Research Article |
|
Corresponding author: Nicholas P. Moran ( nicholaspatrickmoran@gmail.com ) Academic editor: John Ross Wilson
© 2025 Nicholas P. Moran, Anca M. Hanea, Andrew P. Robinson.
This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Citation:
Moran NP, Hanea AM, Robinson AP (2025) Border biosecurity interceptions for air passengers – assessing intervention methods and analytic tools. NeoBiota 97: 161-178. https://doi.org/10.3897/neobiota.97.141784
|
At-border interventions are a critical step along the biosecurity continuum, to measure and control the risks associated with the cross-border movement of people and goods. Air passengers are a high-volume pathway for a range of biosecurity risk materials, against which various interventions may be used (e.g., manual searches, detector dogs, x-rays, etc.). Tasmania is an island state, and its environment and industries have benefited from a low level of invasive pests due to their geographic isolation. Therefore, relatively strict at-border interventions are used to prevent the entry of new pests, including some serious invasive pests already present on mainland Australia (e.g., Queensland (Bactrocera tryoni) and Mediterranean (Ceratitis capitata) fruit fly). Using a large interception database for domestic air passengers entering the southern Australian state of Tasmania from mainland Australia, this study applies common statistical modelling tools to assess the efficacy of interventions (namely, dog detectors, and bag searches), and to identify pathway risk factors (e.g., flight origin/route). This analysis considered the effects of interventions on both voluntary declarations by passengers and also detections of undeclared risk material on passengers. The analysis also focused on biosecurity risk items generally (e.g., fruits and vegetables, meat products, cut flowers), and items that are specifically considered to be fruit-fly hosts. The results highlight that active at-border interventions and the presence of biosecurity inspectors capture a significant volume of biosecurity risk items at the border, and detector dogs have particularly strong positive effects on the rate of interceptions, particularly for items detected on passengers. Conducting bag searches also appears to increase interceptions, both by increasing the rate of items being detected and by encouraging voluntary declarations. Sensitivity analyses then test the robustness of results to modelling implementation methods and distributional assumptions. This study demonstrates how statistical modelling can provide robust insights into biosecurity interventions and risk factors along pathways, and further highlights the value of high-quality interception data resources for informing and improving biosecurity systems.
Bactrocera tryoni, border biosecurity, Ceratitis capitata, detector dogs, fruit fly, invasive species, passenger screening, pathway risk analysis
Biosecurity border interventions seek to balance the need for the cross-border movement of goods and people against their biosecurity risks. Although intervention policies inherit from a common framework of international agreements (
This is particularly true for the Australian island state of Tasmania (Fig.
Location of Tasmania in relation to mainland Australia (inset), including the locations of the seven arrival ports for air passengers, namely (from left to right) 1. King Island, 2. Burnie, 3. Devonport, 4. Launceston, 5. Bridport, 6. Hobart, and 7. Flinders Island. Base map produced via QGIS (v3.24.2; www.qgis.org). (Note, airports have been anonymised for the remainder of the analysis and labelled Airport_A, Airport_B. etc.)
Air passengers are an important high-volume pathway for pest introductions, with around 20 million passengers arriving annually in Australia in 2023–24 (
A range of risk mitigation tools can be employed at multiple points on the air passenger pathway, from pre-departure, in-transit and on-arrival screening/inspection phases of the biosecurity continuum (
Detector dogs may be particularly valuable in air passenger screening, being able to screen large volumes of passengers and luggage efficiently, and able to be trained to target general biosecurity materials as well as specific pests and diseases (
The analysis of biosecurity interception/surveillance data is prone to some common issues in statistical modelling, including zero-inflation (i.e., where data includes a large proportion of zeros, for example where detections of targeted items are rare), overdispersion (e.g., where variance is much higher than predicted), and censoring (e.g., if data is only recorded where contamination is detected;
Focusing on domestic flight arrivals into Tasmania from mainland Australia, the goal of this study is to assess the efficacy of passenger interventions and pathway risk factors on biosecurity interceptions. This focuses on both general biosecurity risk material (‘BRM’) interceptions, and interceptions of BRM material specifically relevant to Qfly and Medfly (collectively referred to as fruit fly, ‘FF’). Preventing FF incursions has been a focus of Tasmania’s border biosecurity system, particularly following the 2018 incursion. This study uses recent air pathway intervention data for Tasmania. These data are rich resources for our study, as they include records for all commercial arrivals, as well as relevant data on the types/amount of BRM intercepted. This provides a valuable opportunity to apply statistical modelling approaches and assess their sensitivity to implementation methods. The specific aims of this analysis were:
Tasmania is an island state (see Fig.
The main entry pathway for domestic passengers is from flights originating in six Australian mainland states/territories, with a significant but smaller volume of maritime arrivals (e.g., ferries, cruise vessels, private vessels, etc.). Interceptions from air passengers are recorded in the Biosecurity Activity Database System (referred to as ‘BAS data’), from which data from 1 January 2019–1 September 2023 were available. There are BAS interception records for 59,917 domestic interstate flight arrivals, carrying over 6.5 M passengers (~1.4 M/year on average), from which 66,675 BRM interceptions were made. This study focuses specifically on domestic interstate arrivals, as these are routinely recorded in BAS data, and domestic flights represent a large majority of air arrivals in the state (~99% based on 2023/24 volumes;
BRM items are generally defined to include fresh produce (i.e., fruits and vegetables), animal products including seafood, live animals, plant material (e.g., nursery stock, seeds), and soil attached to sports equipment or clothing (
Data for 59,917 flight arrivals was found to be within the scope of analysis, which excludes flights from international origins or within the state, and flights with no data (i.e., cancelled, diverted, missed, or cleared remotely; ~14% of all records). A further subset of 27 arrivals was excluded because of apparent data entry issues, and 25 arrivals into one airport were excluded as no commercial flights arrive at this location, and interceptions for the remaining private arrivals were extremely low, causing computational issues with model implementation. As only a small fraction of actual arrivals is excluded, and missed arrivals do not appear to be targeted/biased towards specific arrivals, we are confident that these exclusions do not reduce the operational relevance of the analyses.
Six count variables were used as response variables, namely:
Total BRM and FF host interceptions are the sum of their corresponding declared and undeclared detection counts. Both BRM and FF variables were used to explore how interventions perform against both general biosecurity threats as well as high-priority/high-risk biosecurity materials, respectively. Detections may occur through manual searches or via detector dogs, and biosecurity staff also ask for passengers to voluntarily declare any BRM items, both of which may occur at several stages of the arrival process (e.g., as passengers enter terminals, or in luggage collection areas). Both detections and declarations were included to explore how interventions influence both voluntary and involuntary compliance behaviour in passengers (e.g., whether detector dogs primarily increase interception through direct detections, or whether their visual presence also encourages voluntary declarations).
The number of interceptions was calculated as the sum of each distinct type of BRM or FF host, separated by the passenger (e.g., if 2 passengers are intercepted each carrying 3 types of BRM, N_Total = 6). The rationale is that each commodity type may represent a distinct biosecurity threat, as may the same kind of commodity being carried by two separate passengers.
Generalized linear mixed effects (‘glm’) models with a Poisson distribution were implemented via package ‘lme4’ (v1.1-33,
Four fixed effects were included, namely: arrival airport ("Location"), intervention regime ("Regime"), number of bag searches ("BagSearchCount"), and number of passengers per flight ("PassengerCount"). "Regime" includes five combinations of one or more dog detector team (‘DDT’) and biosecurity inspector (‘BI’), i.e. one BI, two BIs, one DDT, one DDT with one BI, and two DDTs. Both DDTs and BIs have been deployed across all airports. Airports were included as fixed effects, as they may differ both in their interception efficacy and in the underlying rates of contamination on flights arriving at each location. Count predictor variables (i.e., passenger and bag search counts) were square-root transformed and Z-scaled to reduce skewness, to improve both model performance and the interpretability of effect estimates (per
Models included two random effects, to assess the level of variance associated with the flight’s Australian state/territory of origin ("FlightOrigin") and specific flight route ("FlightNumber"; nested within origin). Flights without a number recorded were categorised as ‘Itinerant/Other’, with a large majority considered to be private non-commercial arrivals, but also likely to include a small percentage of commercial flights for which their numbers were not entered into the database. For further details of model structure see Suppl. material
Unless otherwise stated, all values in square brackets below represent 95% confidence intervals (or credibility intervals for Bayesian models below; ‘95CI’) for the estimated effects. The statistical significance of any fixed effects is inferred from whether their 95CIs include zero. Random effects are assessed based on how much variance is explained in models, and whether 95CIs for any specific random intercept predictions include zero. Where appropriate, parameter/effect estimates below have been converted to percentage changes in the expected number of interceptions for ease of interpretability. Marginal means were extracted from models using the package ‘emmeans’ (v1.8.7,
Sensitivity to overdispersion and zero-inflation was tested by re-fitting a subset of models in a Bayesian framework via the package ‘brms’ (v2.19.0,
Four alternative distributions were tested for each response variable, namely Poisson (as in the main analysis but implemented in a Bayesian framework), zero-inflated Poisson, negative binomial, and zero-inflated negative binomial, respectively. These were chosen as common alternatives to account for cases with excess zeros and overdispersion in ecology and other fields where count data is common (
Measures of model fit were also estimated for all models, i.e., Akaike/Watanabe–Akaike information criterion ‘AIC’/‘WAIC’ as a measure of the quality of model fit for the dataset. Marginal and conditional R2 values as measures of the proportion of variance were explained by fixed effects and both fixed and random effects respectively (via package ‘performance’, v0.10.3,
Models identified significant effects of biosecurity interventions upon interceptions of both BRM and FF host items. Estimated BRM and FF host interception rates were significantly higher when detector dogs were present. For example, the estimated total BRM interceptions (N_Total) per flight with one DDT was 0.88 [95CI: 0.80, 0.96], compared to 0.50 [0.46, 0.55] for one BI when using our default Poisson model. This effect appeared to primarily be driven by increases in the number of detections, with DDTs having strong positive effects on BRM and FF host item detections (Fig.
Estimated interception rates for air passengers under different border intervention regimes, for (A) biosecurity risk material (BRM) interceptions and (B) the subset of BRM that are fruit fly (FF) host items. Regimes include combinations of detector dog teams (DDT) and biosecurity inspectors (BI). Note, that estimated rates are the predicted number of interceptions per flight, and are independent of other factors included in the models (i.e., are estimated based on a flight with a mean number of passengers, and a mean number of bag searches, and averaged across arrival airports). Total, declared and detected rates come from distinct models, so estimates are not expected to be additive.
The number of bag searches conducted (performed both by DDTs and BIs) had a positive effect on the estimated total, declared, and detected BRM counts. Unsurprisingly, the square root number of bag searches per arrival was associated with a per-unit increase in total BRM interceptions of 24.0% [23.3%, 24.6%]. A similar effect was found for BRM declarations (i.e., 23.8% [22.8%, 24.9%]) and detections (i.e., 24.1% [23.3%, 24.9%]). Similar effects were observed for FF host interceptions in total (23.8% [23.0%, 24.6%], declarations (23.2% [22.1%, 24.4%]), and detections (24.3% [23.2%, 25.4%]). In both cases, the effect was similar for detections and declarations, suggesting that conducting more bag searches increases the rate of BRM being detected and encourages more declarations. As expected, increased passenger counts were also associated with increased interception rates across all response variables. Finally, there were also some differences between arrival airports in their estimated interception rates (see Suppl. material
Random factors, flight number and flight origin, both explained some variance in interception rates (e.g., for N_Total, VFlightOrigin = 0.004, VFlightNumber = 0.042), although the random effects only explained a small proportion of variation relative to fixed effects (i.e., for N_Total, R2marginal = 0.543; R2conditional = 0.570, proportional VFlightOrigin = 0.002, and proportional VFlightNumber = 0.025). It should also be noted that the overdispersion may lead to overestimates of R2 values (e.g.,
Predicted random intercepts by flight origin for (A–C) biosecurity risk material (BRM) interceptions, declarations, and detections; and (B) fruit fly (FF) host item interceptions, declarations, and detections. Error bars represent 95CIs, and intervals that do not include zero are considered to have significantly higher or lower levels of BRM or FF host interceptions than an average flight. Intercept estimates are in the modelled unit, i.e., the log of the proportional difference between the group and the overall expected BRM or FF host count.
Tests showed that models used in the main analysis for N_Total and N_Declarations_FF both had probable zero-inflation (ratio of predicted to observed zeros: 0.85 and 0.92, respectively), and overdispersion was present in both cases (N_Total: dispersion ratio = 1.634, χ2 = 97786.221, P < 0.001; N_Declarations_FF: dispersion ratio = 1.709, χ2 = 102303.640, P < 0.001). Notably, overdispersion can be a common consequence of zero-inflation, in which case a zero-inflated Poisson approach may be sufficient to account for both issues (see
Nonetheless, sensitivity analysis showed that the outputs were relatively robust to implementation methods, with the patterns identified qualitatively similar between implementation types, but with some variation in the magnitude and uncertainty of effects. Estimated interception rates under differing regimes showed similar patterns when using a Bayesian implementation, although with slightly greater uncertainty (e.g., the estimated rate with one BI was 0.50 [0.44, 0.57] compared to 0.50 [0.46, 0.55] in the main model; see Fig.
Estimated biosecurity risk material (BRM) interception rates for air passenger intervention regimes using different model implementations. Regimes include combinations of detector dog teams (DDT) and biosecurity inspectors (BI). Estimates are for five different model implementations, based on the modelled distribution and on a frequentist (lme4) vs Bayesian (brms) framework (see further details under Suppl. material
Random intercept predictions also appeared to show qualitatively similar patterns for FF host detections (Fig.
Predicted random intercepts for fruit fly (FF) host item detections, by flight origin. Estimates are included from five different model implementations, which from the top include the following; (green, circle) Poisson-lme4; (purple, triangle) Poisson-brms; (blue, square) zero-inflated Poisson-brms; (gold, diamond) negative binomial-brms; and, (orange, upside-down triangle) zero-inflated negative binomial-brms. Intercept estimates are in the modelled unit, i.e., the log of the proportional difference between the group and the overall expected FF host count.
Biosecurity interceptions at Tasmanian airports were strongly influenced by the methods used. For example, the number of bag searches conducted increased both detections and declarations from passengers. This suggests that increased effort in active at-border surveillance by officers will increase the efficacy of interventions by promoting both voluntary compliance by passengers and detections of undeclared risk items that may otherwise have been missed. Similarly, dog detector teams are increasingly deployed for border interventions along high-volume phytosanitary risk pathways, both in Australia and many other countries (
The ability to analyse pathway risk heterogeneity is limited by the type of data collected for arrivals along a biosecurity pathway. Despite the relatively limited set of pathway factors included in models (i.e., origin and route) and the relatively small proportion of total variance explained by these factors, models were able to identify specific flight origins and routes as potentially either high- or low-risk arrivals. This shows how interception data may be useful for supporting risk-based approaches to interventions (e.g., Australia’s flight-based-traveller profiles;
While these data are valuable for identifying how interventions or pathway risk influence the actual interception rates, which is critical information for implementing biosecurity interventions to reduce risk at the border, further information is required to fully quantify the risk of incursions along this pathway. For example, the risk of fruit fly establishing through the air passenger pathway would require us to estimate the actual volume of biosecurity risk material on flights and the proportion of those items infested with fruit fly (i.e., contamination/infestation rates), the proportion of risk material missed (i.e., leakage), or the viability of any individuals or larvae that may infest any of the risk material. These parameters may be estimated using complementary methods, such as endpoint surveys that target a subset of passengers as manual or X-ray searches to estimate contamination rates (
This study used a simple and common approach for count data (i.e., regression modelling based on a Poisson distribution), performed with modelling tools that are accessible, and relatively easy to implement. Sensitivity analysis suggested that the outputs of this approach were qualitatively similar to approaches using more advanced tools (i.e., Bayesian modelling methods), or distributions (e.g., that account for zero-inflation). However, there were some notable differences in outputs. For example, interception rates estimated from negative binomial models tended to be lower, suggesting that failing to account for over-dispersion may lead to overestimates. Furthermore, these models accounting for both zero-inflation and overdispersion (i.e., zero-inflated negative binomial models) were the best-fitting models tested. Also, Bayesian methods tended to lead to higher uncertainty estimates around fixed- and random-effect parameters, so may represent a more conservative approach to modelling pathway risk factors. Therefore, while our conclusions were generally robust to implementation methods, sensitivity analysis may also be a valuable step for providing additional information for decision-makers about the robustness of any conclusions drawn from modelling and future researchers should consider their implementation. In this case, however, the operational interpretation of the simpler models was borne out by the more complex models, i.e. that detector dogs were more effective than biosecurity inspectors.
Finally, effective at-border interventions are a key step in the biosecurity continuum. As at-border interventions become more sophisticated and widely implemented, large interception data sets will inevitably become more available to researchers and biosecurity decision-makers. This study highlights how this data can be a valuable resource for informing management decisions for Tasmania and can provide empirical evidence to support the implementation of risk-based approaches or the use of specific methods such as detector dogs, which can improve resource allocations and lead to more effective interventions at borders.
We acknowledge Biosecurity Tasmania and its staff for supporting this project and specifically thank Rae Burrows, Andrew Bishop, Ryan Wilkinson, Meg Flanagan, Renee Tiggs, Guy Westmore, Emma Hutchinson, Cameron Healey, Jason Paul, Alex Matthews, Liam Harrex, Jesse Siebler, Christian Knapp, Andrew Carter, Deepa Adhikari, Elise Baniowski, Marlene Quinn, and Chris Jones.
The authors have declared that no competing interests exist.
No ethical statement was reported.
The project received funding from Biosecurity Tasmania, Department of Natural Resources and Environment Tasmania.
NPM: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Software, Resources, Validation, Visualization, Writing – original draft. AMH: Conceptualization, Methodology, Supervision, Writing – review & editing. APR: Conceptualization, Methodology, Funding acquisition, Supervision, Writing – review & editing.
Nicholas. P Moran https://orcid.org/0000-0002-7331-0400
Anca M. Hanea https://orcid.org/0000-0003-3870-5949
Andrew P. Robinson https://orcid.org/0000-0002-0509-6043
For privacy and operational purposes, all identifying information has been anonymised from datasets, including airport names, flight numbers, etc. Fully anonymised datasets, analysis code, models and outputs are all available at the Open Science Framework (osf.io/78tv9/; doi: 10.17605/OSF.IO/78TV9).
Additional supporting materials include the following data and modelling outputs
Data type: pdf
Explanation note: (A) Composition of BRM and FF host interceptions; (B) Supplementary model design and output details.