, and reprisal in preventing globally available biological and information technologies from being misused. Some of the other questions explored by the publication include: What types of governance measures for these dual-use technologies have already been adopted? What objectives have those measures sought to achieve? How have the technical characteristics of the technology affected governance prospects? What have been the primary obstacles to effective governance, and what gaps exist in the current governance regime? Are further governance measures feasible? In addition to a preface from Global Nuclear Future Initiative Co-Director Robert Rosner (University of Chicago) and an introduction and conclusion from Elisa Harris, Governance of Dual-Use Technologiesincludes:On the Regulation of Dual-Use Nuclear Technology by James M. Acton (Carnegie Endowment for International Peace)Dual-Use Threats: The Case of Biotechnology by Elisa D. Harris (University of Maryland)Governance of Information Technology and Cyber Weapons by Herbert Lin (Stanford University

    Automated Human Screening for Detecting Concealed Knowledge

    Get PDF
    Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is hiding important information would be of high value to many other fields and functions. This dissertation proposes design principles for and reports on an implementation and empirical evaluation of a non-invasive, automated system for human screening. The screening system design (termed an automated screening kiosk or ASK) is patterned after a standard interviewing method called the Concealed Information Test (CIT), which is built on theories explaining psychophysiological and behavioral effects of human orienting and defensive responses. As part of testing the ASK proof of concept, I propose and empirically examine alternative indicators of concealed knowledge in a CIT. Specifically, I propose kinesic rigidity as a viable cue, propose and instantiate an automated method for capturing rigidity, and test its viability using a traditional CIT experiment. I also examine oculomotor behavior using a mock security screening experiment using an ASK system design. Participants in this second experiment packed a fake improvised explosive device (IED) in a bag and were screened by an ASK system. Results indicate that the ASK design, if implemented within a highly controlled framework such as the CIT, has potential to overcome barriers to more widespread application of concealed knowledge testing in government and business settings
    • …
    corecore