Sunday, May 17, 2015 Page 1 Investigating “Hider” Theory New Horizons in Search Theory 4 th Workshop.

Slides:



Advertisements
Similar presentations
Benthic Assessments One benthic ecologists concerns and suggestions Fred Nichols USGS, retired.
Advertisements

© 2005, CARE USA. All rights reserved. PARIS PROGRAM APPROCH At CARE Bangladesh.
Science, Technology, Society and the Environment.
Distance is a big idea that helps us understand many other geographic features about Australia, including the patterns of natural vegetation, sheep, cattle,
13 January 2005 Slide 1 National Defense University – Institute for National Strategic Studies China’s Strategic Force Modernization Dr. Phillip Saunders.
ECON International Economics
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
PODS: Interpreting Spatial and Temporal Environmental Information Edoardo (Edo) Biagioni University of Hawai’i at Mānoa.
Chapter 16 Electronic and Information Warfare. Basics Electronic Attack Deception Soft Kill/Hard Kill Electronic protection Electronic Support.
SCHOOL OF INFORMATION UNIVERSITY OF MICHIGAN Collaboratories at a Glance G Judy Olson Nathan Bos Erik Dahl.
Developed by Cool Pictures and MultiMedia Presentations Copyright © 2004 by South-Western, a division of Thomson Learning, Inc. All rights reserved. Developed.
MILITARY AIR VEHICLE, AS A SYSTEM György Seres DSc
ETP 2005 Brian Vance Engineering Is the art of applying scientific and mathematical principles, experiences judgments and common sense to create or develop.
Power Transition Theory and U.S.-China Relations Professor David Skidmore September 28, 2010 University of Macau.
The Business Environment
What is Earth Science ?  Since the beginning of human history, people have observed the world around them.  Early people forged myths and legends to.
Online communities 2. Starter: Signing up to an online account: When signing up to a new account you sometimes have to fill in one of these: This is called.
Group 4 Alma Pena Jose Medina Laura Randall Mona Shafer Melissa Dunlop Raul Guerrero Chapter 2.
Introduction to Computer Security PA Turnpike Commission.
UAS Combat Threat Survivability SURVICE Engineering Company
EQ: What are the most effective ways to carry out a scientific inquiry?
Toward a new era of intellectual property: aligning competition and IP policy Richard Gold Associate Professor Innovative to abuse? Exploring the interactions.
Unit One Geography: It’s Nature and Perspectives Chapter One: Introduction to Human Geography.
Chapter 5 Diagnosis for Change McGraw-Hill/Irwin
Meteorology What is it? How does it work? Meteorology in action!!
Breakout Session IV: Applying Remote Sensing Observations to Impacts Assessment Background (1) The IPCC WG 2 Report (2008) “Climate Change Impacts, Adaptation.
EXPECTATION - Describe the relationship between the warming of the atmosphere of the Earth by the Sun and convection within the atmosphere and the oceans.
Build Execution into Strategy Group 3.  A company encompasses everyone from the top to the bottom  There needs to be a culture of trust and commitment.
The Environment Chapter 13 Lawrence Erlbaum Associates, Publisher, Copyright
Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.
Introduction to Earth Science The Scope of Earth Science.
STRENGTHS WEAKNESSES OPPORTUNITIES THREATS.  Advantages of proposition?  Capabilities?  Competitive advantages?  USP's (unique selling points)? 
 The word ‘strategy’ is derived from a Greek word ‘ strategos’, which means generalship----the actual direction of military force  Strategy is a plan.
Environmental Science SVN3M. What is the GOAL of this course?  See Course Description: Syllabus  BIG IDEAS:  Background Information:  What do we need.
Key Words in disaster Management Dhammika Mahendre.
The business environments has two aspects: The internal environment also known as the micro-environment and The external environment, which is made up.
David Schneider Memorial University, St. John’s, Canada Scale, Scope, and Power Laws in Environmental Science. Part II. Environmental Science September.
World War I The Great War The U.S. Enters the War The United States tried to remain neutral The U.S. into the war: 1.S -Sussex Pledge 2.L-
3-D rendering of jet stream with temperature on Earth’s surface ESIP Air Domain Overview The Air Domain encompasses a variety of topic areas, but its focus.
Improving public involvement – examples of education and information frameworks Rachel Carless Coastal Literacy Officer, Coastnet.
How to handle the issue of uncertainty in Local Climate Change Adaptation Policymaking – summing up the models and approaches developed in Clim-ATIC Presentation.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Kristian Krieger, M. Brooke Rogers Chapter 7 - Promoting Public Resilience against Chemical, Biological, Radiological.
Lecture 6. Human Factors in Engineering Design SPRING 2016 GE105 Introduction to Engineering Design College of Engineering King Saud University.
Wolf-Sim Agent-Based Computer Model for Distributed Network Forces (DNF ) Preliminary Analysis Brief prepared by: Dr. Richard A. Katz, Stephen D. Basile.
Oceans and Climate IB Geography. Distance from the sea and Weather Due to the differing specific heat capacities of land and water, this can affect local.
Tuesday, June 07, 2016 Page 1 Investigating “Hider” Theory New Horizons in Search Theory 4 th Workshop.
Getting ready for Nursery!. Ten top tips- getting ready to start 1.I know my own name 2.I can take myself to the toilet and flush it 3.I can wash and.
Ch 16 sec 2  Nuclear weapons were such a scary thing that it changed the way military strategy was planned from Hiroshima to today.  No nuclear weapons.
District 4 Area Workshops 2016 Conflict Resolution or I say tomato you say…
CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT MODULE: NAVAL KNOWLEDGE UNIT 2: NAVAL OPERATIONS AND SUPPORT FUNCTIONS.
Physical and Human Geography
Monday.
Waves and Currents.
Waves and Currents.
Waves and Currents.
U.S. Nuclear Strategy toward China
Waves and Currents.
How and why did America change its tactics to fight the Viet Cong?
World Politics Under a system of Anarchy
Recap Waves are energy moving through a substance
NATIONAL LANDSAT POLICY Executive Office of the President
Waves and Currents.
Waves and Currents.
Waves and Currents.
Waves and Currents.
Waves and Currents.
Waves and Currents.
Waves and Currents.
Waves and Currents.
Presentation transcript:

Sunday, May 17, 2015 Page 1 Investigating “Hider” Theory New Horizons in Search Theory 4 th Workshop

Sunday, May 17, 2015 Page 2 Investigating “Hider” Theory Presentations Group 1: Hiding Contraband (WMD) Steve Basile, Jeff Cares, Bill Glenney, Tim Mertens, Frank Tito Group 2: ASW and Other Military Examples Michelle Jarvais, David Jarvis, Rich Katz, Brian McCue, Bill Pruitt

Sunday, May 17, 2015 Page 3 Investigating “Hider” Theory Group 1: Hiding Contraband (WMD) Steve Basile, Jeff Cares, Bill Glenney, Tim Mertens, Frank Tito

Sunday, May 17, 2015 Page 4 Investigating “Hider” Theory Operational Context General Competitive Context –Hider, Searcher with active strategies –Not necessarily mirror image strategies Forces, Elements Involved (all have some signature) –Organization Policy makers, financiers, scientists, technicians, deliverers, suppliers Communications, contracts, policies, links, social networks, trust, fear, etc. –Resources Could be outwardly benign, particularly in isolation e.g., site, money, raw materials, recipe, etc. Could be virtual, distributed –Process Arrangement of resources and organization to produce contraband –Contraband End product of a process Environmental Considerations –Size of the thing and the area in which it is hidden –Background (ambient noise in the environment) –Backyard (familiarity with background) –Neutral or unrelated activity (affects positively or negatively) –Clutter, evasion, deception, decoy, camouflage GROUP 1: Hiding Contraband

Sunday, May 17, 2015 Page 5 Investigating “Hider” Theory Operational Problem Hide what? –Organization, resources, process or contraband –Specifically undeclared WMD Chemical, Biological, Radiological, Nuclear, Explosive Stockpile volume equivalent to a 3-car garage Hide where? –Within a country With exceptions, e.g., resources, people, money can go global Hide why? –Because it is illegal Prevent sanctions Protect sovereignty –Surprise –Obscure scale Ambiguity about intentions, capability, size of arsenal, readiness –Protect stockpile For later use, survivability, prevent theft, sale value, deterrent value –Affect world/regional/local opinion Sympathy for regime if WMD remains hidden Affect political events (e.g., 2004 US election) Support larger political strategy Hide when? –For months or years GROUP 1: Hiding Contraband

Sunday, May 17, 2015 Page 6 Investigating “Hider” Theory Major Process Elements What are the major factors that impact hider success? What are the relationships between these major factors? Are any of these substantially greater than the others? GROUP 1: Hiding Contraband

Sunday, May 17, 2015 Page 7 Investigating “Hider” Theory Process Diagram PROCESSPROCESS CONTRABAND RESOURCES ORGANIZATION GROUP 1: Hiding Contraband

Sunday, May 17, 2015 Page 8 Investigating “Hider” Theory Network Strategy Ratio of Buttons to Strings Number of Buttons Connected Kauffman, At Home in the Universe, p.57

Sunday, May 17, 2015 Page 9 Investigating “Hider” Theory Insights and Conclusions Many of the parts are in plain sight Links are often the things that are telling –Hider needs “invisible thread” Search for contraband very like ASW –Hider relies on big area/small stockpile Hider relies on knowledge or searcher’s capabilities, location High combinatoric space to hide in –Network of org + resources GROUP 1: Hiding Contraband

Sunday, May 17, 2015 Page 10 Investigating “Hider” Theory Group 2: ASW and Other Military Examples Michelle Jarvais, David Jarvis, Rich Katz, Brian McCue, Bill Pruitt

Sunday, May 17, 2015 Page 11 Investigating “Hider” Theory GROUP 2: ASW & Military Examples Potential Operational Scenarios Orange ASUW on Blue HVU (Carrier) –Transiting –Flights Operations “Dipping Game” SOF Scenario – Minimize hiding discontinuities (hiders coming from a hider) Submarine vs. submarine example –Searcher who is also a hider –Differences in hiding between nuclear, diesel and AIP subs “The Great Scud Hide” –Any type of mobile missile launchers (TELs, Soviet nuclear trucks) Mine fields SSBN Example –Our mission is to hide

Sunday, May 17, 2015 Page 12 Investigating “Hider” Theory GROUP 2: ASW & Military Examples Operational Context: Submarine Attack on Carrier General competitive context –Orange trying to sink Blue Carrier in one of two scenarios, transiting to an operational area and carrier flight operations in a coastal area Forces, elements involved –Orange Subs OIA- Other Information Assets (aircraft to cue subs, etc.) –Blue Carrier (PRIMARY HIDER) - a big ship in a bigger ocean Subs Helicopters Other Information Assets (surface escorts, air, satellites, etc.) Environmental considerations –Water depth, distance from coastline, conditions of the body of water (salinity, temperature, bottom type, etc.)

Sunday, May 17, 2015 Page 13 Investigating “Hider” Theory Orange SubOrange OIA Blue Carrier Search & Kill HIDE Cue HIDE Blue Sub HIDE, Search & Kill Search & Kill Cue HIDE Blue Helo HIDE Search & Kill N/A Blue OIA N/A Cue Jamming, spoofing, hacking, cyberwar GROUP 2: ASW & Military Examples Operational Context: Submarine Attack on Carrier

Sunday, May 17, 2015 Page 14 Investigating “Hider” Theory GROUP 2: ASW & Military Examples Operational Context: Submarine Attack on Carrier Describe the specific Hider application –Hide what? The PRIMARY HIDER is the Blue Carrier SECONDARY HIDERS include the Orange Sub & Blue Sub –Hide where? Transiting to the area of operations Operating off the coast of a hostile country –Hide why? To provide air operations –Hide when? For duration of transit and of air operations—and return transit

Sunday, May 17, 2015 Page 15 Investigating “Hider” Theory Sub on CVSub on Sub Helo on Sub Sub on Sub R ???? V ???? T ???? A ???? P = 1 – e -2RVT/A GROUP 2: ASW & Military Examples Operational Context: Submarine Attack on Carrier – Some Pseudo-Facts

Sunday, May 17, 2015 Page 16 Investigating “Hider” Theory GROUP 2: ASW & Military Examples Operational Context: Submarine Attack on Carrier – Some Real Math Is his sub going to find my sub before my sub finds his carrier? Some math: given three exponential processes w/ rates γ1, γ2, and γ3, the probability that event i has happens first is: The γ’s are the various 2RVT/A’s.

Sunday, May 17, 2015 Page 17 Investigating “Hider” Theory Major Process Elements Hide How? –What are the major factors that impact hider success? Standoff distance from the shore, farther out you are the better you can hide Predictability of carrier movement, both during transit and during flights operations (like to turn into the wind) –What are the relationships between these major factors? –Are any of these substantially greater than the others? GROUP 2: ASW & Military Examples

Sunday, May 17, 2015 Page 18 Investigating “Hider” Theory GROUP 2: ASW & Military Examples Insights and Conclusions The importance of the duality of the searcher/hider –The notion of split personality –Each has its own behavior –However, there are links between the searcher/hider aspects of the personality There is a network of interactions searchers and hiders Local vs. global behavior –Change of behavior based on local interactions What would be the applicability of agent- based models to Hider theory?

Sunday, May 17, 2015 Page 19 Investigating “Hider” Theory Alidade Services